<?xml version="1.0" encoding="utf-8"?>
	<updates>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20211223-07</id>
		<issued date="2021-12-24" />
		<updated date="2022-03-25" />
		<title>Множественные уязвимости BusyBox </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в busybox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-busybox-cve-2021-42374-cve-2021-42380-cve-2021-42379-cve-2021-42384-cve-2/</description>
               <solution>
                    Запретить использование в ОС пакета BusyBox
                или
                    Установить обновление для пакета(ов) BusyBox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-busybox-cve-2021-42374-cve-2021-42380-cve-2021-42379-cve-2021-42384-cve-2/" type="self" id="ROS-20211223-07" title="ROS-20211223-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374" type="cve" id="CVE-2021-42374" title="CVE-2021-42374" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380" type="cve" id="CVE-2021-42380" title="CVE-2021-42380" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379" type="cve" id="CVE-2021-42379" title="CVE-2021-42379" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384" type="cve" id="CVE-2021-42384" title="CVE-2021-42384" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382" type="cve" id="CVE-2021-42382" title="CVE-2021-42382" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385" type="cve" id="CVE-2021-42385" title="CVE-2021-42385" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378" type="cve" id="CVE-2021-42378" title="CVE-2021-42378" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386" type="cve" id="CVE-2021-42386" title="CVE-2021-42386" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381" type="cve" id="CVE-2021-42381" title="CVE-2021-42381" />
			<reference href="https://bdu.fstec.ru/vul/2021-06386" type="self" id="BDU:2021-06386" title="BDU:2021-06386" />
			<reference href="https://bdu.fstec.ru/vul/2021-06395" type="self" id="BDU:2021-06395" title="BDU:2021-06395" />
			<reference href="https://bdu.fstec.ru/vul/2021-06396" type="self" id="BDU:2021-06396" title="BDU:2021-06396" />
			<reference href="https://bdu.fstec.ru/vul/2021-06387" type="self" id="BDU:2021-06387" title="BDU:2021-06387" />
			<reference href="https://bdu.fstec.ru/vul/2021-06388" type="self" id="BDU:2021-06388" title="BDU:2021-06388" />
			<reference href="https://bdu.fstec.ru/vul/2021-06397" type="self" id="BDU:2021-06397" title="BDU:2021-06397" />
			<reference href="https://bdu.fstec.ru/vul/2021-06398" type="self" id="BDU:2021-06398" title="BDU:2021-06398" />
			<reference href="https://bdu.fstec.ru/vul/2021-06389" type="self" id="BDU:2021-06389" title="BDU:2021-06389" />
			<reference href="https://bdu.fstec.ru/vul/2021-06390" type="self" id="BDU:2021-06390" title="BDU:2021-06390" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="busybox" epoch="1" version="1.34.1" release="1.el7.3" arch="x86_64" src="">
					<filename>busybox-1:1.34.1-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20211223-06</id>
		<issued date="2021-12-24" />
		<updated date="2022-03-25" />
		<title>Уязвимость Polkit </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в polkit</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-polkit-cve-2021-3560/</description>
               <solution>
                    Запретить использование в ОС пакета polkit
                или
                    Установить обновление для пакета(ов) polkit
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-polkit-cve-2021-3560/" type="self" id="ROS-20211223-06" title="ROS-20211223-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3560" type="cve" id="CVE-2021-3560" title="CVE-2021-3560" />
			<reference href="https://bdu.fstec.ru/vul/2021-03207" type="self" id="BDU:2021-03207" title="BDU:2021-03207" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="polkit" epoch="0" version="0.118" release="1.el7" arch="x86_64" src="">
					<filename>polkit-0:0.118-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20211223-05</id>
		<issued date="2021-12-24" />
		<updated date="2022-03-25" />
		<title>Уязвимость приложения компьютерной телефонии Asterisk </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в asterisk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-prilozheniya-kompyuternoy-telefonii-asterisk-cve-2021-32558/</description>
               <solution>
                    Запретить использование в ОС пакета Asterisk
                или
                    Установить обновление для пакета(ов) Asterisk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-prilozheniya-kompyuternoy-telefonii-asterisk-cve-2021-32558/" type="self" id="ROS-20211223-05" title="ROS-20211223-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32558" type="cve" id="CVE-2021-32558" title="CVE-2021-32558" />
			<reference href="https://bdu.fstec.ru/vul/2021-06391" type="self" id="BDU:2021-06391" title="BDU:2021-06391" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="asterisk" epoch="0" version="17.5.0" release="4.el7" arch="x86_64" src="">
					<filename>asterisk-0:17.5.0-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20211223-04</id>
		<issued date="2021-12-24" />
		<updated date="2022-03-25" />
		<title>Множественные уязвимости HTTP-сервера Apache </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в httpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-http-servera-apache-cve-2021-44790-cve-2021-44224/</description>
               <solution>
                    Запретить использование в ОС пакета Apache HTTP Server
                или
                    Установить обновление для пакета(ов) Apache HTTP Server
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-http-servera-apache-cve-2021-44790-cve-2021-44224/" type="self" id="ROS-20211223-04" title="ROS-20211223-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790" type="cve" id="CVE-2021-44790" title="CVE-2021-44790" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44224" type="cve" id="CVE-2021-44224" title="CVE-2021-44224" />
			<reference href="https://bdu.fstec.ru/vul/2021-06392" type="self" id="BDU:2021-06392" title="BDU:2021-06392" />
			<reference href="https://bdu.fstec.ru/vul/2021-06393" type="self" id="BDU:2021-06393" title="BDU:2021-06393" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="httpd" epoch="0" version="2.4.52" release="1.el7.3" arch="x86_64" src="">
					<filename>httpd-0:2.4.52-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20211223-03</id>
		<issued date="2021-12-24" />
		<updated date="2022-03-25" />
		<title>Множественные уязвимости OpenLDAP </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в openldap</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-openldap-cve-2021-27212-cve-2020-36221-cve-2020-36224-cve-2020-36230-cve-/</description>
               <solution>
                    Запретить использование в ОС пакета OpenLDAP
                или
                    Установить обновление для пакета(ов) OpenLDAP
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-openldap-cve-2021-27212-cve-2020-36221-cve-2020-36224-cve-2020-36230-cve-/" type="self" id="ROS-20211223-03" title="ROS-20211223-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27212" type="cve" id="CVE-2021-27212" title="CVE-2021-27212" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36221" type="cve" id="CVE-2020-36221" title="CVE-2020-36221" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36224" type="cve" id="CVE-2020-36224" title="CVE-2020-36224" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36230" type="cve" id="CVE-2020-36230" title="CVE-2020-36230" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36229" type="cve" id="CVE-2020-36229" title="CVE-2020-36229" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36228" type="cve" id="CVE-2020-36228" title="CVE-2020-36228" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36227" type="cve" id="CVE-2020-36227" title="CVE-2020-36227" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36226" type="cve" id="CVE-2020-36226" title="CVE-2020-36226" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36225" type="cve" id="CVE-2020-36225" title="CVE-2020-36225" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36223" type="cve" id="CVE-2020-36223" title="CVE-2020-36223" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36222" type="cve" id="CVE-2020-36222" title="CVE-2020-36222" />
			<reference href="https://bdu.fstec.ru/vul/2021-06394" type="self" id="BDU:2021-06394" title="BDU:2021-06394" />
			<reference href="https://bdu.fstec.ru/vul/2021-06385" type="self" id="BDU:2021-06385" title="BDU:2021-06385" />
			<reference href="https://bdu.fstec.ru/vul/2021-06399" type="self" id="BDU:2021-06399" title="BDU:2021-06399" />
			<reference href="https://bdu.fstec.ru/vul/2021-06400" type="self" id="BDU:2021-06400" title="BDU:2021-06400" />
			<reference href="https://bdu.fstec.ru/vul/2021-06401" type="self" id="BDU:2021-06401" title="BDU:2021-06401" />
			<reference href="https://bdu.fstec.ru/vul/2021-06402" type="self" id="BDU:2021-06402" title="BDU:2021-06402" />
			<reference href="https://bdu.fstec.ru/vul/2021-06403" type="self" id="BDU:2021-06403" title="BDU:2021-06403" />
			<reference href="https://bdu.fstec.ru/vul/2021-06383" type="self" id="BDU:2021-06383" title="BDU:2021-06383" />
			<reference href="https://bdu.fstec.ru/vul/2021-06384" type="self" id="BDU:2021-06384" title="BDU:2021-06384" />
			<reference href="https://bdu.fstec.ru/vul/2021-06404" type="self" id="BDU:2021-06404" title="BDU:2021-06404" />
			<reference href="https://bdu.fstec.ru/vul/2021-06405" type="self" id="BDU:2021-06405" title="BDU:2021-06405" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openldap" epoch="0" version="2.4.55" release="6.el7.3" arch="x86_64" src="">
					<filename>openldap-0:2.4.55-6.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20211223-02</id>
		<issued date="2021-12-24" />
		<updated date="2022-03-25" />
		<title>Уязвимость пакета офисных приложений LibreOffice </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в libreoffice</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-paketa-ofisnykh-prilozheniy-libreoffice-cve-2021-25633/</description>
               <solution>
                    Запретить использование в ОС пакета LibreOffice
                или
                    Установить обновление для пакета(ов) LibreOffice
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-paketa-ofisnykh-prilozheniy-libreoffice-cve-2021-25633/" type="self" id="ROS-20211223-02" title="ROS-20211223-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25633" type="cve" id="CVE-2021-25633" title="CVE-2021-25633" />
			<reference href="https://bdu.fstec.ru/vul/2021-05337" type="self" id="BDU:2021-05337" title="BDU:2021-05337" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libreoffice" epoch="1" version="7.2.2.2" release="1.el7" arch="x86_64" src="">
					<filename>libreoffice-1:7.2.2.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20211223-01</id>
		<issued date="2021-12-24" />
		<updated date="2022-03-25" />
		<title>Множественные уязвимости Log4j  </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в log4j</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-log4j-cve-2021-45105-cve-2021-45046/</description>
               <solution>
                    Запретить использование в ОС пакета log4j
                или
                    Установить обновление для пакета(ов) log4j
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-log4j-cve-2021-45105-cve-2021-45046/" type="self" id="ROS-20211223-01" title="ROS-20211223-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45105" type="cve" id="CVE-2021-45105" title="CVE-2021-45105" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046" type="cve" id="CVE-2021-45046" title="CVE-2021-45046" />
			<reference href="https://bdu.fstec.ru/vul/2021-06325" type="self" id="BDU:2021-06325" title="BDU:2021-06325" />
			<reference href="https://bdu.fstec.ru/vul/2021-06204" type="self" id="BDU:2021-06204" title="BDU:2021-06204" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="log4j" epoch="0" version="2.17.0" release="1.el7" arch="noarch" src="">
					<filename>log4j-0:2.17.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220112-04</id>
		<issued date="2022-01-12" />
		<updated date="2022-03-25" />
		<title>Множественные уязвимости Django </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в python3-django</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-django-cve-2021-45115-cve-2021-45116-cve-2021-45452/</description>
               <solution>
                    Запретить использование в ОС пакета Django
                или
                    Установить обновление для пакета(ов) Django
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-django-cve-2021-45115-cve-2021-45116-cve-2021-45452/" type="self" id="ROS-20220112-04" title="ROS-20220112-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45115" type="cve" id="CVE-2021-45115" title="CVE-2021-45115" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45116" type="cve" id="CVE-2021-45116" title="CVE-2021-45116" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45452" type="cve" id="CVE-2021-45452" title="CVE-2021-45452" />
			<reference href="https://bdu.fstec.ru/vul/2022-00352" type="self" id="BDU:2022-00352" title="BDU:2022-00352" />
			<reference href="https://bdu.fstec.ru/vul/2022-00354" type="self" id="BDU:2022-00354" title="BDU:2022-00354" />
			<reference href="https://bdu.fstec.ru/vul/2022-00353" type="self" id="BDU:2022-00353" title="BDU:2022-00353" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-django" epoch="0" version="3.2.11" release="1.el7" arch="noarch" src="">
					<filename>python3-django-0:3.2.11-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220112-03</id>
		<issued date="2022-01-12" />
		<updated date="2022-03-25" />
		<title>Уязвимость FTP-сервера vsftpd </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в vsftpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ftp-servera-vsftpd-cve-2021-3618/</description>
               <solution>
                    Запретить использование в ОС пакета vsftpd
                или
                    Установить обновление для пакета(ов) vsftpd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ftp-servera-vsftpd-cve-2021-3618/" type="self" id="ROS-20220112-03" title="ROS-20220112-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3618" type="cve" id="CVE-2021-3618" title="CVE-2021-3618" />
			<reference href="https://bdu.fstec.ru/vul/2022-00351" type="self" id="BDU:2022-00351" title="BDU:2022-00351" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vsftpd" epoch="0" version="3.0.5" release="1.el7" arch="x86_64" src="">
					<filename>vsftpd-0:3.0.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220112-02</id>
		<issued date="2022-01-12" />
		<updated date="2022-03-25" />
		<title>Уязвимость glibc </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в glibc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glibc-cve-2021-35942/</description>
               <solution>
                    Запретить использование в ОС пакета glibc
                или
                    Установить обновление для пакета(ов) glibc
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glibc-cve-2021-35942/" type="self" id="ROS-20220112-02" title="ROS-20220112-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942" type="cve" id="CVE-2021-35942" title="CVE-2021-35942" />
			<reference href="https://bdu.fstec.ru/vul/2021-03561" type="self" id="BDU:2021-03561" title="BDU:2021-03561" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glibc" epoch="0" version="2.28" release="5.el7" arch="x86_64" src="">
					<filename>glibc-0:2.28-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220112-01</id>
		<issued date="2022-01-12" />
		<updated date="2022-03-25" />
		<title>Множественные уязвимости X.Org Server </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в xorg-x11-server-Xorg</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-x-org-server-cve-2021-4008-cve-2021-4009-cve-2021-4010-cve-2021-4011/</description>
               <solution>
                    Запретить использование в ОС пакета X.Org Server
                или
                    Установить обновление для пакета(ов) X.Org Server
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-x-org-server-cve-2021-4008-cve-2021-4009-cve-2021-4010-cve-2021-4011/" type="self" id="ROS-20220112-01" title="ROS-20220112-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008" type="cve" id="CVE-2021-4008" title="CVE-2021-4008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009" type="cve" id="CVE-2021-4009" title="CVE-2021-4009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010" type="cve" id="CVE-2021-4010" title="CVE-2021-4010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011" type="cve" id="CVE-2021-4011" title="CVE-2021-4011" />
			<reference href="https://bdu.fstec.ru/vul/2022-00348" type="self" id="BDU:2022-00348" title="BDU:2022-00348" />
			<reference href="https://bdu.fstec.ru/vul/2022-00347" type="self" id="BDU:2022-00347" title="BDU:2022-00347" />
			<reference href="https://bdu.fstec.ru/vul/2022-00346" type="self" id="BDU:2022-00346" title="BDU:2022-00346" />
			<reference href="https://bdu.fstec.ru/vul/2022-00349" type="self" id="BDU:2022-00349" title="BDU:2022-00349" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="xorg-x11-server-Xorg" epoch="0" version="1.20.14" release="1.el7.3" arch="x86_64" src="">
					<filename>xorg-x11-server-Xorg-0:1.20.14-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220114-01</id>
		<issued date="2022-01-14" />
		<updated date="2022-11-07" />
		<title>Уязвимости Mozilla Firefox </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mozilla-firefox-i-thunderbird-cve-2022-22746-cve-2022-22743-cve-2022-2274/</description>
               <solution>
                    Запретить использование в ОС пакета Mozilla Firefox
                или
                    Установить обновление для пакета(ов) Mozilla Firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mozilla-firefox-i-thunderbird-cve-2022-22746-cve-2022-22743-cve-2022-2274/" type="self" id="ROS-20220114-01" title="ROS-20220114-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22746" type="cve" id="CVE-2022-22746" title="CVE-2022-22746" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743" type="cve" id="CVE-2022-22743" title="CVE-2022-22743" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742" type="cve" id="CVE-2022-22742" title="CVE-2022-22742" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741" type="cve" id="CVE-2022-22741" title="CVE-2022-22741" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740" type="cve" id="CVE-2022-22740" title="CVE-2022-22740" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738" type="cve" id="CVE-2022-22738" title="CVE-2022-22738" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737" type="cve" id="CVE-2022-22737" title="CVE-2022-22737" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140" type="cve" id="CVE-2021-4140" title="CVE-2021-4140" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748" type="cve" id="CVE-2022-22748" title="CVE-2022-22748" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745" type="cve" id="CVE-2022-22745" title="CVE-2022-22745" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22744" type="cve" id="CVE-2022-22744" title="CVE-2022-22744" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747" type="cve" id="CVE-2022-22747" title="CVE-2022-22747" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739" type="cve" id="CVE-2022-22739" title="CVE-2022-22739" />
			<reference href="https://bdu.fstec.ru/vul/2022-00287" type="self" id="BDU:2022-00287" title="BDU:2022-00287" />
			<reference href="https://bdu.fstec.ru/vul/2022-00288" type="self" id="BDU:2022-00288" title="BDU:2022-00288" />
			<reference href="https://bdu.fstec.ru/vul/2022-00289" type="self" id="BDU:2022-00289" title="BDU:2022-00289" />
			<reference href="https://bdu.fstec.ru/vul/2022-00290" type="self" id="BDU:2022-00290" title="BDU:2022-00290" />
			<reference href="https://bdu.fstec.ru/vul/2022-00291" type="self" id="BDU:2022-00291" title="BDU:2022-00291" />
			<reference href="https://bdu.fstec.ru/vul/2022-00292" type="self" id="BDU:2022-00292" title="BDU:2022-00292" />
			<reference href="https://bdu.fstec.ru/vul/2022-00293" type="self" id="BDU:2022-00293" title="BDU:2022-00293" />
			<reference href="https://bdu.fstec.ru/vul/2022-00294" type="self" id="BDU:2022-00294" title="BDU:2022-00294" />
			<reference href="https://bdu.fstec.ru/vul/2022-00295" type="self" id="BDU:2022-00295" title="BDU:2022-00295" />
			<reference href="https://bdu.fstec.ru/vul/2022-00296" type="self" id="BDU:2022-00296" title="BDU:2022-00296" />
			<reference href="https://bdu.fstec.ru/vul/2022-00297" type="self" id="BDU:2022-00297" title="BDU:2022-00297" />
			<reference href="https://bdu.fstec.ru/vul/2022-00298" type="self" id="BDU:2022-00298" title="BDU:2022-00298" />
			<reference href="https://bdu.fstec.ru/vul/2022-00299" type="self" id="BDU:2022-00299" title="BDU:2022-00299" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="91.5.0" release="1.el7.3" arch="x86_64" src="">
					<filename>firefox-0:91.5.0-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220128-03</id>
		<issued date="2022-02-01" />
		<updated date="2022-03-25" />
		<title>Уязвимость util-linux</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в util-linux</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-util-linux-cve-2021-3996-cve-2021-3995/</description>
               <solution>
                    Запретить использование в ОС пакета Util-linux
                или
                    Установить обновление для пакета(ов) Util-linux
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-util-linux-cve-2021-3996-cve-2021-3995/" type="self" id="ROS-20220128-03" title="ROS-20220128-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996" type="cve" id="CVE-2021-3996" title="CVE-2021-3996" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995" type="cve" id="CVE-2021-3995" title="CVE-2021-3995" />
			<reference href="https://bdu.fstec.ru/vul/2022-00589" type="self" id="BDU:2022-00589" title="BDU:2022-00589" />
			<reference href="https://bdu.fstec.ru/vul/2022-00588" type="self" id="BDU:2022-00588" title="BDU:2022-00588" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="util-linux" epoch="0" version="2.37.3" release="1.el7" arch="x86_64" src="">
					<filename>util-linux-0:2.37.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220128-02</id>
		<issued date="2022-02-01" />
		<updated date="2022-03-25" />
		<title>Уязвимость библиотеки изображений Python Pillow </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в python3-pillow</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-biblioteki-izobrazheniy-python-pillow-cve-2022-22817-cve-2022-22816-cve-2022-22815/</description>
               <solution>
                    Запретить использование в ОС пакета Pillow
                или
                    Установить обновление для пакета(ов) Pillow
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-biblioteki-izobrazheniy-python-pillow-cve-2022-22817-cve-2022-22816-cve-2022-22815/" type="self" id="ROS-20220128-02" title="ROS-20220128-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22817" type="cve" id="CVE-2022-22817" title="CVE-2022-22817" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22816" type="cve" id="CVE-2022-22816" title="CVE-2022-22816" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22815" type="cve" id="CVE-2022-22815" title="CVE-2022-22815" />
			<reference href="https://bdu.fstec.ru/vul/2022-00583" type="self" id="BDU:2022-00583" title="BDU:2022-00583" />
			<reference href="https://bdu.fstec.ru/vul/2022-00582" type="self" id="BDU:2022-00582" title="BDU:2022-00582" />
			<reference href="https://bdu.fstec.ru/vul/2022-00581" type="self" id="BDU:2022-00581" title="BDU:2022-00581" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-pillow" epoch="0" version="8.1.2" release="1.el7" arch="x86_64" src="">
					<filename>python3-pillow-0:8.1.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220128-01</id>
		<issued date="2022-02-01" />
		<updated date="2022-03-29" />
		<title>Уязвимость библиотеки Polkit </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в polkit</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-biblioteki-polkit-cve-2021-4034/</description>
               <solution>
                    Запретить использование в ОС пакета Polkit
                или
                    Установить обновление для пакета(ов) Polkit
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-biblioteki-polkit-cve-2021-4034/" type="self" id="ROS-20220128-01" title="ROS-20220128-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4034" type="cve" id="CVE-2021-4034" title="CVE-2021-4034" />
			<reference href="https://bdu.fstec.ru/vul/2022-00488" type="self" id="BDU:2022-00488" title="BDU:2022-00488" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="polkit" epoch="0" version="0.118" release="3.el7" arch="x86_64" src="">
					<filename>polkit-0:0.118-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220125-18</id>
		<issued date="2022-02-01" />
		<updated date="2022-03-29" />
		<title>Уязвимость гипервизора Xen</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в xen</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gipervizora-xen-cve-2021-28702/</description>
               <solution>
                    Запретить использование в ОС пакета Xen
                или
                    Установить обновление для пакета(ов) Xen
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gipervizora-xen-cve-2021-28702/" type="self" id="ROS-20220125-18" title="ROS-20220125-18" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702" type="cve" id="CVE-2021-28702" title="CVE-2021-28702" />
			<reference href="https://bdu.fstec.ru/vul/2022-00752" type="self" id="BDU:2022-00752" title="BDU:2022-00752" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="xen" epoch="0" version="4.13.2" release="4.el7" arch="x86_64" src="">
					<filename>xen-0:4.13.2-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220125-17</id>
		<issued date="2022-02-01" />
		<updated date="2025-10-09" />
		<title>Уязвимость эмулятора аппаратного обеспечения QEMU</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в qemu-common</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-emulyatora-apparatnogo-obespecheniya-qemu-cve-2021-3930-cve-2021-3930/</description>
               <solution>
                    Запретить использование в ОС пакета qemu-common
                или
                    Установить обновление для пакета(ов) qemu-common
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-emulyatora-apparatnogo-obespecheniya-qemu-cve-2021-3930-cve-2021-3930/" type="self" id="ROS-20220125-17" title="ROS-20220125-17" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3748" type="cve" id="CVE-2021-3748" title="CVE-2021-3748" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3930" type="cve" id="CVE-2021-3930" title="CVE-2021-3930" />
			<reference href="https://bdu.fstec.ru/vul/2022-00753" type="self" id="BDU:2022-00753" title="BDU:2022-00753" />
			<reference href="https://bdu.fstec.ru/vul/2022-00754" type="self" id="BDU:2022-00754" title="BDU:2022-00754" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="qemu-common" epoch="15" version="6.1.0" release="7.el7" arch="x86_64" src="">
					<filename>qemu-common-15:6.1.0-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220125-16</id>
		<issued date="2022-02-01" />
		<updated date="2022-03-24" />
		<title>Уязвимость набора инструментального ПО GNU Binary Utilities </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в binutils</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nabora-instrumentalnogo-po-gnu-binary-utilities-binutils-cve-2021-45078/</description>
               <solution>
                    Запретить использование в ОС пакета GNU Binary Utilities (binutils)
                или
                    Установить обновление для пакета(ов) GNU Binary Utilities (binutils)
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nabora-instrumentalnogo-po-gnu-binary-utilities-binutils-cve-2021-45078/" type="self" id="ROS-20220125-16" title="ROS-20220125-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078" type="cve" id="CVE-2021-45078" title="CVE-2021-45078" />
			<reference href="https://bdu.fstec.ru/vul/2022-00594" type="self" id="BDU:2022-00594" title="BDU:2022-00594" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="binutils" epoch="0" version="2.35" release="3.el7" arch="x86_64" src="">
					<filename>binutils-0:2.35-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220125-19</id>
		<issued date="2022-02-01" />
		<updated date="2024-12-23" />
		<title>Уязвимость файловой системы XFS</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-faylovoy-sistemy-xfs-cve-2021-4155/</description>
               <solution>Установить обновление для пакета(ов) ядра ОС</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-faylovoy-sistemy-xfs-cve-2021-4155/" type="self" id="ROS-20220125-19" title="ROS-20220125-19" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155" type="cve" id="CVE-2021-4155" title="CVE-2021-4155" />
			<reference href="https://bdu.fstec.ru/vul/2022-00755" type="self" id="BDU:2022-00755" title="BDU:2022-00755" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="5.15.10" release="2.el7" arch="x86_64" src="">
					<filename>kernel-lt-0:5.15.10-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220125-15</id>
		<issued date="2022-02-01" />
		<updated date="2022-03-24" />
		<title>Уязвимость криптографической библиотеки Libgcrypt</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в libgcrypt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kriptograficheskoy-biblioteki-libgcrypt-cve-2021-40528/</description>
               <solution>
                    Запретить использование в ОС пакета Libgcrypt
                или
                    Установить обновление для пакета(ов) Libgcrypt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kriptograficheskoy-biblioteki-libgcrypt-cve-2021-40528/" type="self" id="ROS-20220125-15" title="ROS-20220125-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40528" type="cve" id="CVE-2021-40528" title="CVE-2021-40528" />
			<reference href="https://bdu.fstec.ru/vul/2022-00593" type="self" id="BDU:2022-00593" title="BDU:2022-00593" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libgcrypt" epoch="0" version="1.8.6" release="3.el7" arch="x86_64" src="">
					<filename>libgcrypt-0:1.8.6-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220125-14</id>
		<issued date="2022-02-01" />
		<updated date="2022-03-29" />
		<title>Уязвимость библиотеки Lxml</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в python3-lxml</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-biblioteki-lxml-cve-2021-43818/</description>
               <solution>
                    Запретить использование в ОС пакета Lxml
                или
                    Установить обновление для пакета(ов) Lxml
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-biblioteki-lxml-cve-2021-43818/" type="self" id="ROS-20220125-14" title="ROS-20220125-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43818" type="cve" id="CVE-2021-43818" title="CVE-2021-43818" />
			<reference href="https://bdu.fstec.ru/vul/2022-00756" type="self" id="BDU:2022-00756" title="BDU:2022-00756" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-lxml" epoch="0" version="4.6.5" release="1.el7" arch="x86_64" src="">
					<filename>python3-lxml-0:4.6.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220125-13</id>
		<issued date="2022-02-01" />
		<updated date="2022-03-24" />
		<title>Уязвимость СУБД PostgreSQL</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в postgresql</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sistemy-upravleniya-bazami-dannykh-postgresql-cve-2021-23214/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql
                или
                    Установить обновление для пакета(ов) postgresql
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sistemy-upravleniya-bazami-dannykh-postgresql-cve-2021-23214/" type="self" id="ROS-20220125-13" title="ROS-20220125-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214" type="cve" id="CVE-2021-23214" title="CVE-2021-23214" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222" type="cve" id="CVE-2021-23222" title="CVE-2021-23222" />
			<reference href="https://bdu.fstec.ru/vul/2021-05857" type="self" id="BDU:2021-05857" title="BDU:2021-05857" />
			<reference href="https://bdu.fstec.ru/vul/2021-05535" type="self" id="BDU:2021-05535" title="BDU:2021-05535" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql" epoch="0" version="12.9" release="1.el7" arch="x86_64" src="">
					<filename>postgresql-0:12.9-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220125-12</id>
		<issued date="2022-02-01" />
		<updated date="2022-03-29" />
		<title>Уязвимость исполняемой среды для запуска контейнеров containerd</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в containerd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ispolnyaemoy-sredy-dlya-zapuska-konteynerov-containerd-cve-2021-41103/</description>
               <solution>
                    Запретить использование в ОС пакета containerd
                или
                    Установить обновление для пакета(ов) containerd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ispolnyaemoy-sredy-dlya-zapuska-konteynerov-containerd-cve-2021-41103/" type="self" id="ROS-20220125-12" title="ROS-20220125-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41103" type="cve" id="CVE-2021-41103" title="CVE-2021-41103" />
			<reference href="https://bdu.fstec.ru/vul/2022-00757" type="self" id="BDU:2022-00757" title="BDU:2022-00757" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="containerd" epoch="0" version="1.5.8" release="1.el7" arch="x86_64" src="">
					<filename>containerd-0:1.5.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220125-11</id>
		<issued date="2022-02-01" />
		<updated date="2022-03-24" />
		<title>Уязвимость сетевого программного средства Netty</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в netty</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-setevogo-programmnogo-sredstva-netty-cve-2021-21409-cve-2021-21295/</description>
               <solution>
                    Запретить использование в ОС пакета РЕД ОС
                или
                    Установить обновление для пакета(ов) РЕД ОС
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-setevogo-programmnogo-sredstva-netty-cve-2021-21409-cve-2021-21295/" type="self" id="ROS-20220125-11" title="ROS-20220125-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21409" type="cve" id="CVE-2021-21409" title="CVE-2021-21409" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21295" type="cve" id="CVE-2021-21295" title="CVE-2021-21295" />
			<reference href="https://bdu.fstec.ru/vul/2022-00315" type="self" id="BDU:2022-00315" title="BDU:2022-00315" />
			<reference href="https://bdu.fstec.ru/vul/2022-00303" type="self" id="BDU:2022-00303" title="BDU:2022-00303" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="netty" epoch="0" version="4.1.60" release="1.el7.3" arch="x86_64" src="">
					<filename>netty-0:4.1.60-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220125-10</id>
		<issued date="2022-02-01" />
		<updated date="2022-03-29" />
		<title>Уязвимость программной платформы Node.js</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в nodejs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-programmnoy-platformy-node-js-cve-2021-44531-cve-2021-44532-cve-2021-44533-cve-2022-21824/</description>
               <solution>
                    Запретить использование в ОС пакета Node.js
                или
                    Установить обновление для пакета(ов) Node.js
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-programmnoy-platformy-node-js-cve-2021-44531-cve-2021-44532-cve-2021-44533-cve-2022-21824/" type="self" id="ROS-20220125-10" title="ROS-20220125-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44531" type="cve" id="CVE-2021-44531" title="CVE-2021-44531" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44532" type="cve" id="CVE-2021-44532" title="CVE-2021-44532" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44533" type="cve" id="CVE-2021-44533" title="CVE-2021-44533" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824" type="cve" id="CVE-2022-21824" title="CVE-2022-21824" />
			<reference href="https://bdu.fstec.ru/vul/2022-00758" type="self" id="BDU:2022-00758" title="BDU:2022-00758" />
			<reference href="https://bdu.fstec.ru/vul/2022-00759" type="self" id="BDU:2022-00759" title="BDU:2022-00759" />
			<reference href="https://bdu.fstec.ru/vul/2022-00751" type="self" id="BDU:2022-00751" title="BDU:2022-00751" />
			<reference href="https://bdu.fstec.ru/vul/2022-00760" type="self" id="BDU:2022-00760" title="BDU:2022-00760" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs" epoch="1" version="16.13.2" release="1.el7" arch="x86_64" src="">
					<filename>nodejs-1:16.13.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220125-09</id>
		<issued date="2022-02-01" />
		<updated date="2022-03-24" />
		<title>Уязвимость библиотеки nghttp2 </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в nghttp2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-biblioteki-nghttp2-cve-ne-prisvoeno/</description>
               <solution>
                    Запретить использование в ОС пакета nghttp2
                или
                    Установить обновление для пакета(ов) nghttp2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-biblioteki-nghttp2-cve-ne-prisvoeno/" type="self" id="ROS-20220125-09" title="ROS-20220125-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=" type="cve" id="" title="" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nghttp2" epoch="0" version="1.46.0" release="1.el7.3" arch="x86_64" src="">
					<filename>nghttp2-0:1.46.0-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220125-08</id>
		<issued date="2022-02-01" />
		<updated date="2022-03-24" />
		<title>Уязвимость агента передачи почты Sendmail </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в sendmail</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-agenta-peredachi-pochty-sendmail-cve-2021-3618/</description>
               <solution>
                    Запретить использование в ОС пакета Sendmail
                или
                    Установить обновление для пакета(ов) Sendmail
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-agenta-peredachi-pochty-sendmail-cve-2021-3618/" type="self" id="ROS-20220125-08" title="ROS-20220125-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3618" type="cve" id="CVE-2021-3618" title="CVE-2021-3618" />
			<reference href="https://bdu.fstec.ru/vul/2022-00351" type="self" id="BDU:2022-00351" title="BDU:2022-00351" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="sendmail" epoch="0" version="8.16.1" release="1.el7" arch="x86_64" src="">
					<filename>sendmail-0:8.16.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220125-07</id>
		<issued date="2022-02-01" />
		<updated date="2022-03-24" />
		<title>Уязвимость растрового графического редактора GIMP</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в gimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rastrovogo-graficheskogo-redaktora-gimp-cve-2021-45463/</description>
               <solution>
                    Запретить использование в ОС пакета GIMP
                или
                    Установить обновление для пакета(ов) GIMP
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rastrovogo-graficheskogo-redaktora-gimp-cve-2021-45463/" type="self" id="ROS-20220125-07" title="ROS-20220125-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45463" type="cve" id="CVE-2021-45463" title="CVE-2021-45463" />
			<reference href="https://bdu.fstec.ru/vul/2022-02388" type="self" id="BDU:2022-02388" title="BDU:2022-02388" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gimp" epoch="2" version="2.10.30" release="1.el7" arch="x86_64" src="">
					<filename>gimp-2:2.10.30-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220125-06</id>
		<issued date="2022-02-01" />
		<updated date="2022-03-24" />
		<title>Уязвимость утилиты для развёртывания, управления пакетами Flatpak</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в flatpak</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-utility-dlya-razvyertyvaniya-upravleniya-paketami-flatpak-cve-2021-43860/</description>
               <solution>
                    Запретить использование в ОС пакета Flatpak
                или
                    Установить обновление для пакета(ов) Flatpak
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-utility-dlya-razvyertyvaniya-upravleniya-paketami-flatpak-cve-2021-43860/" type="self" id="ROS-20220125-06" title="ROS-20220125-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43860" type="cve" id="CVE-2021-43860" title="CVE-2021-43860" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="flatpak" epoch="0" version="1.10.6" release="1.el7" arch="x86_64" src="">
					<filename>flatpak-0:1.10.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220125-05</id>
		<issued date="2022-02-01" />
		<updated date="2022-03-24" />
		<title>Уязвимость пакета управления рассылками электронных писем GNU Mailman </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в mailman</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-paketa-upravleniya-rassylkami-elektronnykh-pisem-gnu-mailman-cve-2021-44227/</description>
               <solution>
                    Запретить использование в ОС пакета GNU Mailman
                или
                    Установить обновление для пакета(ов) GNU Mailman
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-paketa-upravleniya-rassylkami-elektronnykh-pisem-gnu-mailman-cve-2021-44227/" type="self" id="ROS-20220125-05" title="ROS-20220125-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44227" type="cve" id="CVE-2021-44227" title="CVE-2021-44227" />
			<reference href="https://bdu.fstec.ru/vul/2022-00592" type="self" id="BDU:2022-00592" title="BDU:2022-00592" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mailman" epoch="3" version="2.1.39" release="1.el7.3" arch="x86_64" src="">
					<filename>mailman-3:2.1.39-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220125-04</id>
		<issued date="2022-02-01" />
		<updated date="2022-03-24" />
		<title>Уязвимость библиотеки журналирования Java-программ Apache Log4j2</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в log4j</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-biblioteki-zhurnalirovaniya-java-programm-apache-log4j2-cve-2021-44832/</description>
               <solution>
                    Запретить использование в ОС пакета log4j
                или
                    Установить обновление для пакета(ов) log4j
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-biblioteki-zhurnalirovaniya-java-programm-apache-log4j2-cve-2021-44832/" type="self" id="ROS-20220125-04" title="ROS-20220125-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44832" type="cve" id="CVE-2021-44832" title="CVE-2021-44832" />
			<reference href="https://bdu.fstec.ru/vul/2022-00044" type="self" id="BDU:2022-00044" title="BDU:2022-00044" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="log4j" epoch="0" version="2.17.1" release="1.el7.3" arch="noarch" src="">
					<filename>log4j-0:2.17.1-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220125-03</id>
		<issued date="2022-02-01" />
		<updated date="2022-03-24" />
		<title>Уязвимость пакета антивирусного ПО Clam AntiVirus</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в clamav</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-paketa-antivirusnogo-po-clam-antivirus-cve-2022-20698/</description>
               <solution>
                    Запретить использование в ОС пакета ClamAV, Clam AntiVirus
                или
                    Установить обновление для пакета(ов) ClamAV, Clam AntiVirus
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-paketa-antivirusnogo-po-clam-antivirus-cve-2022-20698/" type="self" id="ROS-20220125-03" title="ROS-20220125-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20698" type="cve" id="CVE-2022-20698" title="CVE-2022-20698" />
			<reference href="https://bdu.fstec.ru/vul/2022-00587" type="self" id="BDU:2022-00587" title="BDU:2022-00587" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="clamav" epoch="0" version="0.103.5" release="1.el7.3" arch="x86_64" src="">
					<filename>clamav-0:0.103.5-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220125-02</id>
		<issued date="2022-02-01" />
		<updated date="2022-03-24" />
		<title>Уязвимость веб-сервера Nginx</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в nginx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-veb-servera-nginx-cve-2021-3618/</description>
               <solution>
                    Запретить использование в ОС пакета Nginx
                или
                    Установить обновление для пакета(ов) Nginx
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-veb-servera-nginx-cve-2021-3618/" type="self" id="ROS-20220125-02" title="ROS-20220125-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3618" type="cve" id="CVE-2021-3618" title="CVE-2021-3618" />
			<reference href="https://bdu.fstec.ru/vul/2022-00351" type="self" id="BDU:2022-00351" title="BDU:2022-00351" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nginx" epoch="1" version="1.18.0" release="6.el7" arch="x86_64" src="">
					<filename>nginx-1:1.18.0-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220125-20</id>
		<issued date="2022-02-01" />
		<updated date="2024-11-18" />
		<title>Уязвимость пакета Cryptsetup</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в cryptsetup</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-paketa-cryptsetup-cve-2021-4122/</description>
               <solution>
                    Запретить использование в ОС пакета Cryptsetup
                или
                    Установить обновление для пакета(ов) Cryptsetup
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-paketa-cryptsetup-cve-2021-4122/" type="self" id="ROS-20220125-20" title="ROS-20220125-20" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4122" type="cve" id="CVE-2021-4122" title="CVE-2021-4122" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cryptsetup" epoch="0" version="2.3.7" release="4.el7" arch="x86_64" src="">
					<filename>cryptsetup-0:2.3.7-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220125-01</id>
		<issued date="2022-02-01" />
		<updated date="2022-03-24" />
		<title>Уязвимость HTTP-клиента для Python urllib3</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в python3-urllib3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-http-klienta-dlya-python-urllib3-cve-2021-33503/</description>
               <solution>
                    Запретить использование в ОС пакета urllib3
                или
                    Установить обновление для пакета(ов) urllib3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-http-klienta-dlya-python-urllib3-cve-2021-33503/" type="self" id="ROS-20220125-01" title="ROS-20220125-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33503" type="cve" id="CVE-2021-33503" title="CVE-2021-33503" />
			<reference href="https://bdu.fstec.ru/vul/2022-00586" type="self" id="BDU:2022-00586" title="BDU:2022-00586" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-urllib3" epoch="0" version="1.26.5" release="1.el7.3" arch="noarch" src="">
					<filename>python3-urllib3-0:1.26.5-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220202-01</id>
		<issued date="2022-02-02" />
		<updated date="2022-03-24" />
		<title>Уязвимость GLPI </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2022-21720-cve-2022-21719/</description>
               <solution>
                    Запретить использование в ОС пакета GLPI 
                или
                    Установить обновление для пакета(ов) GLPI 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2022-21720-cve-2022-21719/" type="self" id="ROS-20220202-01" title="ROS-20220202-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21720" type="cve" id="CVE-2022-21720" title="CVE-2022-21720" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21719" type="cve" id="CVE-2022-21719" title="CVE-2022-21719" />
			<reference href="https://bdu.fstec.ru/vul/2022-00591" type="self" id="BDU:2022-00591" title="BDU:2022-00591" />
			<reference href="https://bdu.fstec.ru/vul/2022-00590" type="self" id="BDU:2022-00590" title="BDU:2022-00590" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi" epoch="0" version="9.5.7" release="3.el7" arch="noarch" src="">
					<filename>glpi-0:9.5.7-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220204-01</id>
		<issued date="2022-02-22" />
		<updated date="2022-03-24" />
		<title>Уязвимость фреймворка Django </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в python3-django</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-freymvorka-django-cve-2022-22818-cve-2022-23833/</description>
               <solution>
                    Запретить использование в ОС пакета Django
                или
                    Установить обновление для пакета(ов) Django
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-freymvorka-django-cve-2022-22818-cve-2022-23833/" type="self" id="ROS-20220204-01" title="ROS-20220204-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22818" type="cve" id="CVE-2022-22818" title="CVE-2022-22818" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23833" type="cve" id="CVE-2022-23833" title="CVE-2022-23833" />
			<reference href="https://bdu.fstec.ru/vul/2022-00584" type="self" id="BDU:2022-00584" title="BDU:2022-00584" />
			<reference href="https://bdu.fstec.ru/vul/2022-00585" type="self" id="BDU:2022-00585" title="BDU:2022-00585" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-django" epoch="0" version="3.2.12" release="1.el7" arch="noarch" src="">
					<filename>python3-django-0:3.2.12-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220207-01</id>
		<issued date="2022-02-22" />
		<updated date="2022-03-31" />
		<title>Уязвимость ядра Linux </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-yadra-linux-cve-2021-43267-cve-2021-38201-cve-2021-3653-cve-2021-3656-cve-2021-41073/</description>
               <solution>
                    Установить обновление для пакета(ов) ядра РЕД ОС согласно инструкции 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-yadra-linux-cve-2021-43267-cve-2021-38201-cve-2021-3653-cve-2021-3656-cve-2021-41073/" type="self" id="ROS-20220207-01" title="ROS-20220207-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43267" type="cve" id="CVE-2021-43267" title="CVE-2021-43267" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38201" type="cve" id="CVE-2021-38201" title="CVE-2021-38201" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3653" type="cve" id="CVE-2021-3653" title="CVE-2021-3653" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3656" type="cve" id="CVE-2021-3656" title="CVE-2021-3656" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41073" type="cve" id="CVE-2021-41073" title="CVE-2021-41073" />
			<reference href="https://bdu.fstec.ru/vul/2021-05673" type="self" id="BDU:2021-05673" title="BDU:2021-05673" />
			<reference href="https://bdu.fstec.ru/vul/2021-04711" type="self" id="BDU:2021-04711" title="BDU:2021-04711" />
			<reference href="https://bdu.fstec.ru/vul/2022-00682" type="self" id="BDU:2022-00682" title="BDU:2022-00682" />
			<reference href="https://bdu.fstec.ru/vul/2022-00683" type="self" id="BDU:2022-00683" title="BDU:2022-00683" />
			<reference href="https://bdu.fstec.ru/vul/2022-00681" type="self" id="BDU:2022-00681" title="BDU:2022-00681" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="5.15.10" release="1.el7" arch="x86_64" src="">
					<filename>kernel-lt-0:5.15.10-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220208-01</id>
		<issued date="2022-02-22" />
		<updated date="2022-03-24" />
		<title>Уязвимость сетевой файловой системы Samba</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в samba</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-setevoy-faylovoy-sistemy-samba-cve-2021-44141-cve-2021-44142-cve-2022-0336/</description>
               <solution>
                    Запретить использование в ОС пакета Samba
                или
                    Установить обновление для пакета(ов) Samba
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-setevoy-faylovoy-sistemy-samba-cve-2021-44141-cve-2021-44142-cve-2022-0336/" type="self" id="ROS-20220208-01" title="ROS-20220208-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44141" type="cve" id="CVE-2021-44141" title="CVE-2021-44141" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142" type="cve" id="CVE-2021-44142" title="CVE-2021-44142" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0336" type="cve" id="CVE-2022-0336" title="CVE-2022-0336" />
			<reference href="https://bdu.fstec.ru/vul/2022-00685" type="self" id="BDU:2022-00685" title="BDU:2022-00685" />
			<reference href="https://bdu.fstec.ru/vul/2022-00579" type="self" id="BDU:2022-00579" title="BDU:2022-00579" />
			<reference href="https://bdu.fstec.ru/vul/2022-00684" type="self" id="BDU:2022-00684" title="BDU:2022-00684" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="samba" epoch="0" version="4.15.5" release="1.el7.3" arch="x86_64" src="">
					<filename>samba-0:4.15.5-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220209-01</id>
		<issued date="2022-02-22" />
		<updated date="2022-03-24" />
		<title>Уязвимость DNS-сервера BIND</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в bind</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dns-servera-bind-cve-2021-25219/</description>
               <solution>
                    Запретить использование в ОС пакета BIND
                или
                    Установить обновление для пакета(ов) BIND
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dns-servera-bind-cve-2021-25219/" type="self" id="ROS-20220209-01" title="ROS-20220209-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25219" type="cve" id="CVE-2021-25219" title="CVE-2021-25219" />
			<reference href="https://bdu.fstec.ru/vul/2022-00686" type="self" id="BDU:2022-00686" title="BDU:2022-00686" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="bind" epoch="32" version="9.16.16" release="3.el7" arch="x86_64" src="">
					<filename>bind-32:9.16.16-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220210-01</id>
		<issued date="2022-02-22" />
		<updated date="2022-03-24" />
		<title>Уязвимость браузера Mozilla Firefox и почтового клиента Mozilla Thunderbird </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-brauzera-mozilla-firefox-i-pochtovogo-klienta-mozilla-thunderbird-cve-2022-22754-cve-2022/</description>
               <solution>
                    Запретить использование в ОС пакета Mozilla Firefox/Thunderbird
                или
                    Установить обновление для пакета(ов) Mozilla Firefox/Thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-brauzera-mozilla-firefox-i-pochtovogo-klienta-mozilla-thunderbird-cve-2022-22754-cve-2022/" type="self" id="ROS-20220210-01" title="ROS-20220210-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22754" type="cve" id="CVE-2022-22754" title="CVE-2022-22754" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22756" type="cve" id="CVE-2022-22756" title="CVE-2022-22756" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22759" type="cve" id="CVE-2022-22759" title="CVE-2022-22759" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22760" type="cve" id="CVE-2022-22760" title="CVE-2022-22760" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22761" type="cve" id="CVE-2022-22761" title="CVE-2022-22761" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22764" type="cve" id="CVE-2022-22764" title="CVE-2022-22764" />
			<reference href="https://bdu.fstec.ru/vul/2022-00807" type="self" id="BDU:2022-00807" title="BDU:2022-00807" />
			<reference href="https://bdu.fstec.ru/vul/2022-00808" type="self" id="BDU:2022-00808" title="BDU:2022-00808" />
			<reference href="https://bdu.fstec.ru/vul/2022-00809" type="self" id="BDU:2022-00809" title="BDU:2022-00809" />
			<reference href="https://bdu.fstec.ru/vul/2022-00804" type="self" id="BDU:2022-00804" title="BDU:2022-00804" />
			<reference href="https://bdu.fstec.ru/vul/2022-00803" type="self" id="BDU:2022-00803" title="BDU:2022-00803" />
			<reference href="https://bdu.fstec.ru/vul/2022-00802" type="self" id="BDU:2022-00802" title="BDU:2022-00802" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="91.6.0" release="1.el7.3" arch="x86_64" src="">
					<filename>firefox-0:91.6.0-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220210-03</id>
		<issued date="2022-02-22" />
		<updated date="2024-12-23" />
		<title>Уязвимость клиентской библиотеки HTTP httplib2</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в python3-httplib2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-klientskoy-biblioteki-http-httplib2-cve-2021-21240/</description>
               <solution>
                    Запретить использование в ОС пакета httplib2
                или
                    Установить обновление для пакета(ов) httplib2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-klientskoy-biblioteki-http-httplib2-cve-2021-21240/" type="self" id="ROS-20220210-03" title="ROS-20220210-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21240" type="cve" id="CVE-2021-21240" title="CVE-2021-21240" />
			<reference href="https://bdu.fstec.ru/vul/2022-00801" type="self" id="BDU:2022-00801" title="BDU:2022-00801" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-httplib2" epoch="0" version="0.20.3" release="1.el7.3" arch="noarch" src="">
					<filename>python3-httplib2-0:0.20.3-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220217-02</id>
		<issued date="2022-02-22" />
		<updated date="2022-03-24" />
		<title>Уязвимость почтового клиента Mozilla Thunderbird</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pochtovogo-klienta-mozilla-thunderbird-cve-2022-0566/</description>
               <solution>
                    Запретить использование в ОС пакета thunderbird
                или
                    Установить обновление для пакета(ов) thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pochtovogo-klienta-mozilla-thunderbird-cve-2022-0566/" type="self" id="ROS-20220217-02" title="ROS-20220217-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0566" type="cve" id="CVE-2022-0566" title="CVE-2022-0566" />
			<reference href="https://bdu.fstec.ru/vul/2022-01072" type="self" id="BDU:2022-01072" title="BDU:2022-01072" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="91.6.1" release="1.el7.3" arch="x86_64" src="">
					<filename>thunderbird-0:91.6.1-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220217-01</id>
		<issued date="2022-02-22" />
		<updated date="2022-03-24" />
		<title>Уязвимость системы управления базами данных MariaDB</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в mariadb</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sistemy-upravleniya-bazami-dannykh-mariadb-cve-2022-24052-cve-2022-24051-cve-2022-24050-c/</description>
               <solution>
                    Запретить использование в ОС пакета MariaDB
                или
                    Установить обновление для пакета(ов) MariaDB
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sistemy-upravleniya-bazami-dannykh-mariadb-cve-2022-24052-cve-2022-24051-cve-2022-24050-c/" type="self" id="ROS-20220217-01" title="ROS-20220217-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24052" type="cve" id="CVE-2022-24052" title="CVE-2022-24052" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24051" type="cve" id="CVE-2022-24051" title="CVE-2022-24051" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24050" type="cve" id="CVE-2022-24050" title="CVE-2022-24050" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24048" type="cve" id="CVE-2022-24048" title="CVE-2022-24048" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46659" type="cve" id="CVE-2021-46659" title="CVE-2021-46659" />
			<reference href="https://bdu.fstec.ru/vul/2022-00883" type="self" id="BDU:2022-00883" title="BDU:2022-00883" />
			<reference href="https://bdu.fstec.ru/vul/2022-00837" type="self" id="BDU:2022-00837" title="BDU:2022-00837" />
			<reference href="https://bdu.fstec.ru/vul/2022-00887" type="self" id="BDU:2022-00887" title="BDU:2022-00887" />
			<reference href="https://bdu.fstec.ru/vul/2022-00903" type="self" id="BDU:2022-00903" title="BDU:2022-00903" />
			<reference href="https://bdu.fstec.ru/vul/2022-01074" type="self" id="BDU:2022-01074" title="BDU:2022-01074" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mariadb" epoch="3" version="10.5.15" release="1.el7" arch="x86_64" src="">
					<filename>mariadb-3:10.5.15-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220225-03</id>
		<issued date="2022-02-25" />
		<updated date="2022-03-24" />
		<title>Уязвимость командной оболочки zsh </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в zsh</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-komandnoy-obolochki-zsh-cve-2021-45444/</description>
               <solution>
                    Запретить использование в ОС пакета zsh
                или
                    Установить обновление для пакета(ов) zsh
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-komandnoy-obolochki-zsh-cve-2021-45444/" type="self" id="ROS-20220225-03" title="ROS-20220225-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45444" type="cve" id="CVE-2021-45444" title="CVE-2021-45444" />
			<reference href="https://bdu.fstec.ru/vul/2022-01068" type="self" id="BDU:2022-01068" title="BDU:2022-01068" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zsh" epoch="0" version="5.6.1" release="5.el7" arch="x86_64" src="">
					<filename>zsh-0:5.6.1-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220225-02</id>
		<issued date="2022-02-25" />
		<updated date="2022-03-24" />
		<title>Уязвимость системы управления содержимым Drupal</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в drupal7</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sistemy-upravleniya-soderzhimym-drupal-cve-2022-25270-cve-2022-25271/</description>
               <solution>
                    Запретить использование в ОС пакета Drupal
                или
                    Установить обновление для пакета(ов) Drupal
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sistemy-upravleniya-soderzhimym-drupal-cve-2022-25270-cve-2022-25271/" type="self" id="ROS-20220225-02" title="ROS-20220225-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25270" type="cve" id="CVE-2022-25270" title="CVE-2022-25270" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25271" type="cve" id="CVE-2022-25271" title="CVE-2022-25271" />
			<reference href="https://bdu.fstec.ru/vul/2022-01067" type="self" id="BDU:2022-01067" title="BDU:2022-01067" />
			<reference href="https://bdu.fstec.ru/vul/2022-01066" type="self" id="BDU:2022-01066" title="BDU:2022-01066" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="drupal7" epoch="0" version="7.88" release="1.el7.3" arch="noarch" src="">
					<filename>drupal7-0:7.88-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220225-01</id>
		<issued date="2022-02-25" />
		<updated date="2022-03-24" />
		<title>Уязвимость библиотеки парсинга Expat </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в expat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-biblioteki-parsinga-expat-cve-2022-25236-cve-2022-25313-cve-2022-25235-cve-2022-25314-cve/</description>
               <solution>
                    Запретить использование в ОС пакета Expat
                или
                    Установить обновление для пакета(ов) Expat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-biblioteki-parsinga-expat-cve-2022-25236-cve-2022-25313-cve-2022-25235-cve-2022-25314-cve/" type="self" id="ROS-20220225-01" title="ROS-20220225-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236" type="cve" id="CVE-2022-25236" title="CVE-2022-25236" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313" type="cve" id="CVE-2022-25313" title="CVE-2022-25313" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235" type="cve" id="CVE-2022-25235" title="CVE-2022-25235" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25314" type="cve" id="CVE-2022-25314" title="CVE-2022-25314" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315" type="cve" id="CVE-2022-25315" title="CVE-2022-25315" />
			<reference href="https://bdu.fstec.ru/vul/2022-01065" type="self" id="BDU:2022-01065" title="BDU:2022-01065" />
			<reference href="https://bdu.fstec.ru/vul/2022-01064" type="self" id="BDU:2022-01064" title="BDU:2022-01064" />
			<reference href="https://bdu.fstec.ru/vul/2022-01063" type="self" id="BDU:2022-01063" title="BDU:2022-01063" />
			<reference href="https://bdu.fstec.ru/vul/2022-01062" type="self" id="BDU:2022-01062" title="BDU:2022-01062" />
			<reference href="https://bdu.fstec.ru/vul/2022-01071" type="self" id="BDU:2022-01071" title="BDU:2022-01071" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="expat" epoch="0" version="2.4.1" release="2.el7" arch="x86_64" src="">
					<filename>expat-0:2.4.1-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220301-01</id>
		<issued date="2022-03-01" />
		<updated date="2022-03-24" />
		<title>Уязвимость инструмента песочницы Bubblewrap</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в bubblewrap</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-instrumenta-pesochnitsy-bubblewrap-cve-2021-4034/</description>
               <solution>
                    Запретить использование в ОС пакета Bubblewrap
                или
                    Установить обновление для пакета(ов) Bubblewrap
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-instrumenta-pesochnitsy-bubblewrap-cve-2021-4034/" type="self" id="ROS-20220301-01" title="ROS-20220301-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4034" type="cve" id="CVE-2021-4034" title="CVE-2021-4034" />
			<reference href="https://bdu.fstec.ru/vul/2022-00488" type="self" id="BDU:2022-00488" title="BDU:2022-00488" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="bubblewrap" epoch="0" version="0.6.1" release="1.el7.3" arch="x86_64" src="">
					<filename>bubblewrap-0:0.6.1-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220301-02</id>
		<issued date="2022-03-01" />
		<updated date="2024-12-23" />
		<title>Уязвимость текстового редактора Vim</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в vim-X11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tekstovogo-redaktora-vim-cve-2022-0696/</description>
               <solution>
                    Запретить использование в ОС пакета Vim
                или
                    Установить обновление для пакета(ов) Vim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tekstovogo-redaktora-vim-cve-2022-0696/" type="self" id="ROS-20220301-02" title="ROS-20220301-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0696" type="cve" id="CVE-2022-0696" title="CVE-2022-0696" />
			<reference href="https://bdu.fstec.ru/vul/2022-01055" type="self" id="BDU:2022-01055" title="BDU:2022-01055" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-X11" epoch="2" version="8.2.4460" release="2.el7" arch="x86_64" src="">
					<filename>vim-X11-2:8.2.4460-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220304-01</id>
		<issued date="2022-03-04" />
		<updated date="2022-03-29" />
		<title>Множественные уязвимости snapd </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в snapd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-snapd-cve-2021-44730-cve-2021-44731-cve-2021-4120/</description>
               <solution>
                    Запретить использование в ОС пакета snapd
                или
                    Установить обновление для пакета(ов) snapd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-snapd-cve-2021-44730-cve-2021-44731-cve-2021-4120/" type="self" id="ROS-20220304-01" title="ROS-20220304-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44730" type="cve" id="CVE-2021-44730" title="CVE-2021-44730" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44731" type="cve" id="CVE-2021-44731" title="CVE-2021-44731" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4120" type="cve" id="CVE-2021-4120" title="CVE-2021-4120" />
			<reference href="https://bdu.fstec.ru/vul/2022-01460" type="self" id="BDU:2022-01460" title="BDU:2022-01460" />
			<reference href="https://bdu.fstec.ru/vul/2022-01445" type="self" id="BDU:2022-01445" title="BDU:2022-01445" />
			<reference href="https://bdu.fstec.ru/vul/2022-01444" type="self" id="BDU:2022-01444" title="BDU:2022-01444" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="snapd" epoch="0" version="2.54.3" release="7.el7" arch="x86_64" src="">
					<filename>snapd-0:2.54.3-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220309-02</id>
		<issued date="2022-03-09" />
		<updated date="2022-03-24" />
		<title>Уязвимость браузера Mozilla Firefox </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-brauzera-mozilla-firefox-cve-2022-26485-cve-2022-26486/</description>
               <solution>
                    Запретить использование в ОС пакета firefox
                или
                    Установить обновление для пакета(ов) firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-brauzera-mozilla-firefox-cve-2022-26485-cve-2022-26486/" type="self" id="ROS-20220309-02" title="ROS-20220309-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26485" type="cve" id="CVE-2022-26485" title="CVE-2022-26485" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26486" type="cve" id="CVE-2022-26486" title="CVE-2022-26486" />
			<reference href="https://bdu.fstec.ru/vul/2022-01146" type="self" id="BDU:2022-01146" title="BDU:2022-01146" />
			<reference href="https://bdu.fstec.ru/vul/2022-01147" type="self" id="BDU:2022-01147" title="BDU:2022-01147" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="91.6.1" release="1.el7.3" arch="x86_64" src="">
					<filename>firefox-0:91.6.1-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220309-01</id>
		<issued date="2022-03-09" />
		<updated date="2022-03-29" />
		<title>Уязвимость реализации механизма аутентификации cyrus-sasl </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в cyrus-sasl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-realizatsii-mekhanizma-autentifikatsii-cyrus-sasl-cve-2022-24407/</description>
               <solution>
                    Запретить использование в ОС пакета Cyrus-sasl
                или
                    Установить обновление для пакета(ов) Cyrus-sasl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-realizatsii-mekhanizma-autentifikatsii-cyrus-sasl-cve-2022-24407/" type="self" id="ROS-20220309-01" title="ROS-20220309-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407" type="cve" id="CVE-2022-24407" title="CVE-2022-24407" />
			<reference href="https://bdu.fstec.ru/vul/2022-01443" type="self" id="BDU:2022-01443" title="BDU:2022-01443" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cyrus-sasl" epoch="0" version="2.1.27" release="5.el7" arch="x86_64" src="">
					<filename>cyrus-sasl-0:2.1.27-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220310-01</id>
		<issued date="2022-03-10" />
		<updated date="2022-03-29" />
		<title>Множественные уязвимости мультимедийной коммуникационной библиотеки PJSIP</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в pjproject</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-multimediynoy-kommunikatsionnoy-biblioteki-pjsip-cve-2021-43299-cve-2021-/</description>
               <solution>
                    Запретить использование в ОС пакета PJSIP
                или
                    Установить обновление для пакета(ов) PJSIP
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-multimediynoy-kommunikatsionnoy-biblioteki-pjsip-cve-2021-43299-cve-2021-/" type="self" id="ROS-20220310-01" title="ROS-20220310-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299" type="cve" id="CVE-2021-43299" title="CVE-2021-43299" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300" type="cve" id="CVE-2021-43300" title="CVE-2021-43300" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301" type="cve" id="CVE-2021-43301" title="CVE-2021-43301" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302" type="cve" id="CVE-2021-43302" title="CVE-2021-43302" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303" type="cve" id="CVE-2021-43303" title="CVE-2021-43303" />
			<reference href="https://bdu.fstec.ru/vul/2022-01452" type="self" id="BDU:2022-01452" title="BDU:2022-01452" />
			<reference href="https://bdu.fstec.ru/vul/2022-01451" type="self" id="BDU:2022-01451" title="BDU:2022-01451" />
			<reference href="https://bdu.fstec.ru/vul/2022-01449" type="self" id="BDU:2022-01449" title="BDU:2022-01449" />
			<reference href="https://bdu.fstec.ru/vul/2022-01458" type="self" id="BDU:2022-01458" title="BDU:2022-01458" />
			<reference href="https://bdu.fstec.ru/vul/2022-01450" type="self" id="BDU:2022-01450" title="BDU:2022-01450" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pjproject" epoch="0" version="2.7.2" release="7.el7" arch="x86_64" src="">
					<filename>pjproject-0:2.7.2-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220314-02</id>
		<issued date="2022-03-14" />
		<updated date="2022-03-24" />
		<title>Уязвимость ядра операционной системы Linux </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-yadra-operatsionnoy-sistemy-linux-cve-2022-0847/</description>
               <solution>
                    Установить обновление для пакета(ов) ядра РЕД ОС
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-yadra-operatsionnoy-sistemy-linux-cve-2022-0847/" type="self" id="ROS-20220314-02" title="ROS-20220314-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847" type="cve" id="CVE-2022-0847" title="CVE-2022-0847" />
			<reference href="https://bdu.fstec.ru/vul/2022-01166" type="self" id="BDU:2022-01166" title="BDU:2022-01166" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="5.15.10" release="3.el7" arch="x86_64" src="">
					<filename>kernel-lt-0:5.15.10-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220314-01</id>
		<issued date="2022-03-14" />
		<updated date="2022-03-29" />
		<title>Множественные уязвимости Mozilla Firefox </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mozilla-firefox-cve-2022-26383-cve-2022-26384-cve-2022-26387-cve-2022-263/</description>
               <solution>
                    Запретить использование в ОС пакета Mozilla Firefox
                или
                    Установить обновление для пакета(ов) Mozilla Firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mozilla-firefox-cve-2022-26383-cve-2022-26384-cve-2022-26387-cve-2022-263/" type="self" id="ROS-20220314-01" title="ROS-20220314-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26383" type="cve" id="CVE-2022-26383" title="CVE-2022-26383" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26384" type="cve" id="CVE-2022-26384" title="CVE-2022-26384" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26387" type="cve" id="CVE-2022-26387" title="CVE-2022-26387" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26381" type="cve" id="CVE-2022-26381" title="CVE-2022-26381" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26386" type="cve" id="CVE-2022-26386" title="CVE-2022-26386" />
			<reference href="https://bdu.fstec.ru/vul/2022-01446" type="self" id="BDU:2022-01446" title="BDU:2022-01446" />
			<reference href="https://bdu.fstec.ru/vul/2022-01448" type="self" id="BDU:2022-01448" title="BDU:2022-01448" />
			<reference href="https://bdu.fstec.ru/vul/2022-01454" type="self" id="BDU:2022-01454" title="BDU:2022-01454" />
			<reference href="https://bdu.fstec.ru/vul/2022-01447" type="self" id="BDU:2022-01447" title="BDU:2022-01447" />
			<reference href="https://bdu.fstec.ru/vul/2022-01459" type="self" id="BDU:2022-01459" title="BDU:2022-01459" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="91.7.0" release="1.el7.3" arch="x86_64" src="">
					<filename>firefox-0:91.7.0-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220315-01</id>
		<issued date="2022-03-15" />
		<updated date="2022-03-29" />
		<title>Уязвимость libxml2</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в libxml2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libxml2-cve-2022-23308/</description>
               <solution>
                    Запретить использование в ОС пакета libxml2
                или
                    Установить обновление для пакета(ов) libxml2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libxml2-cve-2022-23308/" type="self" id="ROS-20220315-01" title="ROS-20220315-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23308" type="cve" id="CVE-2022-23308" title="CVE-2022-23308" />
			<reference href="https://bdu.fstec.ru/vul/2022-01453" type="self" id="BDU:2022-01453" title="BDU:2022-01453" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libxml2" epoch="0" version="2.9.8" release="10.el7.3" arch="x86_64" src="">
					<filename>libxml2-0:2.9.8-10.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220317-01</id>
		<issued date="2022-03-17" />
		<updated date="2022-03-29" />
		<title>Множественные уязвимости Apache HTTP Server</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в httpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-apache-http-server-cve-2022-23943-cve-2022-22719-cve-2022-22720-cve-2022-/</description>
               <solution>
                    Запретить использование в ОС пакета Apache HTTP Server
                или
                    Установить обновление для пакета(ов) Apache HTTP Server
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-apache-http-server-cve-2022-23943-cve-2022-22719-cve-2022-22720-cve-2022-/" type="self" id="ROS-20220317-01" title="ROS-20220317-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23943" type="cve" id="CVE-2022-23943" title="CVE-2022-23943" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22721" type="cve" id="CVE-2022-22721" title="CVE-2022-22721" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22720" type="cve" id="CVE-2022-22720" title="CVE-2022-22720" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22719" type="cve" id="CVE-2022-22719" title="CVE-2022-22719" />
			<reference href="https://bdu.fstec.ru/vul/2022-01461" type="self" id="BDU:2022-01461" title="BDU:2022-01461" />
			<reference href="https://bdu.fstec.ru/vul/2022-01455" type="self" id="BDU:2022-01455" title="BDU:2022-01455" />
			<reference href="https://bdu.fstec.ru/vul/2022-01456" type="self" id="BDU:2022-01456" title="BDU:2022-01456" />
			<reference href="https://bdu.fstec.ru/vul/2022-01457" type="self" id="BDU:2022-01457" title="BDU:2022-01457" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="httpd" epoch="0" version="2.4.53" release="1.el7.3" arch="x86_64" src="">
					<filename>httpd-0:2.4.53-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220318-03</id>
		<issued date="2022-03-18" />
		<updated date="2022-03-24" />
		<title>Уязвимость библиотеки Polkit </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в polkit</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-biblioteki-polkit-cve-2021-4115/</description>
               <solution>
                    Запретить использование в ОС пакета Polkit
                или
                    Установить обновление для пакета(ов) Polkit
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-biblioteki-polkit-cve-2021-4115/" type="self" id="ROS-20220318-03" title="ROS-20220318-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4115" type="cve" id="CVE-2021-4115" title="CVE-2021-4115" />
			<reference href="https://bdu.fstec.ru/vul/2022-01462" type="self" id="BDU:2022-01462" title="BDU:2022-01462" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="polkit" epoch="0" version="0.118" release="4.el7" arch="x86_64" src="">
					<filename>polkit-0:0.118-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220318-02</id>
		<issued date="2022-03-18" />
		<updated date="2022-03-24" />
		<title>Уязвимость библиотеки OpenSSL</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в openssl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-biblioteki-openssl-cve-2022-0778/</description>
               <solution>
                    Запретить использование в ОС пакета РЕД ОС OpenSSL
                или
                    Установить обновление для пакета(ов) РЕД ОС OpenSSL
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-biblioteki-openssl-cve-2022-0778/" type="self" id="ROS-20220318-02" title="ROS-20220318-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778" type="cve" id="CVE-2022-0778" title="CVE-2022-0778" />
			<reference href="https://bdu.fstec.ru/vul/2022-01315" type="self" id="BDU:2022-01315" title="BDU:2022-01315" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl" epoch="1" version="1.1.1g" release="18.el7" arch="x86_64" src="">
					<filename>openssl-1:1.1.1g-18.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220318-01</id>
		<issued date="2022-03-18" />
		<updated date="2022-03-29" />
		<title>Уязвимости Webmin </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в webmin</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimosti-webmin-cve-2022-0824-cve-2022-0829/</description>
               <solution>
                    Запретить использование в ОС пакета Webmin
                или
                    Установить обновление для пакета(ов) Webmin
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimosti-webmin-cve-2022-0824-cve-2022-0829/" type="self" id="ROS-20220318-01" title="ROS-20220318-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0824" type="cve" id="CVE-2022-0824" title="CVE-2022-0824" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0829" type="cve" id="CVE-2022-0829" title="CVE-2022-0829" />
			<reference href="https://bdu.fstec.ru/vul/2022-01518" type="self" id="BDU:2022-01518" title="BDU:2022-01518" />
			<reference href="https://bdu.fstec.ru/vul/2022-01517" type="self" id="BDU:2022-01517" title="BDU:2022-01517" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="webmin" epoch="0" version="1.981" release="3.el7" arch="noarch" src="">
					<filename>webmin-0:1.981-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220322-02</id>
		<issued date="2022-03-22" />
		<updated date="2022-03-29" />
		<title>Множественные уязвимости libarchive</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в libarchive</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libarchive-cve-2021-31566-cve-2021-23177/</description>
               <solution>
                    Запретить использование в ОС пакета libarchive
                или
                    Установить обновление для пакета(ов) libarchive
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libarchive-cve-2021-31566-cve-2021-23177/" type="self" id="ROS-20220322-02" title="ROS-20220322-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31566" type="cve" id="CVE-2021-31566" title="CVE-2021-31566" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23177" type="cve" id="CVE-2021-23177" title="CVE-2021-23177" />
			<reference href="https://bdu.fstec.ru/vul/2022-01464" type="self" id="BDU:2022-01464" title="BDU:2022-01464" />
			<reference href="https://bdu.fstec.ru/vul/2022-01463" type="self" id="BDU:2022-01463" title="BDU:2022-01463" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libarchive" epoch="0" version="3.4.3" release="3.el7" arch="x86_64" src="">
					<filename>libarchive-0:3.4.3-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220322-01</id>
		<issued date="2022-03-22" />
		<updated date="2022-03-29" />
		<title>Множественные уязвимости Mozilla Thunderbird</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mozilla-thunderbird-cve-2022-26383-cve-2022-26384-cve-2022-26387-cve-2022/</description>
               <solution>
                    Запретить использование в ОС пакета Mozilla Thunderbird
                или
                    Установить обновление для пакета(ов) Mozilla Thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mozilla-thunderbird-cve-2022-26383-cve-2022-26384-cve-2022-26387-cve-2022/" type="self" id="ROS-20220322-01" title="ROS-20220322-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26387" type="cve" id="CVE-2022-26387" title="CVE-2022-26387" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26386" type="cve" id="CVE-2022-26386" title="CVE-2022-26386" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26383" type="cve" id="CVE-2022-26383" title="CVE-2022-26383" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26384" type="cve" id="CVE-2022-26384" title="CVE-2022-26384" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26381" type="cve" id="CVE-2022-26381" title="CVE-2022-26381" />
			<reference href="https://bdu.fstec.ru/vul/2022-01454" type="self" id="BDU:2022-01454" title="BDU:2022-01454" />
			<reference href="https://bdu.fstec.ru/vul/2022-01459" type="self" id="BDU:2022-01459" title="BDU:2022-01459" />
			<reference href="https://bdu.fstec.ru/vul/2022-01446" type="self" id="BDU:2022-01446" title="BDU:2022-01446" />
			<reference href="https://bdu.fstec.ru/vul/2022-01448" type="self" id="BDU:2022-01448" title="BDU:2022-01448" />
			<reference href="https://bdu.fstec.ru/vul/2022-01447" type="self" id="BDU:2022-01447" title="BDU:2022-01447" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="91.7.0" release="1.el7.3" arch="x86_64" src="">
					<filename>thunderbird-0:91.7.0-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220323-02</id>
		<issued date="2022-03-23" />
		<updated date="2022-03-24" />
		<title>Множественные уязвимости glibc</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в glibc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-glibc-cve-2022-23219-cve-2022-23218-cve-2021-3999-cve-2021-3998/</description>
               <solution>
                    Запретить использование в ОС пакета glibc — GNU C Library
                или
                    Установить обновление для пакета(ов) glibc
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-glibc-cve-2022-23219-cve-2022-23218-cve-2021-3999-cve-2021-3998/" type="self" id="ROS-20220323-02" title="ROS-20220323-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219" type="cve" id="CVE-2022-23219" title="CVE-2022-23219" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218" type="cve" id="CVE-2022-23218" title="CVE-2022-23218" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999" type="cve" id="CVE-2021-3999" title="CVE-2021-3999" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998" type="cve" id="CVE-2021-3998" title="CVE-2021-3998" />
			<reference href="https://bdu.fstec.ru/vul/2022-01633" type="self" id="BDU:2022-01633" title="BDU:2022-01633" />
			<reference href="https://bdu.fstec.ru/vul/2022-01632" type="self" id="BDU:2022-01632" title="BDU:2022-01632" />
			<reference href="https://bdu.fstec.ru/vul/2022-01635" type="self" id="BDU:2022-01635" title="BDU:2022-01635" />
			<reference href="https://bdu.fstec.ru/vul/2022-01634" type="self" id="BDU:2022-01634" title="BDU:2022-01634" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glibc" epoch="0" version="2.28" release="6.el7" arch="x86_64" src="">
					<filename>glibc-0:2.28-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220323-01</id>
		<issued date="2022-03-23" />
		<updated date="2022-03-24" />
		<title>Уязвимость phpMyAdmin</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в phpMyAdmin</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-phpmyadmin-cve-2022-0813/</description>
               <solution>
                    Запретить использование в ОС пакета phpMyAdmin
                или
                    Установить обновление для пакета(ов) phpMyAdmin
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-phpmyadmin-cve-2022-0813/" type="self" id="ROS-20220323-01" title="ROS-20220323-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0813" type="cve" id="CVE-2022-0813" title="CVE-2022-0813" />
			<reference href="https://bdu.fstec.ru/vul/2022-01640" type="self" id="BDU:2022-01640" title="BDU:2022-01640" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="phpMyAdmin" epoch="0" version="5.1.3" release="1.el7" arch="noarch" src="">
					<filename>phpMyAdmin-0:5.1.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220324-01</id>
		<issued date="2022-03-24" />
		<updated date="2022-03-24" />
		<title>Уязвимость cgroup</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cgroup-cve-2022-0492/</description>
               <solution>Установить обновление для пакета(ов)РЕД ОС kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cgroup-cve-2022-0492/" type="self" id="ROS-20220324-01" title="ROS-20220324-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492" type="cve" id="CVE-2022-0492" title="CVE-2022-0492" />
			<reference href="https://bdu.fstec.ru/vul/2022-00737" type="self" id="BDU:2022-00737" title="BDU:2022-00737" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="5.15.10" release="3.el7" arch="x86_64" src="">
					<filename>kernel-lt-0:5.15.10-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220324-02</id>
		<issued date="2022-03-24" />
		<updated date="2025-10-09" />
		<title>Уязвимость QEMU</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в qemu-common</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qemu-cve-2022-0358/</description>
               <solution>
                    Запретить использование в ОС пакета qemu-common
                или
                    Установить обновление для пакета(ов) qemu-common
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qemu-cve-2022-0358/" type="self" id="ROS-20220324-02" title="ROS-20220324-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0358" type="cve" id="CVE-2022-0358" title="CVE-2022-0358" />
			<reference href="https://bdu.fstec.ru/vul/2022-01465" type="self" id="BDU:2022-01465" title="BDU:2022-01465" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="qemu-common" epoch="15" version="6.1.0" release="8.el7" arch="x86_64" src="">
					<filename>qemu-common-15:6.1.0-8.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220329-01</id>
		<issued date="2022-03-29" />
		<updated date="2022-03-29" />
		<title>Уязвимость zlib </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в zlib</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zlib-cve-2018-25032/</description>
               <solution>
                    Запретить использование в ОС пакета zlib
                или
                    Установить обновление для пакета(ов) zlib
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zlib-cve-2018-25032/" type="self" id="ROS-20220329-01" title="ROS-20220329-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032" type="cve" id="CVE-2018-25032" title="CVE-2018-25032" />
			<reference href="https://bdu.fstec.ru/vul/2022-01641" type="self" id="BDU:2022-01641" title="BDU:2022-01641" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zlib" epoch="0" version="1.2.11" release="14.el7" arch="x86_64" src="">
					<filename>zlib-0:1.2.11-14.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220329-02</id>
		<issued date="2022-03-29" />
		<updated date="2022-03-29" />
		<title>Множественные уязвимости Moodle </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-moodle-cve-2022-0983-cve-2022-0984-cve-2022-0985/</description>
               <solution>
                    Запретить использование в ОС пакета Moodle
                или
                    Установить обновление для пакета(ов) Moodle
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-moodle-cve-2022-0983-cve-2022-0984-cve-2022-0985/" type="self" id="ROS-20220329-02" title="ROS-20220329-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0983" type="cve" id="CVE-2022-0983" title="CVE-2022-0983" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0985" type="cve" id="CVE-2022-0985" title="CVE-2022-0985" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0984" type="cve" id="CVE-2022-0984" title="CVE-2022-0984" />
			<reference href="https://bdu.fstec.ru/vul/2022-01636" type="self" id="BDU:2022-01636" title="BDU:2022-01636" />
			<reference href="https://bdu.fstec.ru/vul/2022-01637" type="self" id="BDU:2022-01637" title="BDU:2022-01637" />
			<reference href="https://bdu.fstec.ru/vul/2022-01638" type="self" id="BDU:2022-01638" title="BDU:2022-01638" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="moodle" epoch="0" version="3.11.4" release="2.el7.3" arch="noarch" src="">
					<filename>moodle-0:3.11.4-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220329-03</id>
		<issued date="2022-03-29" />
		<updated date="2022-03-29" />
		<title>Уязвимость OpenVPN </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в openvpn</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openvpn-cve-2022-0547/</description>
               <solution>
                    Запретить использование в ОС пакета OpenVPN
                или
                    Установить обновление для пакета(ов) OpenVPN
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openvpn-cve-2022-0547/" type="self" id="ROS-20220329-03" title="ROS-20220329-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0547" type="cve" id="CVE-2022-0547" title="CVE-2022-0547" />
			<reference href="https://bdu.fstec.ru/vul/2022-01642" type="self" id="BDU:2022-01642" title="BDU:2022-01642" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openvpn" epoch="0" version="2.5.6" release="1.el7" arch="x86_64" src="">
					<filename>openvpn-0:2.5.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220329-04</id>
		<issued date="2022-03-29" />
		<updated date="2022-03-29" />
		<title>Множественные уязвимости nbd </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в nbd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nbd-cve-2022-2649-cve-2022-26496/</description>
               <solution>
                    Запретить использование в ОС пакета nbd
                или
                    Установить обновление для пакета(ов) nbd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nbd-cve-2022-2649-cve-2022-26496/" type="self" id="ROS-20220329-04" title="ROS-20220329-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26495" type="cve" id="CVE-2022-26495" title="CVE-2022-26495" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26496" type="cve" id="CVE-2022-26496" title="CVE-2022-26496" />
			<reference href="https://bdu.fstec.ru/vul/2022-01639" type="self" id="BDU:2022-01639" title="BDU:2022-01639" />
			<reference href="https://bdu.fstec.ru/vul/2022-01643" type="self" id="BDU:2022-01643" title="BDU:2022-01643" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nbd" epoch="0" version="3.24" release="1.el7" arch="x86_64" src="">
					<filename>nbd-0:3.24-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220330-01</id>
		<issued date="2022-03-30" />
		<updated date="2022-03-30" />
		<title>Уязвимость libnbd</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в libnbd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libnbd-cve-2022-0485/</description>
               <solution>
                    Запретить использование в ОС пакета libnbd
                или
                    Установить обновление для пакета(ов) libnbd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libnbd-cve-2022-0485/" type="self" id="ROS-20220330-01" title="ROS-20220330-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0485" type="cve" id="CVE-2022-0485" title="CVE-2022-0485" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libnbd" epoch="0" version="1.10.0" release="2.el7" arch="x86_64" src="">
					<filename>libnbd-0:1.10.0-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220330-02</id>
		<issued date="2022-03-30" />
		<updated date="2022-03-30" />
		<title>Уязвимость libexpat</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в expat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libexpat-cve-2022-23852-cve-2022-23990/</description>
               <solution>
                    Запретить использование в ОС пакета expat
                или
                    Установить обновление для пакета(ов) expat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libexpat-cve-2022-23852-cve-2022-23990/" type="self" id="ROS-20220330-02" title="ROS-20220330-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852" type="cve" id="CVE-2022-23852" title="CVE-2022-23852" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990" type="cve" id="CVE-2022-23990" title="CVE-2022-23990" />
			<reference href="https://bdu.fstec.ru/vul/2022-01702" type="self" id="BDU:2022-01702" title="BDU:2022-01702" />
			<reference href="https://bdu.fstec.ru/vul/2022-00999" type="self" id="BDU:2022-00999" title="BDU:2022-00999" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="expat" epoch="0" version="2.4.1" release="3.el7" arch="x86_64" src="">
					<filename>expat-0:2.4.1-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220405-01</id>
		<issued date="2022-04-05" />
		<updated date="2022-04-05" />
		<title>Уязвимость Paramiko </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в python3-paramiko</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-paramiko-cve-2022-24302/</description>
               <solution>
                    Запретить использование в ОС пакета Paramiko
                или
                    Установить обновление для пакета(ов) Paramiko
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-paramiko-cve-2022-24302/" type="self" id="ROS-20220405-01" title="ROS-20220405-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24302" type="cve" id="CVE-2022-24302" title="CVE-2022-24302" />
			<reference href="https://bdu.fstec.ru/vul/2022-01897" type="self" id="BDU:2022-01897" title="BDU:2022-01897" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-paramiko" epoch="0" version="2.4.2" release="3.el7" arch="noarch" src="">
					<filename>python3-paramiko-0:2.4.2-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220407-01</id>
		<issued date="2022-04-07" />
		<updated date="2022-04-07" />
		<title>Множественные уязвимости  libsndfile</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в libsndfile</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libsndfile/</description>
               <solution>
                    Запретить использование в ОС пакета libsndfile
                или
                    Установить обновление для пакета(ов) libsndfile
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libsndfile/" type="self" id="ROS-20220407-01" title="ROS-20220407-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=не присвоен" type="cve" id="не присвоен" title="не присвоен" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libsndfile" epoch="0" version="1.0.28" release="12.el7" arch="x86_64" src="">
					<filename>libsndfile-0:1.0.28-12.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220407-02</id>
		<issued date="2022-04-07" />
		<updated date="2022-04-07" />
		<title>Уязвимость Vim </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в vim-X11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-cve-2022-1154/</description>
               <solution>
                    Запретить использование в ОС пакета Vim
                или
                    Установить обновление для пакета(ов) Vim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-cve-2022-1154/" type="self" id="ROS-20220407-02" title="ROS-20220407-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154" type="cve" id="CVE-2022-1154" title="CVE-2022-1154" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-X11" epoch="2" version="8.2.4460" release="5.el7.3" arch="x86_64" src="">
					<filename>vim-X11-2:8.2.4460-5.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220407-03</id>
		<issued date="2022-04-07" />
		<updated date="2022-04-07" />
		<title>Множественные уязвимости Python</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в python3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python-cve-2022-0391-cve-2021-4189/</description>
               <solution>
                    Запретить использование в ОС пакета Python
                или
                    Установить обновление для пакета(ов) Python
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python-cve-2022-0391-cve-2021-4189/" type="self" id="ROS-20220407-03" title="ROS-20220407-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391" type="cve" id="CVE-2022-0391" title="CVE-2022-0391" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189" type="cve" id="CVE-2021-4189" title="CVE-2021-4189" />
			<reference href="https://bdu.fstec.ru/vul/2022-02302" type="self" id="BDU:2022-02302" title="BDU:2022-02302" />
			<reference href="https://bdu.fstec.ru/vul/2022-02303" type="self" id="BDU:2022-02303" title="BDU:2022-02303" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3" epoch="0" version="3.8.2" release="13.el7" arch="x86_64" src="">
					<filename>python3-0:3.8.2-13.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220412-01</id>
		<issued date="2022-04-12" />
		<updated date="2022-04-12" />
		<title>Множественные уязвимости Vim</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в vim-X11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim-cve-2022-0943-cve-2022-0729/</description>
               <solution>
                    Запретить использование в ОС пакета Vim
                или
                    Установить обновление для пакета(ов) Vim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim-cve-2022-0943-cve-2022-0729/" type="self" id="ROS-20220412-01" title="ROS-20220412-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943" type="cve" id="CVE-2022-0943" title="CVE-2022-0943" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729" type="cve" id="CVE-2022-0729" title="CVE-2022-0729" />
			<reference href="https://bdu.fstec.ru/vul/2022-01466" type="self" id="BDU:2022-01466" title="BDU:2022-01466" />
			<reference href="https://bdu.fstec.ru/vul/2022-02375" type="self" id="BDU:2022-02375" title="BDU:2022-02375" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-X11" epoch="2" version="8.2.4701" release="1.el7.3" arch="x86_64" src="">
					<filename>vim-X11-2:8.2.4701-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220412-02</id>
		<issued date="2022-04-12" />
		<updated date="2022-04-12" />
		<title>Множественные уязвимости Mozilla Firefox </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mozilla-firefox-cve-2022-1097-cve-2022-1196-cve-2022-28281-cve-2022-28282/</description>
               <solution>
                    Запретить использование в ОС пакета Mozilla Firefox
                или
                    Установить обновление для пакета(ов) Mozilla Firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mozilla-firefox-cve-2022-1097-cve-2022-1196-cve-2022-28281-cve-2022-28282/" type="self" id="ROS-20220412-02" title="ROS-20220412-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097" type="cve" id="CVE-2022-1097" title="CVE-2022-1097" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281" type="cve" id="CVE-2022-28281" title="CVE-2022-28281" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282" type="cve" id="CVE-2022-28282" title="CVE-2022-28282" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285" type="cve" id="CVE-2022-28285" title="CVE-2022-28285" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286" type="cve" id="CVE-2022-28286" title="CVE-2022-28286" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289" type="cve" id="CVE-2022-28289" title="CVE-2022-28289" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713" type="cve" id="CVE-2022-24713" title="CVE-2022-24713" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196" type="cve" id="CVE-2022-1196" title="CVE-2022-1196" />
			<reference href="https://bdu.fstec.ru/vul/2022-02368" type="self" id="BDU:2022-02368" title="BDU:2022-02368" />
			<reference href="https://bdu.fstec.ru/vul/2022-02369" type="self" id="BDU:2022-02369" title="BDU:2022-02369" />
			<reference href="https://bdu.fstec.ru/vul/2022-02370" type="self" id="BDU:2022-02370" title="BDU:2022-02370" />
			<reference href="https://bdu.fstec.ru/vul/2022-02371" type="self" id="BDU:2022-02371" title="BDU:2022-02371" />
			<reference href="https://bdu.fstec.ru/vul/2022-02372" type="self" id="BDU:2022-02372" title="BDU:2022-02372" />
			<reference href="https://bdu.fstec.ru/vul/2022-02138" type="self" id="BDU:2022-02138" title="BDU:2022-02138" />
			<reference href="https://bdu.fstec.ru/vul/2022-02373" type="self" id="BDU:2022-02373" title="BDU:2022-02373" />
			<reference href="https://bdu.fstec.ru/vul/2022-02374" type="self" id="BDU:2022-02374" title="BDU:2022-02374" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="91.8.0" release="1.el7.3" arch="x86_64" src="">
					<filename>firefox-0:91.8.0-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220412-03</id>
		<issued date="2022-04-12" />
		<updated date="2022-04-12" />
		<title>Множественные уязвимости Mozilla Thunderbird </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mozilla-thunderbird-cve-2022-1097-cve-2022-1196-cve-2022-28281-cve-2022-2/</description>
               <solution>
                    Запретить использование в ОС пакета Mozilla Thunderbird
                или
                    Установить обновление для пакета(ов) Mozilla Thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mozilla-thunderbird-cve-2022-1097-cve-2022-1196-cve-2022-28281-cve-2022-2/" type="self" id="ROS-20220412-03" title="ROS-20220412-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097" type="cve" id="CVE-2022-1097" title="CVE-2022-1097" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281" type="cve" id="CVE-2022-28281" title="CVE-2022-28281" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282" type="cve" id="CVE-2022-28282" title="CVE-2022-28282" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285" type="cve" id="CVE-2022-28285" title="CVE-2022-28285" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286" type="cve" id="CVE-2022-28286" title="CVE-2022-28286" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289" type="cve" id="CVE-2022-28289" title="CVE-2022-28289" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713" type="cve" id="CVE-2022-24713" title="CVE-2022-24713" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196" type="cve" id="CVE-2022-1196" title="CVE-2022-1196" />
			<reference href="https://bdu.fstec.ru/vul/2022-02368" type="self" id="BDU:2022-02368" title="BDU:2022-02368" />
			<reference href="https://bdu.fstec.ru/vul/2022-02369" type="self" id="BDU:2022-02369" title="BDU:2022-02369" />
			<reference href="https://bdu.fstec.ru/vul/2022-02370" type="self" id="BDU:2022-02370" title="BDU:2022-02370" />
			<reference href="https://bdu.fstec.ru/vul/2022-02371" type="self" id="BDU:2022-02371" title="BDU:2022-02371" />
			<reference href="https://bdu.fstec.ru/vul/2022-02372" type="self" id="BDU:2022-02372" title="BDU:2022-02372" />
			<reference href="https://bdu.fstec.ru/vul/2022-02138" type="self" id="BDU:2022-02138" title="BDU:2022-02138" />
			<reference href="https://bdu.fstec.ru/vul/2022-02373" type="self" id="BDU:2022-02373" title="BDU:2022-02373" />
			<reference href="https://bdu.fstec.ru/vul/2022-02374" type="self" id="BDU:2022-02374" title="BDU:2022-02374" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="91.8.0" release="1.el7.3" arch="x86_64" src="">
					<filename>thunderbird-0:91.8.0-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220413-01</id>
		<issued date="2022-04-13" />
		<updated date="2022-04-13" />
		<title>Множественные уязвимости ядра ОС </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-yadra-os-cve-2022-0995-cve-2022-27666-cve-2022-1015-cve-2022-1016-cve-202/</description>
               <solution>Установить обновление для пакета(ов) ядра РЕД ОС. При необходимости использовать инструкцию 
</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-yadra-os-cve-2022-0995-cve-2022-27666-cve-2022-1015-cve-2022-1016-cve-202/" type="self" id="ROS-20220413-01" title="ROS-20220413-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0995" type="cve" id="CVE-2022-0995" title="CVE-2022-0995" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666" type="cve" id="CVE-2022-27666" title="CVE-2022-27666" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1015" type="cve" id="CVE-2022-1015" title="CVE-2022-1015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016" type="cve" id="CVE-2022-1016" title="CVE-2022-1016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25636" type="cve" id="CVE-2022-25636" title="CVE-2022-25636" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083" type="cve" id="CVE-2021-4083" title="CVE-2021-4083" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1055" type="cve" id="CVE-2022-1055" title="CVE-2022-1055" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0742" type="cve" id="CVE-2022-0742" title="CVE-2022-0742" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258" type="cve" id="CVE-2022-25258" title="CVE-2022-25258" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375" type="cve" id="CVE-2022-25375" title="CVE-2022-25375" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197" type="cve" id="CVE-2021-4197" title="CVE-2021-4197" />
			<reference href="https://bdu.fstec.ru/vul/2022-01597" type="self" id="BDU:2022-01597" title="BDU:2022-01597" />
			<reference href="https://bdu.fstec.ru/vul/2022-01567" type="self" id="BDU:2022-01567" title="BDU:2022-01567" />
			<reference href="https://bdu.fstec.ru/vul/2022-01629" type="self" id="BDU:2022-01629" title="BDU:2022-01629" />
			<reference href="https://bdu.fstec.ru/vul/2022-01630" type="self" id="BDU:2022-01630" title="BDU:2022-01630" />
			<reference href="https://bdu.fstec.ru/vul/2022-00997" type="self" id="BDU:2022-00997" title="BDU:2022-00997" />
			<reference href="https://bdu.fstec.ru/vul/2022-00095" type="self" id="BDU:2022-00095" title="BDU:2022-00095" />
			<reference href="https://bdu.fstec.ru/vul/2022-01644" type="self" id="BDU:2022-01644" title="BDU:2022-01644" />
			<reference href="https://bdu.fstec.ru/vul/2022-01250" type="self" id="BDU:2022-01250" title="BDU:2022-01250" />
			<reference href="https://bdu.fstec.ru/vul/2022-00888" type="self" id="BDU:2022-00888" title="BDU:2022-00888" />
			<reference href="https://bdu.fstec.ru/vul/2022-00891" type="self" id="BDU:2022-00891" title="BDU:2022-00891" />
			<reference href="https://bdu.fstec.ru/vul/2022-02367" type="self" id="BDU:2022-02367" title="BDU:2022-02367" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="5.15.10" release="4.el7" arch="x86_64" src="">
					<filename>kernel-lt-0:5.15.10-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220516-01</id>
		<issued date="2022-05-16" />
		<updated date="2022-06-08" />
		<title>Уязвимость nodejs-shelljs </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в nodejs-shelljs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-shelljs-cve-2022-0144/</description>
               <solution>
                    Запретить использование в ОС пакета nodejs-shelljs
                или
                    Установить обновление для пакета(ов) nodejs-shelljs
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-shelljs-cve-2022-0144/" type="self" id="ROS-20220516-01" title="ROS-20220516-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0144" type="cve" id="CVE-2022-0144" title="CVE-2022-0144" />
			<reference href="https://bdu.fstec.ru/vul/2022-03039" type="self" id="BDU:2022-03039" title="BDU:2022-03039" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs-shelljs" epoch="0" version="0.8.4" release="4.el7.3" arch="noarch" src="">
					<filename>nodejs-shelljs-0:0.8.4-4.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220516-02</id>
		<issued date="2022-05-16" />
		<updated date="2022-05-16" />
		<title>Уязвимость gzip </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в gzip</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gzip-cve-2022-1271/</description>
               <solution>
                    Запретить использование в ОС пакета gzip
                или
                    Установить обновление для пакета(ов) gzip
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gzip-cve-2022-1271/" type="self" id="ROS-20220516-02" title="ROS-20220516-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271" type="cve" id="CVE-2022-1271" title="CVE-2022-1271" />
			<reference href="https://bdu.fstec.ru/vul/2022-02113" type="self" id="BDU:2022-02113" title="BDU:2022-02113" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gzip" epoch="0" version="1.9" release="9.el7.3" arch="x86_64" src="">
					<filename>gzip-0:1.9-9.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220516-03</id>
		<issued date="2022-05-16" />
		<updated date="2022-05-16" />
		<title>Уязвимость libarchive</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в libarchive</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libarchive-cve-2022-26280/</description>
               <solution>
                    Запретить использование в ОС пакета libarchive
                или
                    Установить обновление для пакета(ов) libarchive
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libarchive-cve-2022-26280/" type="self" id="ROS-20220516-03" title="ROS-20220516-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26280" type="cve" id="CVE-2022-26280" title="CVE-2022-26280" />
			<reference href="https://bdu.fstec.ru/vul/2022-01973" type="self" id="BDU:2022-01973" title="BDU:2022-01973" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libarchive" epoch="0" version="3.4.3" release="4.el7.3" arch="x86_64" src="">
					<filename>libarchive-0:3.4.3-4.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220516-04</id>
		<issued date="2022-05-16" />
		<updated date="2022-05-16" />
		<title>Множественные уязвимости Django </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в python3-django</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-django-cve-2022-28347-cve-2022-28346/</description>
               <solution>
                    Запретить использование в ОС пакета python3-django
                или
                    Установить обновление для пакета(ов) python3-django
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-django-cve-2022-28347-cve-2022-28346/" type="self" id="ROS-20220516-04" title="ROS-20220516-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28346" type="cve" id="CVE-2022-28346" title="CVE-2022-28346" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28347" type="cve" id="CVE-2022-28347" title="CVE-2022-28347" />
			<reference href="https://bdu.fstec.ru/vul/2022-02671" type="self" id="BDU:2022-02671" title="BDU:2022-02671" />
			<reference href="https://bdu.fstec.ru/vul/2022-02670" type="self" id="BDU:2022-02670" title="BDU:2022-02670" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-django" epoch="0" version="3.2.13" release="1.el7" arch="noarch" src="">
					<filename>python3-django-0:3.2.13-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220516-05</id>
		<issued date="2022-05-16" />
		<updated date="2022-06-08" />
		<title>Множественные уязвимости Git</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в git</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-git-cve-2022-24765-cve-2022-24767/</description>
               <solution>
                    Запретить использование в ОС пакета Git
                или
                    Установить обновление для пакета(ов) Git
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-git-cve-2022-24765-cve-2022-24767/" type="self" id="ROS-20220516-05" title="ROS-20220516-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24767" type="cve" id="CVE-2022-24767" title="CVE-2022-24767" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24765" type="cve" id="CVE-2022-24765" title="CVE-2022-24765" />
			<reference href="https://bdu.fstec.ru/vul/2022-03032" type="self" id="BDU:2022-03032" title="BDU:2022-03032" />
			<reference href="https://bdu.fstec.ru/vul/2022-02723" type="self" id="BDU:2022-02723" title="BDU:2022-02723" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="git" epoch="0" version="2.30.3" release="1.el7" arch="x86_64" src="">
					<filename>git-0:2.30.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220516-06</id>
		<issued date="2022-05-16" />
		<updated date="2022-06-08" />
		<title>Множественные уязвимости Ruby</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в ruby</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-ruby-cve-2022-28738-cve-2022-28739/</description>
               <solution>
                    Запретить использование в ОС пакета Ruby
                или
                    Установить обновление для пакета(ов) Ruby
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-ruby-cve-2022-28738-cve-2022-28739/" type="self" id="ROS-20220516-06" title="ROS-20220516-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28739" type="cve" id="CVE-2022-28739" title="CVE-2022-28739" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28738" type="cve" id="CVE-2022-28738" title="CVE-2022-28738" />
			<reference href="https://bdu.fstec.ru/vul/2022-03067" type="self" id="BDU:2022-03067" title="BDU:2022-03067" />
			<reference href="https://bdu.fstec.ru/vul/2022-03068" type="self" id="BDU:2022-03068" title="BDU:2022-03068" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ruby" epoch="0" version="2.7.6" release="129.el7" arch="x86_64" src="">
					<filename>ruby-0:2.7.6-129.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220516-07</id>
		<issued date="2022-05-16" />
		<updated date="2022-05-16" />
		<title>Уязвимость ядра операционной системы Linux </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-yadra-operatsionnoy-sistemy-linux-cve-2022-28893/</description>
               <solution>Установить обновление для пакета(ов) ядра РЕД ОС</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-yadra-operatsionnoy-sistemy-linux-cve-2022-28893/" type="self" id="ROS-20220516-07" title="ROS-20220516-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893" type="cve" id="CVE-2022-28893" title="CVE-2022-28893" />
			<reference href="https://bdu.fstec.ru/vul/2022-02112" type="self" id="BDU:2022-02112" title="BDU:2022-02112" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="5.15.35" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:5.15.35-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220516-08</id>
		<issued date="2022-05-16" />
		<updated date="2022-06-08" />
		<title>Уязвимость libxml2</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в libxml2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libxml2-cve-2022-29824/</description>
               <solution>
                    Запретить использование в ОС пакета libxml2
                или
                    Установить обновление для пакета(ов) libxml2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libxml2-cve-2022-29824/" type="self" id="ROS-20220516-08" title="ROS-20220516-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29824" type="cve" id="CVE-2022-29824" title="CVE-2022-29824" />
			<reference href="https://bdu.fstec.ru/vul/2022-03033" type="self" id="BDU:2022-03033" title="BDU:2022-03033" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libxml2" epoch="0" version="2.9.8" release="11.el7.3" arch="x86_64" src="">
					<filename>libxml2-0:2.9.8-11.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220516-09</id>
		<issued date="2022-05-16" />
		<updated date="2022-06-08" />
		<title>Множественные уязвимости cURL</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-curl-cve-2022-27776-cve-2022-27775-cve-2022-27774-cve-2022-22576/</description>
               <solution>
                    Запретить использование в ОС пакета cURL
                или
                    Установить обновление для пакета(ов) cURL
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-curl-cve-2022-27776-cve-2022-27775-cve-2022-27774-cve-2022-22576/" type="self" id="ROS-20220516-09" title="ROS-20220516-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776" type="cve" id="CVE-2022-27776" title="CVE-2022-27776" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775" type="cve" id="CVE-2022-27775" title="CVE-2022-27775" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774" type="cve" id="CVE-2022-27774" title="CVE-2022-27774" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576" type="cve" id="CVE-2022-22576" title="CVE-2022-22576" />
			<reference href="https://bdu.fstec.ru/vul/2022-03040" type="self" id="BDU:2022-03040" title="BDU:2022-03040" />
			<reference href="https://bdu.fstec.ru/vul/2022-03038" type="self" id="BDU:2022-03038" title="BDU:2022-03038" />
			<reference href="https://bdu.fstec.ru/vul/2022-03041" type="self" id="BDU:2022-03041" title="BDU:2022-03041" />
			<reference href="https://bdu.fstec.ru/vul/2022-03036" type="self" id="BDU:2022-03036" title="BDU:2022-03036" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="curl" epoch="0" version="7.81.0" release="2.el7.3" arch="x86_64" src="">
					<filename>curl-0:7.81.0-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220516-10</id>
		<issued date="2022-05-16" />
		<updated date="2022-05-16" />
		<title>Уязвимость libinput</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в libinput</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libinput-cve-2022-1215/</description>
               <solution>
                    Запретить использование в ОС пакета libinput
                или
                    Установить обновление для пакета(ов) libinput
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libinput-cve-2022-1215/" type="self" id="ROS-20220516-10" title="ROS-20220516-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1215" type="cve" id="CVE-2022-1215" title="CVE-2022-1215" />
			<reference href="https://bdu.fstec.ru/vul/2022-02695" type="self" id="BDU:2022-02695" title="BDU:2022-02695" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libinput" epoch="0" version="1.18.901" release="1.el7.3" arch="x86_64" src="">
					<filename>libinput-0:1.18.901-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220516-11</id>
		<issued date="2022-05-16" />
		<updated date="2022-06-08" />
		<title>Множественные уязвимости VIM</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в vim-X11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim-cve-2022-1620-cve-2022-1619/</description>
               <solution>
                    Запретить использование в ОС пакета Vim
                или
                    Установить обновление для пакета(ов) Vim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim-cve-2022-1620-cve-2022-1619/" type="self" id="ROS-20220516-11" title="ROS-20220516-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619" type="cve" id="CVE-2022-1619" title="CVE-2022-1619" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620" type="cve" id="CVE-2022-1620" title="CVE-2022-1620" />
			<reference href="https://bdu.fstec.ru/vul/2022-03035" type="self" id="BDU:2022-03035" title="BDU:2022-03035" />
			<reference href="https://bdu.fstec.ru/vul/2022-03037" type="self" id="BDU:2022-03037" title="BDU:2022-03037" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-X11" epoch="2" version="8.2.4701" release="2.el7.3" arch="x86_64" src="">
					<filename>vim-X11-2:8.2.4701-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220518-01</id>
		<issued date="2022-05-18" />
		<updated date="2022-06-08" />
		<title>Множественные уязвимости Mozilla Firefox </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mozilla-firefox-cve-2022-29909-cve-2022-29911-cve-2022-29912-cve-2022-299/</description>
               <solution>
                    Запретить использование в ОС пакета Mozilla Firefox
                или
                    Установить обновление для пакета(ов) Mozilla Firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mozilla-firefox-cve-2022-29909-cve-2022-29911-cve-2022-29912-cve-2022-299/" type="self" id="ROS-20220518-01" title="ROS-20220518-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29914" type="cve" id="CVE-2022-29914" title="CVE-2022-29914" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29909" type="cve" id="CVE-2022-29909" title="CVE-2022-29909" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29916" type="cve" id="CVE-2022-29916" title="CVE-2022-29916" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29911" type="cve" id="CVE-2022-29911" title="CVE-2022-29911" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29912" type="cve" id="CVE-2022-29912" title="CVE-2022-29912" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29917" type="cve" id="CVE-2022-29917" title="CVE-2022-29917" />
			<reference href="https://bdu.fstec.ru/vul/2022-03073" type="self" id="BDU:2022-03073" title="BDU:2022-03073" />
			<reference href="https://bdu.fstec.ru/vul/2022-03077" type="self" id="BDU:2022-03077" title="BDU:2022-03077" />
			<reference href="https://bdu.fstec.ru/vul/2022-03076" type="self" id="BDU:2022-03076" title="BDU:2022-03076" />
			<reference href="https://bdu.fstec.ru/vul/2022-03075" type="self" id="BDU:2022-03075" title="BDU:2022-03075" />
			<reference href="https://bdu.fstec.ru/vul/2022-03074" type="self" id="BDU:2022-03074" title="BDU:2022-03074" />
			<reference href="https://bdu.fstec.ru/vul/2022-02988" type="self" id="BDU:2022-02988" title="BDU:2022-02988" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="91.9.0" release="1.el7.3" arch="x86_64" src="">
					<filename>firefox-0:91.9.0-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220518-02</id>
		<issued date="2022-05-18" />
		<updated date="2022-06-08" />
		<title>Множественные уязвимости Thunderbird </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-cve-2022-1520-cve-2022-29909-cve-2022-29911-cve-2022-29912-cv/</description>
               <solution>
                    Запретить использование в ОС пакета Mozilla Thunderbird
                или
                    Установить обновление для пакета(ов) Mozilla Thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-cve-2022-1520-cve-2022-29909-cve-2022-29911-cve-2022-29912-cv/" type="self" id="ROS-20220518-02" title="ROS-20220518-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29914" type="cve" id="CVE-2022-29914" title="CVE-2022-29914" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29909" type="cve" id="CVE-2022-29909" title="CVE-2022-29909" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29916" type="cve" id="CVE-2022-29916" title="CVE-2022-29916" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29911" type="cve" id="CVE-2022-29911" title="CVE-2022-29911" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29912" type="cve" id="CVE-2022-29912" title="CVE-2022-29912" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29917" type="cve" id="CVE-2022-29917" title="CVE-2022-29917" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29913" type="cve" id="CVE-2022-29913" title="CVE-2022-29913" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1520" type="cve" id="CVE-2022-1520" title="CVE-2022-1520" />
			<reference href="https://bdu.fstec.ru/vul/2022-03073" type="self" id="BDU:2022-03073" title="BDU:2022-03073" />
			<reference href="https://bdu.fstec.ru/vul/2022-03077" type="self" id="BDU:2022-03077" title="BDU:2022-03077" />
			<reference href="https://bdu.fstec.ru/vul/2022-03076" type="self" id="BDU:2022-03076" title="BDU:2022-03076" />
			<reference href="https://bdu.fstec.ru/vul/2022-03075" type="self" id="BDU:2022-03075" title="BDU:2022-03075" />
			<reference href="https://bdu.fstec.ru/vul/2022-03074" type="self" id="BDU:2022-03074" title="BDU:2022-03074" />
			<reference href="https://bdu.fstec.ru/vul/2022-02988" type="self" id="BDU:2022-02988" title="BDU:2022-02988" />
			<reference href="https://bdu.fstec.ru/vul/2022-02941" type="self" id="BDU:2022-02941" title="BDU:2022-02941" />
			<reference href="https://bdu.fstec.ru/vul/2022-02977" type="self" id="BDU:2022-02977" title="BDU:2022-02977" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="91.9.0" release="1.el7.3" arch="x86_64" src="">
					<filename>thunderbird-0:91.9.0-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220518-03</id>
		<issued date="2022-05-18" />
		<updated date="2022-06-08" />
		<title>Множественные уязвимости pjproject</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в pjproject</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-pjproject-cve-2022-24754-cve-2022-24792-cve-2022-24786-cve-2022-24764-cve/</description>
               <solution>
                    Запретить использование в ОС пакета pjproject
                или
                    Установить обновление для пакета(ов) pjproject
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-pjproject-cve-2022-24754-cve-2022-24792-cve-2022-24786-cve-2022-24764-cve/" type="self" id="ROS-20220518-03" title="ROS-20220518-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24754" type="cve" id="CVE-2022-24754" title="CVE-2022-24754" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792" type="cve" id="CVE-2022-24792" title="CVE-2022-24792" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786" type="cve" id="CVE-2022-24786" title="CVE-2022-24786" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764" type="cve" id="CVE-2022-24764" title="CVE-2022-24764" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793" type="cve" id="CVE-2022-24793" title="CVE-2022-24793" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763" type="cve" id="CVE-2022-24763" title="CVE-2022-24763" />
			<reference href="https://bdu.fstec.ru/vul/2022-03168" type="self" id="BDU:2022-03168" title="BDU:2022-03168" />
			<reference href="https://bdu.fstec.ru/vul/2022-03169" type="self" id="BDU:2022-03169" title="BDU:2022-03169" />
			<reference href="https://bdu.fstec.ru/vul/2022-03170" type="self" id="BDU:2022-03170" title="BDU:2022-03170" />
			<reference href="https://bdu.fstec.ru/vul/2022-03171" type="self" id="BDU:2022-03171" title="BDU:2022-03171" />
			<reference href="https://bdu.fstec.ru/vul/2022-03172" type="self" id="BDU:2022-03172" title="BDU:2022-03172" />
			<reference href="https://bdu.fstec.ru/vul/2022-03173" type="self" id="BDU:2022-03173" title="BDU:2022-03173" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pjproject" epoch="0" version="2.7.2" release="8.el7.3" arch="x86_64" src="">
					<filename>pjproject-0:2.7.2-8.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220524-01</id>
		<issued date="2022-05-24" />
		<updated date="2022-06-08" />
		<title>Множественные уязвимости OpenSSL</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в openssl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-openssl-cve-2022-1292-cve-2022-1343-cve-2022-1434-cve-2022-1473/</description>
               <solution>
                    Запретить использование в ОС пакета OpenSSL
                или
                    Установить обновление для пакета(ов) OpenSSL
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-openssl-cve-2022-1292-cve-2022-1343-cve-2022-1434-cve-2022-1473/" type="self" id="ROS-20220524-01" title="ROS-20220524-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292" type="cve" id="CVE-2022-1292" title="CVE-2022-1292" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1343" type="cve" id="CVE-2022-1343" title="CVE-2022-1343" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1434" type="cve" id="CVE-2022-1434" title="CVE-2022-1434" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1473" type="cve" id="CVE-2022-1473" title="CVE-2022-1473" />
			<reference href="https://bdu.fstec.ru/vul/2022-03181" type="self" id="BDU:2022-03181" title="BDU:2022-03181" />
			<reference href="https://bdu.fstec.ru/vul/2022-03175" type="self" id="BDU:2022-03175" title="BDU:2022-03175" />
			<reference href="https://bdu.fstec.ru/vul/2022-03174" type="self" id="BDU:2022-03174" title="BDU:2022-03174" />
			<reference href="https://bdu.fstec.ru/vul/2022-03268" type="self" id="BDU:2022-03268" title="BDU:2022-03268" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl" epoch="1" version="1.1.1g" release="19.el7" arch="x86_64" src="">
					<filename>openssl-1:1.1.1g-19.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220524-02</id>
		<issued date="2022-05-24" />
		<updated date="2022-06-08" />
		<title>Уязвимость Dnsmasq</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в dnsmasq</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dnsmasq-cve-2022-0934/</description>
               <solution>
                    Запретить использование в ОС пакета Dnsmasq или обработку запросов DHCPv6
                или
                    Установить обновление для пакета(ов) Dnsmasq
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dnsmasq-cve-2022-0934/" type="self" id="ROS-20220524-02" title="ROS-20220524-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0934" type="cve" id="CVE-2022-0934" title="CVE-2022-0934" />
			<reference href="https://bdu.fstec.ru/vul/2022-03253" type="self" id="BDU:2022-03253" title="BDU:2022-03253" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dnsmasq" epoch="0" version="2.85" release="4.el7" arch="x86_64" src="">
					<filename>dnsmasq-0:2.85-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220524-03</id>
		<issued date="2022-05-24" />
		<updated date="2025-09-09" />
		<title>Множественные уязвимости cURL</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-curl-cve-2022-30115-cve-2022-27782-cve-2022-27781-cve-2022-27780-cve-2022/</description>
               <solution>
                    Запретить использование в ОС пакета cURL
                или
                    Установить обновление для пакета(ов) cURL
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-curl-cve-2022-30115-cve-2022-27782-cve-2022-27781-cve-2022-27780-cve-2022/" type="self" id="ROS-20220524-03" title="ROS-20220524-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30115" type="cve" id="CVE-2022-30115" title="CVE-2022-30115" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782" type="cve" id="CVE-2022-27782" title="CVE-2022-27782" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27780" type="cve" id="CVE-2022-27780" title="CVE-2022-27780" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27779" type="cve" id="CVE-2022-27779" title="CVE-2022-27779" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27778" type="cve" id="CVE-2022-27778" title="CVE-2022-27778" />
			<reference href="https://bdu.fstec.ru/vul/2022-03187" type="self" id="BDU:2022-03187" title="BDU:2022-03187" />
			<reference href="https://bdu.fstec.ru/vul/2022-03185" type="self" id="BDU:2022-03185" title="BDU:2022-03185" />
			<reference href="https://bdu.fstec.ru/vul/2022-03184" type="self" id="BDU:2022-03184" title="BDU:2022-03184" />
			<reference href="https://bdu.fstec.ru/vul/2022-03178" type="self" id="BDU:2022-03178" title="BDU:2022-03178" />
			<reference href="https://bdu.fstec.ru/vul/2022-03177" type="self" id="BDU:2022-03177" title="BDU:2022-03177" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="curl" epoch="0" version="7.81.0" release="3.el7.3" arch="x86_64" src="">
					<filename>curl-0:7.81.0-3.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220524-04</id>
		<issued date="2022-05-24" />
		<updated date="2022-06-08" />
		<title>Множественные уязвимости Moodle</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-moodle-cve-2022-30599-cve-2022-30596-cve-2022-30597-cve-2022-30598-cve-20/</description>
               <solution>
                    Запретить использование в ОС пакета Moodle
                или
                    Установить обновление для пакета(ов) Moodle
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-moodle-cve-2022-30599-cve-2022-30596-cve-2022-30597-cve-2022-30598-cve-20/" type="self" id="ROS-20220524-04" title="ROS-20220524-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30599" type="cve" id="CVE-2022-30599" title="CVE-2022-30599" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30596" type="cve" id="CVE-2022-30596" title="CVE-2022-30596" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30597" type="cve" id="CVE-2022-30597" title="CVE-2022-30597" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30598" type="cve" id="CVE-2022-30598" title="CVE-2022-30598" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30600" type="cve" id="CVE-2022-30600" title="CVE-2022-30600" />
			<reference href="https://bdu.fstec.ru/vul/2022-03179" type="self" id="BDU:2022-03179" title="BDU:2022-03179" />
			<reference href="https://bdu.fstec.ru/vul/2022-03176" type="self" id="BDU:2022-03176" title="BDU:2022-03176" />
			<reference href="https://bdu.fstec.ru/vul/2022-03183" type="self" id="BDU:2022-03183" title="BDU:2022-03183" />
			<reference href="https://bdu.fstec.ru/vul/2022-03231" type="self" id="BDU:2022-03231" title="BDU:2022-03231" />
			<reference href="https://bdu.fstec.ru/vul/2022-03182" type="self" id="BDU:2022-03182" title="BDU:2022-03182" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="moodle" epoch="0" version="3.11.4" release="3.el7.3" arch="noarch" src="">
					<filename>moodle-0:3.11.4-3.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220525-01</id>
		<issued date="2022-05-25" />
		<updated date="2022-06-08" />
		<title>Множественные уязвимости VIM </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в vim-X11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim-cve-2022-1381-cve-2022-1420-cve-2022-1616-cve-2022-1621-cve-2022-1733/</description>
               <solution>
                    Запретить использование в ОС пакета Vim
                или
                    Установить обновление для пакета(ов) Vim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim-cve-2022-1381-cve-2022-1420-cve-2022-1616-cve-2022-1621-cve-2022-1733/" type="self" id="ROS-20220525-01" title="ROS-20220525-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1381" type="cve" id="CVE-2022-1381" title="CVE-2022-1381" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420" type="cve" id="CVE-2022-1420" title="CVE-2022-1420" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616" type="cve" id="CVE-2022-1616" title="CVE-2022-1616" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621" type="cve" id="CVE-2022-1621" title="CVE-2022-1621" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733" type="cve" id="CVE-2022-1733" title="CVE-2022-1733" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1674" type="cve" id="CVE-2022-1674" title="CVE-2022-1674" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629" type="cve" id="CVE-2022-1629" title="CVE-2022-1629" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735" type="cve" id="CVE-2022-1735" title="CVE-2022-1735" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1771" type="cve" id="CVE-2022-1771" title="CVE-2022-1771" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785" type="cve" id="CVE-2022-1785" title="CVE-2022-1785" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796" type="cve" id="CVE-2022-1796" title="CVE-2022-1796" />
			<reference href="https://bdu.fstec.ru/vul/2022-03269" type="self" id="BDU:2022-03269" title="BDU:2022-03269" />
			<reference href="https://bdu.fstec.ru/vul/2022-03270" type="self" id="BDU:2022-03270" title="BDU:2022-03270" />
			<reference href="https://bdu.fstec.ru/vul/2022-03271" type="self" id="BDU:2022-03271" title="BDU:2022-03271" />
			<reference href="https://bdu.fstec.ru/vul/2022-03234" type="self" id="BDU:2022-03234" title="BDU:2022-03234" />
			<reference href="https://bdu.fstec.ru/vul/2022-03232" type="self" id="BDU:2022-03232" title="BDU:2022-03232" />
			<reference href="https://bdu.fstec.ru/vul/2022-03233" type="self" id="BDU:2022-03233" title="BDU:2022-03233" />
			<reference href="https://bdu.fstec.ru/vul/2022-03235" type="self" id="BDU:2022-03235" title="BDU:2022-03235" />
			<reference href="https://bdu.fstec.ru/vul/2022-03239" type="self" id="BDU:2022-03239" title="BDU:2022-03239" />
			<reference href="https://bdu.fstec.ru/vul/2022-03240" type="self" id="BDU:2022-03240" title="BDU:2022-03240" />
			<reference href="https://bdu.fstec.ru/vul/2022-03238" type="self" id="BDU:2022-03238" title="BDU:2022-03238" />
			<reference href="https://bdu.fstec.ru/vul/2022-03237" type="self" id="BDU:2022-03237" title="BDU:2022-03237" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-X11" epoch="2" version="8.2.4701" release="3.el7.3" arch="x86_64" src="">
					<filename>vim-X11-2:8.2.4701-3.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220530-01</id>
		<issued date="2022-05-30" />
		<updated date="2022-06-08" />
		<title>Уязвимость Vim </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в vim-X11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-cve-2022-1769/</description>
               <solution>
                    Запретить использование в ОС пакета Vim
                или
                    Установить обновление для пакета(ов) Vim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-cve-2022-1769/" type="self" id="ROS-20220530-01" title="ROS-20220530-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1769" type="cve" id="CVE-2022-1769" title="CVE-2022-1769" />
			<reference href="https://bdu.fstec.ru/vul/2022-03230" type="self" id="BDU:2022-03230" title="BDU:2022-03230" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-X11" epoch="2" version="8.2.4701" release="4.el7.3" arch="x86_64" src="">
					<filename>vim-X11-2:8.2.4701-4.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220530-02</id>
		<issued date="2022-05-30" />
		<updated date="2022-05-30" />
		<title>Уязвимость postgresql</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в postgresql</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-cve-2022-1552/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql
                или
                    Установить обновление для пакета(ов) postgresql
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-cve-2022-1552/" type="self" id="ROS-20220530-02" title="ROS-20220530-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1552" type="cve" id="CVE-2022-1552" title="CVE-2022-1552" />
			<reference href="https://bdu.fstec.ru/vul/2022-02928" type="self" id="BDU:2022-02928" title="BDU:2022-02928" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql" epoch="0" version="12.9" release="2.el7" arch="x86_64" src="">
					<filename>postgresql-0:12.9-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220530-03</id>
		<issued date="2022-05-30" />
		<updated date="2022-05-30" />
		<title>Множественные уязвимости Mozilla Firefox</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mozilla-firefox-cve-2022-1802-cve-2022-1529/</description>
               <solution>
                    Запретить использование в ОС пакета firefox
                или
                    Установить обновление для пакета(ов) firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mozilla-firefox-cve-2022-1802-cve-2022-1529/" type="self" id="ROS-20220530-03" title="ROS-20220530-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802" type="cve" id="CVE-2022-1802" title="CVE-2022-1802" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529" type="cve" id="CVE-2022-1529" title="CVE-2022-1529" />
			<reference href="https://bdu.fstec.ru/vul/2022-03097" type="self" id="BDU:2022-03097" title="BDU:2022-03097" />
			<reference href="https://bdu.fstec.ru/vul/2022-03098" type="self" id="BDU:2022-03098" title="BDU:2022-03098" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="91.9.1" release="1.el7.3" arch="x86_64" src="">
					<filename>firefox-0:91.9.1-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220530-04</id>
		<issued date="2022-05-30" />
		<updated date="2022-05-30" />
		<title>Множественные уязвимости Mozilla thunderbird</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mozilla-thunderbird-cve-2022-1802-cve-2022-1529/</description>
               <solution>
                    Запретить использование в ОС пакета thunderbird
                или
                    Установить обновление для пакета(ов) thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mozilla-thunderbird-cve-2022-1802-cve-2022-1529/" type="self" id="ROS-20220530-04" title="ROS-20220530-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802" type="cve" id="CVE-2022-1802" title="CVE-2022-1802" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529" type="cve" id="CVE-2022-1529" title="CVE-2022-1529" />
			<reference href="https://bdu.fstec.ru/vul/2022-03097" type="self" id="BDU:2022-03097" title="BDU:2022-03097" />
			<reference href="https://bdu.fstec.ru/vul/2022-03098" type="self" id="BDU:2022-03098" title="BDU:2022-03098" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="91.9.1" release="1.el7.3" arch="x86_64" src="">
					<filename>thunderbird-0:91.9.1-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220131-01</id>
		<issued date="2022-06-01" />
		<updated date="2022-06-01" />
		<title>Множественные уязвимости в linuxptp</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в linuxptp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-v-linuxptp-cve-2021-3570-cve-2021-3571/</description>
               <solution>
                    Запретить использование в ОС пакета linuxptp
                или
                    Установить обновление для пакета(ов) linuxptp
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-v-linuxptp-cve-2021-3570-cve-2021-3571/" type="self" id="ROS-20220131-01" title="ROS-20220131-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3571" type="cve" id="CVE-2021-3571" title="CVE-2021-3571" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3570" type="cve" id="CVE-2021-3570" title="CVE-2021-3570" />
			<reference href="https://bdu.fstec.ru/vul/2021-04469" type="self" id="BDU:2021-04469" title="BDU:2021-04469" />
			<reference href="https://bdu.fstec.ru/vul/2021-03699" type="self" id="BDU:2021-03699" title="BDU:2021-03699" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="linuxptp" epoch="0" version="2.0" release="8.20191225gite05809.el7" arch="x86_64" src="">
					<filename>linuxptp-0:2.0-8.20191225gite05809.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220608-01</id>
		<issued date="2022-06-08" />
		<updated date="2023-10-09" />
		<title>Множественные уязвимости ClamAV </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в clamav</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-clamav-cve-2022-20785-cve-2022-20803-cve-2022-20770-cve-2022-20796-cve-20/</description>
               <solution>
                    Запретить использование в ОС пакета ClamAV
                или
                    Установить обновление для пакета(ов) ClamAV
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-clamav-cve-2022-20785-cve-2022-20803-cve-2022-20770-cve-2022-20796-cve-20/" type="self" id="ROS-20220608-01" title="ROS-20220608-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20785" type="cve" id="CVE-2022-20785" title="CVE-2022-20785" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20803" type="cve" id="CVE-2022-20803" title="CVE-2022-20803" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20770" type="cve" id="CVE-2022-20770" title="CVE-2022-20770" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20796" type="cve" id="CVE-2022-20796" title="CVE-2022-20796" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20771" type="cve" id="CVE-2022-20771" title="CVE-2022-20771" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20792" type="cve" id="CVE-2022-20792" title="CVE-2022-20792" />
			<reference href="https://bdu.fstec.ru/vul/2022-02932" type="self" id="BDU:2022-02932" title="BDU:2022-02932" />
			<reference href="https://bdu.fstec.ru/vul/2022-03419" type="self" id="BDU:2022-03419" title="BDU:2022-03419" />
			<reference href="https://bdu.fstec.ru/vul/2022-02934" type="self" id="BDU:2022-02934" title="BDU:2022-02934" />
			<reference href="https://bdu.fstec.ru/vul/2022-02931" type="self" id="BDU:2022-02931" title="BDU:2022-02931" />
			<reference href="https://bdu.fstec.ru/vul/2022-02933" type="self" id="BDU:2022-02933" title="BDU:2022-02933" />
			<reference href="https://bdu.fstec.ru/vul/2022-03420" type="self" id="BDU:2022-03420" title="BDU:2022-03420" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="clamav" epoch="0" version="0.103.6" release="1.el7.3" arch="x86_64" src="">
					<filename>clamav-0:0.103.6-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220620-01</id>
		<issued date="2022-06-20" />
		<updated date="2022-06-20" />
		<title>Отказ в обслуживании в conmon</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в conmon</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/otkaz-v-obsluzhivanii-v-conmon-cve-2022-1708/</description>
               <solution>
                    Запретить использование в ОС пакета conmon
                или
                    Установить обновление для пакета(ов) conmon
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/otkaz-v-obsluzhivanii-v-conmon-cve-2022-1708/" type="self" id="ROS-20220620-01" title="ROS-20220620-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1708" type="cve" id="CVE-2022-1708" title="CVE-2022-1708" />
			<reference href="https://bdu.fstec.ru/vul/2022-03768" type="self" id="BDU:2022-03768" title="BDU:2022-03768" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="conmon" epoch="2" version="2.1.2" release="1.el7.3" arch="x86_64" src="">
					<filename>conmon-2:2.1.2-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220622-01</id>
		<issued date="2022-06-22" />
		<updated date="2022-06-22" />
		<title>Уязвимость E2fsprogs </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в e2fsprogs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-e2fsprogs-cve-2022-1304/</description>
               <solution>
                    Запретить использование в ОС пакета E2fsprogs
                или
                    Установить обновление для пакета(ов) E2fsprogs
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-e2fsprogs-cve-2022-1304/" type="self" id="ROS-20220622-01" title="ROS-20220622-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304" type="cve" id="CVE-2022-1304" title="CVE-2022-1304" />
			<reference href="https://bdu.fstec.ru/vul/2022-03769" type="self" id="BDU:2022-03769" title="BDU:2022-03769" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="e2fsprogs" epoch="0" version="1.44.6" release="4.el7.3" arch="x86_64" src="">
					<filename>e2fsprogs-0:1.44.6-4.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220622-02</id>
		<issued date="2022-06-22" />
		<updated date="2022-06-22" />
		<title>Уязвимость PCRE2 </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в pcre2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pcre2-cve-2022-1586/</description>
               <solution>
                    Запретить использование в ОС пакета PCRE2
                или
                    Установить обновление для пакета(ов) PCRE2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pcre2-cve-2022-1586/" type="self" id="ROS-20220622-02" title="ROS-20220622-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586" type="cve" id="CVE-2022-1586" title="CVE-2022-1586" />
			<reference href="https://bdu.fstec.ru/vul/2022-03770" type="self" id="BDU:2022-03770" title="BDU:2022-03770" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pcre2" epoch="0" version="10.36" release="4.el7.3" arch="x86_64" src="">
					<filename>pcre2-0:10.36-4.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220628-01</id>
		<issued date="2022-06-28" />
		<updated date="2022-06-28" />
		<title>Множественные уязвимости Apache HTTP </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в httpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-apache-http-cve-2022-26377-cve-2022-28330-cve-2022-28614-cve-2022-28615-c/</description>
               <solution>
                    Запретить использование в ОС пакета Apache HTTP
                или
                    Установить обновление для пакета(ов) Apache HTTP
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-apache-http-cve-2022-26377-cve-2022-28330-cve-2022-28614-cve-2022-28615-c/" type="self" id="ROS-20220628-01" title="ROS-20220628-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26377" type="cve" id="CVE-2022-26377" title="CVE-2022-26377" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28330" type="cve" id="CVE-2022-28330" title="CVE-2022-28330" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28614" type="cve" id="CVE-2022-28614" title="CVE-2022-28614" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28615" type="cve" id="CVE-2022-28615" title="CVE-2022-28615" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29404" type="cve" id="CVE-2022-29404" title="CVE-2022-29404" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30522" type="cve" id="CVE-2022-30522" title="CVE-2022-30522" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30556" type="cve" id="CVE-2022-30556" title="CVE-2022-30556" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31813" type="cve" id="CVE-2022-31813" title="CVE-2022-31813" />
			<reference href="https://bdu.fstec.ru/vul/2022-04115" type="self" id="BDU:2022-04115" title="BDU:2022-04115" />
			<reference href="https://bdu.fstec.ru/vul/2022-04101" type="self" id="BDU:2022-04101" title="BDU:2022-04101" />
			<reference href="https://bdu.fstec.ru/vul/2022-04102" type="self" id="BDU:2022-04102" title="BDU:2022-04102" />
			<reference href="https://bdu.fstec.ru/vul/2022-04146" type="self" id="BDU:2022-04146" title="BDU:2022-04146" />
			<reference href="https://bdu.fstec.ru/vul/2022-04147" type="self" id="BDU:2022-04147" title="BDU:2022-04147" />
			<reference href="https://bdu.fstec.ru/vul/2022-04145" type="self" id="BDU:2022-04145" title="BDU:2022-04145" />
			<reference href="https://bdu.fstec.ru/vul/2022-04106" type="self" id="BDU:2022-04106" title="BDU:2022-04106" />
			<reference href="https://bdu.fstec.ru/vul/2022-04141" type="self" id="BDU:2022-04141" title="BDU:2022-04141" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="httpd" epoch="0" version="2.4.54" release="1.el7.3" arch="x86_64" src="">
					<filename>httpd-0:2.4.54-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220628-02</id>
		<issued date="2022-06-28" />
		<updated date="2022-06-28" />
		<title>Уязвимость BlueZ </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в bluez</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-bluez-/</description>
               <solution>
                    Запретить использование в ОС пакета BlueZ
                или
                    Установить обновление для пакета(ов) BlueZ
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-bluez-/" type="self" id="ROS-20220628-02" title="ROS-20220628-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=не присвоен" type="cve" id="не присвоен" title="не присвоен" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="bluez" epoch="0" version="5.55" release="1.el7.3" arch="x86_64" src="">
					<filename>bluez-0:5.55-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220628-03</id>
		<issued date="2022-06-28" />
		<updated date="2022-06-28" />
		<title>Уязвимость Squid </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в squid</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-squid-cve-2021-46784/</description>
               <solution>
                    Запретить использование в ОС пакета Squid
                или
                    Установить обновление для пакета(ов) Squid
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-squid-cve-2021-46784/" type="self" id="ROS-20220628-03" title="ROS-20220628-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46784" type="cve" id="CVE-2021-46784" title="CVE-2021-46784" />
			<reference href="https://bdu.fstec.ru/vul/2022-04051" type="self" id="BDU:2022-04051" title="BDU:2022-04051" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="squid" epoch="7" version="5.5" release="1.el7.3" arch="x86_64" src="">
					<filename>squid-7:5.5-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220701-01</id>
		<issued date="2022-07-01" />
		<updated date="2022-07-21" />
		<title>Множественные уязвимости Vim</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в vim-X11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim/</description>
               <solution>
                    Запретить использование в ОС пакета Vim
                или
                    Установить обновление для пакета(ов) Vim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim/" type="self" id="ROS-20220701-01" title="ROS-20220701-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2175" type="cve" id="CVE-2022-2175" title="CVE-2022-2175" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2042" type="cve" id="CVE-2022-2042" title="CVE-2022-2042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2210" type="cve" id="CVE-2022-2210" title="CVE-2022-2210" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2208" type="cve" id="CVE-2022-2208" title="CVE-2022-2208" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2207" type="cve" id="CVE-2022-2207" title="CVE-2022-2207" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2206" type="cve" id="CVE-2022-2206" title="CVE-2022-2206" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2183" type="cve" id="CVE-2022-2183" title="CVE-2022-2183" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2182" type="cve" id="CVE-2022-2182" title="CVE-2022-2182" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1720" type="cve" id="CVE-2022-1720" title="CVE-2022-1720" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1886" type="cve" id="CVE-2022-1886" title="CVE-2022-1886" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2126" type="cve" id="CVE-2022-2126" title="CVE-2022-2126" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2125" type="cve" id="CVE-2022-2125" title="CVE-2022-2125" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2124" type="cve" id="CVE-2022-2124" title="CVE-2022-2124" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2000" type="cve" id="CVE-2022-2000" title="CVE-2022-2000" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968" type="cve" id="CVE-2022-1968" title="CVE-2022-1968" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942" type="cve" id="CVE-2022-1942" title="CVE-2022-1942" />
			<reference href="https://bdu.fstec.ru/vul/2022-04226" type="self" id="BDU:2022-04226" title="BDU:2022-04226" />
			<reference href="https://bdu.fstec.ru/vul/2022-04208" type="self" id="BDU:2022-04208" title="BDU:2022-04208" />
			<reference href="https://bdu.fstec.ru/vul/2022-04219" type="self" id="BDU:2022-04219" title="BDU:2022-04219" />
			<reference href="https://bdu.fstec.ru/vul/2022-04209" type="self" id="BDU:2022-04209" title="BDU:2022-04209" />
			<reference href="https://bdu.fstec.ru/vul/2022-04214" type="self" id="BDU:2022-04214" title="BDU:2022-04214" />
			<reference href="https://bdu.fstec.ru/vul/2022-04572" type="self" id="BDU:2022-04572" title="BDU:2022-04572" />
			<reference href="https://bdu.fstec.ru/vul/2022-04215" type="self" id="BDU:2022-04215" title="BDU:2022-04215" />
			<reference href="https://bdu.fstec.ru/vul/2022-04216" type="self" id="BDU:2022-04216" title="BDU:2022-04216" />
			<reference href="https://bdu.fstec.ru/vul/2022-04217" type="self" id="BDU:2022-04217" title="BDU:2022-04217" />
			<reference href="https://bdu.fstec.ru/vul/2022-04218" type="self" id="BDU:2022-04218" title="BDU:2022-04218" />
			<reference href="https://bdu.fstec.ru/vul/2022-04220" type="self" id="BDU:2022-04220" title="BDU:2022-04220" />
			<reference href="https://bdu.fstec.ru/vul/2022-04221" type="self" id="BDU:2022-04221" title="BDU:2022-04221" />
			<reference href="https://bdu.fstec.ru/vul/2022-04222" type="self" id="BDU:2022-04222" title="BDU:2022-04222" />
			<reference href="https://bdu.fstec.ru/vul/2022-04223" type="self" id="BDU:2022-04223" title="BDU:2022-04223" />
			<reference href="https://bdu.fstec.ru/vul/2022-04224" type="self" id="BDU:2022-04224" title="BDU:2022-04224" />
			<reference href="https://bdu.fstec.ru/vul/2022-04225" type="self" id="BDU:2022-04225" title="BDU:2022-04225" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-X11" epoch="2" version="8.2.4701" release="5.el7.3" arch="x86_64" src="">
					<filename>vim-X11-2:8.2.4701-5.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220701-02</id>
		<issued date="2022-07-01" />
		<updated date="2022-07-01" />
		<title>Множественные уязвимости firefox </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-cve-2022-34479-cve-2022-34470-cve-2022-34468-cve-2022-34481-cve-2/</description>
               <solution>
                    Запретить использование в ОС пакета Mozilla Firefox ESR
                или
                    Установить обновление для пакета(ов) Mozilla Firefox ESR
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-cve-2022-34479-cve-2022-34470-cve-2022-34468-cve-2022-34481-cve-2/" type="self" id="ROS-20220701-02" title="ROS-20220701-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479" type="cve" id="CVE-2022-34479" title="CVE-2022-34479" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470" type="cve" id="CVE-2022-34470" title="CVE-2022-34470" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468" type="cve" id="CVE-2022-34468" title="CVE-2022-34468" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481" type="cve" id="CVE-2022-34481" title="CVE-2022-34481" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744" type="cve" id="CVE-2022-31744" title="CVE-2022-31744" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472" type="cve" id="CVE-2022-34472" title="CVE-2022-34472" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200" type="cve" id="CVE-2022-2200" title="CVE-2022-2200" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484" type="cve" id="CVE-2022-34484" title="CVE-2022-34484" />
			<reference href="https://bdu.fstec.ru/vul/2022-04154" type="self" id="BDU:2022-04154" title="BDU:2022-04154" />
			<reference href="https://bdu.fstec.ru/vul/2022-04031" type="self" id="BDU:2022-04031" title="BDU:2022-04031" />
			<reference href="https://bdu.fstec.ru/vul/2022-04153" type="self" id="BDU:2022-04153" title="BDU:2022-04153" />
			<reference href="https://bdu.fstec.ru/vul/2022-04062" type="self" id="BDU:2022-04062" title="BDU:2022-04062" />
			<reference href="https://bdu.fstec.ru/vul/2022-04243" type="self" id="BDU:2022-04243" title="BDU:2022-04243" />
			<reference href="https://bdu.fstec.ru/vul/2022-04065" type="self" id="BDU:2022-04065" title="BDU:2022-04065" />
			<reference href="https://bdu.fstec.ru/vul/2022-04063" type="self" id="BDU:2022-04063" title="BDU:2022-04063" />
			<reference href="https://bdu.fstec.ru/vul/2022-04029" type="self" id="BDU:2022-04029" title="BDU:2022-04029" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="91.11.0" release="1.el7.3" arch="x86_64" src="">
					<filename>firefox-0:91.11.0-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220701-03</id>
		<issued date="2022-07-01" />
		<updated date="2022-07-01" />
		<title>Множественные уязвимости thunderbird </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-cve-2022-34479-cve-2022-34470-cve-2022-34468-cve-2022-34481-c/</description>
               <solution>
                    Запретить использование в ОС пакета Mozilla Thunderbird
                или
                    Установить обновление для пакета(ов) Mozilla Thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-cve-2022-34479-cve-2022-34470-cve-2022-34468-cve-2022-34481-c/" type="self" id="ROS-20220701-03" title="ROS-20220701-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479" type="cve" id="CVE-2022-34479" title="CVE-2022-34479" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470" type="cve" id="CVE-2022-34470" title="CVE-2022-34470" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468" type="cve" id="CVE-2022-34468" title="CVE-2022-34468" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481" type="cve" id="CVE-2022-34481" title="CVE-2022-34481" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744" type="cve" id="CVE-2022-31744" title="CVE-2022-31744" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472" type="cve" id="CVE-2022-34472" title="CVE-2022-34472" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200" type="cve" id="CVE-2022-2200" title="CVE-2022-2200" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484" type="cve" id="CVE-2022-34484" title="CVE-2022-34484" />
			<reference href="https://bdu.fstec.ru/vul/2022-04154" type="self" id="BDU:2022-04154" title="BDU:2022-04154" />
			<reference href="https://bdu.fstec.ru/vul/2022-04031" type="self" id="BDU:2022-04031" title="BDU:2022-04031" />
			<reference href="https://bdu.fstec.ru/vul/2022-04153" type="self" id="BDU:2022-04153" title="BDU:2022-04153" />
			<reference href="https://bdu.fstec.ru/vul/2022-04062" type="self" id="BDU:2022-04062" title="BDU:2022-04062" />
			<reference href="https://bdu.fstec.ru/vul/2022-04243" type="self" id="BDU:2022-04243" title="BDU:2022-04243" />
			<reference href="https://bdu.fstec.ru/vul/2022-04065" type="self" id="BDU:2022-04065" title="BDU:2022-04065" />
			<reference href="https://bdu.fstec.ru/vul/2022-04063" type="self" id="BDU:2022-04063" title="BDU:2022-04063" />
			<reference href="https://bdu.fstec.ru/vul/2022-04029" type="self" id="BDU:2022-04029" title="BDU:2022-04029" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="91.11.0" release="1.el7.3" arch="x86_64" src="">
					<filename>thunderbird-0:91.11.0-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220705-01</id>
		<issued date="2022-07-05" />
		<updated date="2022-07-05" />
		<title>Уязвимость caribou</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в caribou</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-caribou-cve-2020-25712/</description>
               <solution>
                    Запретить использование в ОС пакета Caribou
                или
                    Установить обновление для пакета(ов) Caribou
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-caribou-cve-2020-25712/" type="self" id="ROS-20220705-01" title="ROS-20220705-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25712" type="cve" id="CVE-2020-25712" title="CVE-2020-25712" />
			<reference href="https://bdu.fstec.ru/vul/2021-01784" type="self" id="BDU:2021-01784" title="BDU:2021-01784" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="caribou" epoch="0" version="0.4.21" release="22.el7" arch="x86_64" src="">
					<filename>caribou-0:0.4.21-22.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220706-01</id>
		<issued date="2022-07-06" />
		<updated date="2022-07-06" />
		<title>Уязвимость OpenSSH </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в openssh</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssh-/</description>
               <solution>
                    Запретить использование в ОС пакета OpenSSH
                или
                    Установить обновление для пакета(ов) OpenSSH
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssh-/" type="self" id="ROS-20220706-01" title="ROS-20220706-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=" type="cve" id="" title="" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssh" epoch="0" version="8.9p1" release="5.el7" arch="x86_64" src="">
					<filename>openssh-0:8.9p1-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220706-02</id>
		<issued date="2022-07-06" />
		<updated date="2022-07-21" />
		<title>Множественные уязвимости Rubygem Rack</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в rubygem-rack</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rubygem-rack-cve-2022-30123-cve-2022-30122/</description>
               <solution>
                    Запретить использование в ОС пакета Rubygem Rack
                или
                    Установить обновление для пакета(ов) Rubygem Rack
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rubygem-rack-cve-2022-30123-cve-2022-30122/" type="self" id="ROS-20220706-02" title="ROS-20220706-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30123" type="cve" id="CVE-2022-30123" title="CVE-2022-30123" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30122" type="cve" id="CVE-2022-30122" title="CVE-2022-30122" />
			<reference href="https://bdu.fstec.ru/vul/2022-04201" type="self" id="BDU:2022-04201" title="BDU:2022-04201" />
			<reference href="https://bdu.fstec.ru/vul/2022-04200" type="self" id="BDU:2022-04200" title="BDU:2022-04200" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-rack" epoch="1" version="2.0.8" release="3.el7" arch="noarch" src="">
					<filename>rubygem-rack-1:2.0.8-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220714-01</id>
		<issued date="2022-07-14" />
		<updated date="2022-07-21" />
		<title>Уязвимость BusyBox </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в busybox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-busybox-cve-2022-28391/</description>
               <solution>
                    Запретить использование в ОС пакета BusyBox
                или
                    Установить обновление для пакета(ов) BusyBox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-busybox-cve-2022-28391/" type="self" id="ROS-20220714-01" title="ROS-20220714-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391" type="cve" id="CVE-2022-28391" title="CVE-2022-28391" />
			<reference href="https://bdu.fstec.ru/vul/2022-04487" type="self" id="BDU:2022-04487" title="BDU:2022-04487" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="busybox" epoch="1" version="1.34.1" release="3.el7.3" arch="x86_64" src="">
					<filename>busybox-1:1.34.1-3.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220714-02</id>
		<issued date="2022-07-14" />
		<updated date="2022-07-14" />
		<title>Уязвимость Dovecot </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в dovecot</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dovecot-cve-2022-30550/</description>
               <solution>
                    Запретить использование в ОС пакета dovecot
                или
                    Установить обновление для пакета(ов) dovecot
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dovecot-cve-2022-30550/" type="self" id="ROS-20220714-02" title="ROS-20220714-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30550" type="cve" id="CVE-2022-30550" title="CVE-2022-30550" />
			<reference href="https://bdu.fstec.ru/vul/2022-04273" type="self" id="BDU:2022-04273" title="BDU:2022-04273" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dovecot" epoch="1" version="2.3.11.3" release="5.el7.3" arch="x86_64" src="">
					<filename>dovecot-1:2.3.11.3-5.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220619-01</id>
		<issued date="2022-07-19" />
		<updated date="2022-07-19" />
		<title>Уязвимость ядра ОС </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-yadra-os-cve-2022-32250/</description>
               <solution>Установить обновление для пакета(ов) ядра РЕД ОС</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-yadra-os-cve-2022-32250/" type="self" id="ROS-20220619-01" title="ROS-20220619-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250" type="cve" id="CVE-2022-32250" title="CVE-2022-32250" />
			<reference href="https://bdu.fstec.ru/vul/2022-03283" type="self" id="BDU:2022-03283" title="BDU:2022-03283" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="5.15.35" release="4.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:5.15.35-4.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220721-01</id>
		<issued date="2022-08-09" />
		<updated date="2022-08-09" />
		<title>Множественные уязвимости X.Org Server</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в xorg-x11-server-common</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-x-org-server-cve-2022-2319-cve-2022-2320/</description>
               <solution>
                    Запретить использование в ОС пакета xorg-x11-server
                или
                    Установить обновление для пакета(ов) xorg-x11-server
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-x-org-server-cve-2022-2319-cve-2022-2320/" type="self" id="ROS-20220721-01" title="ROS-20220721-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2319" type="cve" id="CVE-2022-2319" title="CVE-2022-2319" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2320" type="cve" id="CVE-2022-2320" title="CVE-2022-2320" />
			<reference href="https://bdu.fstec.ru/vul/2022-04748" type="self" id="BDU:2022-04748" title="BDU:2022-04748" />
			<reference href="https://bdu.fstec.ru/vul/2022-04749" type="self" id="BDU:2022-04749" title="BDU:2022-04749" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="xorg-x11-server-common" epoch="0" version="1.20.14" release="2.el7.3" arch="x86_64" src="">
					<filename>xorg-x11-server-common-0:1.20.14-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220804-01</id>
		<issued date="2022-08-09" />
		<updated date="2022-09-14" />
		<title>Уязвимость в стандартной библиотеке языка Rust </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в rust</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-v-standartnoy-biblioteke-yazyka-rust-cve-2022-21658/</description>
               <solution>
			Запретить использование в ОС пакета Rust
		
		 или
		
			Установить обновление для пакета(ов) Rust
		</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-v-standartnoy-biblioteke-yazyka-rust-cve-2022-21658/" type="self" id="ROS-20220804-01" title="ROS-20220804-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21658" type="cve" id="CVE-2022-21658" title="CVE-2022-21658" />
			<reference href="https://bdu.fstec.ru/vul/2022-05167" type="self" id="BDU:2022-05167" title="BDU:2022-05167" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rust" epoch="0" version="1.61.0" release="2.el7" arch="x86_64" src="">
					<filename>rust-0:1.61.0-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220721-02</id>
		<issued date="2022-08-09" />
		<updated date="2022-09-14" />
		<title>Целочисленное переполнение в Harfbuzz </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в harfbuzz</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/tselochislennoe-perepolnenie-v-harfbuzz-cve-2022-33068/</description>
               <solution>
			Запретить использование в ОС пакета Harfbuzz
		
		 или
		
			Установить обновление для пакета(ов) Harfbuzz
		</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/tselochislennoe-perepolnenie-v-harfbuzz-cve-2022-33068/" type="self" id="ROS-20220721-02" title="ROS-20220721-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33068" type="cve" id="CVE-2022-33068" title="CVE-2022-33068" />
			<reference href="https://bdu.fstec.ru/vul/2022-05166" type="self" id="BDU:2022-05166" title="BDU:2022-05166" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="harfbuzz" epoch="0" version="2.6.4" release="5.el7" arch="x86_64" src="">
					<filename>harfbuzz-0:2.6.4-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220808-01</id>
		<issued date="2022-08-24" />
		<updated date="2022-09-14" />
		<title>Множественные уязвимости Samba</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в samba</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-samba-cve-2022-32744-cve-2022-32746-cve-2022-2031-cve-2022-32745-cve-2022/</description>
               <solution>
			Запретить использование в ОС пакета samba
		
		 или
		
			Установить обновление для пакета(ов) samba
		</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-samba-cve-2022-32744-cve-2022-32746-cve-2022-2031-cve-2022-32745-cve-2022/" type="self" id="ROS-20220808-01" title="ROS-20220808-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746" type="cve" id="CVE-2022-32746" title="CVE-2022-32746" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744" type="cve" id="CVE-2022-32744" title="CVE-2022-32744" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745" type="cve" id="CVE-2022-32745" title="CVE-2022-32745" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742" type="cve" id="CVE-2022-32742" title="CVE-2022-32742" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031" type="cve" id="CVE-2022-2031" title="CVE-2022-2031" />
			<reference href="https://bdu.fstec.ru/vul/2022-04911" type="self" id="BDU:2022-04911" title="BDU:2022-04911" />
			<reference href="https://bdu.fstec.ru/vul/2022-04687" type="self" id="BDU:2022-04687" title="BDU:2022-04687" />
			<reference href="https://bdu.fstec.ru/vul/2022-04913" type="self" id="BDU:2022-04913" title="BDU:2022-04913" />
			<reference href="https://bdu.fstec.ru/vul/2022-04977" type="self" id="BDU:2022-04977" title="BDU:2022-04977" />
			<reference href="https://bdu.fstec.ru/vul/2022-05290" type="self" id="BDU:2022-05290" title="BDU:2022-05290" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="samba" epoch="0" version="4.15.9" release="1m.el7.3" arch="x86_64" src="">
					<filename>samba-0:4.15.9-1m.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220826-01</id>
		<issued date="2022-08-26" />
		<updated date="2022-09-14" />
		<title>Множественные уязвимости PHP</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в php</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-cve-2021-21708-cve-2022-31625-cve-2021-21702-cve-2021-21705-cve-2021-/</description>
               <solution>
			Запретить использование в ОС пакета PHP
		
		 или
		
			Установить обновление для пакета(ов) PHP:
		
 
		 # dnf install php81-release
		 # dnf clean all 
		 # dnf makecache
		 # dnf update php*
		
		</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-cve-2021-21708-cve-2022-31625-cve-2021-21702-cve-2021-21705-cve-2021-/" type="self" id="ROS-20220826-01" title="ROS-20220826-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21708" type="cve" id="CVE-2021-21708" title="CVE-2021-21708" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31625" type="cve" id="CVE-2022-31625" title="CVE-2022-31625" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21702" type="cve" id="CVE-2021-21702" title="CVE-2021-21702" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705" type="cve" id="CVE-2021-21705" title="CVE-2021-21705" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21704" type="cve" id="CVE-2021-21704" title="CVE-2021-21704" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703" type="cve" id="CVE-2021-21703" title="CVE-2021-21703" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31627" type="cve" id="CVE-2022-31627" title="CVE-2022-31627" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31626" type="cve" id="CVE-2022-31626" title="CVE-2022-31626" />
			<reference href="https://bdu.fstec.ru/vul/2022-05350" type="self" id="BDU:2022-05350" title="BDU:2022-05350" />
			<reference href="https://bdu.fstec.ru/vul/2022-05351" type="self" id="BDU:2022-05351" title="BDU:2022-05351" />
			<reference href="https://bdu.fstec.ru/vul/2021-03159" type="self" id="BDU:2021-03159" title="BDU:2021-03159" />
			<reference href="https://bdu.fstec.ru/vul/2021-03703" type="self" id="BDU:2021-03703" title="BDU:2021-03703" />
			<reference href="https://bdu.fstec.ru/vul/2021-03559" type="self" id="BDU:2021-03559" title="BDU:2021-03559" />
			<reference href="https://bdu.fstec.ru/vul/2021-05228" type="self" id="BDU:2021-05228" title="BDU:2021-05228" />
			<reference href="https://bdu.fstec.ru/vul/2022-04762" type="self" id="BDU:2022-04762" title="BDU:2022-04762" />
			<reference href="https://bdu.fstec.ru/vul/2022-03725" type="self" id="BDU:2022-03725" title="BDU:2022-03725" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php" epoch="0" version="8.1.9" release="1.el7" arch="x86_64" src="">
					<filename>php-0:8.1.9-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220908-01</id>
		<issued date="2022-09-08" />
		<updated date="2022-09-14" />
		<title>Множественные уязвимости ядра ОС </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-yadra-os-cve-2022-2078-cve-2022-2588-cve-2022-2585-cve-2022-2586-cve-2022/</description>
               <solution>
			 отключение неиспользуемых учетных записей, а также учетных записей недоверенных пользователей; ограничение доступа к командной строке для недоверенных пользователей; использование антивирусных средств защиты; мониторинг действий пользователей; использование систем управления доступом. 
		
		 или
		
			Установить обновление для пакета(ов) ядра РЕД ОС
		</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-yadra-os-cve-2022-2078-cve-2022-2588-cve-2022-2585-cve-2022-2586-cve-2022/" type="self" id="ROS-20220908-01" title="ROS-20220908-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078" type="cve" id="CVE-2022-2078" title="CVE-2022-2078" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588" type="cve" id="CVE-2022-2588" title="CVE-2022-2588" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586" type="cve" id="CVE-2022-2586" title="CVE-2022-2586" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585" type="cve" id="CVE-2022-2585" title="CVE-2022-2585" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918" type="cve" id="CVE-2022-34918" title="CVE-2022-34918" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655" type="cve" id="CVE-2021-33655" title="CVE-2021-33655" />
			<reference href="https://bdu.fstec.ru/vul/2022-04090" type="self" id="BDU:2022-04090" title="BDU:2022-04090" />
			<reference href="https://bdu.fstec.ru/vul/2022-05178" type="self" id="BDU:2022-05178" title="BDU:2022-05178" />
			<reference href="https://bdu.fstec.ru/vul/2022-05140" type="self" id="BDU:2022-05140" title="BDU:2022-05140" />
			<reference href="https://bdu.fstec.ru/vul/2022-05633" type="self" id="BDU:2022-05633" title="BDU:2022-05633" />
			<reference href="https://bdu.fstec.ru/vul/2022-04733" type="self" id="BDU:2022-04733" title="BDU:2022-04733" />
			<reference href="https://bdu.fstec.ru/vul/2022-04878" type="self" id="BDU:2022-04878" title="BDU:2022-04878" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="5.15.35" release="5.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:5.15.35-5.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220909-01</id>
		<issued date="2022-09-09" />
		<updated date="2022-09-14" />
		<title>Множественные уязвимости Vim </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в vim-X11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim-cve-2022-3016-cve-2022-2982-cve-2022-2980-cve-2022-2923-cve-2022-2946/</description>
               <solution>
			Запретить использование в ОС пакета vim
		
		 или
		
			Установить обновление для пакета(ов) vim
		</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim-cve-2022-3016-cve-2022-2982-cve-2022-2980-cve-2022-2923-cve-2022-2946/" type="self" id="ROS-20220909-01" title="ROS-20220909-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3016" type="cve" id="CVE-2022-3016" title="CVE-2022-3016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2982" type="cve" id="CVE-2022-2982" title="CVE-2022-2982" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2923" type="cve" id="CVE-2022-2923" title="CVE-2022-2923" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2946" type="cve" id="CVE-2022-2946" title="CVE-2022-2946" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2980" type="cve" id="CVE-2022-2980" title="CVE-2022-2980" />
			<reference href="https://bdu.fstec.ru/vul/2022-05331" type="self" id="BDU:2022-05331" title="BDU:2022-05331" />
			<reference href="https://bdu.fstec.ru/vul/2022-05390" type="self" id="BDU:2022-05390" title="BDU:2022-05390" />
			<reference href="https://bdu.fstec.ru/vul/2022-05234" type="self" id="BDU:2022-05234" title="BDU:2022-05234" />
			<reference href="https://bdu.fstec.ru/vul/2022-05289" type="self" id="BDU:2022-05289" title="BDU:2022-05289" />
			<reference href="https://bdu.fstec.ru/vul/2022-02729" type="self" id="BDU:2022-02729" title="BDU:2022-02729" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-X11" epoch="2" version="8.2.4701" release="8.el7.3" arch="x86_64" src="">
					<filename>vim-X11-2:8.2.4701-8.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220914-01</id>
		<issued date="2022-09-14" />
		<updated date="2022-10-05" />
		<title>Уязвимость libconfuse </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в libconfuse</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libconfuse-cve-2022-40320/</description>
               <solution>
                    Запретить использование в ОС пакета libConfuse
                или
                    Установить обновление для пакета(ов) libConfuse
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libconfuse-cve-2022-40320/" type="self" id="ROS-20220914-01" title="ROS-20220914-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40320" type="cve" id="CVE-2022-40320" title="CVE-2022-40320" />
			<reference href="https://bdu.fstec.ru/vul/2022-05795" type="self" id="BDU:2022-05795" title="BDU:2022-05795" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libconfuse" epoch="0" version="3.3" release="3.el7" arch="x86_64" src="">
					<filename>libconfuse-0:3.3-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220919-01</id>
		<issued date="2022-09-19" />
		<updated date="2022-10-05" />
		<title>Множественные уязвимости ядра ОС </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-yadra-os-/</description>
               <solution>Установить обновление для пакета(ов) ядра ОС</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-yadra-os-/" type="self" id="ROS-20220919-01" title="ROS-20220919-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3202" type="cve" id="CVE-2022-3202" title="CVE-2022-3202" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2977" type="cve" id="CVE-2022-2977" title="CVE-2022-2977" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2964" type="cve" id="CVE-2022-2964" title="CVE-2022-2964" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4154" type="cve" id="CVE-2021-4154" title="CVE-2021-4154" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33656" type="cve" id="CVE-2021-33656" title="CVE-2021-33656" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2380" type="cve" id="CVE-2022-2380" title="CVE-2022-2380" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0941" type="cve" id="CVE-2021-0941" title="CVE-2021-0941" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250" type="cve" id="CVE-2022-32250" title="CVE-2022-32250" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390" type="cve" id="CVE-2022-28390" title="CVE-2022-28390" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389" type="cve" id="CVE-2022-28389" title="CVE-2022-28389" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388" type="cve" id="CVE-2022-28388" title="CVE-2022-28388" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516" type="cve" id="CVE-2022-1516" title="CVE-2022-1516" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158" type="cve" id="CVE-2022-1158" title="CVE-2022-1158" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959" type="cve" id="CVE-2022-24959" title="CVE-2022-24959" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879" type="cve" id="CVE-2021-44879" title="CVE-2021-44879" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26878" type="cve" id="CVE-2022-26878" title="CVE-2022-26878" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975" type="cve" id="CVE-2021-43975" title="CVE-2021-43975" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516" type="cve" id="CVE-2022-0516" title="CVE-2022-0516" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4028" type="cve" id="CVE-2021-4028" title="CVE-2021-4028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435" type="cve" id="CVE-2022-0435" title="CVE-2022-0435" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24122" type="cve" id="CVE-2022-24122" title="CVE-2022-24122" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0185" type="cve" id="CVE-2022-0185" title="CVE-2022-0185" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733" type="cve" id="CVE-2021-44733" title="CVE-2021-44733" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37576" type="cve" id="CVE-2021-37576" title="CVE-2021-37576" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33033" type="cve" id="CVE-2021-33033" title="CVE-2021-33033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3612" type="cve" id="CVE-2021-3612" title="CVE-2021-3612" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22555" type="cve" id="CVE-2021-22555" title="CVE-2021-22555" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21781" type="cve" id="CVE-2021-21781" title="CVE-2021-21781" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3600" type="cve" id="CVE-2021-3600" title="CVE-2021-3600" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33624" type="cve" id="CVE-2021-33624" title="CVE-2021-33624" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3609" type="cve" id="CVE-2021-3609" title="CVE-2021-3609" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3490" type="cve" id="CVE-2021-3490" title="CVE-2021-3490" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3489" type="cve" id="CVE-2021-3489" title="CVE-2021-3489" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23133" type="cve" id="CVE-2021-23133" title="CVE-2021-23133" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3506" type="cve" id="CVE-2021-3506" title="CVE-2021-3506" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27365" type="cve" id="CVE-2021-27365" title="CVE-2021-27365" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27364" type="cve" id="CVE-2021-27364" title="CVE-2021-27364" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27363" type="cve" id="CVE-2021-27363" title="CVE-2021-27363" />
			<reference href="https://bdu.fstec.ru/vul/2022-05844" type="self" id="BDU:2022-05844" title="BDU:2022-05844" />
			<reference href="https://bdu.fstec.ru/vul/2022-05852" type="self" id="BDU:2022-05852" title="BDU:2022-05852" />
			<reference href="https://bdu.fstec.ru/vul/2022-05848" type="self" id="BDU:2022-05848" title="BDU:2022-05848" />
			<reference href="https://bdu.fstec.ru/vul/2022-05676" type="self" id="BDU:2022-05676" title="BDU:2022-05676" />
			<reference href="https://bdu.fstec.ru/vul/2022-05829" type="self" id="BDU:2022-05829" title="BDU:2022-05829" />
			<reference href="https://bdu.fstec.ru/vul/2022-04393" type="self" id="BDU:2022-04393" title="BDU:2022-04393" />
			<reference href="https://bdu.fstec.ru/vul/2022-05836" type="self" id="BDU:2022-05836" title="BDU:2022-05836" />
			<reference href="https://bdu.fstec.ru/vul/2022-03283" type="self" id="BDU:2022-03283" title="BDU:2022-03283" />
			<reference href="https://bdu.fstec.ru/vul/2022-02672" type="self" id="BDU:2022-02672" title="BDU:2022-02672" />
			<reference href="https://bdu.fstec.ru/vul/2022-02681" type="self" id="BDU:2022-02681" title="BDU:2022-02681" />
			<reference href="https://bdu.fstec.ru/vul/2022-05411" type="self" id="BDU:2022-05411" title="BDU:2022-05411" />
			<reference href="https://bdu.fstec.ru/vul/2022-05401" type="self" id="BDU:2022-05401" title="BDU:2022-05401" />
			<reference href="https://bdu.fstec.ru/vul/2022-03034" type="self" id="BDU:2022-03034" title="BDU:2022-03034" />
			<reference href="https://bdu.fstec.ru/vul/2022-00833" type="self" id="BDU:2022-00833" title="BDU:2022-00833" />
			<reference href="https://bdu.fstec.ru/vul/2022-02325" type="self" id="BDU:2022-02325" title="BDU:2022-02325" />
			<reference href="https://bdu.fstec.ru/vul/2022-02677" type="self" id="BDU:2022-02677" title="BDU:2022-02677" />
			<reference href="https://bdu.fstec.ru/vul/2021-06351" type="self" id="BDU:2021-06351" title="BDU:2021-06351" />
			<reference href="https://bdu.fstec.ru/vul/2022-00869" type="self" id="BDU:2022-00869" title="BDU:2022-00869" />
			<reference href="https://bdu.fstec.ru/vul/2022-00733" type="self" id="BDU:2022-00733" title="BDU:2022-00733" />
			<reference href="https://bdu.fstec.ru/vul/2022-02564" type="self" id="BDU:2022-02564" title="BDU:2022-02564" />
			<reference href="https://bdu.fstec.ru/vul/2022-00515" type="self" id="BDU:2022-00515" title="BDU:2022-00515" />
			<reference href="https://bdu.fstec.ru/vul/2022-01472" type="self" id="BDU:2022-01472" title="BDU:2022-01472" />
			<reference href="https://bdu.fstec.ru/vul/2022-00026" type="self" id="BDU:2022-00026" title="BDU:2022-00026" />
			<reference href="https://bdu.fstec.ru/vul/2021-04028" type="self" id="BDU:2021-04028" title="BDU:2021-04028" />
			<reference href="https://bdu.fstec.ru/vul/2021-04828" type="self" id="BDU:2021-04828" title="BDU:2021-04828" />
			<reference href="https://bdu.fstec.ru/vul/2021-03229" type="self" id="BDU:2021-03229" title="BDU:2021-03229" />
			<reference href="https://bdu.fstec.ru/vul/2021-04260" type="self" id="BDU:2021-04260" title="BDU:2021-04260" />
			<reference href="https://bdu.fstec.ru/vul/2021-03994" type="self" id="BDU:2021-03994" title="BDU:2021-03994" />
			<reference href="https://bdu.fstec.ru/vul/2021-03254" type="self" id="BDU:2021-03254" title="BDU:2021-03254" />
			<reference href="https://bdu.fstec.ru/vul/2021-03232" type="self" id="BDU:2021-03232" title="BDU:2021-03232" />
			<reference href="https://bdu.fstec.ru/vul/2021-03233" type="self" id="BDU:2021-03233" title="BDU:2021-03233" />
			<reference href="https://bdu.fstec.ru/vul/2021-04842" type="self" id="BDU:2021-04842" title="BDU:2021-04842" />
			<reference href="https://bdu.fstec.ru/vul/2021-04825" type="self" id="BDU:2021-04825" title="BDU:2021-04825" />
			<reference href="https://bdu.fstec.ru/vul/2021-04855" type="self" id="BDU:2021-04855" title="BDU:2021-04855" />
			<reference href="https://bdu.fstec.ru/vul/2021-04844" type="self" id="BDU:2021-04844" title="BDU:2021-04844" />
			<reference href="https://bdu.fstec.ru/vul/2021-01218" type="self" id="BDU:2021-01218" title="BDU:2021-01218" />
			<reference href="https://bdu.fstec.ru/vul/2021-01650" type="self" id="BDU:2021-01650" title="BDU:2021-01650" />
			<reference href="https://bdu.fstec.ru/vul/2021-01266" type="self" id="BDU:2021-01266" title="BDU:2021-01266" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="5.15.35" release="5.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:5.15.35-5.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220920-01</id>
		<issued date="2022-09-20" />
		<updated date="2022-10-05" />
		<title>Множественные уязвимости GRUB </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в grub2-common</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-grub-/</description>
               <solution>Установить обновление для пакета(ов) загрузчика РЕД ОС grub2</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-grub-/" type="self" id="ROS-20220920-01" title="ROS-20220920-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10713" type="cve" id="CVE-2020-10713" title="CVE-2020-10713" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14308" type="cve" id="CVE-2020-14308" title="CVE-2020-14308" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14309" type="cve" id="CVE-2020-14309" title="CVE-2020-14309" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14310" type="cve" id="CVE-2020-14310" title="CVE-2020-14310" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14311" type="cve" id="CVE-2020-14311" title="CVE-2020-14311" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15705" type="cve" id="CVE-2020-15705" title="CVE-2020-15705" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15706" type="cve" id="CVE-2020-15706" title="CVE-2020-15706" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15707" type="cve" id="CVE-2020-15707" title="CVE-2020-15707" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14372" type="cve" id="CVE-2020-14372" title="CVE-2020-14372" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25632" type="cve" id="CVE-2020-25632" title="CVE-2020-25632" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25647" type="cve" id="CVE-2020-25647" title="CVE-2020-25647" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27749" type="cve" id="CVE-2020-27749" title="CVE-2020-27749" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27779" type="cve" id="CVE-2020-27779" title="CVE-2020-27779" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3418" type="cve" id="CVE-2021-3418" title="CVE-2021-3418" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20225" type="cve" id="CVE-2021-20225" title="CVE-2021-20225" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20233" type="cve" id="CVE-2021-20233" title="CVE-2021-20233" />
			<reference href="https://bdu.fstec.ru/vul/2020-03625" type="self" id="BDU:2020-03625" title="BDU:2020-03625" />
			<reference href="https://bdu.fstec.ru/vul/2020-03955" type="self" id="BDU:2020-03955" title="BDU:2020-03955" />
			<reference href="https://bdu.fstec.ru/vul/2020-03968" type="self" id="BDU:2020-03968" title="BDU:2020-03968" />
			<reference href="https://bdu.fstec.ru/vul/2020-03969" type="self" id="BDU:2020-03969" title="BDU:2020-03969" />
			<reference href="https://bdu.fstec.ru/vul/2020-03970" type="self" id="BDU:2020-03970" title="BDU:2020-03970" />
			<reference href="https://bdu.fstec.ru/vul/2022-05895" type="self" id="BDU:2022-05895" title="BDU:2022-05895" />
			<reference href="https://bdu.fstec.ru/vul/2020-03971" type="self" id="BDU:2020-03971" title="BDU:2020-03971" />
			<reference href="https://bdu.fstec.ru/vul/2020-03972" type="self" id="BDU:2020-03972" title="BDU:2020-03972" />
			<reference href="https://bdu.fstec.ru/vul/2022-00326" type="self" id="BDU:2022-00326" title="BDU:2022-00326" />
			<reference href="https://bdu.fstec.ru/vul/2022-00313" type="self" id="BDU:2022-00313" title="BDU:2022-00313" />
			<reference href="https://bdu.fstec.ru/vul/2022-00337" type="self" id="BDU:2022-00337" title="BDU:2022-00337" />
			<reference href="https://bdu.fstec.ru/vul/2022-00338" type="self" id="BDU:2022-00338" title="BDU:2022-00338" />
			<reference href="https://bdu.fstec.ru/vul/2022-00341" type="self" id="BDU:2022-00341" title="BDU:2022-00341" />
			<reference href="https://bdu.fstec.ru/vul/2022-05896" type="self" id="BDU:2022-05896" title="BDU:2022-05896" />
			<reference href="https://bdu.fstec.ru/vul/2022-00308" type="self" id="BDU:2022-00308" title="BDU:2022-00308" />
			<reference href="https://bdu.fstec.ru/vul/2022-00304" type="self" id="BDU:2022-00304" title="BDU:2022-00304" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="grub2-common" epoch="1" version="2.06" release="55.el7.3" arch="noarch" src="">
					<filename>grub2-common-1:2.06-55.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220926-01</id>
		<issued date="2022-09-26" />
		<updated date="2022-10-05" />
		<title>Множественные уязвимости Vim</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в vim-X11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim-cve-2022-3234-cve-2022-3235/</description>
               <solution>
                    Запретить использование в ОС пакета Vim
                или
                    Установить обновление для пакета(ов) Vim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim-cve-2022-3234-cve-2022-3235/" type="self" id="ROS-20220926-01" title="ROS-20220926-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3234" type="cve" id="CVE-2022-3234" title="CVE-2022-3234" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3235" type="cve" id="CVE-2022-3235" title="CVE-2022-3235" />
			<reference href="https://bdu.fstec.ru/vul/2022-05991" type="self" id="BDU:2022-05991" title="BDU:2022-05991" />
			<reference href="https://bdu.fstec.ru/vul/2022-05992" type="self" id="BDU:2022-05992" title="BDU:2022-05992" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-X11" epoch="2" version="8.2.4701" release="9.el7.3" arch="x86_64" src="">
					<filename>vim-X11-2:8.2.4701-9.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220926-02</id>
		<issued date="2022-09-26" />
		<updated date="2022-10-05" />
		<title>Выполнение произвольного кода в Poppler </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в poppler</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/vypolnenie-proizvolnogo-koda-v-poppler-cve-2022-38784/</description>
               <solution>
                    Запретить использование в ОС пакета Poppler
                или
                    Установить обновление для пакета(ов) Poppler
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/vypolnenie-proizvolnogo-koda-v-poppler-cve-2022-38784/" type="self" id="ROS-20220926-02" title="ROS-20220926-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38784" type="cve" id="CVE-2022-38784" title="CVE-2022-38784" />
			<reference href="https://bdu.fstec.ru/vul/2022-05993" type="self" id="BDU:2022-05993" title="BDU:2022-05993" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="poppler" epoch="0" version="21.08.0" release="12.el7" arch="x86_64" src="">
					<filename>poppler-0:21.08.0-12.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220929-01</id>
		<issued date="2022-09-29" />
		<updated date="2022-10-06" />
		<title>Множественные уязвимости BIND </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в bind</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-bind-cve-2022-2795-cve-2022-2881-cve-2022-2906-cve-2022-3080-cve-2022-381/</description>
               <solution>
                    Запретить использование в ОС пакета BIND
                или
                    Установить обновление для пакета(ов) BIND
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-bind-cve-2022-2795-cve-2022-2881-cve-2022-2906-cve-2022-3080-cve-2022-381/" type="self" id="ROS-20220929-01" title="ROS-20220929-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2795" type="cve" id="CVE-2022-2795" title="CVE-2022-2795" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2881" type="cve" id="CVE-2022-2881" title="CVE-2022-2881" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2906" type="cve" id="CVE-2022-2906" title="CVE-2022-2906" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3080" type="cve" id="CVE-2022-3080" title="CVE-2022-3080" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38177" type="cve" id="CVE-2022-38177" title="CVE-2022-38177" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38178" type="cve" id="CVE-2022-38178" title="CVE-2022-38178" />
			<reference href="https://bdu.fstec.ru/vul/2022-02387" type="self" id="BDU:2022-02387" title="BDU:2022-02387" />
			<reference href="https://bdu.fstec.ru/vul/2022-05984" type="self" id="BDU:2022-05984" title="BDU:2022-05984" />
			<reference href="https://bdu.fstec.ru/vul/2022-06070" type="self" id="BDU:2022-06070" title="BDU:2022-06070" />
			<reference href="https://bdu.fstec.ru/vul/2022-06125" type="self" id="BDU:2022-06125" title="BDU:2022-06125" />
			<reference href="https://bdu.fstec.ru/vul/2022-06120" type="self" id="BDU:2022-06120" title="BDU:2022-06120" />
			<reference href="https://bdu.fstec.ru/vul/2022-06121" type="self" id="BDU:2022-06121" title="BDU:2022-06121" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="bind" epoch="32" version="9.16.16" release="4.el7" arch="x86_64" src="">
					<filename>bind-32:9.16.16-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220929-02</id>
		<issued date="2022-09-29" />
		<updated date="2022-10-05" />
		<title>Уязвимость Redis </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в redis</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-redis-cve-2022-35951/</description>
               <solution>
                    Запретить использование в ОС пакета redis
                или
                    Установить обновление для пакета(ов) redis
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-redis-cve-2022-35951/" type="self" id="ROS-20220929-02" title="ROS-20220929-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35951" type="cve" id="CVE-2022-35951" title="CVE-2022-35951" />
			<reference href="https://bdu.fstec.ru/vul/2022-05912" type="self" id="BDU:2022-05912" title="BDU:2022-05912" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="redis" epoch="0" version="7.0.5" release="1.el7" arch="x86_64" src="">
					<filename>redis-0:7.0.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221004-01</id>
		<issued date="2022-10-04" />
		<updated date="2022-10-04" />
		<title>Множественные уязвимости Vim</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в vim-X11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim-cve-2022-3278-cve-2022-3297-cve-2022-3296-cve-2022-3324/</description>
               <solution>
                    Запретить использование в ОС пакета Vim
                или
                    Установить обновление для пакета(ов) Vim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim-cve-2022-3278-cve-2022-3297-cve-2022-3296-cve-2022-3324/" type="self" id="ROS-20221004-01" title="ROS-20221004-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3278" type="cve" id="CVE-2022-3278" title="CVE-2022-3278" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3297" type="cve" id="CVE-2022-3297" title="CVE-2022-3297" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3296" type="cve" id="CVE-2022-3296" title="CVE-2022-3296" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3324" type="cve" id="CVE-2022-3324" title="CVE-2022-3324" />
			<reference href="https://bdu.fstec.ru/vul/2022-06180" type="self" id="BDU:2022-06180" title="BDU:2022-06180" />
			<reference href="https://bdu.fstec.ru/vul/2022-06179" type="self" id="BDU:2022-06179" title="BDU:2022-06179" />
			<reference href="https://bdu.fstec.ru/vul/2022-06178" type="self" id="BDU:2022-06178" title="BDU:2022-06178" />
			<reference href="https://bdu.fstec.ru/vul/2022-06177" type="self" id="BDU:2022-06177" title="BDU:2022-06177" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-X11" epoch="2" version="8.2.4701" release="10.el7.3" arch="x86_64" src="">
					<filename>vim-X11-2:8.2.4701-10.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221004-02</id>
		<issued date="2022-10-04" />
		<updated date="2022-10-04" />
		<title>Уязвимость lighttpd </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в lighttpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-lighttpd-cve-2022-37797/</description>
               <solution>
                    Запретить использование в ОС пакета lighttpd
                или
                    Установить обновление для пакета(ов) lighttpd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-lighttpd-cve-2022-37797/" type="self" id="ROS-20221004-02" title="ROS-20221004-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37797" type="cve" id="CVE-2022-37797" title="CVE-2022-37797" />
			<reference href="https://bdu.fstec.ru/vul/2022-06126" type="self" id="BDU:2022-06126" title="BDU:2022-06126" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="lighttpd" epoch="0" version="1.4.64" release="2.el7" arch="x86_64" src="">
					<filename>lighttpd-0:1.4.64-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221007-01</id>
		<issued date="2022-10-07" />
		<updated date="2022-10-07" />
		<title>Уязвимость cURL </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2022-35252/</description>
               <solution>
                    Запретить использование в ОС пакета cURL
                или
                    Установить обновление для пакета(ов) cURL
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2022-35252/" type="self" id="ROS-20221007-01" title="ROS-20221007-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35252" type="cve" id="CVE-2022-35252" title="CVE-2022-35252" />
			<reference href="https://bdu.fstec.ru/vul/2022-06193" type="self" id="BDU:2022-06193" title="BDU:2022-06193" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="curl" epoch="0" version="7.81.0" release="4.el7.3" arch="x86_64" src="">
					<filename>curl-0:7.81.0-4.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221007-02</id>
		<issued date="2022-10-07" />
		<updated date="2022-10-07" />
		<title>Уязвимость lighttpd </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в lighttpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-lighttpd-cve-2022-41556/</description>
               <solution>
                    Запретить использование в ОС пакета lighttpd
                или
                    Установить обновление для пакета(ов) lighttpd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-lighttpd-cve-2022-41556/" type="self" id="ROS-20221007-02" title="ROS-20221007-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41556" type="cve" id="CVE-2022-41556" title="CVE-2022-41556" />
			<reference href="https://bdu.fstec.ru/vul/2022-06197" type="self" id="BDU:2022-06197" title="BDU:2022-06197" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="lighttpd" epoch="0" version="1.4.64" release="3.el7" arch="x86_64" src="">
					<filename>lighttpd-0:1.4.64-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221007-03</id>
		<issued date="2022-10-07" />
		<updated date="2022-10-07" />
		<title>Уязвимость Vim </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в vim-X11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-cve-2022-3352/</description>
               <solution>
                    Запретить использование в ОС пакета Vim
                или
                    Установить обновление для пакета(ов) Vim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-cve-2022-3352/" type="self" id="ROS-20221007-03" title="ROS-20221007-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3352" type="cve" id="CVE-2022-3352" title="CVE-2022-3352" />
			<reference href="https://bdu.fstec.ru/vul/2022-06196" type="self" id="BDU:2022-06196" title="BDU:2022-06196" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-X11" epoch="2" version="8.2.4701" release="11.el7.3" arch="x86_64" src="">
					<filename>vim-X11-2:8.2.4701-11.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221007-04</id>
		<issued date="2022-10-07" />
		<updated date="2022-10-13" />
		<title>Множественные уязвимости thunderbird</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird/</description>
               <solution>
                    Запретить использование в ОС пакета Mozilla Thunderbird
                или
                    Установить обновление для пакета(ов) Mozilla Thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird/" type="self" id="ROS-20221007-04" title="ROS-20221007-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36318" type="cve" id="CVE-2022-36318" title="CVE-2022-36318" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36319" type="cve" id="CVE-2022-36319" title="CVE-2022-36319" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3033" type="cve" id="CVE-2022-3033" title="CVE-2022-3033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3032" type="cve" id="CVE-2022-3032" title="CVE-2022-3032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3034" type="cve" id="CVE-2022-3034" title="CVE-2022-3034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36059" type="cve" id="CVE-2022-36059" title="CVE-2022-36059" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38472" type="cve" id="CVE-2022-38472" title="CVE-2022-38472" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38473" type="cve" id="CVE-2022-38473" title="CVE-2022-38473" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38475" type="cve" id="CVE-2022-38475" title="CVE-2022-38475" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38476" type="cve" id="CVE-2022-38476" title="CVE-2022-38476" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38477" type="cve" id="CVE-2022-38477" title="CVE-2022-38477" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38478" type="cve" id="CVE-2022-38478" title="CVE-2022-38478" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40956" type="cve" id="CVE-2022-40956" title="CVE-2022-40956" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40957" type="cve" id="CVE-2022-40957" title="CVE-2022-40957" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40958" type="cve" id="CVE-2022-40958" title="CVE-2022-40958" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40959" type="cve" id="CVE-2022-40959" title="CVE-2022-40959" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40960" type="cve" id="CVE-2022-40960" title="CVE-2022-40960" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40962" type="cve" id="CVE-2022-40962" title="CVE-2022-40962" />
			<reference href="https://bdu.fstec.ru/vul/2022-06141" type="self" id="BDU:2022-06141" title="BDU:2022-06141" />
			<reference href="https://bdu.fstec.ru/vul/2022-06107" type="self" id="BDU:2022-06107" title="BDU:2022-06107" />
			<reference href="https://bdu.fstec.ru/vul/2022-05444" type="self" id="BDU:2022-05444" title="BDU:2022-05444" />
			<reference href="https://bdu.fstec.ru/vul/2022-05488" type="self" id="BDU:2022-05488" title="BDU:2022-05488" />
			<reference href="https://bdu.fstec.ru/vul/2022-05479" type="self" id="BDU:2022-05479" title="BDU:2022-05479" />
			<reference href="https://bdu.fstec.ru/vul/2022-05486" type="self" id="BDU:2022-05486" title="BDU:2022-05486" />
			<reference href="https://bdu.fstec.ru/vul/2022-05566" type="self" id="BDU:2022-05566" title="BDU:2022-05566" />
			<reference href="https://bdu.fstec.ru/vul/2022-05497" type="self" id="BDU:2022-05497" title="BDU:2022-05497" />
			<reference href="https://bdu.fstec.ru/vul/2022-05560" type="self" id="BDU:2022-05560" title="BDU:2022-05560" />
			<reference href="https://bdu.fstec.ru/vul/2022-05298" type="self" id="BDU:2022-05298" title="BDU:2022-05298" />
			<reference href="https://bdu.fstec.ru/vul/2022-05446" type="self" id="BDU:2022-05446" title="BDU:2022-05446" />
			<reference href="https://bdu.fstec.ru/vul/2022-05447" type="self" id="BDU:2022-05447" title="BDU:2022-05447" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="102.3.1" release="1.el7.3" arch="x86_64" src="">
					<filename>thunderbird-0:102.3.1-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221007-05</id>
		<issued date="2022-10-07" />
		<updated date="2022-10-07" />
		<title>Множественные уязвимости firefox</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox/</description>
               <solution>
                    Запретить использование в ОС пакета Firefox
                или
                    Установить обновление для пакета(ов) Firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox/" type="self" id="ROS-20221007-05" title="ROS-20221007-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36318" type="cve" id="CVE-2022-36318" title="CVE-2022-36318" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36319" type="cve" id="CVE-2022-36319" title="CVE-2022-36319" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38472" type="cve" id="CVE-2022-38472" title="CVE-2022-38472" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38473" type="cve" id="CVE-2022-38473" title="CVE-2022-38473" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38475" type="cve" id="CVE-2022-38475" title="CVE-2022-38475" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38476" type="cve" id="CVE-2022-38476" title="CVE-2022-38476" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38477" type="cve" id="CVE-2022-38477" title="CVE-2022-38477" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38478" type="cve" id="CVE-2022-38478" title="CVE-2022-38478" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40956" type="cve" id="CVE-2022-40956" title="CVE-2022-40956" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40957" type="cve" id="CVE-2022-40957" title="CVE-2022-40957" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40958" type="cve" id="CVE-2022-40958" title="CVE-2022-40958" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40959" type="cve" id="CVE-2022-40959" title="CVE-2022-40959" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40960" type="cve" id="CVE-2022-40960" title="CVE-2022-40960" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40962" type="cve" id="CVE-2022-40962" title="CVE-2022-40962" />
			<reference href="https://bdu.fstec.ru/vul/2022-06141" type="self" id="BDU:2022-06141" title="BDU:2022-06141" />
			<reference href="https://bdu.fstec.ru/vul/2022-06107" type="self" id="BDU:2022-06107" title="BDU:2022-06107" />
			<reference href="https://bdu.fstec.ru/vul/2022-05566" type="self" id="BDU:2022-05566" title="BDU:2022-05566" />
			<reference href="https://bdu.fstec.ru/vul/2022-05497" type="self" id="BDU:2022-05497" title="BDU:2022-05497" />
			<reference href="https://bdu.fstec.ru/vul/2022-05560" type="self" id="BDU:2022-05560" title="BDU:2022-05560" />
			<reference href="https://bdu.fstec.ru/vul/2022-05298" type="self" id="BDU:2022-05298" title="BDU:2022-05298" />
			<reference href="https://bdu.fstec.ru/vul/2022-05446" type="self" id="BDU:2022-05446" title="BDU:2022-05446" />
			<reference href="https://bdu.fstec.ru/vul/2022-05447" type="self" id="BDU:2022-05447" title="BDU:2022-05447" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="102.3.0" release="1.el7.3" arch="x86_64" src="">
					<filename>firefox-0:102.3.0-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221013-01</id>
		<issued date="2022-10-13" />
		<updated date="2022-10-17" />
		<title>Множественные уязвимости D-Bus</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в dbus</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-d-bus-cve-2022-42012-cve-2022-42011-cve-2022-42010/</description>
               <solution>
			Запретить использование в ОС пакета D-Bus
		
		или
		
			Установить обновление для пакета(ов) D-Bus
		</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-d-bus-cve-2022-42012-cve-2022-42011-cve-2022-42010/" type="self" id="ROS-20221013-01" title="ROS-20221013-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42010" type="cve" id="CVE-2022-42010" title="CVE-2022-42010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42011" type="cve" id="CVE-2022-42011" title="CVE-2022-42011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42012" type="cve" id="CVE-2022-42012" title="CVE-2022-42012" />
			<reference href="https://bdu.fstec.ru/vul/2022-06389" type="self" id="BDU:2022-06389" title="BDU:2022-06389" />
			<reference href="https://bdu.fstec.ru/vul/2022-06394" type="self" id="BDU:2022-06394" title="BDU:2022-06394" />
			<reference href="https://bdu.fstec.ru/vul/2022-06391" type="self" id="BDU:2022-06391" title="BDU:2022-06391" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dbus" epoch="1" version="1.12.16" release="7.el7" arch="x86_64" src="">
					<filename>dbus-1:1.12.16-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221013-02</id>
		<issued date="2022-10-13" />
		<updated date="2022-10-13" />
		<title>Множественные уязвимости Moodle</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-moodle-cve-2022-40316-cve-2022-40315-cve-2022-40314-cve-2022-40313-cve-20/</description>
               <solution>
                    Запретить использование в ОС пакета Moodle
                или
                    Установить обновление для пакета(ов) Moodle
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-moodle-cve-2022-40316-cve-2022-40315-cve-2022-40314-cve-2022-40313-cve-20/" type="self" id="ROS-20221013-02" title="ROS-20221013-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40316" type="cve" id="CVE-2022-40316" title="CVE-2022-40316" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40315" type="cve" id="CVE-2022-40315" title="CVE-2022-40315" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40314" type="cve" id="CVE-2022-40314" title="CVE-2022-40314" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40313" type="cve" id="CVE-2022-40313" title="CVE-2022-40313" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36568" type="cve" id="CVE-2021-36568" title="CVE-2021-36568" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35649" type="cve" id="CVE-2022-35649" title="CVE-2022-35649" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35653" type="cve" id="CVE-2022-35653" title="CVE-2022-35653" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35650" type="cve" id="CVE-2022-35650" title="CVE-2022-35650" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35651" type="cve" id="CVE-2022-35651" title="CVE-2022-35651" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35652" type="cve" id="CVE-2022-35652" title="CVE-2022-35652" />
			<reference href="https://bdu.fstec.ru/vul/2022-06382" type="self" id="BDU:2022-06382" title="BDU:2022-06382" />
			<reference href="https://bdu.fstec.ru/vul/2022-06359" type="self" id="BDU:2022-06359" title="BDU:2022-06359" />
			<reference href="https://bdu.fstec.ru/vul/2022-06383" type="self" id="BDU:2022-06383" title="BDU:2022-06383" />
			<reference href="https://bdu.fstec.ru/vul/2022-06402" type="self" id="BDU:2022-06402" title="BDU:2022-06402" />
			<reference href="https://bdu.fstec.ru/vul/2022-06406" type="self" id="BDU:2022-06406" title="BDU:2022-06406" />
			<reference href="https://bdu.fstec.ru/vul/2022-06403" type="self" id="BDU:2022-06403" title="BDU:2022-06403" />
			<reference href="https://bdu.fstec.ru/vul/2022-04908" type="self" id="BDU:2022-04908" title="BDU:2022-04908" />
			<reference href="https://bdu.fstec.ru/vul/2022-06405" type="self" id="BDU:2022-06405" title="BDU:2022-06405" />
			<reference href="https://bdu.fstec.ru/vul/2022-04906" type="self" id="BDU:2022-04906" title="BDU:2022-04906" />
			<reference href="https://bdu.fstec.ru/vul/2022-04907" type="self" id="BDU:2022-04907" title="BDU:2022-04907" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="moodle" epoch="0" version="3.11.4" release="4.el7.3" arch="noarch" src="">
					<filename>moodle-0:3.11.4-4.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221013-03</id>
		<issued date="2022-10-13" />
		<updated date="2022-10-21" />
		<title>Обход ограничений в PostgreSQL1C </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/obkhod-ogranicheniy-v-postgresql-cve-2022-2625/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql
                или
                    Установить обновление для пакета(ов) postgresql
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/obkhod-ogranicheniy-v-postgresql-cve-2022-2625/" type="self" id="ROS-20221013-03" title="ROS-20221013-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2625" type="cve" id="CVE-2022-2625" title="CVE-2022-2625" />
			<reference href="https://bdu.fstec.ru/vul/2022-04971" type="self" id="BDU:2022-04971" title="BDU:2022-04971" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql-1c" epoch="0" version="14.5" release="1.el7" arch="x86_64" src="">
					<filename>postgresql-1c-0:14.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221017-01</id>
		<issued date="2022-10-17" />
		<updated date="2022-10-17" />
		<title>Множественные уязвимости FreeRDP</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в freerdp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-freerdp-cve-2022-39282-cve-2022-39283/</description>
               <solution>
                    Запретить использование в ОС пакета FreeRDP
                или
                    Установить обновление для пакета(ов) FreeRDP
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-freerdp-cve-2022-39282-cve-2022-39283/" type="self" id="ROS-20221017-01" title="ROS-20221017-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39283" type="cve" id="CVE-2022-39283" title="CVE-2022-39283" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39282" type="cve" id="CVE-2022-39282" title="CVE-2022-39282" />
			<reference href="https://bdu.fstec.ru/vul/2022-06362" type="self" id="BDU:2022-06362" title="BDU:2022-06362" />
			<reference href="https://bdu.fstec.ru/vul/2022-06360" type="self" id="BDU:2022-06360" title="BDU:2022-06360" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="freerdp" epoch="3" version="2.8.1" release="1.el7" arch="x86_64" src="">
					<filename>freerdp-3:2.8.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221017-02</id>
		<issued date="2022-10-17" />
		<updated date="2022-10-17" />
		<title>Уязвимость Assimp </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в assimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-assimp-cve-2022-38528/</description>
               <solution>
                    Запретить использование в ОС пакета Open Asset Import Library (Assimp)
                или
                    Установить обновление для пакета(ов) Open Asset Import Library (Assimp)
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-assimp-cve-2022-38528/" type="self" id="ROS-20221017-02" title="ROS-20221017-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38528" type="cve" id="CVE-2022-38528" title="CVE-2022-38528" />
			<reference href="https://bdu.fstec.ru/vul/2022-06361" type="self" id="BDU:2022-06361" title="BDU:2022-06361" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="assimp" epoch="0" version="3.3.1" release="17.el7" arch="x86_64" src="">
					<filename>assimp-0:3.3.1-17.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221020-01</id>
		<issued date="2022-10-20" />
		<updated date="2022-10-25" />
		<title>Уязвимость LibKSBA </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libksba</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libksba-cve-2022-3515/</description>
               <solution>
                    Запретить использование в ОС пакета LibKSBA
                или
                    Установить обновление для пакета(ов) LibKSBA
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libksba-cve-2022-3515/" type="self" id="ROS-20221020-01" title="ROS-20221020-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3515" type="cve" id="CVE-2022-3515" title="CVE-2022-3515" />
			<reference href="https://bdu.fstec.ru/vul/2022-06395" type="self" id="BDU:2022-06395" title="BDU:2022-06395" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libksba" epoch="0" version="1.3.5" release="7.el7" arch="x86_64" src="">
					<filename>libksba-0:1.3.5-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221020-02</id>
		<issued date="2022-10-20" />
		<updated date="2022-10-25" />
		<title>Уязвимость protobuf-java </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в protobuf</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-protobuf-java-cve-2022-3171/</description>
               <solution>
                    Запретить использование в ОС пакета Protobuf-java
                или
                    Установить обновление для пакета(ов) Protobuf-java
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-protobuf-java-cve-2022-3171/" type="self" id="ROS-20221020-02" title="ROS-20221020-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3171" type="cve" id="CVE-2022-3171" title="CVE-2022-3171" />
			<reference href="https://bdu.fstec.ru/vul/2022-06396" type="self" id="BDU:2022-06396" title="BDU:2022-06396" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="protobuf" epoch="0" version="3.6.1" release="4.el7" arch="x86_64" src="">
					<filename>protobuf-0:3.6.1-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221013-05</id>
		<issued date="2022-10-21" />
		<updated date="2024-12-23" />
		<title>Обход ограничений в PostgreSQL</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/obkhod-ogranicheniy-v-postgresql-cve-2022-2625-/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql
                или
                    Установить обновление для пакета(ов) postgresql
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/obkhod-ogranicheniy-v-postgresql-cve-2022-2625-/" type="self" id="ROS-20221013-05" title="ROS-20221013-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2625" type="cve" id="CVE-2022-2625" title="CVE-2022-2625" />
			<reference href="https://bdu.fstec.ru/vul/2022-04971" type="self" id="BDU:2022-04971" title="BDU:2022-04971" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql" epoch="0" version="12.12" release="1.el7" arch="x86_64" src="">
					<filename>postgresql-0:12.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221013-06</id>
		<issued date="2022-10-21" />
		<updated date="2024-12-23" />
		<title>Обход ограничений в PostgreSQL13 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql13</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/obkhod-ogranicheniy-v-postgresql13-cve-2022-2625/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql
                или
                    Установить обновление для пакета(ов) postgresql
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/obkhod-ogranicheniy-v-postgresql13-cve-2022-2625/" type="self" id="ROS-20221013-06" title="ROS-20221013-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2625" type="cve" id="CVE-2022-2625" title="CVE-2022-2625" />
			<reference href="https://bdu.fstec.ru/vul/2022-04971" type="self" id="BDU:2022-04971" title="BDU:2022-04971" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql13" epoch="0" version="13.8" release="1.el7" arch="x86_64" src="">
					<filename>postgresql13-0:13.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221013-04</id>
		<issued date="2022-10-21" />
		<updated date="2024-12-23" />
		<title>Обход ограничений в PostgreSQL14 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql14</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/obkhod-ogranicheniy-v-postgresql14-cve-2022-2625/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql
                или
                    Установить обновление для пакета(ов) postgresql
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/obkhod-ogranicheniy-v-postgresql14-cve-2022-2625/" type="self" id="ROS-20221013-04" title="ROS-20221013-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2625" type="cve" id="CVE-2022-2625" title="CVE-2022-2625" />
			<reference href="https://bdu.fstec.ru/vul/2022-04971" type="self" id="BDU:2022-04971" title="BDU:2022-04971" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql14" epoch="0" version="14.5" release="1.el7" arch="x86_64" src="">
					<filename>postgresql14-0:14.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221025-01</id>
		<issued date="2022-10-25" />
		<updated date="2022-10-25" />
		<title>Уязвимость shapelib </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в shapelib</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-shapelib-cve-2022-0699/</description>
               <solution>
                    Запретить использование в ОС пакета shapelib
                или
                    Установить обновление для пакета(ов) shapelib
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-shapelib-cve-2022-0699/" type="self" id="ROS-20221025-01" title="ROS-20221025-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0699" type="cve" id="CVE-2022-0699" title="CVE-2022-0699" />
			<reference href="https://bdu.fstec.ru/vul/2022-06588" type="self" id="BDU:2022-06588" title="BDU:2022-06588" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="shapelib" epoch="0" version="1.5.0" release="2.el7" arch="x86_64" src="">
					<filename>shapelib-0:1.5.0-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221025-02</id>
		<issued date="2022-10-25" />
		<updated date="2022-10-25" />
		<title>Уязвимость Redis </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в redis</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-redis-cve-2022-3647/</description>
               <solution>
                    Запретить использование в ОС пакета Redis
                или
                    Установить обновление для пакета(ов) Redis
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-redis-cve-2022-3647/" type="self" id="ROS-20221025-02" title="ROS-20221025-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3647" type="cve" id="CVE-2022-3647" title="CVE-2022-3647" />
			<reference href="https://bdu.fstec.ru/vul/2022-06489" type="self" id="BDU:2022-06489" title="BDU:2022-06489" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="redis" epoch="0" version="7.0.5" release="2.el7" arch="x86_64" src="">
					<filename>redis-0:7.0.5-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221025-03</id>
		<issued date="2022-10-25" />
		<updated date="2022-10-25" />
		<title>Множественные уязвимости браузера Mozilla firefox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-brauzera-mozilla-firefox-cve-2022-42927-cve-2022-42928-cve-2022-42929/</description>
               <solution>
                    Запретить использование в ОС пакета Mozilla Firefox
                или
                    Установить обновление для пакета(ов) Mozilla Firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-brauzera-mozilla-firefox-cve-2022-42927-cve-2022-42928-cve-2022-42929/" type="self" id="ROS-20221025-03" title="ROS-20221025-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42927" type="cve" id="CVE-2022-42927" title="CVE-2022-42927" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42928" type="cve" id="CVE-2022-42928" title="CVE-2022-42928" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42929" type="cve" id="CVE-2022-42929" title="CVE-2022-42929" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="102.4.0" release="1.el7.3" arch="x86_64" src="">
					<filename>firefox-0:102.4.0-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221025-04</id>
		<issued date="2022-10-25" />
		<updated date="2022-10-25" />
		<title>Множественные уязвимости Mozilla Thunderbird </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mozilla-thunderbird-cve-2022-42927-cve-2022-42928-cve-2022-42929/</description>
               <solution>
                    Запретить использование в ОС пакета Mozilla Thunderbird
                или
                    Установить обновление для пакета(ов) Mozilla Thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mozilla-thunderbird-cve-2022-42927-cve-2022-42928-cve-2022-42929/" type="self" id="ROS-20221025-04" title="ROS-20221025-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42927" type="cve" id="CVE-2022-42927" title="CVE-2022-42927" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42928" type="cve" id="CVE-2022-42928" title="CVE-2022-42928" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42929" type="cve" id="CVE-2022-42929" title="CVE-2022-42929" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="102.4.0" release="1.el7.3" arch="x86_64" src="">
					<filename>thunderbird-0:102.4.0-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221028-01</id>
		<issued date="2022-10-28" />
		<updated date="2022-10-28" />
		<title>Множественные уязвимости Exim </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в exim</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-exim-cve-2022-3620-cve-2022-3559/</description>
               <solution>
                    Запретить использование в ОС пакета Exim
                или
                    Установить обновление для пакета(ов) Exim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-exim-cve-2022-3620-cve-2022-3559/" type="self" id="ROS-20221028-01" title="ROS-20221028-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3620" type="cve" id="CVE-2022-3620" title="CVE-2022-3620" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3559" type="cve" id="CVE-2022-3559" title="CVE-2022-3559" />
			<reference href="https://bdu.fstec.ru/vul/2022-06693" type="self" id="BDU:2022-06693" title="BDU:2022-06693" />
			<reference href="https://bdu.fstec.ru/vul/2022-06645" type="self" id="BDU:2022-06645" title="BDU:2022-06645" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="exim" epoch="0" version="4.96" release="4.el7.3" arch="x86_64" src="">
					<filename>exim-0:4.96-4.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221103-01</id>
		<issued date="2022-11-03" />
		<updated date="2022-11-03" />
		<title>Уязвимость VIM </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в vim-X11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-cve-2022-3705/</description>
               <solution>
                    Запретить использование в ОС пакета Vim
                или
                    Установить обновление для пакета(ов) Vim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-cve-2022-3705/" type="self" id="ROS-20221103-01" title="ROS-20221103-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3705" type="cve" id="CVE-2022-3705" title="CVE-2022-3705" />
			<reference href="https://bdu.fstec.ru/vul/2022-06663" type="self" id="BDU:2022-06663" title="BDU:2022-06663" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-X11" epoch="2" version="8.2.4701" release="12.el7.3" arch="x86_64" src="">
					<filename>vim-X11-2:8.2.4701-12.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221103-02</id>
		<issued date="2022-11-03" />
		<updated date="2022-11-03" />
		<title>Множественные уязвимости PJSIP </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в pjproject</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-pjsip-cve-2022-39244-cve-2022-39269/</description>
               <solution>
                    Запретить использование в ОС пакета PJSIP
                или
                    Установить обновление для пакета(ов) PJSIP
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-pjsip-cve-2022-39244-cve-2022-39269/" type="self" id="ROS-20221103-02" title="ROS-20221103-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269" type="cve" id="CVE-2022-39269" title="CVE-2022-39269" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244" type="cve" id="CVE-2022-39244" title="CVE-2022-39244" />
			<reference href="https://bdu.fstec.ru/vul/2022-06662" type="self" id="BDU:2022-06662" title="BDU:2022-06662" />
			<reference href="https://bdu.fstec.ru/vul/2022-06661" type="self" id="BDU:2022-06661" title="BDU:2022-06661" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pjproject" epoch="0" version="2.7.2" release="9.el7.3" arch="x86_64" src="">
					<filename>pjproject-0:2.7.2-9.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221103-03</id>
		<issued date="2022-11-03" />
		<updated date="2022-11-03" />
		<title>Множественные уязвимости Apache Batik XML</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в batik</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-apache-batik-xml-cve-2022-42890-cve-2022-41704/</description>
               <solution>
                    Запретить использование в ОС пакета Apache Batik XML
                или
                    Установить обновление для пакета(ов) Apache Batik XML
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-apache-batik-xml-cve-2022-42890-cve-2022-41704/" type="self" id="ROS-20221103-03" title="ROS-20221103-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42890" type="cve" id="CVE-2022-42890" title="CVE-2022-42890" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41704" type="cve" id="CVE-2022-41704" title="CVE-2022-41704" />
			<reference href="https://bdu.fstec.ru/vul/2022-06659" type="self" id="BDU:2022-06659" title="BDU:2022-06659" />
			<reference href="https://bdu.fstec.ru/vul/2022-06660" type="self" id="BDU:2022-06660" title="BDU:2022-06660" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="batik" epoch="0" version="1.13" release="2.el7" arch="noarch" src="">
					<filename>batik-0:1.13-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221103-04</id>
		<issued date="2022-11-03" />
		<updated date="2022-11-03" />
		<title>Уязвимость Libtasn1 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в libtasn1</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libtasn1-cve-2021-46848/</description>
               <solution>
                    Запретить использование в ОС пакета Libtasn1
                или
                    Установить обновление для пакета(ов) Libtasn1
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libtasn1-cve-2021-46848/" type="self" id="ROS-20221103-04" title="ROS-20221103-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46848" type="cve" id="CVE-2021-46848" title="CVE-2021-46848" />
			<reference href="https://bdu.fstec.ru/vul/2022-06694" type="self" id="BDU:2022-06694" title="BDU:2022-06694" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libtasn1" epoch="0" version="4.16.0" release="2.el7" arch="x86_64" src="">
					<filename>libtasn1-0:4.16.0-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221103-05</id>
		<issued date="2022-11-03" />
		<updated date="2022-11-03" />
		<title>Уязвимость утилиты ntfs-3g </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ntfs-3g</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-utility-ntfs-3g-cve-2022-40284/</description>
               <solution>
                    - отключение возможности автоматического монтирования NTFS-разделов;
                        - ограничение возможности подключения недоверенных USB-устройств.
                или
                    Установить обновление для пакета(ов) ntfs-3g
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-utility-ntfs-3g-cve-2022-40284/" type="self" id="ROS-20221103-05" title="ROS-20221103-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40284" type="cve" id="CVE-2022-40284" title="CVE-2022-40284" />
			<reference href="https://bdu.fstec.ru/vul/2022-06607" type="self" id="BDU:2022-06607" title="BDU:2022-06607" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ntfs-3g" epoch="2" version="2021.8.22" release="4.el7" arch="x86_64" src="">
					<filename>ntfs-3g-2:2021.8.22-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221103-06</id>
		<issued date="2022-11-03" />
		<updated date="2025-04-17" />
		<title>Множественные уязвимости Apache Tomcat</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-apache-tomcat-cve-2021-42340-cve-2022-23181-cve-2022-43980/</description>
               <solution>
                    Запретить использование в ОС пакета tomcat
                или
                    Установить обновление для пакета(ов) tomcat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-apache-tomcat-cve-2021-42340-cve-2022-23181-cve-2022-43980/" type="self" id="ROS-20221103-06" title="ROS-20221103-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42340" type="cve" id="CVE-2021-42340" title="CVE-2021-42340" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23181" type="cve" id="CVE-2022-23181" title="CVE-2022-23181" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43980" type="cve" id="CVE-2021-43980" title="CVE-2021-43980" />
			<reference href="https://bdu.fstec.ru/vul/2021-06115" type="self" id="BDU:2021-06115" title="BDU:2021-06115" />
			<reference href="https://bdu.fstec.ru/vul/2022-06690" type="self" id="BDU:2022-06690" title="BDU:2022-06690" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat" epoch="1" version="9.0.68" release="1.el7" arch="noarch" src="">
					<filename>tomcat-1:9.0.68-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220114-02</id>
		<issued date="2022-11-07" />
		<updated date="2024-12-23" />
		<title>Уязвимости Thunderbird </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimosti-thunderbird-cve-2022-22737-cve-2022-22751/</description>
               <solution>
                    Запретить использование в ОС пакета Mozilla Thunderbird
                или
                    Установить обновление для пакета(ов) Mozilla Thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimosti-thunderbird-cve-2022-22737-cve-2022-22751/" type="self" id="ROS-20220114-02" title="ROS-20220114-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22746" type="cve" id="CVE-2022-22746" title="CVE-2022-22746" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743" type="cve" id="CVE-2022-22743" title="CVE-2022-22743" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742" type="cve" id="CVE-2022-22742" title="CVE-2022-22742" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741" type="cve" id="CVE-2022-22741" title="CVE-2022-22741" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740" type="cve" id="CVE-2022-22740" title="CVE-2022-22740" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738" type="cve" id="CVE-2022-22738" title="CVE-2022-22738" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737" type="cve" id="CVE-2022-22737" title="CVE-2022-22737" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140" type="cve" id="CVE-2021-4140" title="CVE-2021-4140" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748" type="cve" id="CVE-2022-22748" title="CVE-2022-22748" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745" type="cve" id="CVE-2022-22745" title="CVE-2022-22745" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22744" type="cve" id="CVE-2022-22744" title="CVE-2022-22744" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747" type="cve" id="CVE-2022-22747" title="CVE-2022-22747" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739" type="cve" id="CVE-2022-22739" title="CVE-2022-22739" />
			<reference href="https://bdu.fstec.ru/vul/2022-00287" type="self" id="BDU:2022-00287" title="BDU:2022-00287" />
			<reference href="https://bdu.fstec.ru/vul/2022-00288" type="self" id="BDU:2022-00288" title="BDU:2022-00288" />
			<reference href="https://bdu.fstec.ru/vul/2022-00289" type="self" id="BDU:2022-00289" title="BDU:2022-00289" />
			<reference href="https://bdu.fstec.ru/vul/2022-00290" type="self" id="BDU:2022-00290" title="BDU:2022-00290" />
			<reference href="https://bdu.fstec.ru/vul/2022-00291" type="self" id="BDU:2022-00291" title="BDU:2022-00291" />
			<reference href="https://bdu.fstec.ru/vul/2022-00292" type="self" id="BDU:2022-00292" title="BDU:2022-00292" />
			<reference href="https://bdu.fstec.ru/vul/2022-00293" type="self" id="BDU:2022-00293" title="BDU:2022-00293" />
			<reference href="https://bdu.fstec.ru/vul/2022-00294" type="self" id="BDU:2022-00294" title="BDU:2022-00294" />
			<reference href="https://bdu.fstec.ru/vul/2022-00295" type="self" id="BDU:2022-00295" title="BDU:2022-00295" />
			<reference href="https://bdu.fstec.ru/vul/2022-00296" type="self" id="BDU:2022-00296" title="BDU:2022-00296" />
			<reference href="https://bdu.fstec.ru/vul/2022-00297" type="self" id="BDU:2022-00297" title="BDU:2022-00297" />
			<reference href="https://bdu.fstec.ru/vul/2022-00298" type="self" id="BDU:2022-00298" title="BDU:2022-00298" />
			<reference href="https://bdu.fstec.ru/vul/2022-00299" type="self" id="BDU:2022-00299" title="BDU:2022-00299" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="91.5.0" release="1.el7.3" arch="x86_64" src="">
					<filename>thunderbird-0:91.5.0-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221108-01</id>
		<issued date="2022-11-08" />
		<updated date="2022-11-08" />
		<title>Множественные уязвимости cURL</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-curl-cve-2022-42916-cve-2022-42915/</description>
               <solution>
                    Запретить использование в ОС пакета cURL
                или
                    Установить обновление для пакета(ов) cURL
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-curl-cve-2022-42916-cve-2022-42915/" type="self" id="ROS-20221108-01" title="ROS-20221108-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42916" type="cve" id="CVE-2022-42916" title="CVE-2022-42916" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42915" type="cve" id="CVE-2022-42915" title="CVE-2022-42915" />
			<reference href="https://bdu.fstec.ru/vul/2022-06692" type="self" id="BDU:2022-06692" title="BDU:2022-06692" />
			<reference href="https://bdu.fstec.ru/vul/2022-06691" type="self" id="BDU:2022-06691" title="BDU:2022-06691" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="curl" epoch="0" version="7.81.0" release="5.el7.3" arch="x86_64" src="">
					<filename>curl-0:7.81.0-5.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221009-01</id>
		<issued date="2022-11-09" />
		<updated date="2022-11-09" />
		<title>Множественные уязвимости Exiv2</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в exiv2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-exiv2-cve-2022-3717-cve-2022-3718-cve-2022-3719-cve-2022-3755-cve-2022-37/</description>
               <solution>
                    Запретить использование в ОС пакета Exiv2
                или
                    Установить обновление для пакета(ов) Exiv2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-exiv2-cve-2022-3717-cve-2022-3718-cve-2022-3719-cve-2022-3755-cve-2022-37/" type="self" id="ROS-20221009-01" title="ROS-20221009-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3719" type="cve" id="CVE-2022-3719" title="CVE-2022-3719" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3718" type="cve" id="CVE-2022-3718" title="CVE-2022-3718" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3717" type="cve" id="CVE-2022-3717" title="CVE-2022-3717" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3757" type="cve" id="CVE-2022-3757" title="CVE-2022-3757" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3756" type="cve" id="CVE-2022-3756" title="CVE-2022-3756" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3755" type="cve" id="CVE-2022-3755" title="CVE-2022-3755" />
			<reference href="https://bdu.fstec.ru/vul/2022-06711" type="self" id="BDU:2022-06711" title="BDU:2022-06711" />
			<reference href="https://bdu.fstec.ru/vul/2022-06712" type="self" id="BDU:2022-06712" title="BDU:2022-06712" />
			<reference href="https://bdu.fstec.ru/vul/2022-06713" type="self" id="BDU:2022-06713" title="BDU:2022-06713" />
			<reference href="https://bdu.fstec.ru/vul/2022-06714" type="self" id="BDU:2022-06714" title="BDU:2022-06714" />
			<reference href="https://bdu.fstec.ru/vul/2022-06710" type="self" id="BDU:2022-06710" title="BDU:2022-06710" />
			<reference href="https://bdu.fstec.ru/vul/2022-06709" type="self" id="BDU:2022-06709" title="BDU:2022-06709" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="exiv2" epoch="0" version="0.27.3" release="5.el7" arch="x86_64" src="">
					<filename>exiv2-0:0.27.3-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221110-01</id>
		<issued date="2022-11-10" />
		<updated date="2022-11-10" />
		<title>Множественные уязвимости libxml2</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libxml2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libxml2-cve-id-cve-2022-40304-cve-id-cve-2022-40303/</description>
               <solution>
                    Запретить использование в ОС пакета libxml2
                или
                    Установить обновление для пакета(ов) libxml2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libxml2-cve-id-cve-2022-40304-cve-id-cve-2022-40303/" type="self" id="ROS-20221110-01" title="ROS-20221110-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40304" type="cve" id="CVE-2022-40304" title="CVE-2022-40304" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40303" type="cve" id="CVE-2022-40303" title="CVE-2022-40303" />
			<reference href="https://bdu.fstec.ru/vul/2022-06700" type="self" id="BDU:2022-06700" title="BDU:2022-06700" />
			<reference href="https://bdu.fstec.ru/vul/2022-06701" type="self" id="BDU:2022-06701" title="BDU:2022-06701" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libxml2" epoch="0" version="2.9.8" release="12.el7.3" arch="x86_64" src="">
					<filename>libxml2-0:2.9.8-12.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221118-01</id>
		<issued date="2022-11-18" />
		<updated date="2022-11-18" />
		<title>Уязвимость LibTIFF </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в libtiff</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libtiff-cve-2022-3970/</description>
               <solution>
                    Запретить использование в ОС пакета LibTIFF
                или
                    Установить обновление для пакета(ов) LibTIFF
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libtiff-cve-2022-3970/" type="self" id="ROS-20221118-01" title="ROS-20221118-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3970" type="cve" id="CVE-2022-3970" title="CVE-2022-3970" />
			<reference href="https://bdu.fstec.ru/vul/2022-06974" type="self" id="BDU:2022-06974" title="BDU:2022-06974" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libtiff" epoch="0" version="4.4.0" release="4.el7" arch="x86_64" src="">
					<filename>libtiff-0:4.4.0-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221118-02</id>
		<issued date="2022-11-18" />
		<updated date="2022-11-18" />
		<title>Уязвимость GPAC </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gpac</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gpac-cve-2022-3957/</description>
               <solution>
                    Запретить использование в ОС пакета GPAC
                или
                    Установить обновление для пакета(ов) GPAC
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gpac-cve-2022-3957/" type="self" id="ROS-20221118-02" title="ROS-20221118-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3957" type="cve" id="CVE-2022-3957" title="CVE-2022-3957" />
			<reference href="https://bdu.fstec.ru/vul/2022-06960" type="self" id="BDU:2022-06960" title="BDU:2022-06960" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gpac" epoch="0" version="0.7.1" release="2.el7" arch="x86_64" src="">
					<filename>gpac-0:0.7.1-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221118-03</id>
		<issued date="2022-11-18" />
		<updated date="2022-11-18" />
		<title>Уязвимость Pixman</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в pixman</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pixman-cve-2022-44638/</description>
               <solution>
                    Запретить использование в ОС пакета pixman
                или
                    Установить обновление для пакета(ов) pixman
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pixman-cve-2022-44638/" type="self" id="ROS-20221118-03" title="ROS-20221118-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44638" type="cve" id="CVE-2022-44638" title="CVE-2022-44638" />
			<reference href="https://bdu.fstec.ru/vul/2022-06667" type="self" id="BDU:2022-06667" title="BDU:2022-06667" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pixman" epoch="0" version="0.40.0" release="3.el7" arch="x86_64" src="">
					<filename>pixman-0:0.40.0-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221118-04</id>
		<issued date="2022-11-18" />
		<updated date="2022-11-18" />
		<title>Множественные уязвимости firefox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-cve-2022-45403-cve-2022-45404-cve-2022-45405/</description>
               <solution>
                    Запретить использование в ОС пакета Mozilla Firefox
                или
                    Установить обновление для пакета(ов) Mozilla Firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-cve-2022-45403-cve-2022-45404-cve-2022-45405/" type="self" id="ROS-20221118-04" title="ROS-20221118-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403" type="cve" id="CVE-2022-45403" title="CVE-2022-45403" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404" type="cve" id="CVE-2022-45404" title="CVE-2022-45404" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405" type="cve" id="CVE-2022-45405" title="CVE-2022-45405" />
			<reference href="https://bdu.fstec.ru/vul/2022-06961" type="self" id="BDU:2022-06961" title="BDU:2022-06961" />
			<reference href="https://bdu.fstec.ru/vul/2022-06814" type="self" id="BDU:2022-06814" title="BDU:2022-06814" />
			<reference href="https://bdu.fstec.ru/vul/2022-06815" type="self" id="BDU:2022-06815" title="BDU:2022-06815" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="102.5.0" release="1.el7.3" arch="x86_64" src="">
					<filename>firefox-0:102.5.0-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221118-05</id>
		<issued date="2022-11-18" />
		<updated date="2022-11-18" />
		<title>Множественные уязвимости thunderbird </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-cve-2022-45403-cve-2022-45404-cve-2022-45405/</description>
               <solution>
                    Запретить использование в ОС пакета Mozilla Thunderbird
                или
                    Установить обновление для пакета(ов) Mozilla Thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-cve-2022-45403-cve-2022-45404-cve-2022-45405/" type="self" id="ROS-20221118-05" title="ROS-20221118-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403" type="cve" id="CVE-2022-45403" title="CVE-2022-45403" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404" type="cve" id="CVE-2022-45404" title="CVE-2022-45404" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405" type="cve" id="CVE-2022-45405" title="CVE-2022-45405" />
			<reference href="https://bdu.fstec.ru/vul/2022-06961" type="self" id="BDU:2022-06961" title="BDU:2022-06961" />
			<reference href="https://bdu.fstec.ru/vul/2022-06814" type="self" id="BDU:2022-06814" title="BDU:2022-06814" />
			<reference href="https://bdu.fstec.ru/vul/2022-06815" type="self" id="BDU:2022-06815" title="BDU:2022-06815" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="102.5.0" release="1.el7.3" arch="x86_64" src="">
					<filename>thunderbird-0:102.5.0-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221121-01</id>
		<issued date="2022-11-21" />
		<updated date="2022-11-21" />
		<title>Уязвимость sudo </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в sudo</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sudo-cve-2022-43995/</description>
               <solution>Установить обновление для пакета(ов) Sudo</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sudo-cve-2022-43995/" type="self" id="ROS-20221121-01" title="ROS-20221121-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43995" type="cve" id="CVE-2022-43995" title="CVE-2022-43995" />
			<reference href="https://bdu.fstec.ru/vul/2022-06664" type="self" id="BDU:2022-06664" title="BDU:2022-06664" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="sudo" epoch="0" version="1.8.29" release="4.el7" arch="x86_64" src="">
					<filename>sudo-0:1.8.29-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221121-02</id>
		<issued date="2022-11-21" />
		<updated date="2022-11-21" />
		<title>Множественные уязвимости FreeRDP</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в freerdp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-freerdp-cve-2022-39319-cve-2022-39318-cve-2022-39317-cve-2022-41877-cve-2/</description>
               <solution>
                    Запретить использование в ОС пакета FreeRDP
                или
пользователи:
не должны использовать переключатель перенаправления `/usb`;
не должны использовать канал перенаправления дисков — параметры командной строки `/drive`, `+drives` или `+home-drive`
                или
                    Установить обновление для пакета(ов) FreeRDP
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-freerdp-cve-2022-39319-cve-2022-39318-cve-2022-39317-cve-2022-41877-cve-2/" type="self" id="ROS-20221121-02" title="ROS-20221121-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39319" type="cve" id="CVE-2022-39319" title="CVE-2022-39319" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39318" type="cve" id="CVE-2022-39318" title="CVE-2022-39318" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39317" type="cve" id="CVE-2022-39317" title="CVE-2022-39317" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41877" type="cve" id="CVE-2022-41877" title="CVE-2022-41877" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39347" type="cve" id="CVE-2022-39347" title="CVE-2022-39347" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39320" type="cve" id="CVE-2022-39320" title="CVE-2022-39320" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39316" type="cve" id="CVE-2022-39316" title="CVE-2022-39316" />
			<reference href="https://bdu.fstec.ru/vul/2022-06973" type="self" id="BDU:2022-06973" title="BDU:2022-06973" />
			<reference href="https://bdu.fstec.ru/vul/2022-06970" type="self" id="BDU:2022-06970" title="BDU:2022-06970" />
			<reference href="https://bdu.fstec.ru/vul/2022-06972" type="self" id="BDU:2022-06972" title="BDU:2022-06972" />
			<reference href="https://bdu.fstec.ru/vul/2022-06976" type="self" id="BDU:2022-06976" title="BDU:2022-06976" />
			<reference href="https://bdu.fstec.ru/vul/2022-06975" type="self" id="BDU:2022-06975" title="BDU:2022-06975" />
			<reference href="https://bdu.fstec.ru/vul/2022-06971" type="self" id="BDU:2022-06971" title="BDU:2022-06971" />
			<reference href="https://bdu.fstec.ru/vul/2022-06969" type="self" id="BDU:2022-06969" title="BDU:2022-06969" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="freerdp" epoch="3" version="2.9.0" release="1.el7" arch="x86_64" src="">
					<filename>freerdp-3:2.9.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221121-03</id>
		<issued date="2022-11-21" />
		<updated date="2022-11-21" />
		<title>Множественные уязвимости ImageMagick </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ImageMagick</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-imagemagick-cve-2021-20224-cve-2022-28463/</description>
               <solution>
                    Запретить использование в ОС пакета ImageMagick
                или
                    Установить обновление для пакета(ов) ImageMagick
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-imagemagick-cve-2021-20224-cve-2022-28463/" type="self" id="ROS-20221121-03" title="ROS-20221121-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28463" type="cve" id="CVE-2022-28463" title="CVE-2022-28463" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20224" type="cve" id="CVE-2021-20224" title="CVE-2021-20224" />
			<reference href="https://bdu.fstec.ru/vul/2022-03313" type="self" id="BDU:2022-03313" title="BDU:2022-03313" />
			<reference href="https://bdu.fstec.ru/vul/2022-06962" type="self" id="BDU:2022-06962" title="BDU:2022-06962" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ImageMagick" epoch="0" version="6.9.11.27" release="4.el7" arch="x86_64" src="">
					<filename>ImageMagick-0:6.9.11.27-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221122-01</id>
		<issued date="2022-11-22" />
		<updated date="2022-11-22" />
		<title>Уязвимость mutt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mutt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mutt-cve-2022-1328/</description>
               <solution>
                    Запретить использование в ОС пакета mutt
                или
                    Установить обновление для пакета(ов) mutt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mutt-cve-2022-1328/" type="self" id="ROS-20221122-01" title="ROS-20221122-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1328" type="cve" id="CVE-2022-1328" title="CVE-2022-1328" />
			<reference href="https://bdu.fstec.ru/vul/2022-04443" type="self" id="BDU:2022-04443" title="BDU:2022-04443" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mutt" epoch="5" version="2.2.9" release="1.el7" arch="x86_64" src="">
					<filename>mutt-5:2.2.9-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221123-01</id>
		<issued date="2022-11-23" />
		<updated date="2022-11-23" />
		<title>Множественные уязвимости VIM </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в vim-X11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim-cve-2022-2343-cve-2022-2522-cve-2022-3037-cve-2022-1725/</description>
               <solution>
                    Запретить использование в ОС пакета VIM
                или
                    Установить обновление для пакета(ов) VIM
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim-cve-2022-2343-cve-2022-2522-cve-2022-3037-cve-2022-1725/" type="self" id="ROS-20221123-01" title="ROS-20221123-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2343" type="cve" id="CVE-2022-2343" title="CVE-2022-2343" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2522" type="cve" id="CVE-2022-2522" title="CVE-2022-2522" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3037" type="cve" id="CVE-2022-3037" title="CVE-2022-3037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1725" type="cve" id="CVE-2022-1725" title="CVE-2022-1725" />
			<reference href="https://bdu.fstec.ru/vul/2022-06482" type="self" id="BDU:2022-06482" title="BDU:2022-06482" />
			<reference href="https://bdu.fstec.ru/vul/2022-04691" type="self" id="BDU:2022-04691" title="BDU:2022-04691" />
			<reference href="https://bdu.fstec.ru/vul/2022-05389" type="self" id="BDU:2022-05389" title="BDU:2022-05389" />
			<reference href="https://bdu.fstec.ru/vul/2022-06965" type="self" id="BDU:2022-06965" title="BDU:2022-06965" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-X11" epoch="2" version="9.0.828" release="1.el7.3" arch="x86_64" src="">
					<filename>vim-X11-2:9.0.828-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220531-01</id>
		<issued date="2022-11-29" />
		<updated date="2022-11-29" />
		<title>Уязвимость cups </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в cups</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cups-cve-2022-26691/</description>
               <solution>
                    Запретить использование в ОС пакета cups
                или
                    Установить обновление для пакета(ов) cups
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cups-cve-2022-26691/" type="self" id="ROS-20220531-01" title="ROS-20220531-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26691" type="cve" id="CVE-2022-26691" title="CVE-2022-26691" />
			<reference href="https://bdu.fstec.ru/vul/2022-04718" type="self" id="BDU:2022-04718" title="BDU:2022-04718" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cups" epoch="1" version="2.3.3op2" release="2.el7" arch="x86_64" src="">
					<filename>cups-1:2.3.3op2-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221207-01</id>
		<issued date="2022-12-07" />
		<updated date="2022-12-07" />
		<title>Уязвимость zlib </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в zlib</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zlib-cve-2022-37434/</description>
               <solution>
                    Запретить использование в ОС пакета zlib
                или
                    Установить обновление для пакета(ов) zlib
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zlib-cve-2022-37434/" type="self" id="ROS-20221207-01" title="ROS-20221207-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37434" type="cve" id="CVE-2022-37434" title="CVE-2022-37434" />
			<reference href="https://bdu.fstec.ru/vul/2022-05325" type="self" id="BDU:2022-05325" title="BDU:2022-05325" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zlib" epoch="0" version="1.2.11" release="15.el7" arch="x86_64" src="">
					<filename>zlib-0:1.2.11-15.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221207-02</id>
		<issued date="2022-12-07" />
		<updated date="2022-12-07" />
		<title>Уязвимость VLC </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в vlc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vlc-cve-2022-41325/</description>
               <solution>
                    Запретить использование в ОС пакета VLC
                или
                    Установить обновление для пакета(ов) VLC
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vlc-cve-2022-41325/" type="self" id="ROS-20221207-02" title="ROS-20221207-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41325" type="cve" id="CVE-2022-41325" title="CVE-2022-41325" />
			<reference href="https://bdu.fstec.ru/vul/2022-07176" type="self" id="BDU:2022-07176" title="BDU:2022-07176" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vlc" epoch="0" version="3.0.18" release="1.el7.3" arch="x86_64" src="">
					<filename>vlc-0:3.0.18-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221216-01</id>
		<issued date="2022-12-16" />
		<updated date="2022-12-16" />
		<title>Уязвимость libarchive</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в libarchive</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libarchive-cve-2022-36227/</description>
               <solution>
                    Запретить использование в ОС пакета libarchive
                или
                    Установить обновление для пакета(ов) libarchive
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libarchive-cve-2022-36227/" type="self" id="ROS-20221216-01" title="ROS-20221216-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36227" type="cve" id="CVE-2022-36227" title="CVE-2022-36227" />
			<reference href="https://bdu.fstec.ru/vul/2022-07496" type="self" id="BDU:2022-07496" title="BDU:2022-07496" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libarchive" epoch="0" version="3.4.3" release="5.el7.3" arch="x86_64" src="">
					<filename>libarchive-0:3.4.3-5.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221216-02</id>
		<issued date="2022-12-16" />
		<updated date="2022-12-16" />
		<title>Уязвимость Rsync</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в rsync</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rsync-cve-2022-29154/</description>
               <solution>
                    Запретить использование в ОС пакета Rsync
                или
                    Установить обновление для пакета(ов) Rsync
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rsync-cve-2022-29154/" type="self" id="ROS-20221216-02" title="ROS-20221216-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29154" type="cve" id="CVE-2022-29154" title="CVE-2022-29154" />
			<reference href="https://bdu.fstec.ru/vul/2022-05498" type="self" id="BDU:2022-05498" title="BDU:2022-05498" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rsync" epoch="0" version="3.2.7" release="1.el7.3" arch="x86_64" src="">
					<filename>rsync-0:3.2.7-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221220-01</id>
		<issued date="2022-12-20" />
		<updated date="2022-12-20" />
		<title>Множественные уязвимости ядра ОС</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-yadra-os/</description>
               <solution>Установить обновление для пакета(ов) ядра РЕД ОС</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-yadra-os/" type="self" id="ROS-20221220-01" title="ROS-20221220-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581" type="cve" id="CVE-2022-29581" title="CVE-2022-29581" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729" type="cve" id="CVE-2022-1729" title="CVE-2022-1729" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499" type="cve" id="CVE-2022-21499" title="CVE-2022-21499" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1679" type="cve" id="CVE-2022-1679" title="CVE-2022-1679" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2639" type="cve" id="CVE-2022-2639" title="CVE-2022-2639" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879" type="cve" id="CVE-2022-36879" title="CVE-2022-36879" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946" type="cve" id="CVE-2022-36946" title="CVE-2022-36946" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0500" type="cve" id="CVE-2022-0500" title="CVE-2022-0500" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34494" type="cve" id="CVE-2022-34494" title="CVE-2022-34494" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36123" type="cve" id="CVE-2022-36123" title="CVE-2022-36123" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873" type="cve" id="CVE-2022-2873" title="CVE-2022-2873" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842" type="cve" id="CVE-2022-39842" title="CVE-2022-39842" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307" type="cve" id="CVE-2022-40307" title="CVE-2022-40307" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40476" type="cve" id="CVE-2022-40476" title="CVE-2022-40476" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40768" type="cve" id="CVE-2022-40768" title="CVE-2022-40768" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41850" type="cve" id="CVE-2022-41850" title="CVE-2022-41850" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674" type="cve" id="CVE-2022-41674" title="CVE-2022-41674" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719" type="cve" id="CVE-2022-42719" title="CVE-2022-42719" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720" type="cve" id="CVE-2022-42720" title="CVE-2022-42720" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721" type="cve" id="CVE-2022-42721" title="CVE-2022-42721" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722" type="cve" id="CVE-2022-42722" title="CVE-2022-42722" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1943" type="cve" id="CVE-2022-1943" title="CVE-2022-1943" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2959" type="cve" id="CVE-2022-2959" title="CVE-2022-2959" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3077" type="cve" id="CVE-2022-3077" title="CVE-2022-3077" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2905" type="cve" id="CVE-2022-2905" title="CVE-2022-2905" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41848" type="cve" id="CVE-2022-41848" title="CVE-2022-41848" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41849" type="cve" id="CVE-2022-41849" title="CVE-2022-41849" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3435" type="cve" id="CVE-2022-3435" title="CVE-2022-3435" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602" type="cve" id="CVE-2022-2602" title="CVE-2022-2602" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43750" type="cve" id="CVE-2022-43750" title="CVE-2022-43750" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3521" type="cve" id="CVE-2022-3521" title="CVE-2022-3521" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44034" type="cve" id="CVE-2022-44034" title="CVE-2022-44034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3637" type="cve" id="CVE-2022-3637" title="CVE-2022-3637" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3586" type="cve" id="CVE-2022-3586" title="CVE-2022-3586" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3606" type="cve" id="CVE-2022-3606" title="CVE-2022-3606" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3594" type="cve" id="CVE-2022-3594" title="CVE-2022-3594" />
			<reference href="https://bdu.fstec.ru/vul/2022-03059" type="self" id="BDU:2022-03059" title="BDU:2022-03059" />
			<reference href="https://bdu.fstec.ru/vul/2022-03164" type="self" id="BDU:2022-03164" title="BDU:2022-03164" />
			<reference href="https://bdu.fstec.ru/vul/2022-04974" type="self" id="BDU:2022-04974" title="BDU:2022-04974" />
			<reference href="https://bdu.fstec.ru/vul/2022-03162" type="self" id="BDU:2022-03162" title="BDU:2022-03162" />
			<reference href="https://bdu.fstec.ru/vul/2022-04995" type="self" id="BDU:2022-04995" title="BDU:2022-04995" />
			<reference href="https://bdu.fstec.ru/vul/2022-05664" type="self" id="BDU:2022-05664" title="BDU:2022-05664" />
			<reference href="https://bdu.fstec.ru/vul/2022-04686" type="self" id="BDU:2022-04686" title="BDU:2022-04686" />
			<reference href="https://bdu.fstec.ru/vul/2022-02362" type="self" id="BDU:2022-02362" title="BDU:2022-02362" />
			<reference href="https://bdu.fstec.ru/vul/2022-03984" type="self" id="BDU:2022-03984" title="BDU:2022-03984" />
			<reference href="https://bdu.fstec.ru/vul/2022-04725" type="self" id="BDU:2022-04725" title="BDU:2022-04725" />
			<reference href="https://bdu.fstec.ru/vul/2022-06024" type="self" id="BDU:2022-06024" title="BDU:2022-06024" />
			<reference href="https://bdu.fstec.ru/vul/2022-05539" type="self" id="BDU:2022-05539" title="BDU:2022-05539" />
			<reference href="https://bdu.fstec.ru/vul/2022-05654" type="self" id="BDU:2022-05654" title="BDU:2022-05654" />
			<reference href="https://bdu.fstec.ru/vul/2022-05997" type="self" id="BDU:2022-05997" title="BDU:2022-05997" />
			<reference href="https://bdu.fstec.ru/vul/2022-06054" type="self" id="BDU:2022-06054" title="BDU:2022-06054" />
			<reference href="https://bdu.fstec.ru/vul/2022-06228" type="self" id="BDU:2022-06228" title="BDU:2022-06228" />
			<reference href="https://bdu.fstec.ru/vul/2022-06272" type="self" id="BDU:2022-06272" title="BDU:2022-06272" />
			<reference href="https://bdu.fstec.ru/vul/2022-06274" type="self" id="BDU:2022-06274" title="BDU:2022-06274" />
			<reference href="https://bdu.fstec.ru/vul/2022-06273" type="self" id="BDU:2022-06273" title="BDU:2022-06273" />
			<reference href="https://bdu.fstec.ru/vul/2022-07350" type="self" id="BDU:2022-07350" title="BDU:2022-07350" />
			<reference href="https://bdu.fstec.ru/vul/2022-07351" type="self" id="BDU:2022-07351" title="BDU:2022-07351" />
			<reference href="https://bdu.fstec.ru/vul/2022-07352" type="self" id="BDU:2022-07352" title="BDU:2022-07352" />
			<reference href="https://bdu.fstec.ru/vul/2022-07353" type="self" id="BDU:2022-07353" title="BDU:2022-07353" />
			<reference href="https://bdu.fstec.ru/vul/2022-07354" type="self" id="BDU:2022-07354" title="BDU:2022-07354" />
			<reference href="https://bdu.fstec.ru/vul/2022-07355" type="self" id="BDU:2022-07355" title="BDU:2022-07355" />
			<reference href="https://bdu.fstec.ru/vul/2022-07356" type="self" id="BDU:2022-07356" title="BDU:2022-07356" />
			<reference href="https://bdu.fstec.ru/vul/2022-07357" type="self" id="BDU:2022-07357" title="BDU:2022-07357" />
			<reference href="https://bdu.fstec.ru/vul/2022-07358" type="self" id="BDU:2022-07358" title="BDU:2022-07358" />
			<reference href="https://bdu.fstec.ru/vul/2022-06407" type="self" id="BDU:2022-06407" title="BDU:2022-06407" />
			<reference href="https://bdu.fstec.ru/vul/2022-07349" type="self" id="BDU:2022-07349" title="BDU:2022-07349" />
			<reference href="https://bdu.fstec.ru/vul/2022-07348" type="self" id="BDU:2022-07348" title="BDU:2022-07348" />
			<reference href="https://bdu.fstec.ru/vul/2022-07347" type="self" id="BDU:2022-07347" title="BDU:2022-07347" />
			<reference href="https://bdu.fstec.ru/vul/2022-07346" type="self" id="BDU:2022-07346" title="BDU:2022-07346" />
			<reference href="https://bdu.fstec.ru/vul/2022-07345" type="self" id="BDU:2022-07345" title="BDU:2022-07345" />
			<reference href="https://bdu.fstec.ru/vul/2022-07344" type="self" id="BDU:2022-07344" title="BDU:2022-07344" />
			<reference href="https://bdu.fstec.ru/vul/2022-07343" type="self" id="BDU:2022-07343" title="BDU:2022-07343" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="5.15.78" release="1.el7" arch="3" src="">
					<filename>kernel-lt-0:5.15.78-1.el7.3.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221222-01</id>
		<issued date="2022-12-22" />
		<updated date="2023-10-09" />
		<title>Множественные уязвимости xrdp </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в xrdp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-xrdp-cve-2022-20785-cve-2022-20803-cve-2022-20770-cve-2022-20796-cve-2022/</description>
               <solution>
                    Запретить использование в ОС пакета xrdp
                или
                    Установить обновление для пакета(ов) xrdp
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-xrdp-cve-2022-20785-cve-2022-20803-cve-2022-20770-cve-2022-20796-cve-2022/" type="self" id="ROS-20221222-01" title="ROS-20221222-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23468" type="cve" id="CVE-2022-23468" title="CVE-2022-23468" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23477" type="cve" id="CVE-2022-23477" title="CVE-2022-23477" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23478" type="cve" id="CVE-2022-23478" title="CVE-2022-23478" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23479" type="cve" id="CVE-2022-23479" title="CVE-2022-23479" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23480" type="cve" id="CVE-2022-23480" title="CVE-2022-23480" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23481" type="cve" id="CVE-2022-23481" title="CVE-2022-23481" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23482" type="cve" id="CVE-2022-23482" title="CVE-2022-23482" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23483" type="cve" id="CVE-2022-23483" title="CVE-2022-23483" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23484" type="cve" id="CVE-2022-23484" title="CVE-2022-23484" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23493" type="cve" id="CVE-2022-23493" title="CVE-2022-23493" />
			<reference href="https://bdu.fstec.ru/vul/2022-07312" type="self" id="BDU:2022-07312" title="BDU:2022-07312" />
			<reference href="https://bdu.fstec.ru/vul/2022-07224" type="self" id="BDU:2022-07224" title="BDU:2022-07224" />
			<reference href="https://bdu.fstec.ru/vul/2022-07225" type="self" id="BDU:2022-07225" title="BDU:2022-07225" />
			<reference href="https://bdu.fstec.ru/vul/2022-07309" type="self" id="BDU:2022-07309" title="BDU:2022-07309" />
			<reference href="https://bdu.fstec.ru/vul/2022-07306" type="self" id="BDU:2022-07306" title="BDU:2022-07306" />
			<reference href="https://bdu.fstec.ru/vul/2022-07313" type="self" id="BDU:2022-07313" title="BDU:2022-07313" />
			<reference href="https://bdu.fstec.ru/vul/2022-07311" type="self" id="BDU:2022-07311" title="BDU:2022-07311" />
			<reference href="https://bdu.fstec.ru/vul/2022-07308" type="self" id="BDU:2022-07308" title="BDU:2022-07308" />
			<reference href="https://bdu.fstec.ru/vul/2022-07307" type="self" id="BDU:2022-07307" title="BDU:2022-07307" />
			<reference href="https://bdu.fstec.ru/vul/2022-07310" type="self" id="BDU:2022-07310" title="BDU:2022-07310" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="xrdp" epoch="1" version="0.9.21" release="2.el7.3" arch="x86_64" src="">
					<filename>xrdp-1:0.9.21-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221222-02</id>
		<issued date="2022-12-22" />
		<updated date="2025-09-09" />
		<title>Уязвимость cURL </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-curl-cve-2022-35260-cve-2022-32221/</description>
               <solution>
                    Запретить использование в ОС пакета cURL
                или
                    Установить обновление для пакета(ов) cURL
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-curl-cve-2022-35260-cve-2022-32221/" type="self" id="ROS-20221222-02" title="ROS-20221222-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35260" type="cve" id="CVE-2022-35260" title="CVE-2022-35260" />
			<reference href="https://bdu.fstec.ru/vul/2022-07404" type="self" id="BDU:2022-07404" title="BDU:2022-07404" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="curl" epoch="0" version="7.81.0" release="7.el7.3" arch="x86_64" src="">
					<filename>curl-0:7.81.0-7.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221222-03</id>
		<issued date="2022-12-22" />
		<updated date="2023-10-09" />
		<title>Множественные уязвимости moodle</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-moodle-cve-2022-20785-cve-2022-20803-cve-2022-20770-cve-2022-20796-cve-20/</description>
               <solution>
                    Запретить использование в ОС пакета Moodle
                или
                    Установить обновление для пакета(ов) Moodle
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-moodle-cve-2022-20785-cve-2022-20803-cve-2022-20770-cve-2022-20796-cve-20/" type="self" id="ROS-20221222-03" title="ROS-20221222-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45149" type="cve" id="CVE-2022-45149" title="CVE-2022-45149" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45150" type="cve" id="CVE-2022-45150" title="CVE-2022-45150" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45151" type="cve" id="CVE-2022-45151" title="CVE-2022-45151" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45152" type="cve" id="CVE-2022-45152" title="CVE-2022-45152" />
			<reference href="https://bdu.fstec.ru/vul/2022-07405" type="self" id="BDU:2022-07405" title="BDU:2022-07405" />
			<reference href="https://bdu.fstec.ru/vul/2022-07406" type="self" id="BDU:2022-07406" title="BDU:2022-07406" />
			<reference href="https://bdu.fstec.ru/vul/2022-07407" type="self" id="BDU:2022-07407" title="BDU:2022-07407" />
			<reference href="https://bdu.fstec.ru/vul/2022-07408" type="self" id="BDU:2022-07408" title="BDU:2022-07408" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="moodle" epoch="0" version="3.11.4" release="5.el7.3" arch="noarch" src="">
					<filename>moodle-0:3.11.4-5.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221222-05</id>
		<issued date="2022-12-22" />
		<updated date="2024-12-23" />
		<title>Уязвимость php-twig3 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в php-twig3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-twig3-cve-2022-23614/</description>
               <solution>
                    Запретить использование в ОС пакета php-twig3
                или
                    Установить обновление для пакета(ов) php-twig3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-twig3-cve-2022-23614/" type="self" id="ROS-20221222-05" title="ROS-20221222-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23614" type="cve" id="CVE-2022-23614" title="CVE-2022-23614" />
			<reference href="https://bdu.fstec.ru/vul/2022-03019" type="self" id="BDU:2022-03019" title="BDU:2022-03019" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php-twig3" epoch="0" version="3.4.3" release="1.el7" arch="noarch" src="">
					<filename>php-twig3-0:3.4.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221222-04</id>
		<issued date="2022-12-22" />
		<updated date="2022-12-22" />
		<title>Уязвимость PHP </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в php</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-cve-2022-31630/</description>
               <solution>
                    Запретить использование в ОС пакета PHP
                или
                    Установить обновление для пакета(ов) PHP
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-cve-2022-31630/" type="self" id="ROS-20221222-04" title="ROS-20221222-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31630" type="cve" id="CVE-2022-31630" title="CVE-2022-31630" />
			<reference href="https://bdu.fstec.ru/vul/2022-07409" type="self" id="BDU:2022-07409" title="BDU:2022-07409" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php" epoch="0" version="7.4.33" release="1.el7" arch="x86_64" src="">
					<filename>php-0:7.4.33-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221223-01</id>
		<issued date="2022-12-23" />
		<updated date="2022-12-23" />
		<title>Уязвимость containerd </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в containerd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-containerd-cve-2022-23471/</description>
               <solution>
                    Запретить использование в ОС пакета containerd
                или
                    Установить обновление для пакета(ов) containerd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-containerd-cve-2022-23471/" type="self" id="ROS-20221223-01" title="ROS-20221223-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23471" type="cve" id="CVE-2022-23471" title="CVE-2022-23471" />
			<reference href="https://bdu.fstec.ru/vul/2022-07471" type="self" id="BDU:2022-07471" title="BDU:2022-07471" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="containerd" epoch="0" version="1.5.8" release="2.el7" arch="x86_64" src="">
					<filename>containerd-0:1.5.8-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221227-01</id>
		<issued date="2022-12-27" />
		<updated date="2022-12-27" />
		<title>Уязвимость libksba </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libksba</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libksba-cve-2022-47629/</description>
               <solution>
                    Запретить использование в ОС пакета LibKSBA
                или
                    Установить обновление для пакета(ов) LibKSBA
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libksba-cve-2022-47629/" type="self" id="ROS-20221227-01" title="ROS-20221227-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47629" type="cve" id="CVE-2022-47629" title="CVE-2022-47629" />
			<reference href="https://bdu.fstec.ru/vul/2022-07478" type="self" id="BDU:2022-07478" title="BDU:2022-07478" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libksba" epoch="0" version="1.3.5" release="8.el7.3" arch="x86_64" src="">
					<filename>libksba-0:1.3.5-8.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221227-02</id>
		<issued date="2022-12-27" />
		<updated date="2023-01-09" />
		<title>Уязвимость pjproject </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в pjproject</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pjproject-cve-2022-23537/</description>
               <solution>
                    Запретить использование в ОС пакета PJSIP
                или
                    Установить обновление для пакета(ов) PJSIP
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pjproject-cve-2022-23537/" type="self" id="ROS-20221227-02" title="ROS-20221227-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537" type="cve" id="CVE-2022-23537" title="CVE-2022-23537" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547" type="cve" id="CVE-2022-23547" title="CVE-2022-23547" />
			<reference href="https://bdu.fstec.ru/vul/2022-07479" type="self" id="BDU:2022-07479" title="BDU:2022-07479" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pjproject" epoch="0" version="2.7.2" release="10.el7.3" arch="x86_64" src="">
					<filename>pjproject-0:2.7.2-10.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221229-01</id>
		<issued date="2022-12-29" />
		<updated date="2022-12-29" />
		<title>Уязвимость GdkPixbuf </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gdk-pixbuf2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gdkpixbuf-cve-2021-46829/</description>
               <solution>
                    Запретить использование в ОС пакета GdkPixbuf
                или
                    Установить обновление для пакета(ов) GdkPixbuf
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gdkpixbuf-cve-2021-46829/" type="self" id="ROS-20221229-01" title="ROS-20221229-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46829" type="cve" id="CVE-2021-46829" title="CVE-2021-46829" />
			<reference href="https://bdu.fstec.ru/vul/2023-00075" type="self" id="BDU:2023-00075" title="BDU:2023-00075" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gdk-pixbuf2" epoch="0" version="2.40.0" release="7.el7" arch="x86_64" src="">
					<filename>gdk-pixbuf2-0:2.40.0-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221229-02</id>
		<issued date="2022-12-29" />
		<updated date="2022-12-29" />
		<title>Уязвимость Firefox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2022-46872/</description>
               <solution>
                    Запретить использование в ОС пакета Mozilla Firefox
                или
                    Установить обновление для пакета(ов) Mozilla Firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2022-46872/" type="self" id="ROS-20221229-02" title="ROS-20221229-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872" type="cve" id="CVE-2022-46872" title="CVE-2022-46872" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="102.6.0" release="1.el7.3" arch="x86_64" src="">
					<filename>firefox-0:102.6.0-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221229-03</id>
		<issued date="2022-12-29" />
		<updated date="2022-12-29" />
		<title>Уязвимость Thunderbird </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-thunderbird-cve-2022-46872/</description>
               <solution>
                    Запретить использование в ОС пакета Mozilla Thunderbird
                или
                    Установить обновление для пакета(ов) Mozilla Thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-thunderbird-cve-2022-46872/" type="self" id="ROS-20221229-03" title="ROS-20221229-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872" type="cve" id="CVE-2022-46872" title="CVE-2022-46872" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="102.6.0" release="1.el7.3" arch="x86_64" src="">
					<filename>thunderbird-0:102.6.0-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230112-01</id>
		<issued date="2023-01-12" />
		<updated date="2023-01-12" />
		<title>Уязвимость SQUID </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в squid</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-squid-cve-2022-41317/</description>
               <solution>
                    Запретить использование в ОС пакета Squid
                или
                    Установить обновление для пакета(ов) Squid
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-squid-cve-2022-41317/" type="self" id="ROS-20230112-01" title="ROS-20230112-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41317" type="cve" id="CVE-2022-41317" title="CVE-2022-41317" />
			<reference href="https://bdu.fstec.ru/vul/2023-00066" type="self" id="BDU:2023-00066" title="BDU:2023-00066" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="squid" epoch="7" version="5.5" release="2.el7.3" arch="x86_64" src="">
					<filename>squid-7:5.5-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230112-02</id>
		<issued date="2023-01-12" />
		<updated date="2023-01-12" />
		<title>Множественные уязвимости VIM </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в vim-X11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim-cve-2023-0049-cve-2023-0051-cve-2023-0054/</description>
               <solution>
                    Запретить использование в ОС пакета Vim
                или
                    Установить обновление для пакета(ов) Vim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim-cve-2023-0049-cve-2023-0051-cve-2023-0054/" type="self" id="ROS-20230112-02" title="ROS-20230112-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0054" type="cve" id="CVE-2023-0054" title="CVE-2023-0054" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0051" type="cve" id="CVE-2023-0051" title="CVE-2023-0051" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0049" type="cve" id="CVE-2023-0049" title="CVE-2023-0049" />
			<reference href="https://bdu.fstec.ru/vul/2023-00070" type="self" id="BDU:2023-00070" title="BDU:2023-00070" />
			<reference href="https://bdu.fstec.ru/vul/2023-00069" type="self" id="BDU:2023-00069" title="BDU:2023-00069" />
			<reference href="https://bdu.fstec.ru/vul/2023-00068" type="self" id="BDU:2023-00068" title="BDU:2023-00068" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-X11" epoch="2" version="9.0.1160" release="1.el7.3" arch="x86_64" src="">
					<filename>vim-X11-2:9.0.1160-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230117-01</id>
		<issued date="2023-01-17" />
		<updated date="2023-01-17" />
		<title>Уязвимость SDL2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в SDL2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sdl2-cve-2022-4743/</description>
               <solution>
                    Запретить использование в ОС пакета sdl2
                или
                    Установить обновление для пакета(ов) sdl2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sdl2-cve-2022-4743/" type="self" id="ROS-20230117-01" title="ROS-20230117-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4743" type="cve" id="CVE-2022-4743" title="CVE-2022-4743" />
			<reference href="https://bdu.fstec.ru/vul/2023-00292" type="self" id="BDU:2023-00292" title="BDU:2023-00292" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="SDL2" epoch="0" version="2.0.12" release="3.el7" arch="x86_64" src="">
					<filename>SDL2-0:2.0.12-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230117-02</id>
		<issued date="2023-01-17" />
		<updated date="2023-01-17" />
		<title>Множественные уязвимости Open vSwitch </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в openvswitch</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-open-vswitch-cve-2022-4338-cve-2022-4337/</description>
               <solution>
                    Запретить использование в ОС пакета Open vSwitch
                или
                    Установить обновление для пакета(ов) Open vSwitch
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-open-vswitch-cve-2022-4338-cve-2022-4337/" type="self" id="ROS-20230117-02" title="ROS-20230117-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4338" type="cve" id="CVE-2022-4338" title="CVE-2022-4338" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4337" type="cve" id="CVE-2022-4337" title="CVE-2022-4337" />
			<reference href="https://bdu.fstec.ru/vul/2023-00291" type="self" id="BDU:2023-00291" title="BDU:2023-00291" />
			<reference href="https://bdu.fstec.ru/vul/2023-00290" type="self" id="BDU:2023-00290" title="BDU:2023-00290" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openvswitch" epoch="1" version="2.16.0" release="3.el7" arch="x86_64" src="">
					<filename>openvswitch-1:2.16.0-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230124-01</id>
		<issued date="2023-01-24" />
		<updated date="2023-01-24" />
		<title>Уязвимость Sudo </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в sudo</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sudo-cve-2023-22809/</description>
               <solution>
                    Запретить использование в ОС пакета sudo
                или
                    Установить обновление для пакета(ов) Sudo
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sudo-cve-2023-22809/" type="self" id="ROS-20230124-01" title="ROS-20230124-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22809" type="cve" id="CVE-2023-22809" title="CVE-2023-22809" />
			<reference href="https://bdu.fstec.ru/vul/2023-00210" type="self" id="BDU:2023-00210" title="BDU:2023-00210" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="sudo" epoch="0" version="1.8.29" release="5.el7" arch="x86_64" src="">
					<filename>sudo-0:1.8.29-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230124-02</id>
		<issued date="2023-01-24" />
		<updated date="2023-01-24" />
		<title>Уязвимость Vim </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в vim-X11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-cve-2023-0288/</description>
               <solution>
                    Запретить использование в ОС пакета Vim
                или
                    Установить обновление для пакета(ов) Vim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-cve-2023-0288/" type="self" id="ROS-20230124-02" title="ROS-20230124-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0288" type="cve" id="CVE-2023-0288" title="CVE-2023-0288" />
			<reference href="https://bdu.fstec.ru/vul/2023-00387" type="self" id="BDU:2023-00387" title="BDU:2023-00387" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-X11" epoch="2" version="9.0.1206" release="1.el7.3" arch="x86_64" src="">
					<filename>vim-X11-2:9.0.1206-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230124-03</id>
		<issued date="2023-01-24" />
		<updated date="2023-01-24" />
		<title>Уязвимость Libtiff </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в libtiff</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libtiff-cve-2022-48281/</description>
               <solution>
                    Запретить использование в ОС пакета LibTIFF
                или
                    Установить обновление для пакета(ов) LibTIFF
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libtiff-cve-2022-48281/" type="self" id="ROS-20230124-03" title="ROS-20230124-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48281" type="cve" id="CVE-2022-48281" title="CVE-2022-48281" />
			<reference href="https://bdu.fstec.ru/vul/2023-00386" type="self" id="BDU:2023-00386" title="BDU:2023-00386" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libtiff" epoch="0" version="4.4.0" release="5.el7" arch="x86_64" src="">
					<filename>libtiff-0:4.4.0-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230124-04</id>
		<issued date="2023-01-24" />
		<updated date="2023-01-24" />
		<title>Множественные уязвимости Mozilla Firefox</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mozilla-firefox-cve-2022-46871-cve-2022-46877/</description>
               <solution>
                    Запретить использование в ОС пакета Mozilla Firefox
                или
                    Установить обновление для пакета(ов) Mozilla Firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mozilla-firefox-cve-2022-46871-cve-2022-46877/" type="self" id="ROS-20230124-04" title="ROS-20230124-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877" type="cve" id="CVE-2022-46877" title="CVE-2022-46877" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871" type="cve" id="CVE-2022-46871" title="CVE-2022-46871" />
			<reference href="https://bdu.fstec.ru/vul/2023-00384" type="self" id="BDU:2023-00384" title="BDU:2023-00384" />
			<reference href="https://bdu.fstec.ru/vul/2023-00385" type="self" id="BDU:2023-00385" title="BDU:2023-00385" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="102.7.0" release="1.el7.3" arch="x86_64" src="">
					<filename>firefox-0:102.7.0-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230124-05</id>
		<issued date="2023-01-24" />
		<updated date="2023-01-24" />
		<title>Множественные уязвимости libXpm</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libXpm</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libxpm-cve-2022-46285-cve-2022-44617-cve-2022-4883/</description>
               <solution>
                    Запретить использование в ОС пакета libXpm
                или
                    Установить обновление для пакета(ов) libXpm
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libxpm-cve-2022-46285-cve-2022-44617-cve-2022-4883/" type="self" id="ROS-20230124-05" title="ROS-20230124-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4883" type="cve" id="CVE-2022-4883" title="CVE-2022-4883" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44617" type="cve" id="CVE-2022-44617" title="CVE-2022-44617" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46285" type="cve" id="CVE-2022-46285" title="CVE-2022-46285" />
			<reference href="https://bdu.fstec.ru/vul/2023-00388" type="self" id="BDU:2023-00388" title="BDU:2023-00388" />
			<reference href="https://bdu.fstec.ru/vul/2023-00389" type="self" id="BDU:2023-00389" title="BDU:2023-00389" />
			<reference href="https://bdu.fstec.ru/vul/2023-00390" type="self" id="BDU:2023-00390" title="BDU:2023-00390" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libXpm" epoch="0" version="3.5.15" release="2.el7" arch="x86_64" src="">
					<filename>libXpm-0:3.5.15-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230127-01</id>
		<issued date="2023-01-27" />
		<updated date="2023-01-27" />
		<title>Множественные уязвимости Mozilla Thunderbird</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mozilla-thunderbird-cve-2022-46871-cve-2022-46877/</description>
               <solution>
                    Запретить использование в ОС пакета Mozilla Thunderbird
                или
                    Установить обновление для пакета(ов) Mozilla Thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mozilla-thunderbird-cve-2022-46871-cve-2022-46877/" type="self" id="ROS-20230127-01" title="ROS-20230127-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877" type="cve" id="CVE-2022-46877" title="CVE-2022-46877" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871" type="cve" id="CVE-2022-46871" title="CVE-2022-46871" />
			<reference href="https://bdu.fstec.ru/vul/2023-00384" type="self" id="BDU:2023-00384" title="BDU:2023-00384" />
			<reference href="https://bdu.fstec.ru/vul/2023-00385" type="self" id="BDU:2023-00385" title="BDU:2023-00385" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="102.7.0" release="1.el7.3" arch="x86_64" src="">
					<filename>thunderbird-0:102.7.0-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230127-02</id>
		<issued date="2023-01-27" />
		<updated date="2023-01-27" />
		<title>Множественные уязвимости Vim</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в vim-X11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim-cve-2022-47024-cve-2023-0433/</description>
               <solution>
                    Запретить использование в ОС пакета Vim
                или
                    Установить обновление для пакета(ов) Vim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim-cve-2022-47024-cve-2023-0433/" type="self" id="ROS-20230127-02" title="ROS-20230127-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0433" type="cve" id="CVE-2023-0433" title="CVE-2023-0433" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47024" type="cve" id="CVE-2022-47024" title="CVE-2022-47024" />
			<reference href="https://bdu.fstec.ru/vul/2023-00451" type="self" id="BDU:2023-00451" title="BDU:2023-00451" />
			<reference href="https://bdu.fstec.ru/vul/2023-00450" type="self" id="BDU:2023-00450" title="BDU:2023-00450" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-X11" epoch="2" version="9.0.1240" release="1.el7.3" arch="x86_64" src="">
					<filename>vim-X11-2:9.0.1240-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230130-01</id>
		<issued date="2023-01-30" />
		<updated date="2023-01-30" />
		<title>Уязвимость Node.js </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nodejs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-node-js-/</description>
               <solution>
                    Запретить использование в ОС пакета Node.js
                или
                    Установить обновление для пакета(ов) Node.js
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-node-js-/" type="self" id="ROS-20230130-01" title="ROS-20230130-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=" type="cve" id="" title="" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs" epoch="1" version="16.13.2" release="2.el7" arch="x86_64" src="">
					<filename>nodejs-1:16.13.2-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230130-02</id>
		<issued date="2023-01-30" />
		<updated date="2023-01-30" />
		<title>Уязвимость opusfile </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в opusfile</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opusfile-cve-2022-47021/</description>
               <solution>
                    Запретить использование в ОС пакета opusfile
                или
                    Установить обновление для пакета(ов) opusfile
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opusfile-cve-2022-47021/" type="self" id="ROS-20230130-02" title="ROS-20230130-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47021" type="cve" id="CVE-2022-47021" title="CVE-2022-47021" />
			<reference href="https://bdu.fstec.ru/vul/2023-00624" type="self" id="BDU:2023-00624" title="BDU:2023-00624" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="opusfile" epoch="0" version="0.12" release="1.el7.3" arch="x86_64" src="">
					<filename>opusfile-0:0.12-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230203-01</id>
		<issued date="2023-02-03" />
		<updated date="2023-02-03" />
		<title>Уязвимость GNU Tar</title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в tar</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gnu-tar-cve-2022-48303/</description>
               <solution>
                    Запретить использование в ОС пакета GNU Tar
                или
                    Установить обновление для пакета(ов) GNU Tar
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gnu-tar-cve-2022-48303/" type="self" id="ROS-20230203-01" title="ROS-20230203-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48303" type="cve" id="CVE-2022-48303" title="CVE-2022-48303" />
			<reference href="https://bdu.fstec.ru/vul/2023-00577" type="self" id="BDU:2023-00577" title="BDU:2023-00577" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tar" epoch="2" version="1.30" release="5.el7.3" arch="x86_64" src="">
					<filename>tar-2:1.30-5.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230203-02</id>
		<issued date="2023-02-03" />
		<updated date="2023-02-03" />
		<title>Уязвимость Vim</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в vim-X11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-cve-2023-0512/</description>
               <solution>
                    Запретить использование в ОС пакета Vim
                или
                    Установить обновление для пакета(ов) Vim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-cve-2023-0512/" type="self" id="ROS-20230203-02" title="ROS-20230203-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0512" type="cve" id="CVE-2023-0512" title="CVE-2023-0512" />
			<reference href="https://bdu.fstec.ru/vul/2023-00578" type="self" id="BDU:2023-00578" title="BDU:2023-00578" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-X11" epoch="2" version="9.0.1267" release="1.el7.3" arch="x86_64" src="">
					<filename>vim-X11-2:9.0.1267-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230203-03</id>
		<issued date="2023-02-03" />
		<updated date="2023-02-03" />
		<title>Уязвимость binutils </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в binutils</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-binutils-cve-2022-4285/</description>
               <solution>
                    Запретить использование в ОС пакета binutils
                или
                    Установить обновление для пакета(ов) binutils
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-binutils-cve-2022-4285/" type="self" id="ROS-20230203-03" title="ROS-20230203-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4285" type="cve" id="CVE-2022-4285" title="CVE-2022-4285" />
			<reference href="https://bdu.fstec.ru/vul/2023-00576" type="self" id="BDU:2023-00576" title="BDU:2023-00576" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="binutils" epoch="0" version="2.35" release="4.el7" arch="x86_64" src="">
					<filename>binutils-0:2.35-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230210-01</id>
		<issued date="2023-02-10" />
		<updated date="2023-02-10" />
		<title>Уязвимость GNU Less</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в less</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gnu-less-cve-2022-46663/</description>
               <solution>
                    Запретить использование в ОС пакета GNU Less
                или
                    Установить обновление для пакета(ов) GNU Less
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gnu-less-cve-2022-46663/" type="self" id="ROS-20230210-01" title="ROS-20230210-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46663" type="cve" id="CVE-2022-46663" title="CVE-2022-46663" />
			<reference href="https://bdu.fstec.ru/vul/2023-00696" type="self" id="BDU:2023-00696" title="BDU:2023-00696" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="less" epoch="0" version="608" release="1.el7" arch="x86_64" src="">
					<filename>less-0:608-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230210-02</id>
		<issued date="2023-02-10" />
		<updated date="2023-02-10" />
		<title>Уязвимость X.Org Server </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в xorg-x11-server-Xorg</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-x-org-server-cve-2023-0494/</description>
               <solution>
                    Запретить использование в ОС пакета X.Org Server
                или
                    Установить обновление для пакета(ов) X.Org Server
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-x-org-server-cve-2023-0494/" type="self" id="ROS-20230210-02" title="ROS-20230210-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0494" type="cve" id="CVE-2023-0494" title="CVE-2023-0494" />
			<reference href="https://bdu.fstec.ru/vul/2023-00910" type="self" id="BDU:2023-00910" title="BDU:2023-00910" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="xorg-x11-server-Xorg" epoch="0" version="1.20.14" release="5.el7.3" arch="x86_64" src="">
					<filename>xorg-x11-server-Xorg-0:1.20.14-5.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230210-03</id>
		<issued date="2023-02-10" />
		<updated date="2023-02-10" />
		<title>Уязвимость GNU C Library</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в glibc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gnu-c-library-cve-2023-0687/</description>
               <solution>
                    Запретить использование в ОС пакета GNU C Library(glibc)
                или
                    Установить обновление для пакета(ов) GNU C Library(glibc)
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gnu-c-library-cve-2023-0687/" type="self" id="ROS-20230210-03" title="ROS-20230210-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0687" type="cve" id="CVE-2023-0687" title="CVE-2023-0687" />
			<reference href="https://bdu.fstec.ru/vul/2023-00731" type="self" id="BDU:2023-00731" title="BDU:2023-00731" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glibc" epoch="0" version="2.28" release="7.el7" arch="x86_64" src="">
					<filename>glibc-0:2.28-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230210-04</id>
		<issued date="2023-02-10" />
		<updated date="2023-02-10" />
		<title>Уязвимость Redis </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в redis</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-redis-cve-2022-35977/</description>
               <solution>
                    Запретить использование в ОС пакета Redis
                или
                    Установить обновление для пакета(ов) Redis
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-redis-cve-2022-35977/" type="self" id="ROS-20230210-04" title="ROS-20230210-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35977" type="cve" id="CVE-2022-35977" title="CVE-2022-35977" />
			<reference href="https://bdu.fstec.ru/vul/2023-00695" type="self" id="BDU:2023-00695" title="BDU:2023-00695" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="redis" epoch="0" version="7.0.5" release="3.el7" arch="x86_64" src="">
					<filename>redis-0:7.0.5-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230213-01</id>
		<issued date="2023-02-13" />
		<updated date="2023-02-13" />
		<title>Уязвимость ImageMagick </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ImageMagick</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick-cve-2022-44268-cve-2022-44267/</description>
               <solution>
                    Запретить использование в ОС пакета РЕД ОС                    
                или
                    Установить обновление для пакета(ов) РЕД ОС
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick-cve-2022-44268-cve-2022-44267/" type="self" id="ROS-20230213-01" title="ROS-20230213-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44268" type="cve" id="CVE-2022-44268" title="CVE-2022-44268" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44267" type="cve" id="CVE-2022-44267" title="CVE-2022-44267" />
			<reference href="https://bdu.fstec.ru/vul/2023-00579" type="self" id="BDU:2023-00579" title="BDU:2023-00579" />
			<reference href="https://bdu.fstec.ru/vul/2023-00732" type="self" id="BDU:2023-00732" title="BDU:2023-00732" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ImageMagick" epoch="0" version="6.9.11.27" release="5.el7" arch="x86_64" src="">
					<filename>ImageMagick-0:6.9.11.27-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230217-01</id>
		<issued date="2023-02-17" />
		<updated date="2023-02-17" />
		<title>Уязвимость device-mapper-multipath </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в device-mapper-multipath</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-device-mapper-multipath-cve-2022-41974/</description>
               <solution>
                    Запретить использование в ОС пакета device-mapper-multipath
                или
                    Установить обновление для пакета(ов) device-mapper-multipath
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-device-mapper-multipath-cve-2022-41974/" type="self" id="ROS-20230217-01" title="ROS-20230217-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41974" type="cve" id="CVE-2022-41974" title="CVE-2022-41974" />
			<reference href="https://bdu.fstec.ru/vul/2022-06669" type="self" id="BDU:2022-06669" title="BDU:2022-06669" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="device-mapper-multipath" epoch="0" version="0.8.4" release="5.el7" arch="x86_64" src="">
					<filename>device-mapper-multipath-0:0.8.4-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230217-02</id>
		<issued date="2023-02-17" />
		<updated date="2023-02-17" />
		<title>Уязвимость Mozilla Firefox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mozilla-firefox-cve-2023-25746/</description>
               <solution>
                    Запретить использование в ОС пакета Mozilla Firefox
                или
                    Установить обновление для пакета(ов) Mozilla Firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mozilla-firefox-cve-2023-25746/" type="self" id="ROS-20230217-02" title="ROS-20230217-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746" type="cve" id="CVE-2023-25746" title="CVE-2023-25746" />
			<reference href="https://bdu.fstec.ru/vul/2023-01268" type="self" id="BDU:2023-01268" title="BDU:2023-01268" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="102.8.0" release="1.el7.3" arch="x86_64" src="">
					<filename>firefox-0:102.8.0-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230315-01</id>
		<issued date="2023-03-15" />
		<updated date="2023-04-11" />
		<title>Множественные уязвимости Mozilla thunderbird </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-15-03-23/</description>
               <solution>
                    Запретить использование в ОС пакета Mozilla Thunderbird
                или
                    Установить обновление для пакета(ов) Mozilla Thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-15-03-23/" type="self" id="ROS-20230315-01" title="ROS-20230315-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25743" type="cve" id="CVE-2023-25743" title="CVE-2023-25743" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744" type="cve" id="CVE-2023-25744" title="CVE-2023-25744" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742" type="cve" id="CVE-2023-25742" title="CVE-2023-25742" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737" type="cve" id="CVE-2023-25737" title="CVE-2023-25737" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735" type="cve" id="CVE-2023-25735" title="CVE-2023-25735" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732" type="cve" id="CVE-2023-25732" title="CVE-2023-25732" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746" type="cve" id="CVE-2023-25746" title="CVE-2023-25746" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739" type="cve" id="CVE-2023-25739" title="CVE-2023-25739" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767" type="cve" id="CVE-2023-0767" title="CVE-2023-0767" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729" type="cve" id="CVE-2023-25729" title="CVE-2023-25729" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730" type="cve" id="CVE-2023-25730" title="CVE-2023-25730" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728" type="cve" id="CVE-2023-25728" title="CVE-2023-25728" />
			<reference href="https://bdu.fstec.ru/vul/2023-01261" type="self" id="BDU:2023-01261" title="BDU:2023-01261" />
			<reference href="https://bdu.fstec.ru/vul/2023-01262" type="self" id="BDU:2023-01262" title="BDU:2023-01262" />
			<reference href="https://bdu.fstec.ru/vul/2023-01263" type="self" id="BDU:2023-01263" title="BDU:2023-01263" />
			<reference href="https://bdu.fstec.ru/vul/2023-01264" type="self" id="BDU:2023-01264" title="BDU:2023-01264" />
			<reference href="https://bdu.fstec.ru/vul/2023-01266" type="self" id="BDU:2023-01266" title="BDU:2023-01266" />
			<reference href="https://bdu.fstec.ru/vul/2023-01267" type="self" id="BDU:2023-01267" title="BDU:2023-01267" />
			<reference href="https://bdu.fstec.ru/vul/2023-01268" type="self" id="BDU:2023-01268" title="BDU:2023-01268" />
			<reference href="https://bdu.fstec.ru/vul/2023-01269" type="self" id="BDU:2023-01269" title="BDU:2023-01269" />
			<reference href="https://bdu.fstec.ru/vul/2023-01270" type="self" id="BDU:2023-01270" title="BDU:2023-01270" />
			<reference href="https://bdu.fstec.ru/vul/2023-01271" type="self" id="BDU:2023-01271" title="BDU:2023-01271" />
			<reference href="https://bdu.fstec.ru/vul/2023-01272" type="self" id="BDU:2023-01272" title="BDU:2023-01272" />
			<reference href="https://bdu.fstec.ru/vul/2023-01265" type="self" id="BDU:2023-01265" title="BDU:2023-01265" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="102.8.0" release="1.el7.3" arch="x86_64" src="">
					<filename>thunderbird-0:102.8.0-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230316-01</id>
		<issued date="2023-03-16" />
		<updated date="2023-03-16" />
		<title>Уязвимость c-ares </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в c-ares</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-c-ares-cve-2022-4904/</description>
               <solution>
                    Запретить использование в ОС пакета C-ares
                или
                    Установить обновление для пакета(ов) C-ares
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-c-ares-cve-2022-4904/" type="self" id="ROS-20230316-01" title="ROS-20230316-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4904" type="cve" id="CVE-2022-4904" title="CVE-2022-4904" />
			<reference href="https://bdu.fstec.ru/vul/2023-01258" type="self" id="BDU:2023-01258" title="BDU:2023-01258" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="c-ares" epoch="0" version="1.17.2" release="2.el7" arch="x86_64" src="">
					<filename>c-ares-0:1.17.2-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230317-01</id>
		<issued date="2023-03-17" />
		<updated date="2023-03-17" />
		<title>Уязвимость Redis</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в redis</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-redis-cve-2022-36021/</description>
               <solution>
                    Запретить использование в ОС пакета Redis
                или
                    Установить обновление для пакета(ов) Redis
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-redis-cve-2022-36021/" type="self" id="ROS-20230317-01" title="ROS-20230317-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36021" type="cve" id="CVE-2022-36021" title="CVE-2022-36021" />
			<reference href="https://bdu.fstec.ru/vul/2023-01308" type="self" id="BDU:2023-01308" title="BDU:2023-01308" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="redis" epoch="0" version="7.0.5" release="4.el7" arch="x86_64" src="">
					<filename>redis-0:7.0.5-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230317-02</id>
		<issued date="2023-03-17" />
		<updated date="2023-03-17" />
		<title>Уязвимость Squid </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в squid</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-squid-cve-2022-41318/</description>
               <solution>
                    Запретить использование в ОС пакета Squid 
                или
                    Установить обновление для пакета(ов) Squid 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-squid-cve-2022-41318/" type="self" id="ROS-20230317-02" title="ROS-20230317-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41318" type="cve" id="CVE-2022-41318" title="CVE-2022-41318" />
			<reference href="https://bdu.fstec.ru/vul/2023-01309" type="self" id="BDU:2023-01309" title="BDU:2023-01309" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="squid" epoch="7" version="5.5" release="3.el7.3" arch="x86_64" src="">
					<filename>squid-7:5.5-3.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230317-03</id>
		<issued date="2023-03-17" />
		<updated date="2023-03-17" />
		<title>Уязвимость Minio </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в minio</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-minio-cve-2023-25812/</description>
               <solution>
                    Запретить использование в ОС пакета MinIO 
                или
                    Установить обновление для пакета(ов) MinIO 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-minio-cve-2023-25812/" type="self" id="ROS-20230317-03" title="ROS-20230317-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25812" type="cve" id="CVE-2023-25812" title="CVE-2023-25812" />
			<reference href="https://bdu.fstec.ru/vul/2023-01857" type="self" id="BDU:2023-01857" title="BDU:2023-01857" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="minio" epoch="0" version="20230210T184839Z" release="2.el7" arch="x86_64" src="">
					<filename>minio-0:20230210T184839Z-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230320-01</id>
		<issued date="2023-03-20" />
		<updated date="2023-03-20" />
		<title>Уязвимость vim </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в vim-X11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-cve-2023-1127/</description>
               <solution>
                    Запретить использование в ОС пакета Vim
                или
                    Установить обновление для пакета(ов) Vim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-cve-2023-1127/" type="self" id="ROS-20230320-01" title="ROS-20230320-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1127" type="cve" id="CVE-2023-1127" title="CVE-2023-1127" />
			<reference href="https://bdu.fstec.ru/vul/2023-01856" type="self" id="BDU:2023-01856" title="BDU:2023-01856" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-X11" epoch="2" version="9.0.1385" release="1.el7.3" arch="x86_64" src="">
					<filename>vim-X11-2:9.0.1385-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230320-02</id>
		<issued date="2023-03-20" />
		<updated date="2023-03-20" />
		<title>Множественные уязвимости Libde265</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libde265</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libde265-cve-2022-47665-cve-2022-47664/</description>
               <solution>
                    Запретить использование в ОС пакета Libde265 
                или
                    Установить обновление для пакета(ов) Libde265 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libde265-cve-2022-47665-cve-2022-47664/" type="self" id="ROS-20230320-02" title="ROS-20230320-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47665" type="cve" id="CVE-2022-47665" title="CVE-2022-47665" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47664" type="cve" id="CVE-2022-47664" title="CVE-2022-47664" />
			<reference href="https://bdu.fstec.ru/vul/2023-01838" type="self" id="BDU:2023-01838" title="BDU:2023-01838" />
			<reference href="https://bdu.fstec.ru/vul/2023-01833" type="self" id="BDU:2023-01833" title="BDU:2023-01833" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libde265" epoch="0" version="1.0.11" release="1.el7" arch="x86_64" src="">
					<filename>libde265-0:1.0.11-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230321-01</id>
		<issued date="2023-03-21" />
		<updated date="2023-03-21" />
		<title>Множественные уязвимости Libde265</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libde265</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libde265-cve-2023-24758-cve-2023-24757-cve-2023-24756-cve-2023-24755-cve-/</description>
               <solution>
                    Запретить использование в ОС пакета Libde265 
                или
                    Установить обновление для пакета(ов) Libde265 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libde265-cve-2023-24758-cve-2023-24757-cve-2023-24756-cve-2023-24755-cve-/" type="self" id="ROS-20230321-01" title="ROS-20230321-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24758" type="cve" id="CVE-2023-24758" title="CVE-2023-24758" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24757" type="cve" id="CVE-2023-24757" title="CVE-2023-24757" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24756" type="cve" id="CVE-2023-24756" title="CVE-2023-24756" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24755" type="cve" id="CVE-2023-24755" title="CVE-2023-24755" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24754" type="cve" id="CVE-2023-24754" title="CVE-2023-24754" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24752" type="cve" id="CVE-2023-24752" title="CVE-2023-24752" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24751" type="cve" id="CVE-2023-24751" title="CVE-2023-24751" />
			<reference href="https://bdu.fstec.ru/vul/2023-01449" type="self" id="BDU:2023-01449" title="BDU:2023-01449" />
			<reference href="https://bdu.fstec.ru/vul/2023-01448" type="self" id="BDU:2023-01448" title="BDU:2023-01448" />
			<reference href="https://bdu.fstec.ru/vul/2023-01450" type="self" id="BDU:2023-01450" title="BDU:2023-01450" />
			<reference href="https://bdu.fstec.ru/vul/2023-01451" type="self" id="BDU:2023-01451" title="BDU:2023-01451" />
			<reference href="https://bdu.fstec.ru/vul/2023-01447" type="self" id="BDU:2023-01447" title="BDU:2023-01447" />
			<reference href="https://bdu.fstec.ru/vul/2023-01446" type="self" id="BDU:2023-01446" title="BDU:2023-01446" />
			<reference href="https://bdu.fstec.ru/vul/2023-01445" type="self" id="BDU:2023-01445" title="BDU:2023-01445" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libde265" epoch="0" version="1.0.11" release="1.el7" arch="x86_64" src="">
					<filename>libde265-0:1.0.11-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230322-01</id>
		<issued date="2023-03-22" />
		<updated date="2023-03-22" />
		<title>Уязвимость libheif </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libheif</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libheif-cve-2023-0996-2/</description>
               <solution>
                    Запретить использование в ОС пакета Libheif 
                или
                    Установить обновление для пакета(ов) Libheif 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libheif-cve-2023-0996-2/" type="self" id="ROS-20230322-01" title="ROS-20230322-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0996" type="cve" id="CVE-2023-0996" title="CVE-2023-0996" />
			<reference href="https://bdu.fstec.ru/vul/2023-01487" type="self" id="BDU:2023-01487" title="BDU:2023-01487" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libheif" epoch="0" version="1.13.0" release="2.el7" arch="x86_64" src="">
					<filename>libheif-0:1.13.0-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230322-02</id>
		<issued date="2023-03-22" />
		<updated date="2023-03-22" />
		<title>Множественные уязвимости containerd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в containerd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-containerd-cve-2023-25153-cve-2023-25173/</description>
               <solution>
                    Запретить использование в ОС пакета Containerd 
                или
                    Установить обновление для пакета(ов) Containerd 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-containerd-cve-2023-25153-cve-2023-25173/" type="self" id="ROS-20230322-02" title="ROS-20230322-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25153" type="cve" id="CVE-2023-25153" title="CVE-2023-25153" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25173" type="cve" id="CVE-2023-25173" title="CVE-2023-25173" />
			<reference href="https://bdu.fstec.ru/vul/2023-01489" type="self" id="BDU:2023-01489" title="BDU:2023-01489" />
			<reference href="https://bdu.fstec.ru/vul/2023-01488" type="self" id="BDU:2023-01488" title="BDU:2023-01488" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="containerd" epoch="0" version="1.5.18" release="1.el7" arch="x86_64" src="">
					<filename>containerd-0:1.5.18-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230322-03</id>
		<issued date="2023-03-23" />
		<updated date="2023-03-23" />
		<title>Множественные уязвимости Git </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в git</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-git-cve-2023-23946-cve-2023-22490/</description>
               <solution>
                    Запретить использование в ОС пакета Git 
                или
                    Установить обновление для пакета(ов) Git 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-git-cve-2023-23946-cve-2023-22490/" type="self" id="ROS-20230322-03" title="ROS-20230322-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23946" type="cve" id="CVE-2023-23946" title="CVE-2023-23946" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22490" type="cve" id="CVE-2023-22490" title="CVE-2023-22490" />
			<reference href="https://bdu.fstec.ru/vul/2023-01603" type="self" id="BDU:2023-01603" title="BDU:2023-01603" />
			<reference href="https://bdu.fstec.ru/vul/2023-01602" type="self" id="BDU:2023-01602" title="BDU:2023-01602" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="git" epoch="0" version="2.30.8" release="1.el7" arch="x86_64" src="">
					<filename>git-0:2.30.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230324-01</id>
		<issued date="2023-03-24" />
		<updated date="2023-03-24" />
		<title>Уязвимость Samba </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в samba</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-samba-cve-2022-3437-cve-2022-3592/</description>
               <solution>
                    Запретить использование в ОС пакета samba
                или
                    Установить обновление для пакета(ов) samba
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-samba-cve-2022-3437-cve-2022-3592/" type="self" id="ROS-20230324-01" title="ROS-20230324-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437" type="cve" id="CVE-2022-3437" title="CVE-2022-3437" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3592" type="cve" id="CVE-2022-3592" title="CVE-2022-3592" />
			<reference href="https://bdu.fstec.ru/vul/2022-06493" type="self" id="BDU:2022-06493" title="BDU:2022-06493" />
			<reference href="https://bdu.fstec.ru/vul/2022-06494" type="self" id="BDU:2022-06494" title="BDU:2022-06494" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="samba" epoch="0" version="4.17.5" release="1m.el7.3" arch="x86_64" src="">
					<filename>samba-0:4.17.5-1m.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230406-01</id>
		<issued date="2023-04-06" />
		<updated date="2023-04-06" />
		<title>Множественные уязвимости curl </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-curl-cve-2023-27534-cve-2023-27533/</description>
               <solution>
                    Запретить использование в ОС пакета cURL 
                или
                    Установить обновление для пакета(ов) cURL 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-curl-cve-2023-27534-cve-2023-27533/" type="self" id="ROS-20230406-01" title="ROS-20230406-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27534" type="cve" id="CVE-2023-27534" title="CVE-2023-27534" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27533" type="cve" id="CVE-2023-27533" title="CVE-2023-27533" />
			<reference href="https://bdu.fstec.ru/vul/2023-02107" type="self" id="BDU:2023-02107" title="BDU:2023-02107" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="curl" epoch="0" version="7.81.0" release="9.el7.3" arch="x86_64" src="">
					<filename>curl-0:7.81.0-9.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230407-01</id>
		<issued date="2023-04-07" />
		<updated date="2023-04-07" />
		<title>Множественные уязвимости libcurl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libcurl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libcurl-cve-2023-27538-cve-2023-27537-cve-2023-27536-cve-2023-27535/</description>
               <solution>
                    Запретить использование в ОС пакета libcurl 
                или
                    Установить обновление для пакета(ов) libcurl 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libcurl-cve-2023-27538-cve-2023-27537-cve-2023-27536-cve-2023-27535/" type="self" id="ROS-20230407-01" title="ROS-20230407-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27538" type="cve" id="CVE-2023-27538" title="CVE-2023-27538" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27537" type="cve" id="CVE-2023-27537" title="CVE-2023-27537" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27536" type="cve" id="CVE-2023-27536" title="CVE-2023-27536" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27535" type="cve" id="CVE-2023-27535" title="CVE-2023-27535" />
			<reference href="https://bdu.fstec.ru/vul/2023-02103" type="self" id="BDU:2023-02103" title="BDU:2023-02103" />
			<reference href="https://bdu.fstec.ru/vul/2023-02105" type="self" id="BDU:2023-02105" title="BDU:2023-02105" />
			<reference href="https://bdu.fstec.ru/vul/2023-02109" type="self" id="BDU:2023-02109" title="BDU:2023-02109" />
			<reference href="https://bdu.fstec.ru/vul/2023-02106" type="self" id="BDU:2023-02106" title="BDU:2023-02106" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libcurl" epoch="0" version="7.81.0" release="9.el7.3" arch="x86_64" src="">
					<filename>libcurl-0:7.81.0-9.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230407-02</id>
		<issued date="2023-04-07" />
		<updated date="2023-04-07" />
		<title>Уязвимость Redis</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в redis</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-redis-cve-2023-28425/</description>
               <solution>
                    Запретить использование в ОС пакета Redis 
                или
                    Установить обновление для пакета(ов) Redis 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-redis-cve-2023-28425/" type="self" id="ROS-20230407-02" title="ROS-20230407-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28425" type="cve" id="CVE-2023-28425" title="CVE-2023-28425" />
			<reference href="https://bdu.fstec.ru/vul/2023-01970" type="self" id="BDU:2023-01970" title="BDU:2023-01970" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="redis" epoch="0" version="7.0.5" release="6.el7" arch="x86_64" src="">
					<filename>redis-0:7.0.5-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230407-03</id>
		<issued date="2023-04-07" />
		<updated date="2023-04-07" />
		<title>Уязвимость OpenSSL</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в openssl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl-cve-2023-0464/</description>
               <solution>
                    Запретить использование в ОС пакета OpenSSL 
                или
                    Установить обновление для пакета(ов) OpenSSL 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl-cve-2023-0464/" type="self" id="ROS-20230407-03" title="ROS-20230407-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0464" type="cve" id="CVE-2023-0464" title="CVE-2023-0464" />
			<reference href="https://bdu.fstec.ru/vul/2023-02108" type="self" id="BDU:2023-02108" title="BDU:2023-02108" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl" epoch="1" version="1.1.1q" release="3.el7.3" arch="x86_64" src="">
					<filename>openssl-1:1.1.1q-3.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230411-01</id>
		<issued date="2023-04-11" />
		<updated date="2023-04-11" />
		<title>Уязвимость CairoSVG </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-cairosvg</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cairosvg-cve-2023-27586/</description>
               <solution>
                    Запретить использование в ОС пакета CAIROSVG 
                или
                    Установить обновление для пакета(ов) CAIROSVG 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cairosvg-cve-2023-27586/" type="self" id="ROS-20230411-01" title="ROS-20230411-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27586" type="cve" id="CVE-2023-27586" title="CVE-2023-27586" />
			<reference href="https://bdu.fstec.ru/vul/2023-02149" type="self" id="BDU:2023-02149" title="BDU:2023-02149" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-cairosvg" epoch="0" version="2.7.0" release="1.el7" arch="noarch" src="">
					<filename>python3-cairosvg-0:2.7.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230411-02</id>
		<issued date="2023-04-11" />
		<updated date="2023-04-11" />
		<title>Множественные уязвимости Liblouis </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в liblouis</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-liblouis-cve-2023-26768-cve-2023-26767/</description>
               <solution>
                    Запретить использование в ОС пакета Liblouis 
                или
                    Установить обновление для пакета(ов) Liblouis 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-liblouis-cve-2023-26768-cve-2023-26767/" type="self" id="ROS-20230411-02" title="ROS-20230411-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26768" type="cve" id="CVE-2023-26768" title="CVE-2023-26768" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26767" type="cve" id="CVE-2023-26767" title="CVE-2023-26767" />
			<reference href="https://bdu.fstec.ru/vul/2023-02151" type="self" id="BDU:2023-02151" title="BDU:2023-02151" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="liblouis" epoch="0" version="3.21.0" release="2.el7" arch="x86_64" src="">
					<filename>liblouis-0:3.21.0-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230411-03</id>
		<issued date="2023-04-11" />
		<updated date="2023-04-11" />
		<title>Уязвимость Minio</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в minio</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-minio-cve-2023-27589/</description>
               <solution>
                    Запретить использование в ОС пакета MinIO 
                или
                    Установить обновление для пакета(ов) MinIO 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-minio-cve-2023-27589/" type="self" id="ROS-20230411-03" title="ROS-20230411-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27589" type="cve" id="CVE-2023-27589" title="CVE-2023-27589" />
			<reference href="https://bdu.fstec.ru/vul/2023-02148" type="self" id="BDU:2023-02148" title="BDU:2023-02148" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="minio" epoch="0" version="20230210T184839Z" release="3.el7" arch="x86_64" src="">
					<filename>minio-0:20230210T184839Z-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230412-01</id>
		<issued date="2023-04-12" />
		<updated date="2023-04-12" />
		<title>Множественные уязвимости Libde265 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libde265</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libde265-cve-2023-27103-cve-2023-27102/</description>
               <solution>
                    Запретить использование в ОС пакета Libde265 
                или
                    Установить обновление для пакета(ов) Libde265 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libde265-cve-2023-27103-cve-2023-27102/" type="self" id="ROS-20230412-01" title="ROS-20230412-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27103" type="cve" id="CVE-2023-27103" title="CVE-2023-27103" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27102" type="cve" id="CVE-2023-27102" title="CVE-2023-27102" />
			<reference href="https://bdu.fstec.ru/vul/2023-02131" type="self" id="BDU:2023-02131" title="BDU:2023-02131" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libde265" epoch="0" version="1.0.11" release="2.el7" arch="x86_64" src="">
					<filename>libde265-0:1.0.11-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230412-02</id>
		<issued date="2023-04-12" />
		<updated date="2023-04-12" />
		<title>Уязвимость vim </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в vim-X11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-cve-2023-1355/</description>
               <solution>
                    Запретить использование в ОС пакета Vim
                или
                    Установить обновление для пакета(ов) Vim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-cve-2023-1355/" type="self" id="ROS-20230412-02" title="ROS-20230412-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1355" type="cve" id="CVE-2023-1355" title="CVE-2023-1355" />
			<reference href="https://bdu.fstec.ru/vul/2023-02159" type="self" id="BDU:2023-02159" title="BDU:2023-02159" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-X11" epoch="2" version="9.0.1403" release="1.el7.3" arch="x86_64" src="">
					<filename>vim-X11-2:9.0.1403-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230412-03</id>
		<issued date="2023-04-12" />
		<updated date="2023-04-12" />
		<title>Уязвимость Consul </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в consul</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-consul-cve-2023-0845/</description>
               <solution>
                    Запретить использование в ОС пакета Consul 
                или
                    Установить обновление для пакета(ов) Consul 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-consul-cve-2023-0845/" type="self" id="ROS-20230412-03" title="ROS-20230412-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0845" type="cve" id="CVE-2023-0845" title="CVE-2023-0845" />
			<reference href="https://bdu.fstec.ru/vul/2023-01973" type="self" id="BDU:2023-01973" title="BDU:2023-01973" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="consul" epoch="0" version="1.14.5" release="1.el7" arch="x86_64" src="">
					<filename>consul-0:1.14.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230413-01</id>
		<issued date="2023-04-13" />
		<updated date="2023-04-13" />
		<title>Множественные уязвимости Nextcloud </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nextcloud</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nextcloud-cve-2023-25821-cve-2023-25816/</description>
               <solution>
                    Запретить использование в ОС пакета Nextcloud 
                или
                    Установить обновление для пакета(ов) Nextcloud 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nextcloud-cve-2023-25821-cve-2023-25816/" type="self" id="ROS-20230413-01" title="ROS-20230413-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25821" type="cve" id="CVE-2023-25821" title="CVE-2023-25821" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25816" type="cve" id="CVE-2023-25816" title="CVE-2023-25816" />
			<reference href="https://bdu.fstec.ru/vul/2023-02152" type="self" id="BDU:2023-02152" title="BDU:2023-02152" />
			<reference href="https://bdu.fstec.ru/vul/2023-02153" type="self" id="BDU:2023-02153" title="BDU:2023-02153" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nextcloud" epoch="0" version="25.0.3" release="1.el7" arch="noarch" src="">
					<filename>nextcloud-0:25.0.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230414-01</id>
		<issued date="2023-04-14" />
		<updated date="2023-04-14" />
		<title>Уязвимость Ghostscript </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в ghostscript</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ghostscript-cve-2023-28879/</description>
               <solution>
                    Запретить использование в ОС пакета Ghostscript
                или
                    Установить обновление для пакета(ов) Ghostscript
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ghostscript-cve-2023-28879/" type="self" id="ROS-20230414-01" title="ROS-20230414-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28879" type="cve" id="CVE-2023-28879" title="CVE-2023-28879" />
			<reference href="https://bdu.fstec.ru/vul/2023-02055" type="self" id="BDU:2023-02055" title="BDU:2023-02055" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ghostscript" epoch="0" version="9.52" release="2.el7" arch="x86_64" src="">
					<filename>ghostscript-0:9.52-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230414-02</id>
		<issued date="2023-04-14" />
		<updated date="2023-04-14" />
		<title>Множественные уязвимости BIND </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в bind</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-bind-cve-2021-25220-cve-2022-0396-cve-2022-0635-cve-2022-0667/</description>
               <solution>
                    Запретить использование в ОС пакета BIND
                или
                    Установить обновление для пакета(ов) BIND
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-bind-cve-2021-25220-cve-2022-0396-cve-2022-0635-cve-2022-0667/" type="self" id="ROS-20230414-02" title="ROS-20230414-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25220" type="cve" id="CVE-2021-25220" title="CVE-2021-25220" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0396" type="cve" id="CVE-2022-0396" title="CVE-2022-0396" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0635" type="cve" id="CVE-2022-0635" title="CVE-2022-0635" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0667" type="cve" id="CVE-2022-0667" title="CVE-2022-0667" />
			<reference href="https://bdu.fstec.ru/vul/2022-05754" type="self" id="BDU:2022-05754" title="BDU:2022-05754" />
			<reference href="https://bdu.fstec.ru/vul/2023-02161" type="self" id="BDU:2023-02161" title="BDU:2023-02161" />
			<reference href="https://bdu.fstec.ru/vul/2023-02160" type="self" id="BDU:2023-02160" title="BDU:2023-02160" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="bind" epoch="32" version="9.16.27" release="1.el7" arch="x86_64" src="">
					<filename>bind-32:9.16.27-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230414-03</id>
		<issued date="2023-04-14" />
		<updated date="2023-04-14" />
		<title>Уязвимость curl </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2022-43551/</description>
               <solution>
                    Запретить использование в ОС пакета cURL 
                или
                    Установить обновление для пакета(ов) cURL 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2022-43551/" type="self" id="ROS-20230414-03" title="ROS-20230414-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43551" type="cve" id="CVE-2022-43551" title="CVE-2022-43551" />
			<reference href="https://bdu.fstec.ru/vul/2023-02157" type="self" id="BDU:2023-02157" title="BDU:2023-02157" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="curl" epoch="0" version="7.81.0" release="9.el7.3" arch="x86_64" src="">
					<filename>curl-0:7.81.0-9.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230414-04</id>
		<issued date="2023-04-14" />
		<updated date="2023-04-14" />
		<title>Уязвимость curl</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2022-43552/</description>
               <solution>
                    Запретить использование в ОС пакета cURL 
                или
                    Установить обновление для пакета(ов) cURL 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2022-43552/" type="self" id="ROS-20230414-04" title="ROS-20230414-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552" type="cve" id="CVE-2022-43552" title="CVE-2022-43552" />
			<reference href="https://bdu.fstec.ru/vul/2024-07332" type="self" id="BDU:2024-07332" title="BDU:2024-07332" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="curl" epoch="0" version="7.81.0" release="9.el7.3" arch="x86_64" src="">
					<filename>curl-0:7.81.0-9.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230417-01</id>
		<issued date="2023-04-17" />
		<updated date="2023-04-17" />
		<title>Уязвимость Redis </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в redis</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-redis-cve-2023-25155/</description>
               <solution>
                    Запретить использование в ОС пакета Redis
                или
                    Установить обновление для пакета(ов) Redis
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-redis-cve-2023-25155/" type="self" id="ROS-20230417-01" title="ROS-20230417-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25155" type="cve" id="CVE-2023-25155" title="CVE-2023-25155" />
			<reference href="https://bdu.fstec.ru/vul/2023-01740" type="self" id="BDU:2023-01740" title="BDU:2023-01740" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="redis" epoch="0" version="7.0.5" release="6.el7" arch="x86_64" src="">
					<filename>redis-0:7.0.5-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230417-02</id>
		<issued date="2023-04-17" />
		<updated date="2023-04-17" />
		<title>Уязвимость heimdal</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в heimdal-libs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-heimdal-cve-2022-45142/</description>
               <solution>
                    Запретить использование в ОС пакета Heimdal 
                или
                    Установить обновление для пакета(ов) Heimdal 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-heimdal-cve-2022-45142/" type="self" id="ROS-20230417-02" title="ROS-20230417-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45142" type="cve" id="CVE-2022-45142" title="CVE-2022-45142" />
			<reference href="https://bdu.fstec.ru/vul/2023-02156" type="self" id="BDU:2023-02156" title="BDU:2023-02156" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="heimdal-libs" epoch="0" version="7.8.0" release="5.el7.3" arch="x86_64" src="">
					<filename>heimdal-libs-0:7.8.0-5.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230417-03</id>
		<issued date="2023-04-17" />
		<updated date="2023-04-17" />
		<title>Уязвимость ImageMagick </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в ImageMagick7</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/imagemagick-cve-2023-1289/</description>
               <solution>
                    Запретить использование в ОС пакета ImageMagick 
                или
                    Установить обновление для пакета(ов) ImageMagick 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/imagemagick-cve-2023-1289/" type="self" id="ROS-20230417-03" title="ROS-20230417-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1289" type="cve" id="CVE-2023-1289" title="CVE-2023-1289" />
			<reference href="https://bdu.fstec.ru/vul/2023-02155" type="self" id="BDU:2023-02155" title="BDU:2023-02155" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ImageMagick7" epoch="0" version="7.1.0.57" release="2.el7" arch="x86_64" src="">
					<filename>ImageMagick7-0:7.1.0.57-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230417-04</id>
		<issued date="2023-04-17" />
		<updated date="2023-04-17" />
		<title>Множественные уязвимости ТРМ</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libtpms</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-trm-cve-2023-1017-cve-2023-1018/</description>
               <solution>
                    Запретить использование в ОС пакета libtpms
                или
                    Установить обновление для пакета(ов) libtpms
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-trm-cve-2023-1017-cve-2023-1018/" type="self" id="ROS-20230417-04" title="ROS-20230417-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1017" type="cve" id="CVE-2023-1017" title="CVE-2023-1017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1018" type="cve" id="CVE-2023-1018" title="CVE-2023-1018" />
			<reference href="https://bdu.fstec.ru/vul/2023-01188" type="self" id="BDU:2023-01188" title="BDU:2023-01188" />
			<reference href="https://bdu.fstec.ru/vul/2023-01029" type="self" id="BDU:2023-01029" title="BDU:2023-01029" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libtpms" epoch="0" version="0.9.6" release="1.el7" arch="x86_64" src="">
					<filename>libtpms-0:0.9.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230417-05</id>
		<issued date="2023-04-17" />
		<updated date="2023-04-17" />
		<title>Уязвимость curl </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2023-23914/</description>
               <solution>
                    Запретить использование в ОС пакета curl 
                или
                    Установить обновление для пакета(ов) curl 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2023-23914/" type="self" id="ROS-20230417-05" title="ROS-20230417-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23914" type="cve" id="CVE-2023-23914" title="CVE-2023-23914" />
			<reference href="https://bdu.fstec.ru/vul/2023-02154" type="self" id="BDU:2023-02154" title="BDU:2023-02154" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="curl" epoch="0" version="7.81.0" release="9.el7.3" arch="x86_64" src="">
					<filename>curl-0:7.81.0-9.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230418-01</id>
		<issued date="2023-04-18" />
		<updated date="2023-04-18" />
		<title>Множественные уязвимости Nextcloud </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nextcloud</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nextcloud-cve-2023-28835-cve-2023-28833-cve-2023-28644-cve-2023-28643-cve/</description>
               <solution>
                    Запретить использование в ОС пакета Nextcloud 
                или
                    Установить обновление для пакета(ов) Nextcloud 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nextcloud-cve-2023-28835-cve-2023-28833-cve-2023-28644-cve-2023-28643-cve/" type="self" id="ROS-20230418-01" title="ROS-20230418-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28835" type="cve" id="CVE-2023-28835" title="CVE-2023-28835" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28833" type="cve" id="CVE-2023-28833" title="CVE-2023-28833" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28644" type="cve" id="CVE-2023-28644" title="CVE-2023-28644" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28643" type="cve" id="CVE-2023-28643" title="CVE-2023-28643" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26482" type="cve" id="CVE-2023-26482" title="CVE-2023-26482" />
			<reference href="https://bdu.fstec.ru/vul/2023-02258" type="self" id="BDU:2023-02258" title="BDU:2023-02258" />
			<reference href="https://bdu.fstec.ru/vul/2023-02259" type="self" id="BDU:2023-02259" title="BDU:2023-02259" />
			<reference href="https://bdu.fstec.ru/vul/2023-02260" type="self" id="BDU:2023-02260" title="BDU:2023-02260" />
			<reference href="https://bdu.fstec.ru/vul/2023-02261" type="self" id="BDU:2023-02261" title="BDU:2023-02261" />
			<reference href="https://bdu.fstec.ru/vul/2023-02262" type="self" id="BDU:2023-02262" title="BDU:2023-02262" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nextcloud" epoch="0" version="25.0.5" release="1.el7" arch="noarch" src="">
					<filename>nextcloud-0:25.0.5-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230418-02</id>
		<issued date="2023-04-18" />
		<updated date="2023-04-18" />
		<title>Множественные уязвимости PHP </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в php</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-cve-2023-0662-cve-2023-0568/</description>
               <solution>
                    Запретить использование в ОС пакета PHP 
                или
                    Установить обновление для пакета(ов) PHP 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-cve-2023-0662-cve-2023-0568/" type="self" id="ROS-20230418-02" title="ROS-20230418-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0662" type="cve" id="CVE-2023-0662" title="CVE-2023-0662" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0568" type="cve" id="CVE-2023-0568" title="CVE-2023-0568" />
			<reference href="https://bdu.fstec.ru/vul/2023-02263" type="self" id="BDU:2023-02263" title="BDU:2023-02263" />
			<reference href="https://bdu.fstec.ru/vul/2023-02264" type="self" id="BDU:2023-02264" title="BDU:2023-02264" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php" epoch="0" version="8.1.16" release="1.el7" arch="x86_64" src="">
					<filename>php-0:8.1.16-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230418-03</id>
		<issued date="2023-04-18" />
		<updated date="2023-04-18" />
		<title>Множественные уязвимости Git </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в git</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-git-cve-2022-41903-cve-2022-23521/</description>
               <solution>
                    Запретить использование в ОС пакета git
                или
                    Установить обновление для пакета(ов) git
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-git-cve-2022-41903-cve-2022-23521/" type="self" id="ROS-20230418-03" title="ROS-20230418-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41903" type="cve" id="CVE-2022-41903" title="CVE-2022-41903" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23521" type="cve" id="CVE-2022-23521" title="CVE-2022-23521" />
			<reference href="https://bdu.fstec.ru/vul/2023-00609" type="self" id="BDU:2023-00609" title="BDU:2023-00609" />
			<reference href="https://bdu.fstec.ru/vul/2023-00499" type="self" id="BDU:2023-00499" title="BDU:2023-00499" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="git" epoch="0" version="2.30.8" release="1.el7" arch="x86_64" src="">
					<filename>git-0:2.30.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230418-04</id>
		<issued date="2023-04-18" />
		<updated date="2023-04-18" />
		<title>Уязвимость pki-core </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в pki-ca</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pki-core-cve-2022-2414/</description>
               <solution>
                    Запретить использование в ОС пакета pki-ca
                или
                    Установить обновление для пакета(ов) pki-ca
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pki-core-cve-2022-2414/" type="self" id="ROS-20230418-04" title="ROS-20230418-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2414" type="cve" id="CVE-2022-2414" title="CVE-2022-2414" />
			<reference href="https://bdu.fstec.ru/vul/2022-05089" type="self" id="BDU:2022-05089" title="BDU:2022-05089" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pki-ca" epoch="0" version="10.10.5" release="3.el7" arch="noarch" src="">
					<filename>pki-ca-0:10.10.5-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230418-05</id>
		<issued date="2023-04-18" />
		<updated date="2023-07-11" />
		<title>Множественные уязвимости OpenSSL </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в openssl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-openssl-cve-2022-4304-cve-2022-4450-cve-2023-0286/</description>
               <solution>
                    Запретить использование в ОС пакета OpenSSL 
                или
                    Установить обновление для пакета(ов) OpenSSL 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-openssl-cve-2022-4304-cve-2022-4450-cve-2023-0286/" type="self" id="ROS-20230418-05" title="ROS-20230418-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4304" type="cve" id="CVE-2022-4304" title="CVE-2022-4304" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4450" type="cve" id="CVE-2022-4450" title="CVE-2022-4450" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0286" type="cve" id="CVE-2023-0286" title="CVE-2023-0286" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0401" type="cve" id="CVE-2023-0401" title="CVE-2023-0401" />
			<reference href="https://bdu.fstec.ru/vul/2023-02240" type="self" id="BDU:2023-02240" title="BDU:2023-02240" />
			<reference href="https://bdu.fstec.ru/vul/2023-00665" type="self" id="BDU:2023-00665" title="BDU:2023-00665" />
			<reference href="https://bdu.fstec.ru/vul/2023-02238" type="self" id="BDU:2023-02238" title="BDU:2023-02238" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl" epoch="1" version="1.1.1q" release="2.el7.3" arch="x86_64" src="">
					<filename>openssl-1:1.1.1q-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230419-01</id>
		<issued date="2023-04-19" />
		<updated date="2023-04-19" />
		<title>Множественные уязвимости ClamAV</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в clamav</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-clamav-cve-2023-20032-cve-2023-20052/</description>
               <solution>
                    Запретить использование в ОС пакета ClamAV
                или
                    Установить обновление для пакета(ов) ClamAV
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-clamav-cve-2023-20032-cve-2023-20052/" type="self" id="ROS-20230419-01" title="ROS-20230419-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20032" type="cve" id="CVE-2023-20032" title="CVE-2023-20032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20052" type="cve" id="CVE-2023-20052" title="CVE-2023-20052" />
			<reference href="https://bdu.fstec.ru/vul/2023-00757" type="self" id="BDU:2023-00757" title="BDU:2023-00757" />
			<reference href="https://bdu.fstec.ru/vul/2023-02206" type="self" id="BDU:2023-02206" title="BDU:2023-02206" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="clamav" epoch="0" version="0.103.8" release="1.el7.3" arch="x86_64" src="">
					<filename>clamav-0:0.103.8-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230419-02</id>
		<issued date="2023-04-19" />
		<updated date="2023-04-19" />
		<title>Уязвимость dnsmasq  </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dnsmasq</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dnsmasq-cve-2023-28450/</description>
               <solution>
                    Запретить использование в ОС пакета Dnsmasq
                или
                    Установить обновление для пакета(ов) Dnsmasq
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dnsmasq-cve-2023-28450/" type="self" id="ROS-20230419-02" title="ROS-20230419-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28450" type="cve" id="CVE-2023-28450" title="CVE-2023-28450" />
			<reference href="https://bdu.fstec.ru/vul/2023-02265" type="self" id="BDU:2023-02265" title="BDU:2023-02265" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dnsmasq" epoch="0" version="2.85" release="5.el7" arch="x86_64" src="">
					<filename>dnsmasq-0:2.85-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230419-03</id>
		<issued date="2023-04-19" />
		<updated date="2023-04-19" />
		<title>Уязвимость X.Org </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в xorg-x11-server-common</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-x-org-cve-2023-1393/</description>
               <solution>
                    Запретить использование в ОС пакета X.Org Server 
                или
                    Установить обновление для пакета(ов) X.Org Server 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-x-org-cve-2023-1393/" type="self" id="ROS-20230419-03" title="ROS-20230419-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1393" type="cve" id="CVE-2023-1393" title="CVE-2023-1393" />
			<reference href="https://bdu.fstec.ru/vul/2023-02146" type="self" id="BDU:2023-02146" title="BDU:2023-02146" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="xorg-x11-server-common" epoch="0" version="1.20.14" release="6.el7.3" arch="x86_64" src="">
					<filename>xorg-x11-server-common-0:1.20.14-6.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230420-01</id>
		<issued date="2023-04-20" />
		<updated date="2023-04-20" />
		<title>Множественные уязвимости Apache httpd </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в httpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-apache-httpd-cve-2023-27522-cve-2023-25690/</description>
               <solution>
                    Запретить использование в ОС пакета httpd
                или
                    Установить обновление для пакета(ов) httpd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-apache-httpd-cve-2023-27522-cve-2023-25690/" type="self" id="ROS-20230420-01" title="ROS-20230420-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27522" type="cve" id="CVE-2023-27522" title="CVE-2023-27522" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25690" type="cve" id="CVE-2023-25690" title="CVE-2023-25690" />
			<reference href="https://bdu.fstec.ru/vul/2023-02021" type="self" id="BDU:2023-02021" title="BDU:2023-02021" />
			<reference href="https://bdu.fstec.ru/vul/2023-01738" type="self" id="BDU:2023-01738" title="BDU:2023-01738" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="httpd" epoch="0" version="2.4.56" release="2.el7" arch="x86_64" src="">
					<filename>httpd-0:2.4.56-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230420-02</id>
		<issued date="2023-04-20" />
		<updated date="2023-04-20" />
		<title>Уязвимость glibc </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в glibc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glibc-cve-2021-3326/</description>
               <solution>
                    Запретить использование в ОС пакета glibc
                или
                    Установить обновление для пакета(ов) glibc
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glibc-cve-2021-3326/" type="self" id="ROS-20230420-02" title="ROS-20230420-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326" type="cve" id="CVE-2021-3326" title="CVE-2021-3326" />
			<reference href="https://bdu.fstec.ru/vul/2022-07362" type="self" id="BDU:2022-07362" title="BDU:2022-07362" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glibc" epoch="0" version="2.28" release="8.el7" arch="x86_64" src="">
					<filename>glibc-0:2.28-8.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230420-03</id>
		<issued date="2023-04-20" />
		<updated date="2023-04-20" />
		<title>Множественные уязвимости firefox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-cve-2023-25751-cve-2023-28164-cve-2023-28162-cve-2023-25752-cve-2/</description>
               <solution>
                    Запретить использование в ОС пакета firefox
                или
                    Установить обновление для пакета(ов) firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-cve-2023-25751-cve-2023-28164-cve-2023-28162-cve-2023-25752-cve-2/" type="self" id="ROS-20230420-03" title="ROS-20230420-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25751" type="cve" id="CVE-2023-25751" title="CVE-2023-25751" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28164" type="cve" id="CVE-2023-28164" title="CVE-2023-28164" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28162" type="cve" id="CVE-2023-28162" title="CVE-2023-28162" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25752" type="cve" id="CVE-2023-25752" title="CVE-2023-25752" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28163" type="cve" id="CVE-2023-28163" title="CVE-2023-28163" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28176" type="cve" id="CVE-2023-28176" title="CVE-2023-28176" />
			<reference href="https://bdu.fstec.ru/vul/2023-01561" type="self" id="BDU:2023-01561" title="BDU:2023-01561" />
			<reference href="https://bdu.fstec.ru/vul/2023-01562" type="self" id="BDU:2023-01562" title="BDU:2023-01562" />
			<reference href="https://bdu.fstec.ru/vul/2023-01563" type="self" id="BDU:2023-01563" title="BDU:2023-01563" />
			<reference href="https://bdu.fstec.ru/vul/2023-01558" type="self" id="BDU:2023-01558" title="BDU:2023-01558" />
			<reference href="https://bdu.fstec.ru/vul/2023-01803" type="self" id="BDU:2023-01803" title="BDU:2023-01803" />
			<reference href="https://bdu.fstec.ru/vul/2023-01560" type="self" id="BDU:2023-01560" title="BDU:2023-01560" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="102.9.0" release="1.el7.3" arch="x86_64" src="">
					<filename>firefox-0:102.9.0-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230420-04</id>
		<issued date="2023-04-20" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости thunderbird </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-cve-2023-25751-cve-2023-28164-cve-2023-28162-cve-2023-25752-c/</description>
               <solution>
                    Запретить использование в ОС пакета thunderbird
                или
                    Установить обновление для пакета(ов) thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-cve-2023-25751-cve-2023-28164-cve-2023-28162-cve-2023-25752-c/" type="self" id="ROS-20230420-04" title="ROS-20230420-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25751" type="cve" id="CVE-2023-25751" title="CVE-2023-25751" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28164" type="cve" id="CVE-2023-28164" title="CVE-2023-28164" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28162" type="cve" id="CVE-2023-28162" title="CVE-2023-28162" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25752" type="cve" id="CVE-2023-25752" title="CVE-2023-25752" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28163" type="cve" id="CVE-2023-28163" title="CVE-2023-28163" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28176" type="cve" id="CVE-2023-28176" title="CVE-2023-28176" />
			<reference href="https://bdu.fstec.ru/vul/2023-01561" type="self" id="BDU:2023-01561" title="BDU:2023-01561" />
			<reference href="https://bdu.fstec.ru/vul/2023-01562" type="self" id="BDU:2023-01562" title="BDU:2023-01562" />
			<reference href="https://bdu.fstec.ru/vul/2023-01563" type="self" id="BDU:2023-01563" title="BDU:2023-01563" />
			<reference href="https://bdu.fstec.ru/vul/2023-01558" type="self" id="BDU:2023-01558" title="BDU:2023-01558" />
			<reference href="https://bdu.fstec.ru/vul/2023-01803" type="self" id="BDU:2023-01803" title="BDU:2023-01803" />
			<reference href="https://bdu.fstec.ru/vul/2023-01560" type="self" id="BDU:2023-01560" title="BDU:2023-01560" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="102.9.0" release="1.el7.3" arch="x86_64" src="">
					<filename>thunderbird-0:102.9.0-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230428-01</id>
		<issued date="2023-04-28" />
		<updated date="2023-04-28" />
		<title>Уязвимость python-future </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-future</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-future-cve-2022-40899/</description>
               <solution>
                    Запретить использование в ОС пакета python3-future 
                или
                    Установить обновление для пакета(ов) python3-future 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-future-cve-2022-40899/" type="self" id="ROS-20230428-01" title="ROS-20230428-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40899" type="cve" id="CVE-2022-40899" title="CVE-2022-40899" />
			<reference href="https://bdu.fstec.ru/vul/2023-02446" type="self" id="BDU:2023-02446" title="BDU:2023-02446" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-future" epoch="0" version="0.18.3" release="1.el7" arch="noarch" src="">
					<filename>python3-future-0:0.18.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230428-02</id>
		<issued date="2023-04-28" />
		<updated date="2023-04-28" />
		<title>Уязвимость python-mako</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-mako</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-mako-cve-2022-40023/</description>
               <solution>
                    Запретить использование в ОС пакета python3-mako 
                или
                    Установить обновление для пакета(ов) python3-mako 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-mako-cve-2022-40023/" type="self" id="ROS-20230428-02" title="ROS-20230428-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40023" type="cve" id="CVE-2022-40023" title="CVE-2022-40023" />
			<reference href="https://bdu.fstec.ru/vul/2023-02444" type="self" id="BDU:2023-02444" title="BDU:2023-02444" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-mako" epoch="0" version="1.1.3" release="3.el7" arch="noarch" src="">
					<filename>python3-mako-0:1.1.3-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230428-04</id>
		<issued date="2023-04-28" />
		<updated date="2023-04-28" />
		<title>Множественные уязвимости python-pillow </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в python3-pillow</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python-pillow-cve-2022-30595-cve-2022-45199-cve-2022-45198/</description>
               <solution>
                    Запретить использование в ОС пакета python3-pillow
                или
                    Установить обновление для пакета(ов) python3-pillow
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python-pillow-cve-2022-30595-cve-2022-45199-cve-2022-45198/" type="self" id="ROS-20230428-04" title="ROS-20230428-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3059" type="cve" id="CVE-2022-3059" title="CVE-2022-3059" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45199" type="cve" id="CVE-2022-45199" title="CVE-2022-45199" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45198" type="cve" id="CVE-2022-45198" title="CVE-2022-45198" />
			<reference href="https://bdu.fstec.ru/vul/2022-04237" type="self" id="BDU:2022-04237" title="BDU:2022-04237" />
			<reference href="https://bdu.fstec.ru/vul/2023-02448" type="self" id="BDU:2023-02448" title="BDU:2023-02448" />
			<reference href="https://bdu.fstec.ru/vul/2023-02447" type="self" id="BDU:2023-02447" title="BDU:2023-02447" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-pillow" epoch="0" version="9.4.0" release="1.el7" arch="x86_64" src="">
					<filename>python3-pillow-0:9.4.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230428-05</id>
		<issued date="2023-04-28" />
		<updated date="2023-04-28" />
		<title>Уязвимость python-setuptools </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-setuptools</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-setuptools-cve-2022-40897/</description>
               <solution>
                    Запретить использование в ОС пакета python3-setuptools 
                или
                    Установить обновление для пакета(ов) python3-setuptools 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-setuptools-cve-2022-40897/" type="self" id="ROS-20230428-05" title="ROS-20230428-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40897" type="cve" id="CVE-2022-40897" title="CVE-2022-40897" />
			<reference href="https://bdu.fstec.ru/vul/2023-02445" type="self" id="BDU:2023-02445" title="BDU:2023-02445" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-setuptools" epoch="0" version="41.2.1" release="7.el7" arch="noarch" src="">
					<filename>python3-setuptools-0:41.2.1-7.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230505-01</id>
		<issued date="2023-05-05" />
		<updated date="2023-05-05" />
		<title>Множественные уязвимости thunderbird </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-cve-2023-0547-cve-2023-1945-cve-2023-29479-cve-2023-29531-cve/</description>
               <solution>
                    Запретить использование в ОС пакета Thunderbird
                или
                    Установить обновление для пакета(ов) Thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-cve-2023-0547-cve-2023-1945-cve-2023-29479-cve-2023-29531-cve/" type="self" id="ROS-20230505-01" title="ROS-20230505-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0547" type="cve" id="CVE-2023-0547" title="CVE-2023-0547" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1945" type="cve" id="CVE-2023-1945" title="CVE-2023-1945" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29479" type="cve" id="CVE-2023-29479" title="CVE-2023-29479" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29531" type="cve" id="CVE-2023-29531" title="CVE-2023-29531" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29532" type="cve" id="CVE-2023-29532" title="CVE-2023-29532" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29533" type="cve" id="CVE-2023-29533" title="CVE-2023-29533" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29535" type="cve" id="CVE-2023-29535" title="CVE-2023-29535" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29536" type="cve" id="CVE-2023-29536" title="CVE-2023-29536" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29539" type="cve" id="CVE-2023-29539" title="CVE-2023-29539" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29541" type="cve" id="CVE-2023-29541" title="CVE-2023-29541" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29542" type="cve" id="CVE-2023-29542" title="CVE-2023-29542" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29545" type="cve" id="CVE-2023-29545" title="CVE-2023-29545" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29548" type="cve" id="CVE-2023-29548" title="CVE-2023-29548" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29550" type="cve" id="CVE-2023-29550" title="CVE-2023-29550" />
			<reference href="https://bdu.fstec.ru/vul/2023-02698" type="self" id="BDU:2023-02698" title="BDU:2023-02698" />
			<reference href="https://bdu.fstec.ru/vul/2023-02697" type="self" id="BDU:2023-02697" title="BDU:2023-02697" />
			<reference href="https://bdu.fstec.ru/vul/2023-02696" type="self" id="BDU:2023-02696" title="BDU:2023-02696" />
			<reference href="https://bdu.fstec.ru/vul/2023-02695" type="self" id="BDU:2023-02695" title="BDU:2023-02695" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="102.10.0" release="1.el7.3" arch="x86_64" src="">
					<filename>thunderbird-0:102.10.0-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230505-02</id>
		<issued date="2023-05-05" />
		<updated date="2023-05-05" />
		<title>Множественные уязвимости firefox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-cve-2023-1945-cve-2023-29531-cve-2023-29532-cve-2023-29533-cve-20/</description>
               <solution>
                    Запретить использование в ОС пакета firefox
                или
                    Установить обновление для пакета(ов) firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-cve-2023-1945-cve-2023-29531-cve-2023-29532-cve-2023-29533-cve-20/" type="self" id="ROS-20230505-02" title="ROS-20230505-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1945" type="cve" id="CVE-2023-1945" title="CVE-2023-1945" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29531" type="cve" id="CVE-2023-29531" title="CVE-2023-29531" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29532" type="cve" id="CVE-2023-29532" title="CVE-2023-29532" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29533" type="cve" id="CVE-2023-29533" title="CVE-2023-29533" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29535" type="cve" id="CVE-2023-29535" title="CVE-2023-29535" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29536" type="cve" id="CVE-2023-29536" title="CVE-2023-29536" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29539" type="cve" id="CVE-2023-29539" title="CVE-2023-29539" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29541" type="cve" id="CVE-2023-29541" title="CVE-2023-29541" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29542" type="cve" id="CVE-2023-29542" title="CVE-2023-29542" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29545" type="cve" id="CVE-2023-29545" title="CVE-2023-29545" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29548" type="cve" id="CVE-2023-29548" title="CVE-2023-29548" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29550" type="cve" id="CVE-2023-29550" title="CVE-2023-29550" />
			<reference href="https://bdu.fstec.ru/vul/2023-02697" type="self" id="BDU:2023-02697" title="BDU:2023-02697" />
			<reference href="https://bdu.fstec.ru/vul/2023-02695" type="self" id="BDU:2023-02695" title="BDU:2023-02695" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="102.10.0" release="1.el7.3" arch="x86_64" src="">
					<filename>firefox-0:102.10.0-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230504-03</id>
		<issued date="2023-05-05" />
		<updated date="2023-05-05" />
		<title>Уязвимость nodejs-minimatch </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nodejs-minimatch</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-minimatch-cve-2022-3517/</description>
               <solution>
                    Запретить использование в ОС пакета nodejs-minimatch 
                или
                    Установить обновление для пакета(ов) nodejs-minimatch 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-minimatch-cve-2022-3517/" type="self" id="ROS-20230504-03" title="ROS-20230504-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3517" type="cve" id="CVE-2022-3517" title="CVE-2022-3517" />
			<reference href="https://bdu.fstec.ru/vul/2023-02699" type="self" id="BDU:2023-02699" title="BDU:2023-02699" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs-minimatch" epoch="0" version="3.0.5" release="1.el7" arch="noarch" src="">
					<filename>nodejs-minimatch-0:3.0.5-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230615-01</id>
		<issued date="2023-06-15" />
		<updated date="2023-06-15" />
		<title>Уязвимость LibRaw </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в LibRaw</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libraw-cve-2023-1729/</description>
               <solution>
                    Запретить использование в ОС пакета LibRaw 
                или
                    Установить обновление для пакета(ов) LibRaw 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libraw-cve-2023-1729/" type="self" id="ROS-20230615-01" title="ROS-20230615-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1729" type="cve" id="CVE-2023-1729" title="CVE-2023-1729" />
			<reference href="https://bdu.fstec.ru/vul/2023-03406" type="self" id="BDU:2023-03406" title="BDU:2023-03406" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="LibRaw" epoch="0" version="0.19.5" release="6.el7" arch="x86_64" src="">
					<filename>LibRaw-0:0.19.5-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230615-02</id>
		<issued date="2023-06-15" />
		<updated date="2023-06-15" />
		<title>Уязвимость OpenSearch </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в opensearch</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opensearch-cve-2023-31141/</description>
               <solution>
                    Запретить использование в ОС пакета OpenSearch
                или
                    Установить обновление для пакета(ов) OpenSearch
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opensearch-cve-2023-31141/" type="self" id="ROS-20230615-02" title="ROS-20230615-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31141" type="cve" id="CVE-2023-31141" title="CVE-2023-31141" />
			<reference href="https://bdu.fstec.ru/vul/2023-03424" type="self" id="BDU:2023-03424" title="BDU:2023-03424" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="opensearch" epoch="0" version="2.7.0" release="1" arch="x86_64" src="">
					<filename>opensearch-0:2.7.0-1.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230615-03</id>
		<issued date="2023-06-15" />
		<updated date="2023-06-15" />
		<title>Уязвимость libheif </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libheif</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libheif-cve-2023-29659/</description>
               <solution>
                    Запретить использование в ОС пакета Libheif 
                или
                    Установить обновление для пакета(ов) Libheif 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libheif-cve-2023-29659/" type="self" id="ROS-20230615-03" title="ROS-20230615-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29659" type="cve" id="CVE-2023-29659" title="CVE-2023-29659" />
			<reference href="https://bdu.fstec.ru/vul/2023-03407" type="self" id="BDU:2023-03407" title="BDU:2023-03407" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libheif" epoch="0" version="1.13.0" release="3.el7" arch="x86_64" src="">
					<filename>libheif-0:1.13.0-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230615-04</id>
		<issued date="2023-06-15" />
		<updated date="2023-06-15" />
		<title>Множественные уязвимости Firefox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-cve-2023-34414-cve-2023-34416/</description>
               <solution>
                    Запретить использование в ОС пакета Mozilla Firefox 
                или
                    Установить обновление для пакета(ов) Mozilla Firefox 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-cve-2023-34414-cve-2023-34416/" type="self" id="ROS-20230615-04" title="ROS-20230615-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34414" type="cve" id="CVE-2023-34414" title="CVE-2023-34414" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34416" type="cve" id="CVE-2023-34416" title="CVE-2023-34416" />
			<reference href="https://bdu.fstec.ru/vul/2023-03125" type="self" id="BDU:2023-03125" title="BDU:2023-03125" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="102.12.0" release="1.el7.3" arch="x86_64" src="">
					<filename>firefox-0:102.12.0-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230615-05</id>
		<issued date="2023-06-15" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости Thunderbird </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-cve-2023-34414-cve-2023-34416/</description>
               <solution>
                    Запретить использование в ОС пакета Thunderbird 
                или
                    Установить обновление для пакета(ов) Thunderbird 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-cve-2023-34414-cve-2023-34416/" type="self" id="ROS-20230615-05" title="ROS-20230615-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34414" type="cve" id="CVE-2023-34414" title="CVE-2023-34414" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34416" type="cve" id="CVE-2023-34416" title="CVE-2023-34416" />
			<reference href="https://bdu.fstec.ru/vul/2023-03125" type="self" id="BDU:2023-03125" title="BDU:2023-03125" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="102.12.0" release="1.el7.3" arch="x86_64" src="">
					<filename>thunderbird-0:102.12.0-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230616-01</id>
		<issued date="2023-06-16" />
		<updated date="2023-06-16" />
		<title>Уязвимость nodejs </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nodejs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-cve-2022-29244/</description>
               <solution>
                    Запретить использование в ОС пакета npm
                или
                    Установить обновление для пакета(ов) npm
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-cve-2022-29244/" type="self" id="ROS-20230616-01" title="ROS-20230616-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29244" type="cve" id="CVE-2022-29244" title="CVE-2022-29244" />
			<reference href="https://bdu.fstec.ru/vul/2023-03309" type="self" id="BDU:2023-03309" title="BDU:2023-03309" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs" epoch="1" version="16.15.1" release="1.el7" arch="x86_64" src="">
					<filename>nodejs-1:16.15.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230616-08</id>
		<issued date="2023-06-16" />
		<updated date="2024-12-23" />
		<title>Уязвимость libuv </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libuv</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libuv-cve-2022-29244/</description>
               <solution>
                    Запретить использование в ОС пакета npm
                или
                    Установить обновление для пакета(ов) npm
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libuv-cve-2022-29244/" type="self" id="ROS-20230616-08" title="ROS-20230616-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29244" type="cve" id="CVE-2022-29244" title="CVE-2022-29244" />
			<reference href="https://bdu.fstec.ru/vul/2023-03309" type="self" id="BDU:2023-03309" title="BDU:2023-03309" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libuv" epoch="1" version="1.44.2" release="1.el7" arch="x86_64" src="">
					<filename>libuv-1:1.44.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230616-02</id>
		<issued date="2023-06-16" />
		<updated date="2023-06-16" />
		<title>Уязвимость FFmpeg </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ffmpeg</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ffmpeg-cve-2022-48434/</description>
               <solution>
                    Запретить использование в ОС пакета ffmpeg
                или
                    Установить обновление для пакета(ов) ffmpeg
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ffmpeg-cve-2022-48434/" type="self" id="ROS-20230616-02" title="ROS-20230616-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48434" type="cve" id="CVE-2022-48434" title="CVE-2022-48434" />
			<reference href="https://bdu.fstec.ru/vul/2023-02925" type="self" id="BDU:2023-02925" title="BDU:2023-02925" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ffmpeg" epoch="0" version="4.0" release="5.el7" arch="x86_64" src="">
					<filename>ffmpeg-0:4.0-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230616-03</id>
		<issued date="2023-06-16" />
		<updated date="2023-06-16" />
		<title>Уязвимость vim </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в vim-X11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-cve-2023-2426/</description>
               <solution>
                    Запретить использование в ОС пакета Vim
                или
                    Установить обновление для пакета(ов) Vim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-cve-2023-2426/" type="self" id="ROS-20230616-03" title="ROS-20230616-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2426" type="cve" id="CVE-2023-2426" title="CVE-2023-2426" />
			<reference href="https://bdu.fstec.ru/vul/2023-03777" type="self" id="BDU:2023-03777" title="BDU:2023-03777" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-X11" epoch="2" version="9.0.1504" release="1.el7.3" arch="x86_64" src="">
					<filename>vim-X11-2:9.0.1504-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230616-04</id>
		<issued date="2023-06-16" />
		<updated date="2023-06-16" />
		<title>Множественные уязвимости libxml2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libxml2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libxml2-cve-2023-29469-cve-2023-28484/</description>
               <solution>
                    Запретить использование в ОС пакета libxml2
                или
                    Установить обновление для пакета(ов) libxml2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libxml2-cve-2023-29469-cve-2023-28484/" type="self" id="ROS-20230616-04" title="ROS-20230616-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29469" type="cve" id="CVE-2023-29469" title="CVE-2023-29469" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28484" type="cve" id="CVE-2023-28484" title="CVE-2023-28484" />
			<reference href="https://bdu.fstec.ru/vul/2023-03302" type="self" id="BDU:2023-03302" title="BDU:2023-03302" />
			<reference href="https://bdu.fstec.ru/vul/2023-03298" type="self" id="BDU:2023-03298" title="BDU:2023-03298" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libxml2" epoch="0" version="2.9.8" release="13.el7.3" arch="x86_64" src="">
					<filename>libxml2-0:2.9.8-13.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230616-05</id>
		<issued date="2023-06-16" />
		<updated date="2023-06-16" />
		<title>Уязвимость python3-flask </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-flask</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-flask-cve-2023-30861/</description>
               <solution>
                    Запретить использование в ОС пакета python3-flask
                или
                    Установить обновление для пакета(ов) python3-flask
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-flask-cve-2023-30861/" type="self" id="ROS-20230616-05" title="ROS-20230616-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30861" type="cve" id="CVE-2023-30861" title="CVE-2023-30861" />
			<reference href="https://bdu.fstec.ru/vul/2023-02381" type="self" id="BDU:2023-02381" title="BDU:2023-02381" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-flask" epoch="1" version="2.1.0" release="2.el7" arch="noarch" src="">
					<filename>python3-flask-1:2.1.0-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230616-06</id>
		<issued date="2023-06-16" />
		<updated date="2023-06-16" />
		<title>Уязвимость Nextcloud Mail </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nextcloud-app-mail</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nextcloud-mail-cve-2023-33184/</description>
               <solution>
                    Запретить использование в ОС пакета Nextcloud Mail
                или
                    Установить обновление для пакета(ов) Nextcloud Mail
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nextcloud-mail-cve-2023-33184/" type="self" id="ROS-20230616-06" title="ROS-20230616-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33184" type="cve" id="CVE-2023-33184" title="CVE-2023-33184" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nextcloud-app-mail" epoch="0" version="1.10.0" release="1.el7" arch="noarch" src="">
					<filename>nextcloud-app-mail-0:1.10.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230616-07</id>
		<issued date="2023-06-16" />
		<updated date="2023-06-16" />
		<title>Уязвимость vim </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в vim-X11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-cve-2023-2609/</description>
               <solution>
                    Запретить использование в ОС пакета Vim
                или
                    Установить обновление для пакета(ов) Vim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-cve-2023-2609/" type="self" id="ROS-20230616-07" title="ROS-20230616-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2609" type="cve" id="CVE-2023-2609" title="CVE-2023-2609" />
			<reference href="https://bdu.fstec.ru/vul/2023-07669" type="self" id="BDU:2023-07669" title="BDU:2023-07669" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-X11" epoch="2" version="9.0.1536" release="1.el7.3" arch="x86_64" src="">
					<filename>vim-X11-2:9.0.1536-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230619-01</id>
		<issued date="2023-06-19" />
		<updated date="2023-06-19" />
		<title>Множественные уязвимости GLPI </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-glpi-cve-2023-28855-cve-2023-28852-cve-2023-28849-cve-2023-28838-cve-2023/</description>
               <solution>
                    Запретить использование в ОС пакета GLPI
                или
                    Установить обновление для пакета(ов) GLPI
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-glpi-cve-2023-28855-cve-2023-28852-cve-2023-28849-cve-2023-28838-cve-2023/" type="self" id="ROS-20230619-01" title="ROS-20230619-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28855" type="cve" id="CVE-2023-28855" title="CVE-2023-28855" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28852" type="cve" id="CVE-2023-28852" title="CVE-2023-28852" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28849" type="cve" id="CVE-2023-28849" title="CVE-2023-28849" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28838" type="cve" id="CVE-2023-28838" title="CVE-2023-28838" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28639" type="cve" id="CVE-2023-28639" title="CVE-2023-28639" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28636" type="cve" id="CVE-2023-28636" title="CVE-2023-28636" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28634" type="cve" id="CVE-2023-28634" title="CVE-2023-28634" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28633" type="cve" id="CVE-2023-28633" title="CVE-2023-28633" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28632" type="cve" id="CVE-2023-28632" title="CVE-2023-28632" />
			<reference href="https://bdu.fstec.ru/vul/2023-03415" type="self" id="BDU:2023-03415" title="BDU:2023-03415" />
			<reference href="https://bdu.fstec.ru/vul/2023-03389" type="self" id="BDU:2023-03389" title="BDU:2023-03389" />
			<reference href="https://bdu.fstec.ru/vul/2023-03386" type="self" id="BDU:2023-03386" title="BDU:2023-03386" />
			<reference href="https://bdu.fstec.ru/vul/2023-03387" type="self" id="BDU:2023-03387" title="BDU:2023-03387" />
			<reference href="https://bdu.fstec.ru/vul/2023-03385" type="self" id="BDU:2023-03385" title="BDU:2023-03385" />
			<reference href="https://bdu.fstec.ru/vul/2023-03388" type="self" id="BDU:2023-03388" title="BDU:2023-03388" />
			<reference href="https://bdu.fstec.ru/vul/2023-03380" type="self" id="BDU:2023-03380" title="BDU:2023-03380" />
			<reference href="https://bdu.fstec.ru/vul/2023-03382" type="self" id="BDU:2023-03382" title="BDU:2023-03382" />
			<reference href="https://bdu.fstec.ru/vul/2023-03381" type="self" id="BDU:2023-03381" title="BDU:2023-03381" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi" epoch="0" version="9.5.13" release="1.el7" arch="noarch" src="">
					<filename>glpi-0:9.5.13-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230619-02</id>
		<issued date="2023-06-19" />
		<updated date="2023-06-19" />
		<title>Уязвимость Redis </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в redis</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-redis-cve-2023-28856/</description>
               <solution>
                    Запретить использование в ОС пакета Redis
                или
                    Установить обновление для пакета(ов) Redis
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-redis-cve-2023-28856/" type="self" id="ROS-20230619-02" title="ROS-20230619-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28856" type="cve" id="CVE-2023-28856" title="CVE-2023-28856" />
			<reference href="https://bdu.fstec.ru/vul/2023-03722" type="self" id="BDU:2023-03722" title="BDU:2023-03722" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="redis" epoch="0" version="7.0.5" release="7.el7.3" arch="x86_64" src="">
					<filename>redis-0:7.0.5-7.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230619-03</id>
		<issued date="2023-06-19" />
		<updated date="2023-06-19" />
		<title>Уязвимость python-certifi </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ca-certificates</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-certifi-cve-2022-23491/</description>
               <solution>
                    Запретить использование в ОС пакета ca-certificates
                или
                    Установить обновление для пакета(ов) ca-certificates
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-certifi-cve-2022-23491/" type="self" id="ROS-20230619-03" title="ROS-20230619-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23491" type="cve" id="CVE-2022-23491" title="CVE-2022-23491" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ca-certificates" epoch="0" version="2021.2.50" release="4.el7.3" arch="noarch" src="">
					<filename>ca-certificates-0:2021.2.50-4.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230619-04</id>
		<issued date="2023-06-19" />
		<updated date="2023-06-19" />
		<title>Уязвимость OpenSSL </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openssl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl-cve-2023-0465/</description>
               <solution>
                    Запретить использование в ОС пакета OpenSSL 
                или
                    Установить обновление для пакета(ов) OpenSSL 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl-cve-2023-0465/" type="self" id="ROS-20230619-04" title="ROS-20230619-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0465" type="cve" id="CVE-2023-0465" title="CVE-2023-0465" />
			<reference href="https://bdu.fstec.ru/vul/2023-03312" type="self" id="BDU:2023-03312" title="BDU:2023-03312" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl" epoch="1" version="1.1.1q" release="4.el7.3" arch="x86_64" src="">
					<filename>openssl-1:1.1.1q-4.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230619-05</id>
		<issued date="2023-06-19" />
		<updated date="2023-06-19" />
		<title>Множественные уязвимости python-pip </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-pip</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python-pip-cve-2019-20916-cve-2021-3572/</description>
               <solution>
                    Запретить использование в ОС пакета python3-pip
                или
                    Установить обновление для пакета(ов) python3-pip
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python-pip-cve-2019-20916-cve-2021-3572/" type="self" id="ROS-20230619-05" title="ROS-20230619-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20916" type="cve" id="CVE-2019-20916" title="CVE-2019-20916" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3572" type="cve" id="CVE-2021-3572" title="CVE-2021-3572" />
			<reference href="https://bdu.fstec.ru/vul/2021-03750" type="self" id="BDU:2021-03750" title="BDU:2021-03750" />
			<reference href="https://bdu.fstec.ru/vul/2023-03310" type="self" id="BDU:2023-03310" title="BDU:2023-03310" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-pip" epoch="0" version="19.1.1" release="3.el7" arch="noarch" src="">
					<filename>python3-pip-0:19.1.1-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230619-06</id>
		<issued date="2023-06-19" />
		<updated date="2023-06-19" />
		<title>Уязвимость protobuf-c </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в protobuf-c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-protobuf-c-cve-2022-48468/</description>
               <solution>
                    Запретить использование в ОС пакета protobuf-c
                или
                    Установить обновление для пакета(ов) protobuf-c
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-protobuf-c-cve-2022-48468/" type="self" id="ROS-20230619-06" title="ROS-20230619-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48468" type="cve" id="CVE-2022-48468" title="CVE-2022-48468" />
			<reference href="https://bdu.fstec.ru/vul/2023-03313" type="self" id="BDU:2023-03313" title="BDU:2023-03313" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="protobuf-c" epoch="0" version="1.4.0" release="2.el7" arch="x86_64" src="">
					<filename>protobuf-c-0:1.4.0-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230619-07</id>
		<issued date="2023-06-19" />
		<updated date="2023-06-19" />
		<title>Уязвимость cups-filters </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в cups-filters</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cups-filters-cve-2023-24805/</description>
               <solution>
                    Запретить использование в ОС пакета cups-filters
                или
                    Установить обновление для пакета(ов) cups-filters
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cups-filters-cve-2023-24805/" type="self" id="ROS-20230619-07" title="ROS-20230619-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24805" type="cve" id="CVE-2023-24805" title="CVE-2023-24805" />
			<reference href="https://bdu.fstec.ru/vul/2023-02781" type="self" id="BDU:2023-02781" title="BDU:2023-02781" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cups-filters" epoch="0" version="1.28.13" release="4.el7" arch="x86_64" src="">
					<filename>cups-filters-0:1.28.13-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230620-01</id>
		<issued date="2023-06-20" />
		<updated date="2023-06-20" />
		<title>Уязвимость FFmpeg </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в ffmpeg</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ffmpeg-cve-2022-3341/</description>
               <solution>
                    Запретить использование в ОС пакета Ffmpeg
                или
                    Установить обновление для пакета(ов) Ffmpeg
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ffmpeg-cve-2022-3341/" type="self" id="ROS-20230620-01" title="ROS-20230620-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3341" type="cve" id="CVE-2022-3341" title="CVE-2022-3341" />
			<reference href="https://bdu.fstec.ru/vul/2023-03348" type="self" id="BDU:2023-03348" title="BDU:2023-03348" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ffmpeg" epoch="0" version="4.0" release="6.el7" arch="x86_64" src="">
					<filename>ffmpeg-0:4.0-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230620-02</id>
		<issued date="2023-06-20" />
		<updated date="2023-06-20" />
		<title>Уязвимость Freeimage </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в freeimage</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-freeimage-cve-2021-33367/</description>
               <solution>
                    Запретить использование в ОС пакета FreeImage
                или
                    Установить обновление для пакета(ов) FreeImage
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-freeimage-cve-2021-33367/" type="self" id="ROS-20230620-02" title="ROS-20230620-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33367" type="cve" id="CVE-2021-33367" title="CVE-2021-33367" />
			<reference href="https://bdu.fstec.ru/vul/2023-03346" type="self" id="BDU:2023-03346" title="BDU:2023-03346" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="freeimage" epoch="0" version="3.18.0" release="2.el7" arch="x86_64" src="">
					<filename>freeimage-0:3.18.0-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230620-03</id>
		<issued date="2023-06-20" />
		<updated date="2023-06-20" />
		<title>Уязвимость HAProxy </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в haproxy</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-haproxy-cve-2023-25725/</description>
               <solution>
                    Запретить использование в ОС пакета haproxy
                или
                    Установить обновление для пакета(ов) haproxy
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-haproxy-cve-2023-25725/" type="self" id="ROS-20230620-03" title="ROS-20230620-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25725" type="cve" id="CVE-2023-25725" title="CVE-2023-25725" />
			<reference href="https://bdu.fstec.ru/vul/2023-00758" type="self" id="BDU:2023-00758" title="BDU:2023-00758" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="haproxy" epoch="0" version="2.6.11" release="1.el7" arch="x86_64" src="">
					<filename>haproxy-0:2.6.11-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230620-04</id>
		<issued date="2023-06-20" />
		<updated date="2023-06-20" />
		<title>Множественные уязвимости Wireshark </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в wireshark</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-wireshark-cve-2023-1993-cve-2023-1992/</description>
               <solution>
                    Запретить использование в ОС пакета Wireshark
                или
                    Установить обновление для пакета(ов) Wireshark
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-wireshark-cve-2023-1993-cve-2023-1992/" type="self" id="ROS-20230620-04" title="ROS-20230620-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1993" type="cve" id="CVE-2023-1993" title="CVE-2023-1993" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1992" type="cve" id="CVE-2023-1992" title="CVE-2023-1992" />
			<reference href="https://bdu.fstec.ru/vul/2023-03609" type="self" id="BDU:2023-03609" title="BDU:2023-03609" />
			<reference href="https://bdu.fstec.ru/vul/2023-03347" type="self" id="BDU:2023-03347" title="BDU:2023-03347" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="wireshark" epoch="1" version="3.6.0" release="3.el7" arch="x86_64" src="">
					<filename>wireshark-1:3.6.0-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230620-05</id>
		<issued date="2023-06-20" />
		<updated date="2023-06-20" />
		<title>Уязвимость python3-sqlparse </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-sqlparse</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-sqlparse-cve-2023-30608/</description>
               <solution>
                    Запретить использование в ОС пакета python3-sqlparse
                или
                    Установить обновление для пакета(ов) python3-sqlparse
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-sqlparse-cve-2023-30608/" type="self" id="ROS-20230620-05" title="ROS-20230620-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30608" type="cve" id="CVE-2023-30608" title="CVE-2023-30608" />
			<reference href="https://bdu.fstec.ru/vul/2023-03345" type="self" id="BDU:2023-03345" title="BDU:2023-03345" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-sqlparse" epoch="0" version="0.3.1" release="2.el7" arch="noarch" src="">
					<filename>python3-sqlparse-0:0.3.1-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230620-06</id>
		<issued date="2023-06-20" />
		<updated date="2023-06-20" />
		<title>Множественные уязвимости python3-cryptography </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в python3-cryptography</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-cryptography-cve-2020-36242-cve-2023-0286-cve-2023-23931/</description>
               <solution>
                    Запретить использование в ОС пакета python3-cryptography
                или
                    Установить обновление для пакета(ов) python3-cryptography
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-cryptography-cve-2020-36242-cve-2023-0286-cve-2023-23931/" type="self" id="ROS-20230620-06" title="ROS-20230620-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36242" type="cve" id="CVE-2020-36242" title="CVE-2020-36242" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0286" type="cve" id="CVE-2023-0286" title="CVE-2023-0286" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23931" type="cve" id="CVE-2023-23931" title="CVE-2023-23931" />
			<reference href="https://bdu.fstec.ru/vul/2022-05229" type="self" id="BDU:2022-05229" title="BDU:2022-05229" />
			<reference href="https://bdu.fstec.ru/vul/2023-00665" type="self" id="BDU:2023-00665" title="BDU:2023-00665" />
			<reference href="https://bdu.fstec.ru/vul/2023-02656" type="self" id="BDU:2023-02656" title="BDU:2023-02656" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-cryptography" epoch="0" version="37.0.2" release="9.el7" arch="x86_64" src="">
					<filename>python3-cryptography-0:37.0.2-9.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230620-07</id>
		<issued date="2023-06-20" />
		<updated date="2023-06-20" />
		<title>Множественные уязвимости python3-redis </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-redis</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-redis-cve-2023-28859-cve-2023-28858/</description>
               <solution>
                    Запретить использование в ОС пакета python3-redis
                или
                    Установить обновление для пакета(ов) python3-redis
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-redis-cve-2023-28859-cve-2023-28858/" type="self" id="ROS-20230620-07" title="ROS-20230620-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28859" type="cve" id="CVE-2023-28859" title="CVE-2023-28859" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28858" type="cve" id="CVE-2023-28858" title="CVE-2023-28858" />
			<reference href="https://bdu.fstec.ru/vul/2023-01832" type="self" id="BDU:2023-01832" title="BDU:2023-01832" />
			<reference href="https://bdu.fstec.ru/vul/2023-01831" type="self" id="BDU:2023-01831" title="BDU:2023-01831" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-redis" epoch="0" version="4.5.4" release="1.el7" arch="noarch" src="">
					<filename>python3-redis-0:4.5.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230621-01</id>
		<issued date="2023-06-22" />
		<updated date="2023-06-22" />
		<title>Уязвимость Django </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в python3-django</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-django-cve-2023-31047/</description>
               <solution>
                    Запретить использование в ОС пакета python3-django
                или
                    Установить обновление для пакета(ов) python3-django
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-django-cve-2023-31047/" type="self" id="ROS-20230621-01" title="ROS-20230621-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31047" type="cve" id="CVE-2023-31047" title="CVE-2023-31047" />
			<reference href="https://bdu.fstec.ru/vul/2023-03582" type="self" id="BDU:2023-03582" title="BDU:2023-03582" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-django" epoch="0" version="3.2.13" release="2.el7" arch="noarch" src="">
					<filename>python3-django-0:3.2.13-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230621-02</id>
		<issued date="2023-06-22" />
		<updated date="2023-06-22" />
		<title>Множественные уязвимости Libtiff </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libtiff</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libtiff-cve-2023-30774-cve-2023-30775-cve-2023-2731/</description>
               <solution>
                    Запретить использование в ОС пакета LibTIFF
                или
                    Установить обновление для пакета(ов) LibTIFF
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libtiff-cve-2023-30774-cve-2023-30775-cve-2023-2731/" type="self" id="ROS-20230621-02" title="ROS-20230621-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30774" type="cve" id="CVE-2023-30774" title="CVE-2023-30774" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30775" type="cve" id="CVE-2023-30775" title="CVE-2023-30775" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2731" type="cve" id="CVE-2023-2731" title="CVE-2023-2731" />
			<reference href="https://bdu.fstec.ru/vul/2023-03634" type="self" id="BDU:2023-03634" title="BDU:2023-03634" />
			<reference href="https://bdu.fstec.ru/vul/2023-03633" type="self" id="BDU:2023-03633" title="BDU:2023-03633" />
			<reference href="https://bdu.fstec.ru/vul/2023-03608" type="self" id="BDU:2023-03608" title="BDU:2023-03608" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libtiff" epoch="0" version="4.4.0" release="7.el7" arch="x86_64" src="">
					<filename>libtiff-0:4.4.0-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230621-03</id>
		<issued date="2023-06-22" />
		<updated date="2023-06-22" />
		<title>Множественные уязвимости Gpac </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в gpac</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gpac-cve-2023-2837-cve-2023-2840/</description>
               <solution>
                    Запретить использование в ОС пакета Gpac
                или
                    Установить обновление для пакета(ов) Gpac
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gpac-cve-2023-2837-cve-2023-2840/" type="self" id="ROS-20230621-03" title="ROS-20230621-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2840" type="cve" id="CVE-2023-2840" title="CVE-2023-2840" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2837" type="cve" id="CVE-2023-2837" title="CVE-2023-2837" />
			<reference href="https://bdu.fstec.ru/vul/2023-03581" type="self" id="BDU:2023-03581" title="BDU:2023-03581" />
			<reference href="https://bdu.fstec.ru/vul/2023-03594" type="self" id="BDU:2023-03594" title="BDU:2023-03594" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gpac" epoch="0" version="0.7.1" release="3.el7" arch="x86_64" src="">
					<filename>gpac-0:0.7.1-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230621-04</id>
		<issued date="2023-06-22" />
		<updated date="2025-09-09" />
		<title>Множественные уязвимости Curl </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-curl-cve-2023-28319-cve-2023-28321-cve-2023-28322/</description>
               <solution>
                    Запретить использование в ОС пакета cURL 
                или
                    Установить обновление для пакета(ов) cURL 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-curl-cve-2023-28319-cve-2023-28321-cve-2023-28322/" type="self" id="ROS-20230621-04" title="ROS-20230621-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28319" type="cve" id="CVE-2023-28319" title="CVE-2023-28319" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28321" type="cve" id="CVE-2023-28321" title="CVE-2023-28321" />
			<reference href="https://bdu.fstec.ru/vul/2023-03622" type="self" id="BDU:2023-03622" title="BDU:2023-03622" />
			<reference href="https://bdu.fstec.ru/vul/2023-03648" type="self" id="BDU:2023-03648" title="BDU:2023-03648" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="curl" epoch="0" version="7.81.0" release="10.el7.3" arch="x86_64" src="">
					<filename>curl-0:7.81.0-10.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230621-05</id>
		<issued date="2023-06-22" />
		<updated date="2023-06-22" />
		<title>Уязвимость Openssl </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в openssl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl-cve-2023-2650/</description>
               <solution>
                    Запретить использование в ОС пакета OpenSSL 
                или
                    Установить обновление для пакета(ов) OpenSSL 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl-cve-2023-2650/" type="self" id="ROS-20230621-05" title="ROS-20230621-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2650" type="cve" id="CVE-2023-2650" title="CVE-2023-2650" />
			<reference href="https://bdu.fstec.ru/vul/2023-03652" type="self" id="BDU:2023-03652" title="BDU:2023-03652" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl" epoch="1" version="1.1.1q" release="5.el7.3" arch="x86_64" src="">
					<filename>openssl-1:1.1.1q-5.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230621-06</id>
		<issued date="2023-06-22" />
		<updated date="2023-06-22" />
		<title>Множественные уязвимости ImageMagick </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в ImageMagick7</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-imagemagick-cve-2023-2157-cve-2023-34153-cve-2023-34152-cve-2023-34151/</description>
               <solution>
                    Запретить использование в ОС пакета ImageMagick7 
                или
                    Установить обновление для пакета(ов) ImageMagick7 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-imagemagick-cve-2023-2157-cve-2023-34153-cve-2023-34152-cve-2023-34151/" type="self" id="ROS-20230621-06" title="ROS-20230621-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34153" type="cve" id="CVE-2023-34153" title="CVE-2023-34153" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34152" type="cve" id="CVE-2023-34152" title="CVE-2023-34152" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34151" type="cve" id="CVE-2023-34151" title="CVE-2023-34151" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2157" type="cve" id="CVE-2023-2157" title="CVE-2023-2157" />
			<reference href="https://bdu.fstec.ru/vul/2023-03621" type="self" id="BDU:2023-03621" title="BDU:2023-03621" />
			<reference href="https://bdu.fstec.ru/vul/2023-03578" type="self" id="BDU:2023-03578" title="BDU:2023-03578" />
			<reference href="https://bdu.fstec.ru/vul/2023-03610" type="self" id="BDU:2023-03610" title="BDU:2023-03610" />
			<reference href="https://bdu.fstec.ru/vul/2023-03597" type="self" id="BDU:2023-03597" title="BDU:2023-03597" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ImageMagick7" epoch="0" version="7.1.1.11" release="1.el7" arch="x86_64" src="">
					<filename>ImageMagick7-0:7.1.1.11-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230622-07</id>
		<issued date="2023-06-22" />
		<updated date="2023-06-22" />
		<title>Уязвимость libX11 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libX11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libx11-cve-2023-3138/</description>
               <solution>
                    Запретить использование в ОС пакета libX11
                или
                    Установить обновление для пакета(ов) libx11
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libx11-cve-2023-3138/" type="self" id="ROS-20230622-07" title="ROS-20230622-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3138" type="cve" id="CVE-2023-3138" title="CVE-2023-3138" />
			<reference href="https://bdu.fstec.ru/vul/2023-03596" type="self" id="BDU:2023-03596" title="BDU:2023-03596" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libX11" epoch="0" version="1.6.12" release="6.el7.3" arch="x86_64" src="">
					<filename>libX11-0:1.6.12-6.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230622-08</id>
		<issued date="2023-06-22" />
		<updated date="2023-06-22" />
		<title>Множественные уязвимости thunderbird </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-cve-2023-32212-cve-2023-32213-cve-2023-32214-cve-2023-32215/</description>
               <solution>
                    Запретить использование в ОС пакета Mozilla Thunderbird
                или
                    Установить обновление для пакета(ов) Mozilla Thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-cve-2023-32212-cve-2023-32213-cve-2023-32214-cve-2023-32215/" type="self" id="ROS-20230622-08" title="ROS-20230622-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205" type="cve" id="CVE-2023-32205" title="CVE-2023-32205" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206" type="cve" id="CVE-2023-32206" title="CVE-2023-32206" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207" type="cve" id="CVE-2023-32207" title="CVE-2023-32207" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211" type="cve" id="CVE-2023-32211" title="CVE-2023-32211" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212" type="cve" id="CVE-2023-32212" title="CVE-2023-32212" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213" type="cve" id="CVE-2023-32213" title="CVE-2023-32213" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32214" type="cve" id="CVE-2023-32214" title="CVE-2023-32214" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215" type="cve" id="CVE-2023-32215" title="CVE-2023-32215" />
			<reference href="https://bdu.fstec.ru/vul/2023-02804" type="self" id="BDU:2023-02804" title="BDU:2023-02804" />
			<reference href="https://bdu.fstec.ru/vul/2023-02813" type="self" id="BDU:2023-02813" title="BDU:2023-02813" />
			<reference href="https://bdu.fstec.ru/vul/2023-02814" type="self" id="BDU:2023-02814" title="BDU:2023-02814" />
			<reference href="https://bdu.fstec.ru/vul/2023-02806" type="self" id="BDU:2023-02806" title="BDU:2023-02806" />
			<reference href="https://bdu.fstec.ru/vul/2023-02809" type="self" id="BDU:2023-02809" title="BDU:2023-02809" />
			<reference href="https://bdu.fstec.ru/vul/2023-02805" type="self" id="BDU:2023-02805" title="BDU:2023-02805" />
			<reference href="https://bdu.fstec.ru/vul/2023-02810" type="self" id="BDU:2023-02810" title="BDU:2023-02810" />
			<reference href="https://bdu.fstec.ru/vul/2023-02803" type="self" id="BDU:2023-02803" title="BDU:2023-02803" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="102.11.0" release="1.el7.3" arch="x86_64" src="">
					<filename>thunderbird-0:102.11.0-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230627-01</id>
		<issued date="2023-06-27" />
		<updated date="2023-06-27" />
		<title>Множественные уязвимости moodle </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-moodle-cve-2023-23923-cve-2023-23922-cve-2023-23921-cve-2022-0332-cve-202/</description>
               <solution>
                    Запретить использование в ОС пакета Мoodle
                или
                    Установить обновление для пакета(ов) Мoodle
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-moodle-cve-2023-23923-cve-2023-23922-cve-2023-23921-cve-2022-0332-cve-202/" type="self" id="ROS-20230627-01" title="ROS-20230627-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23923" type="cve" id="CVE-2023-23923" title="CVE-2023-23923" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23922" type="cve" id="CVE-2023-23922" title="CVE-2023-23922" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23921" type="cve" id="CVE-2023-23921" title="CVE-2023-23921" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0332" type="cve" id="CVE-2022-0332" title="CVE-2022-0332" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30944" type="cve" id="CVE-2023-30944" title="CVE-2023-30944" />
			<reference href="https://bdu.fstec.ru/vul/2023-03462" type="self" id="BDU:2023-03462" title="BDU:2023-03462" />
			<reference href="https://bdu.fstec.ru/vul/2023-03477" type="self" id="BDU:2023-03477" title="BDU:2023-03477" />
			<reference href="https://bdu.fstec.ru/vul/2023-03478" type="self" id="BDU:2023-03478" title="BDU:2023-03478" />
			<reference href="https://bdu.fstec.ru/vul/2023-03479" type="self" id="BDU:2023-03479" title="BDU:2023-03479" />
			<reference href="https://bdu.fstec.ru/vul/2023-03480" type="self" id="BDU:2023-03480" title="BDU:2023-03480" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="moodle" epoch="0" version="3.11.5" release="2.el7.3" arch="noarch" src="">
					<filename>moodle-0:3.11.5-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230627-02</id>
		<issued date="2023-06-27" />
		<updated date="2023-06-27" />
		<title>Уязвимость libjxl </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libjxl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libjxl-cve-2023-35790/</description>
               <solution>
                    Запретить использование в ОС пакета Libjxl
                или
                    Установить обновление для пакета(ов) Libjxl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libjxl-cve-2023-35790/" type="self" id="ROS-20230627-02" title="ROS-20230627-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35790" type="cve" id="CVE-2023-35790" title="CVE-2023-35790" />
			<reference href="https://bdu.fstec.ru/vul/2023-03481" type="self" id="BDU:2023-03481" title="BDU:2023-03481" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libjxl" epoch="1" version="0.7.0" release="2.el7" arch="x86_64" src="">
					<filename>libjxl-1:0.7.0-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230628-01</id>
		<issued date="2023-06-28" />
		<updated date="2023-06-28" />
		<title>Множественные уязвимости Nextcloud_server</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nextcloud</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nextcloud-server-cve-2023-35172-cve-2023-35928/</description>
               <solution>
                    Запретить использование в ОС пакета Nextcloud 
                или
                    Установить обновление для пакета(ов) Nextcloud 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nextcloud-server-cve-2023-35172-cve-2023-35928/" type="self" id="ROS-20230628-01" title="ROS-20230628-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35172" type="cve" id="CVE-2023-35172" title="CVE-2023-35172" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35928" type="cve" id="CVE-2023-35928" title="CVE-2023-35928" />
			<reference href="https://bdu.fstec.ru/vul/2023-03598" type="self" id="BDU:2023-03598" title="BDU:2023-03598" />
			<reference href="https://bdu.fstec.ru/vul/2023-03776" type="self" id="BDU:2023-03776" title="BDU:2023-03776" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nextcloud" epoch="0" version="25.0.5" release="2.el7" arch="noarch" src="">
					<filename>nextcloud-0:25.0.5-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230710-01</id>
		<issued date="2023-07-10" />
		<updated date="2023-07-10" />
		<title>Множественные уязвимости podman </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в podman</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-podman-cve-2023-0778-cve-2022-27649-cve-2021-41190-cve-2021-4024-cve-2022/</description>
               <solution>
                    Запретить использование в ОС пакета Podman
                или
                    Установить обновление для пакета(ов) Podman
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-podman-cve-2023-0778-cve-2022-27649-cve-2021-41190-cve-2021-4024-cve-2022/" type="self" id="ROS-20230710-01" title="ROS-20230710-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0778" type="cve" id="CVE-2023-0778" title="CVE-2023-0778" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27649" type="cve" id="CVE-2022-27649" title="CVE-2022-27649" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41190" type="cve" id="CVE-2021-41190" title="CVE-2021-41190" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4024" type="cve" id="CVE-2021-4024" title="CVE-2021-4024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1227" type="cve" id="CVE-2022-1227" title="CVE-2022-1227" />
			<reference href="https://bdu.fstec.ru/vul/2023-03760" type="self" id="BDU:2023-03760" title="BDU:2023-03760" />
			<reference href="https://bdu.fstec.ru/vul/2023-03753" type="self" id="BDU:2023-03753" title="BDU:2023-03753" />
			<reference href="https://bdu.fstec.ru/vul/2023-03675" type="self" id="BDU:2023-03675" title="BDU:2023-03675" />
			<reference href="https://bdu.fstec.ru/vul/2023-03676" type="self" id="BDU:2023-03676" title="BDU:2023-03676" />
			<reference href="https://bdu.fstec.ru/vul/2023-03685" type="self" id="BDU:2023-03685" title="BDU:2023-03685" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="podman" epoch="0" version="4.4.1" release="1.el7" arch="x86_64" src="">
					<filename>podman-0:4.4.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230807-01</id>
		<issued date="2023-08-07" />
		<updated date="2023-08-07" />
		<title>Уязвимость OpenLDAP </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в openldap</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openldap-cve-2022-29155/</description>
               <solution>
                    Запретить использование в ОС пакета openldap
                или
                    Установить обновление для пакета(ов) openldap
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openldap-cve-2022-29155/" type="self" id="ROS-20230807-01" title="ROS-20230807-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155" type="cve" id="CVE-2022-29155" title="CVE-2022-29155" />
			<reference href="https://bdu.fstec.ru/vul/2022-03203" type="self" id="BDU:2022-03203" title="BDU:2022-03203" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openldap" epoch="0" version="2.4.55" release="8.el7.3" arch="x86_64" src="">
					<filename>openldap-0:2.4.55-8.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230824-01</id>
		<issued date="2023-08-25" />
		<updated date="2023-08-25" />
		<title>Множественные уязвимости Moby </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в docker-ce</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-moby-cve-2023-28842-cve-2023-28841-cve-2023-28840/</description>
               <solution>
                    Запретить использование в ОС пакета docker-ce
                или
                    Установить обновление для пакета(ов) docker-ce
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-moby-cve-2023-28842-cve-2023-28841-cve-2023-28840/" type="self" id="ROS-20230824-01" title="ROS-20230824-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28842" type="cve" id="CVE-2023-28842" title="CVE-2023-28842" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28841" type="cve" id="CVE-2023-28841" title="CVE-2023-28841" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28840" type="cve" id="CVE-2023-28840" title="CVE-2023-28840" />
			<reference href="https://bdu.fstec.ru/vul/2023-02006" type="self" id="BDU:2023-02006" title="BDU:2023-02006" />
			<reference href="https://bdu.fstec.ru/vul/2023-05008" type="self" id="BDU:2023-05008" title="BDU:2023-05008" />
			<reference href="https://bdu.fstec.ru/vul/2023-02005" type="self" id="BDU:2023-02005" title="BDU:2023-02005" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="docker-ce" epoch="4" version="20.10.24" release="1.el7" arch="x86_64" src="">
					<filename>docker-ce-4:20.10.24-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230824-02</id>
		<issued date="2023-08-25" />
		<updated date="2023-08-25" />
		<title>Множественные уязвимости Git </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в git</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-git-cve-2023-29007-cve-2023-25652/</description>
               <solution>
                    Запретить использование в ОС пакета git
                или
                    Установить обновление для пакета(ов) git
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-git-cve-2023-29007-cve-2023-25652/" type="self" id="ROS-20230824-02" title="ROS-20230824-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29007" type="cve" id="CVE-2023-29007" title="CVE-2023-29007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25652" type="cve" id="CVE-2023-25652" title="CVE-2023-25652" />
			<reference href="https://bdu.fstec.ru/vul/2023-02908" type="self" id="BDU:2023-02908" title="BDU:2023-02908" />
			<reference href="https://bdu.fstec.ru/vul/2023-03859" type="self" id="BDU:2023-03859" title="BDU:2023-03859" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="git" epoch="0" version="2.30.9" release="1.el7" arch="x86_64" src="">
					<filename>git-0:2.30.9-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230825-03</id>
		<issued date="2023-08-25" />
		<updated date="2023-08-25" />
		<title>Уязвимость Libarchive </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libarchive</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libarchive-cve-2023-30571/</description>
               <solution>
                    Запретить использование в ОС пакета libarchive
                или
                    Установить обновление для пакета(ов) libarchive
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libarchive-cve-2023-30571/" type="self" id="ROS-20230825-03" title="ROS-20230825-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30571" type="cve" id="CVE-2023-30571" title="CVE-2023-30571" />
			<reference href="https://bdu.fstec.ru/vul/2023-05007" type="self" id="BDU:2023-05007" title="BDU:2023-05007" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libarchive" epoch="0" version="3.6.2" release="1.el7" arch="x86_64" src="">
					<filename>libarchive-0:3.6.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230825-04</id>
		<issued date="2023-08-25" />
		<updated date="2023-08-25" />
		<title>Уязвимость Redis </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в redis</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-redis-cve-2023-36824/</description>
               <solution>
                    Запретить использование в ОС пакета redis
                или
                    Установить обновление для пакета(ов) redis
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-redis-cve-2023-36824/" type="self" id="ROS-20230825-04" title="ROS-20230825-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36824" type="cve" id="CVE-2023-36824" title="CVE-2023-36824" />
			<reference href="https://bdu.fstec.ru/vul/2023-04264" type="self" id="BDU:2023-04264" title="BDU:2023-04264" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="redis" epoch="0" version="7.0.12" release="1.el7" arch="x86_64" src="">
					<filename>redis-0:7.0.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230825-05</id>
		<issued date="2023-08-25" />
		<updated date="2025-10-09" />
		<title>Уязвимость qemu </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в qemu-common</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qemu-cve-2023-3354-/</description>
               <solution>
                    Запретить использование в ОС пакета qemu-common
                или
                    Установить обновление для пакета(ов) qemu-common
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qemu-cve-2023-3354-/" type="self" id="ROS-20230825-05" title="ROS-20230825-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3354" type="cve" id="CVE-2023-3354" title="CVE-2023-3354" />
			<reference href="https://bdu.fstec.ru/vul/2023-05003" type="self" id="BDU:2023-05003" title="BDU:2023-05003" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="qemu-common" epoch="15" version="6.1.0" release="16.el7" arch="x86_64" src="">
					<filename>qemu-common-15:6.1.0-16.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230825-06</id>
		<issued date="2023-08-25" />
		<updated date="2023-08-25" />
		<title>Уязвимость yasm  </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в yasm</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-yasm-cve-2023-37732/</description>
               <solution>
                    Запретить использование в ОС пакета Yasm 
                или
                    Установить обновление для пакета(ов) Yasm 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-yasm-cve-2023-37732/" type="self" id="ROS-20230825-06" title="ROS-20230825-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37732" type="cve" id="CVE-2023-37732" title="CVE-2023-37732" />
			<reference href="https://bdu.fstec.ru/vul/2023-05006" type="self" id="BDU:2023-05006" title="BDU:2023-05006" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="yasm" epoch="0" version="1.3.0" release="5.el7" arch="x86_64" src="">
					<filename>yasm-0:1.3.0-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230830-01</id>
		<issued date="2023-08-30" />
		<updated date="2023-08-30" />
		<title>Множественные уязвимости Libreoffice </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libreoffice</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libreoffice-cve-2023-0950-cve-2023-2255/</description>
               <solution>
                    Запретить использование в ОС пакета libreoffice
                или
                    Установить обновление для пакета(ов) libreoffice
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libreoffice-cve-2023-0950-cve-2023-2255/" type="self" id="ROS-20230830-01" title="ROS-20230830-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0950" type="cve" id="CVE-2023-0950" title="CVE-2023-0950" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2255" type="cve" id="CVE-2023-2255" title="CVE-2023-2255" />
			<reference href="https://bdu.fstec.ru/vul/2023-02967" type="self" id="BDU:2023-02967" title="BDU:2023-02967" />
			<reference href="https://bdu.fstec.ru/vul/2023-02968" type="self" id="BDU:2023-02968" title="BDU:2023-02968" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libreoffice" epoch="1" version="7.6.0.2" release="1.el7" arch="x86_64" src="">
					<filename>libreoffice-1:7.6.0.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230904-01</id>
		<issued date="2023-09-04" />
		<updated date="2025-09-26" />
		<title>Множественные уязвимости ядра ОС</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-yadra-os-04-09-23-2/</description>
               <solution>Установить обновление для пакета(ов) ядра РЕД ОС</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-yadra-os-04-09-23-2/" type="self" id="ROS-20230904-01" title="ROS-20230904-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206" type="cve" id="CVE-2023-1206" title="CVE-2023-1206" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3117" type="cve" id="CVE-2023-3117" title="CVE-2023-3117" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3773" type="cve" id="CVE-2023-3773" title="CVE-2023-3773" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3772" type="cve" id="CVE-2023-3772" title="CVE-2023-3772" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132" type="cve" id="CVE-2023-4132" title="CVE-2023-4132" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090" type="cve" id="CVE-2023-3090" title="CVE-2023-3090" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389" type="cve" id="CVE-2023-3389" title="CVE-2023-3389" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3355" type="cve" id="CVE-2023-3355" title="CVE-2023-3355" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3390" type="cve" id="CVE-2023-3390" title="CVE-2023-3390" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3439" type="cve" id="CVE-2023-3439" title="CVE-2023-3439" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283" type="cve" id="CVE-2023-40283" title="CVE-2023-40283" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898" type="cve" id="CVE-2023-2898" title="CVE-2023-2898" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0160" type="cve" id="CVE-2023-0160" title="CVE-2023-0160" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982" type="cve" id="CVE-2022-40982" title="CVE-2022-40982" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20569" type="cve" id="CVE-2023-20569" title="CVE-2023-20569" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4128" type="cve" id="CVE-2023-4128" title="CVE-2023-4128" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147" type="cve" id="CVE-2023-4147" title="CVE-2023-4147" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194" type="cve" id="CVE-2023-4194" title="CVE-2023-4194" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4205" type="cve" id="CVE-2023-4205" title="CVE-2023-4205" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004" type="cve" id="CVE-2023-4004" title="CVE-2023-4004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4010" type="cve" id="CVE-2023-4010" title="CVE-2023-4010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609" type="cve" id="CVE-2023-3609" title="CVE-2023-3609" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3610" type="cve" id="CVE-2023-3610" title="CVE-2023-3610" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611" type="cve" id="CVE-2023-3611" title="CVE-2023-3611" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776" type="cve" id="CVE-2023-3776" title="CVE-2023-3776" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863" type="cve" id="CVE-2023-3863" title="CVE-2023-3863" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2860" type="cve" id="CVE-2023-2860" title="CVE-2023-2860" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3567" type="cve" id="CVE-2023-3567" title="CVE-2023-3567" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3640" type="cve" id="CVE-2023-3640" title="CVE-2023-3640" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3812" type="cve" id="CVE-2023-3812" title="CVE-2023-3812" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35823" type="cve" id="CVE-2023-35823" title="CVE-2023-35823" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35824" type="cve" id="CVE-2023-35824" title="CVE-2023-35824" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35825" type="cve" id="CVE-2023-35825" title="CVE-2023-35825" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35826" type="cve" id="CVE-2023-35826" title="CVE-2023-35826" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35828" type="cve" id="CVE-2023-35828" title="CVE-2023-35828" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35829" type="cve" id="CVE-2023-35829" title="CVE-2023-35829" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31248" type="cve" id="CVE-2023-31248" title="CVE-2023-31248" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35001" type="cve" id="CVE-2023-35001" title="CVE-2023-35001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3269" type="cve" id="CVE-2023-3269" title="CVE-2023-3269" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2156" type="cve" id="CVE-2023-2156" title="CVE-2023-2156" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124" type="cve" id="CVE-2023-2124" title="CVE-2023-2124" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31436" type="cve" id="CVE-2023-31436" title="CVE-2023-31436" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32233" type="cve" id="CVE-2023-32233" title="CVE-2023-32233" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45886" type="cve" id="CVE-2022-45886" title="CVE-2022-45886" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45885" type="cve" id="CVE-2022-45885" title="CVE-2022-45885" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45887" type="cve" id="CVE-2022-45887" title="CVE-2022-45887" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1859" type="cve" id="CVE-2023-1859" title="CVE-2023-1859" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3141" type="cve" id="CVE-2023-3141" title="CVE-2023-3141" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48502" type="cve" id="CVE-2022-48502" title="CVE-2022-48502" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34255" type="cve" id="CVE-2023-34255" title="CVE-2023-34255" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34256" type="cve" id="CVE-2023-34256" title="CVE-2023-34256" />
			<reference href="https://bdu.fstec.ru/vul/2023-03642" type="self" id="BDU:2023-03642" title="BDU:2023-03642" />
			<reference href="https://bdu.fstec.ru/vul/2023-03656" type="self" id="BDU:2023-03656" title="BDU:2023-03656" />
			<reference href="https://bdu.fstec.ru/vul/2023-04267" type="self" id="BDU:2023-04267" title="BDU:2023-04267" />
			<reference href="https://bdu.fstec.ru/vul/2023-04268" type="self" id="BDU:2023-04268" title="BDU:2023-04268" />
			<reference href="https://bdu.fstec.ru/vul/2023-04654" type="self" id="BDU:2023-04654" title="BDU:2023-04654" />
			<reference href="https://bdu.fstec.ru/vul/2023-03721" type="self" id="BDU:2023-03721" title="BDU:2023-03721" />
			<reference href="https://bdu.fstec.ru/vul/2023-03727" type="self" id="BDU:2023-03727" title="BDU:2023-03727" />
			<reference href="https://bdu.fstec.ru/vul/2023-03666" type="self" id="BDU:2023-03666" title="BDU:2023-03666" />
			<reference href="https://bdu.fstec.ru/vul/2023-03677" type="self" id="BDU:2023-03677" title="BDU:2023-03677" />
			<reference href="https://bdu.fstec.ru/vul/2023-03668" type="self" id="BDU:2023-03668" title="BDU:2023-03668" />
			<reference href="https://bdu.fstec.ru/vul/2023-04770" type="self" id="BDU:2023-04770" title="BDU:2023-04770" />
			<reference href="https://bdu.fstec.ru/vul/2023-02996" type="self" id="BDU:2023-02996" title="BDU:2023-02996" />
			<reference href="https://bdu.fstec.ru/vul/2023-01800" type="self" id="BDU:2023-01800" title="BDU:2023-01800" />
			<reference href="https://bdu.fstec.ru/vul/2023-04663" type="self" id="BDU:2023-04663" title="BDU:2023-04663" />
			<reference href="https://bdu.fstec.ru/vul/2023-04625" type="self" id="BDU:2023-04625" title="BDU:2023-04625" />
			<reference href="https://bdu.fstec.ru/vul/2023-04837" type="self" id="BDU:2023-04837" title="BDU:2023-04837" />
			<reference href="https://bdu.fstec.ru/vul/2023-04657" type="self" id="BDU:2023-04657" title="BDU:2023-04657" />
			<reference href="https://bdu.fstec.ru/vul/2023-04659" type="self" id="BDU:2023-04659" title="BDU:2023-04659" />
			<reference href="https://bdu.fstec.ru/vul/2023-04660" type="self" id="BDU:2023-04660" title="BDU:2023-04660" />
			<reference href="https://bdu.fstec.ru/vul/2023-04466" type="self" id="BDU:2023-04466" title="BDU:2023-04466" />
			<reference href="https://bdu.fstec.ru/vul/2023-04371" type="self" id="BDU:2023-04371" title="BDU:2023-04371" />
			<reference href="https://bdu.fstec.ru/vul/2023-03960" type="self" id="BDU:2023-03960" title="BDU:2023-03960" />
			<reference href="https://bdu.fstec.ru/vul/2023-03961" type="self" id="BDU:2023-03961" title="BDU:2023-03961" />
			<reference href="https://bdu.fstec.ru/vul/2023-04269" type="self" id="BDU:2023-04269" title="BDU:2023-04269" />
			<reference href="https://bdu.fstec.ru/vul/2023-04270" type="self" id="BDU:2023-04270" title="BDU:2023-04270" />
			<reference href="https://bdu.fstec.ru/vul/2023-04271" type="self" id="BDU:2023-04271" title="BDU:2023-04271" />
			<reference href="https://bdu.fstec.ru/vul/2023-03782" type="self" id="BDU:2023-03782" title="BDU:2023-03782" />
			<reference href="https://bdu.fstec.ru/vul/2023-03962" type="self" id="BDU:2023-03962" title="BDU:2023-03962" />
			<reference href="https://bdu.fstec.ru/vul/2023-04465" type="self" id="BDU:2023-04465" title="BDU:2023-04465" />
			<reference href="https://bdu.fstec.ru/vul/2023-03499" type="self" id="BDU:2023-03499" title="BDU:2023-03499" />
			<reference href="https://bdu.fstec.ru/vul/2023-03500" type="self" id="BDU:2023-03500" title="BDU:2023-03500" />
			<reference href="https://bdu.fstec.ru/vul/2023-05190" type="self" id="BDU:2023-05190" title="BDU:2023-05190" />
			<reference href="https://bdu.fstec.ru/vul/2023-03502" type="self" id="BDU:2023-03502" title="BDU:2023-03502" />
			<reference href="https://bdu.fstec.ru/vul/2023-03501" type="self" id="BDU:2023-03501" title="BDU:2023-03501" />
			<reference href="https://bdu.fstec.ru/vul/2023-03444" type="self" id="BDU:2023-03444" title="BDU:2023-03444" />
			<reference href="https://bdu.fstec.ru/vul/2023-03947" type="self" id="BDU:2023-03947" title="BDU:2023-03947" />
			<reference href="https://bdu.fstec.ru/vul/2023-03778" type="self" id="BDU:2023-03778" title="BDU:2023-03778" />
			<reference href="https://bdu.fstec.ru/vul/2023-03584" type="self" id="BDU:2023-03584" title="BDU:2023-03584" />
			<reference href="https://bdu.fstec.ru/vul/2023-02529" type="self" id="BDU:2023-02529" title="BDU:2023-02529" />
			<reference href="https://bdu.fstec.ru/vul/2023-02605" type="self" id="BDU:2023-02605" title="BDU:2023-02605" />
			<reference href="https://bdu.fstec.ru/vul/2023-02625" type="self" id="BDU:2023-02625" title="BDU:2023-02625" />
			<reference href="https://bdu.fstec.ru/vul/2023-00645" type="self" id="BDU:2023-00645" title="BDU:2023-00645" />
			<reference href="https://bdu.fstec.ru/vul/2023-00646" type="self" id="BDU:2023-00646" title="BDU:2023-00646" />
			<reference href="https://bdu.fstec.ru/vul/2023-05191" type="self" id="BDU:2023-05191" title="BDU:2023-05191" />
			<reference href="https://bdu.fstec.ru/vul/2023-02166" type="self" id="BDU:2023-02166" title="BDU:2023-02166" />
			<reference href="https://bdu.fstec.ru/vul/2023-03172" type="self" id="BDU:2023-03172" title="BDU:2023-03172" />
			<reference href="https://bdu.fstec.ru/vul/2023-02995" type="self" id="BDU:2023-02995" title="BDU:2023-02995" />
			<reference href="https://bdu.fstec.ru/vul/2023-02994" type="self" id="BDU:2023-02994" title="BDU:2023-02994" />
			<reference href="https://bdu.fstec.ru/vul/2023-02997" type="self" id="BDU:2023-02997" title="BDU:2023-02997" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230904-02</id>
		<issued date="2023-09-04" />
		<updated date="2025-09-26" />
		<title>Множественные уязвимости ядра ОС</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-yadra-os-04-09-23-1/</description>
               <solution>Установить обновление для пакета(ов) ядра РЕД ОС</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-yadra-os-04-09-23-1/" type="self" id="ROS-20230904-02" title="ROS-20230904-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3117" type="cve" id="CVE-2023-3117" title="CVE-2023-3117" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3773" type="cve" id="CVE-2023-3773" title="CVE-2023-3773" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3772" type="cve" id="CVE-2023-3772" title="CVE-2023-3772" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132" type="cve" id="CVE-2023-4132" title="CVE-2023-4132" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090" type="cve" id="CVE-2023-3090" title="CVE-2023-3090" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389" type="cve" id="CVE-2023-3389" title="CVE-2023-3389" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3355" type="cve" id="CVE-2023-3355" title="CVE-2023-3355" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3390" type="cve" id="CVE-2023-3390" title="CVE-2023-3390" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3439" type="cve" id="CVE-2023-3439" title="CVE-2023-3439" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283" type="cve" id="CVE-2023-40283" title="CVE-2023-40283" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898" type="cve" id="CVE-2023-2898" title="CVE-2023-2898" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0160" type="cve" id="CVE-2023-0160" title="CVE-2023-0160" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982" type="cve" id="CVE-2022-40982" title="CVE-2022-40982" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20569" type="cve" id="CVE-2023-20569" title="CVE-2023-20569" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4128" type="cve" id="CVE-2023-4128" title="CVE-2023-4128" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147" type="cve" id="CVE-2023-4147" title="CVE-2023-4147" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194" type="cve" id="CVE-2023-4194" title="CVE-2023-4194" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4205" type="cve" id="CVE-2023-4205" title="CVE-2023-4205" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004" type="cve" id="CVE-2023-4004" title="CVE-2023-4004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4010" type="cve" id="CVE-2023-4010" title="CVE-2023-4010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609" type="cve" id="CVE-2023-3609" title="CVE-2023-3609" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3610" type="cve" id="CVE-2023-3610" title="CVE-2023-3610" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611" type="cve" id="CVE-2023-3611" title="CVE-2023-3611" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776" type="cve" id="CVE-2023-3776" title="CVE-2023-3776" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863" type="cve" id="CVE-2023-3863" title="CVE-2023-3863" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2860" type="cve" id="CVE-2023-2860" title="CVE-2023-2860" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3567" type="cve" id="CVE-2023-3567" title="CVE-2023-3567" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3640" type="cve" id="CVE-2023-3640" title="CVE-2023-3640" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3812" type="cve" id="CVE-2023-3812" title="CVE-2023-3812" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35823" type="cve" id="CVE-2023-35823" title="CVE-2023-35823" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35824" type="cve" id="CVE-2023-35824" title="CVE-2023-35824" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35825" type="cve" id="CVE-2023-35825" title="CVE-2023-35825" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35826" type="cve" id="CVE-2023-35826" title="CVE-2023-35826" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35828" type="cve" id="CVE-2023-35828" title="CVE-2023-35828" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35829" type="cve" id="CVE-2023-35829" title="CVE-2023-35829" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31248" type="cve" id="CVE-2023-31248" title="CVE-2023-31248" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35001" type="cve" id="CVE-2023-35001" title="CVE-2023-35001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3269" type="cve" id="CVE-2023-3269" title="CVE-2023-3269" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2156" type="cve" id="CVE-2023-2156" title="CVE-2023-2156" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124" type="cve" id="CVE-2023-2124" title="CVE-2023-2124" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31436" type="cve" id="CVE-2023-31436" title="CVE-2023-31436" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32233" type="cve" id="CVE-2023-32233" title="CVE-2023-32233" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45886" type="cve" id="CVE-2022-45886" title="CVE-2022-45886" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45885" type="cve" id="CVE-2022-45885" title="CVE-2022-45885" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45887" type="cve" id="CVE-2022-45887" title="CVE-2022-45887" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1859" type="cve" id="CVE-2023-1859" title="CVE-2023-1859" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3141" type="cve" id="CVE-2023-3141" title="CVE-2023-3141" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48502" type="cve" id="CVE-2022-48502" title="CVE-2022-48502" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34255" type="cve" id="CVE-2023-34255" title="CVE-2023-34255" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34256" type="cve" id="CVE-2023-34256" title="CVE-2023-34256" />
			<reference href="https://bdu.fstec.ru/vul/2023-03656" type="self" id="BDU:2023-03656" title="BDU:2023-03656" />
			<reference href="https://bdu.fstec.ru/vul/2023-04267" type="self" id="BDU:2023-04267" title="BDU:2023-04267" />
			<reference href="https://bdu.fstec.ru/vul/2023-04268" type="self" id="BDU:2023-04268" title="BDU:2023-04268" />
			<reference href="https://bdu.fstec.ru/vul/2023-04654" type="self" id="BDU:2023-04654" title="BDU:2023-04654" />
			<reference href="https://bdu.fstec.ru/vul/2023-03721" type="self" id="BDU:2023-03721" title="BDU:2023-03721" />
			<reference href="https://bdu.fstec.ru/vul/2023-03727" type="self" id="BDU:2023-03727" title="BDU:2023-03727" />
			<reference href="https://bdu.fstec.ru/vul/2023-03666" type="self" id="BDU:2023-03666" title="BDU:2023-03666" />
			<reference href="https://bdu.fstec.ru/vul/2023-03677" type="self" id="BDU:2023-03677" title="BDU:2023-03677" />
			<reference href="https://bdu.fstec.ru/vul/2023-03668" type="self" id="BDU:2023-03668" title="BDU:2023-03668" />
			<reference href="https://bdu.fstec.ru/vul/2023-04770" type="self" id="BDU:2023-04770" title="BDU:2023-04770" />
			<reference href="https://bdu.fstec.ru/vul/2023-02996" type="self" id="BDU:2023-02996" title="BDU:2023-02996" />
			<reference href="https://bdu.fstec.ru/vul/2023-01800" type="self" id="BDU:2023-01800" title="BDU:2023-01800" />
			<reference href="https://bdu.fstec.ru/vul/2023-04663" type="self" id="BDU:2023-04663" title="BDU:2023-04663" />
			<reference href="https://bdu.fstec.ru/vul/2023-04625" type="self" id="BDU:2023-04625" title="BDU:2023-04625" />
			<reference href="https://bdu.fstec.ru/vul/2023-04837" type="self" id="BDU:2023-04837" title="BDU:2023-04837" />
			<reference href="https://bdu.fstec.ru/vul/2023-04657" type="self" id="BDU:2023-04657" title="BDU:2023-04657" />
			<reference href="https://bdu.fstec.ru/vul/2023-04659" type="self" id="BDU:2023-04659" title="BDU:2023-04659" />
			<reference href="https://bdu.fstec.ru/vul/2023-04660" type="self" id="BDU:2023-04660" title="BDU:2023-04660" />
			<reference href="https://bdu.fstec.ru/vul/2023-04466" type="self" id="BDU:2023-04466" title="BDU:2023-04466" />
			<reference href="https://bdu.fstec.ru/vul/2023-04371" type="self" id="BDU:2023-04371" title="BDU:2023-04371" />
			<reference href="https://bdu.fstec.ru/vul/2023-03960" type="self" id="BDU:2023-03960" title="BDU:2023-03960" />
			<reference href="https://bdu.fstec.ru/vul/2023-03961" type="self" id="BDU:2023-03961" title="BDU:2023-03961" />
			<reference href="https://bdu.fstec.ru/vul/2023-04269" type="self" id="BDU:2023-04269" title="BDU:2023-04269" />
			<reference href="https://bdu.fstec.ru/vul/2023-04270" type="self" id="BDU:2023-04270" title="BDU:2023-04270" />
			<reference href="https://bdu.fstec.ru/vul/2023-04271" type="self" id="BDU:2023-04271" title="BDU:2023-04271" />
			<reference href="https://bdu.fstec.ru/vul/2023-03782" type="self" id="BDU:2023-03782" title="BDU:2023-03782" />
			<reference href="https://bdu.fstec.ru/vul/2023-03962" type="self" id="BDU:2023-03962" title="BDU:2023-03962" />
			<reference href="https://bdu.fstec.ru/vul/2023-04465" type="self" id="BDU:2023-04465" title="BDU:2023-04465" />
			<reference href="https://bdu.fstec.ru/vul/2023-03499" type="self" id="BDU:2023-03499" title="BDU:2023-03499" />
			<reference href="https://bdu.fstec.ru/vul/2023-03500" type="self" id="BDU:2023-03500" title="BDU:2023-03500" />
			<reference href="https://bdu.fstec.ru/vul/2023-05190" type="self" id="BDU:2023-05190" title="BDU:2023-05190" />
			<reference href="https://bdu.fstec.ru/vul/2023-03502" type="self" id="BDU:2023-03502" title="BDU:2023-03502" />
			<reference href="https://bdu.fstec.ru/vul/2023-03501" type="self" id="BDU:2023-03501" title="BDU:2023-03501" />
			<reference href="https://bdu.fstec.ru/vul/2023-03444" type="self" id="BDU:2023-03444" title="BDU:2023-03444" />
			<reference href="https://bdu.fstec.ru/vul/2023-03947" type="self" id="BDU:2023-03947" title="BDU:2023-03947" />
			<reference href="https://bdu.fstec.ru/vul/2023-03778" type="self" id="BDU:2023-03778" title="BDU:2023-03778" />
			<reference href="https://bdu.fstec.ru/vul/2023-03584" type="self" id="BDU:2023-03584" title="BDU:2023-03584" />
			<reference href="https://bdu.fstec.ru/vul/2023-02529" type="self" id="BDU:2023-02529" title="BDU:2023-02529" />
			<reference href="https://bdu.fstec.ru/vul/2023-02605" type="self" id="BDU:2023-02605" title="BDU:2023-02605" />
			<reference href="https://bdu.fstec.ru/vul/2023-02625" type="self" id="BDU:2023-02625" title="BDU:2023-02625" />
			<reference href="https://bdu.fstec.ru/vul/2023-00645" type="self" id="BDU:2023-00645" title="BDU:2023-00645" />
			<reference href="https://bdu.fstec.ru/vul/2023-00646" type="self" id="BDU:2023-00646" title="BDU:2023-00646" />
			<reference href="https://bdu.fstec.ru/vul/2023-05191" type="self" id="BDU:2023-05191" title="BDU:2023-05191" />
			<reference href="https://bdu.fstec.ru/vul/2023-02166" type="self" id="BDU:2023-02166" title="BDU:2023-02166" />
			<reference href="https://bdu.fstec.ru/vul/2023-03172" type="self" id="BDU:2023-03172" title="BDU:2023-03172" />
			<reference href="https://bdu.fstec.ru/vul/2023-02995" type="self" id="BDU:2023-02995" title="BDU:2023-02995" />
			<reference href="https://bdu.fstec.ru/vul/2023-02994" type="self" id="BDU:2023-02994" title="BDU:2023-02994" />
			<reference href="https://bdu.fstec.ru/vul/2023-02997" type="self" id="BDU:2023-02997" title="BDU:2023-02997" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="5.15.125" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:5.15.125-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230905-01</id>
		<issued date="2023-09-05" />
		<updated date="2023-09-05" />
		<title>Множественные уязвимости ядра ОС</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-yadra-os-05-09-23-1/</description>
               <solution>Установить обновление для пакета(ов) ядра РЕД ОС</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-yadra-os-05-09-23-1/" type="self" id="ROS-20230905-01" title="ROS-20230905-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32254" type="cve" id="CVE-2023-32254" title="CVE-2023-32254" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32250" type="cve" id="CVE-2023-32250" title="CVE-2023-32250" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32257" type="cve" id="CVE-2023-32257" title="CVE-2023-32257" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32258" type="cve" id="CVE-2023-32258" title="CVE-2023-32258" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32256" type="cve" id="CVE-2023-32256" title="CVE-2023-32256" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32252" type="cve" id="CVE-2023-32252" title="CVE-2023-32252" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32248" type="cve" id="CVE-2023-32248" title="CVE-2023-32248" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32249" type="cve" id="CVE-2023-32249" title="CVE-2023-32249" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32247" type="cve" id="CVE-2023-32247" title="CVE-2023-32247" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32255" type="cve" id="CVE-2023-32255" title="CVE-2023-32255" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2593" type="cve" id="CVE-2023-2593" title="CVE-2023-2593" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32253" type="cve" id="CVE-2023-32253" title="CVE-2023-32253" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32251" type="cve" id="CVE-2023-32251" title="CVE-2023-32251" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32246" type="cve" id="CVE-2023-32246" title="CVE-2023-32246" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3867" type="cve" id="CVE-2023-3867" title="CVE-2023-3867" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45888" type="cve" id="CVE-2022-45888" title="CVE-2022-45888" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002" type="cve" id="CVE-2023-2002" title="CVE-2023-2002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2235" type="cve" id="CVE-2023-2235" title="CVE-2023-2235" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2236" type="cve" id="CVE-2023-2236" title="CVE-2023-2236" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2248" type="cve" id="CVE-2023-2248" title="CVE-2023-2248" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33288" type="cve" id="CVE-2023-33288" title="CVE-2023-33288" />
			<reference href="https://bdu.fstec.ru/vul/2023-02749" type="self" id="BDU:2023-02749" title="BDU:2023-02749" />
			<reference href="https://bdu.fstec.ru/vul/2023-02740" type="self" id="BDU:2023-02740" title="BDU:2023-02740" />
			<reference href="https://bdu.fstec.ru/vul/2023-02742" type="self" id="BDU:2023-02742" title="BDU:2023-02742" />
			<reference href="https://bdu.fstec.ru/vul/2023-02747" type="self" id="BDU:2023-02747" title="BDU:2023-02747" />
			<reference href="https://bdu.fstec.ru/vul/2023-02739" type="self" id="BDU:2023-02739" title="BDU:2023-02739" />
			<reference href="https://bdu.fstec.ru/vul/2023-02744" type="self" id="BDU:2023-02744" title="BDU:2023-02744" />
			<reference href="https://bdu.fstec.ru/vul/2023-02746" type="self" id="BDU:2023-02746" title="BDU:2023-02746" />
			<reference href="https://bdu.fstec.ru/vul/2023-02741" type="self" id="BDU:2023-02741" title="BDU:2023-02741" />
			<reference href="https://bdu.fstec.ru/vul/2023-02750" type="self" id="BDU:2023-02750" title="BDU:2023-02750" />
			<reference href="https://bdu.fstec.ru/vul/2023-02748" type="self" id="BDU:2023-02748" title="BDU:2023-02748" />
			<reference href="https://bdu.fstec.ru/vul/2023-02743" type="self" id="BDU:2023-02743" title="BDU:2023-02743" />
			<reference href="https://bdu.fstec.ru/vul/2023-02745" type="self" id="BDU:2023-02745" title="BDU:2023-02745" />
			<reference href="https://bdu.fstec.ru/vul/2023-02751" type="self" id="BDU:2023-02751" title="BDU:2023-02751" />
			<reference href="https://bdu.fstec.ru/vul/2023-05194" type="self" id="BDU:2023-05194" title="BDU:2023-05194" />
			<reference href="https://bdu.fstec.ru/vul/2023-02118" type="self" id="BDU:2023-02118" title="BDU:2023-02118" />
			<reference href="https://bdu.fstec.ru/vul/2023-02407" type="self" id="BDU:2023-02407" title="BDU:2023-02407" />
			<reference href="https://bdu.fstec.ru/vul/2023-02406" type="self" id="BDU:2023-02406" title="BDU:2023-02406" />
			<reference href="https://bdu.fstec.ru/vul/2023-05193" type="self" id="BDU:2023-05193" title="BDU:2023-05193" />
			<reference href="https://bdu.fstec.ru/vul/2023-02801" type="self" id="BDU:2023-02801" title="BDU:2023-02801" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="5.15.125" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:5.15.125-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230905-02</id>
		<issued date="2023-09-05" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости ядра ОС</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-yadra-os-05-09-23-2/</description>
               <solution>Установить обновление для пакета(ов) ядра РЕД ОС</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-yadra-os-05-09-23-2/" type="self" id="ROS-20230905-02" title="ROS-20230905-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32254" type="cve" id="CVE-2023-32254" title="CVE-2023-32254" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32250" type="cve" id="CVE-2023-32250" title="CVE-2023-32250" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32257" type="cve" id="CVE-2023-32257" title="CVE-2023-32257" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32258" type="cve" id="CVE-2023-32258" title="CVE-2023-32258" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32256" type="cve" id="CVE-2023-32256" title="CVE-2023-32256" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32252" type="cve" id="CVE-2023-32252" title="CVE-2023-32252" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32248" type="cve" id="CVE-2023-32248" title="CVE-2023-32248" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32249" type="cve" id="CVE-2023-32249" title="CVE-2023-32249" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32247" type="cve" id="CVE-2023-32247" title="CVE-2023-32247" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32255" type="cve" id="CVE-2023-32255" title="CVE-2023-32255" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2593" type="cve" id="CVE-2023-2593" title="CVE-2023-2593" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32253" type="cve" id="CVE-2023-32253" title="CVE-2023-32253" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32251" type="cve" id="CVE-2023-32251" title="CVE-2023-32251" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32246" type="cve" id="CVE-2023-32246" title="CVE-2023-32246" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3867" type="cve" id="CVE-2023-3867" title="CVE-2023-3867" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45888" type="cve" id="CVE-2022-45888" title="CVE-2022-45888" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002" type="cve" id="CVE-2023-2002" title="CVE-2023-2002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2235" type="cve" id="CVE-2023-2235" title="CVE-2023-2235" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2236" type="cve" id="CVE-2023-2236" title="CVE-2023-2236" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2248" type="cve" id="CVE-2023-2248" title="CVE-2023-2248" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33288" type="cve" id="CVE-2023-33288" title="CVE-2023-33288" />
			<reference href="https://bdu.fstec.ru/vul/2023-02749" type="self" id="BDU:2023-02749" title="BDU:2023-02749" />
			<reference href="https://bdu.fstec.ru/vul/2023-02740" type="self" id="BDU:2023-02740" title="BDU:2023-02740" />
			<reference href="https://bdu.fstec.ru/vul/2023-02742" type="self" id="BDU:2023-02742" title="BDU:2023-02742" />
			<reference href="https://bdu.fstec.ru/vul/2023-02747" type="self" id="BDU:2023-02747" title="BDU:2023-02747" />
			<reference href="https://bdu.fstec.ru/vul/2023-02739" type="self" id="BDU:2023-02739" title="BDU:2023-02739" />
			<reference href="https://bdu.fstec.ru/vul/2023-02744" type="self" id="BDU:2023-02744" title="BDU:2023-02744" />
			<reference href="https://bdu.fstec.ru/vul/2023-02746" type="self" id="BDU:2023-02746" title="BDU:2023-02746" />
			<reference href="https://bdu.fstec.ru/vul/2023-02741" type="self" id="BDU:2023-02741" title="BDU:2023-02741" />
			<reference href="https://bdu.fstec.ru/vul/2023-02750" type="self" id="BDU:2023-02750" title="BDU:2023-02750" />
			<reference href="https://bdu.fstec.ru/vul/2023-02748" type="self" id="BDU:2023-02748" title="BDU:2023-02748" />
			<reference href="https://bdu.fstec.ru/vul/2023-02743" type="self" id="BDU:2023-02743" title="BDU:2023-02743" />
			<reference href="https://bdu.fstec.ru/vul/2023-02745" type="self" id="BDU:2023-02745" title="BDU:2023-02745" />
			<reference href="https://bdu.fstec.ru/vul/2023-02751" type="self" id="BDU:2023-02751" title="BDU:2023-02751" />
			<reference href="https://bdu.fstec.ru/vul/2023-05194" type="self" id="BDU:2023-05194" title="BDU:2023-05194" />
			<reference href="https://bdu.fstec.ru/vul/2023-02118" type="self" id="BDU:2023-02118" title="BDU:2023-02118" />
			<reference href="https://bdu.fstec.ru/vul/2023-02407" type="self" id="BDU:2023-02407" title="BDU:2023-02407" />
			<reference href="https://bdu.fstec.ru/vul/2023-02406" type="self" id="BDU:2023-02406" title="BDU:2023-02406" />
			<reference href="https://bdu.fstec.ru/vul/2023-05193" type="self" id="BDU:2023-05193" title="BDU:2023-05193" />
			<reference href="https://bdu.fstec.ru/vul/2023-02801" type="self" id="BDU:2023-02801" title="BDU:2023-02801" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230907-01</id>
		<issued date="2023-09-08" />
		<updated date="2023-09-08" />
		<title>Уязвимость ghostscript </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в ghostscript</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ghostscript-cve-2023-38559/</description>
               <solution>
                    Запретить использование в ОС пакета Ghostscript
                или
                    Установить обновление для пакета(ов) Ghostscript
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ghostscript-cve-2023-38559/" type="self" id="ROS-20230907-01" title="ROS-20230907-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38559" type="cve" id="CVE-2023-38559" title="CVE-2023-38559" />
			<reference href="https://bdu.fstec.ru/vul/2023-07662" type="self" id="BDU:2023-07662" title="BDU:2023-07662" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ghostscript" epoch="0" version="9.52" release="6.el7" arch="x86_64" src="">
					<filename>ghostscript-0:9.52-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230907-02</id>
		<issued date="2023-09-08" />
		<updated date="2023-09-08" />
		<title>Уязвимость Virtualbox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2023-22018/</description>
               <solution>
                    Запретить использование в ОС пакета VirtualBox
                или
                    Установить обновление для пакета(ов) VirtualBox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2023-22018/" type="self" id="ROS-20230907-02" title="ROS-20230907-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22018" type="cve" id="CVE-2023-22018" title="CVE-2023-22018" />
			<reference href="https://bdu.fstec.ru/vul/2023-03925" type="self" id="BDU:2023-03925" title="BDU:2023-03925" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox" epoch="0" version="6.1.46" release="1.el7" arch="x86_64" src="">
					<filename>VirtualBox-0:6.1.46-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230907-03</id>
		<issued date="2023-09-08" />
		<updated date="2023-09-08" />
		<title>Уязвимость BIND </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в bind</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-bind-cve-2023-2828-cve-2023-2911/</description>
               <solution>
                    Запретить использование в ОС пакета BIND
                или
                    Установить обновление для пакета(ов) BIND
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-bind-cve-2023-2828-cve-2023-2911/" type="self" id="ROS-20230907-03" title="ROS-20230907-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2828" type="cve" id="CVE-2023-2828" title="CVE-2023-2828" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2911" type="cve" id="CVE-2023-2911" title="CVE-2023-2911" />
			<reference href="https://bdu.fstec.ru/vul/2023-07642" type="self" id="BDU:2023-07642" title="BDU:2023-07642" />
			<reference href="https://bdu.fstec.ru/vul/2023-03436" type="self" id="BDU:2023-03436" title="BDU:2023-03436" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="bind" epoch="32" version="9.18.16" release="1.el7" arch="x86_64" src="">
					<filename>bind-32:9.18.16-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230907-04</id>
		<issued date="2023-09-08" />
		<updated date="2023-09-08" />
		<title>Множественные уязвимости openSSL </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openssl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-openssl-cve-2023-3446-cve-2023-3817/</description>
               <solution>
                    Запретить использование в ОС пакета openssl
                или
                    Установить обновление для пакета(ов) openssl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-openssl-cve-2023-3446-cve-2023-3817/" type="self" id="ROS-20230907-04" title="ROS-20230907-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3446" type="cve" id="CVE-2023-3446" title="CVE-2023-3446" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3817" type="cve" id="CVE-2023-3817" title="CVE-2023-3817" />
			<reference href="https://bdu.fstec.ru/vul/2023-04957" type="self" id="BDU:2023-04957" title="BDU:2023-04957" />
			<reference href="https://bdu.fstec.ru/vul/2023-04960" type="self" id="BDU:2023-04960" title="BDU:2023-04960" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl" epoch="1" version="1.1.1q" release="7.el7.3" arch="x86_64" src="">
					<filename>openssl-1:1.1.1q-7.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230908-05</id>
		<issued date="2023-09-08" />
		<updated date="2023-09-08" />
		<title>Уязвимость ImageMagick </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в ImageMagick</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick-cve-2023-39978/</description>
               <solution>
                    Запретить использование в ОС пакета ImageMagick 
                или
                    Установить обновление для пакета(ов) ImageMagick 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick-cve-2023-39978/" type="self" id="ROS-20230908-05" title="ROS-20230908-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39978" type="cve" id="CVE-2023-39978" title="CVE-2023-39978" />
			<reference href="https://bdu.fstec.ru/vul/2024-01900" type="self" id="BDU:2024-01900" title="BDU:2024-01900" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ImageMagick" epoch="0" version="6.9.12.93" release="1.el7" arch="x86_64" src="">
					<filename>ImageMagick-0:6.9.12.93-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230908-06</id>
		<issued date="2023-09-08" />
		<updated date="2023-09-08" />
		<title>Уязвимость Libtiff </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libtiff</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libtiff-cve-2023-3618/</description>
               <solution>
                    Запретить использование в ОС пакета LibTIFF
                или
                    Установить обновление для пакета(ов) LibTIFF
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libtiff-cve-2023-3618/" type="self" id="ROS-20230908-06" title="ROS-20230908-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3618" type="cve" id="CVE-2023-3618" title="CVE-2023-3618" />
			<reference href="https://bdu.fstec.ru/vul/2023-05287" type="self" id="BDU:2023-05287" title="BDU:2023-05287" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libtiff" epoch="0" version="4.4.0" release="8.el7" arch="x86_64" src="">
					<filename>libtiff-0:4.4.0-8.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230908-07</id>
		<issued date="2023-09-08" />
		<updated date="2023-09-08" />
		<title>Множественные уязвимости firefox</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-08-09-23/</description>
               <solution>
                    Запретить использование в ОС пакета firefox
                или
                    Установить обновление для пакета(ов) firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-08-09-23/" type="self" id="ROS-20230908-07" title="ROS-20230908-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201" type="cve" id="CVE-2023-37201" title="CVE-2023-37201" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202" type="cve" id="CVE-2023-37202" title="CVE-2023-37202" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207" type="cve" id="CVE-2023-37207" title="CVE-2023-37207" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208" type="cve" id="CVE-2023-37208" title="CVE-2023-37208" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211" type="cve" id="CVE-2023-37211" title="CVE-2023-37211" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045" type="cve" id="CVE-2023-4045" title="CVE-2023-4045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046" type="cve" id="CVE-2023-4046" title="CVE-2023-4046" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047" type="cve" id="CVE-2023-4047" title="CVE-2023-4047" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048" type="cve" id="CVE-2023-4048" title="CVE-2023-4048" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049" type="cve" id="CVE-2023-4049" title="CVE-2023-4049" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050" type="cve" id="CVE-2023-4050" title="CVE-2023-4050" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4054" type="cve" id="CVE-2023-4054" title="CVE-2023-4054" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055" type="cve" id="CVE-2023-4055" title="CVE-2023-4055" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056" type="cve" id="CVE-2023-4056" title="CVE-2023-4056" />
			<reference href="https://bdu.fstec.ru/vul/2023-04024" type="self" id="BDU:2023-04024" title="BDU:2023-04024" />
			<reference href="https://bdu.fstec.ru/vul/2023-04025" type="self" id="BDU:2023-04025" title="BDU:2023-04025" />
			<reference href="https://bdu.fstec.ru/vul/2023-04019" type="self" id="BDU:2023-04019" title="BDU:2023-04019" />
			<reference href="https://bdu.fstec.ru/vul/2023-04018" type="self" id="BDU:2023-04018" title="BDU:2023-04018" />
			<reference href="https://bdu.fstec.ru/vul/2023-04020" type="self" id="BDU:2023-04020" title="BDU:2023-04020" />
			<reference href="https://bdu.fstec.ru/vul/2023-04326" type="self" id="BDU:2023-04326" title="BDU:2023-04326" />
			<reference href="https://bdu.fstec.ru/vul/2023-04327" type="self" id="BDU:2023-04327" title="BDU:2023-04327" />
			<reference href="https://bdu.fstec.ru/vul/2023-04325" type="self" id="BDU:2023-04325" title="BDU:2023-04325" />
			<reference href="https://bdu.fstec.ru/vul/2023-04498" type="self" id="BDU:2023-04498" title="BDU:2023-04498" />
			<reference href="https://bdu.fstec.ru/vul/2023-04440" type="self" id="BDU:2023-04440" title="BDU:2023-04440" />
			<reference href="https://bdu.fstec.ru/vul/2023-04442" type="self" id="BDU:2023-04442" title="BDU:2023-04442" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="102.14.0" release="1.el7.3" arch="x86_64" src="">
					<filename>firefox-0:102.14.0-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230908-08</id>
		<issued date="2023-09-08" />
		<updated date="2023-09-08" />
		<title>Уязвимость thunderbird </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-thunderbird-cve-2023-3417/</description>
               <solution>
                    Запретить использование в ОС пакета thunderbird
                или
                    Установить обновление для пакета(ов) thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-thunderbird-cve-2023-3417/" type="self" id="ROS-20230908-08" title="ROS-20230908-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3417" type="cve" id="CVE-2023-3417" title="CVE-2023-3417" />
			<reference href="https://bdu.fstec.ru/vul/2023-03965" type="self" id="BDU:2023-03965" title="BDU:2023-03965" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="102.14.0" release="1.el7.3" arch="x86_64" src="">
					<filename>thunderbird-0:102.14.0-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230911-01</id>
		<issued date="2023-09-12" />
		<updated date="2023-09-12" />
		<title>Множественные уязвимости Wireshark </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в wireshark</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-wireshark-cve-2023-3648-cve-2023-3649/</description>
               <solution>
                    Запретить использование в ОС пакета Wireshark
                или
                    Установить обновление для пакета(ов) Wireshark
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-wireshark-cve-2023-3648-cve-2023-3649/" type="self" id="ROS-20230911-01" title="ROS-20230911-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3648" type="cve" id="CVE-2023-3648" title="CVE-2023-3648" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3649" type="cve" id="CVE-2023-3649" title="CVE-2023-3649" />
			<reference href="https://bdu.fstec.ru/vul/2023-05695" type="self" id="BDU:2023-05695" title="BDU:2023-05695" />
			<reference href="https://bdu.fstec.ru/vul/2023-05696" type="self" id="BDU:2023-05696" title="BDU:2023-05696" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="wireshark" epoch="1" version="3.6.0" release="4.el7" arch="x86_64" src="">
					<filename>wireshark-1:3.6.0-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230911-02</id>
		<issued date="2023-09-12" />
		<updated date="2023-09-12" />
		<title>Уязвимость KeePass </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в keepass</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-keepass-cve-2023-32784/</description>
               <solution>
                    Запретить использование в ОС пакета keepass
                или
                    Установить обновление для пакета(ов) keepass
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-keepass-cve-2023-32784/" type="self" id="ROS-20230911-02" title="ROS-20230911-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32784" type="cve" id="CVE-2023-32784" title="CVE-2023-32784" />
			<reference href="https://bdu.fstec.ru/vul/2023-03124" type="self" id="BDU:2023-03124" title="BDU:2023-03124" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="keepass" epoch="0" version="2.54" release="1.el7" arch="x86_64" src="">
					<filename>keepass-0:2.54-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230911-03</id>
		<issued date="2023-09-12" />
		<updated date="2023-09-12" />
		<title>Уязвимость XML libexpat </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в expat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-xml-libexpat-cve-2022-43680/</description>
               <solution>
                    Запретить использование в ОС пакета expat
                или
                    Установить обновление для пакета(ов) expat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-xml-libexpat-cve-2022-43680/" type="self" id="ROS-20230911-03" title="ROS-20230911-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43680" type="cve" id="CVE-2022-43680" title="CVE-2022-43680" />
			<reference href="https://bdu.fstec.ru/vul/2023-02688" type="self" id="BDU:2023-02688" title="BDU:2023-02688" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="expat" epoch="0" version="2.5.0" release="1.el7" arch="x86_64" src="">
					<filename>expat-0:2.5.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230911-04</id>
		<issued date="2023-09-12" />
		<updated date="2023-09-12" />
		<title>Уязвимость Gpac </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gpac</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gpac-cve-2023-3523/</description>
               <solution>
                    Запретить использование в ОС пакета Gpac
                или
                    Установить обновление для пакета(ов) Gpac
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gpac-cve-2023-3523/" type="self" id="ROS-20230911-04" title="ROS-20230911-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3523" type="cve" id="CVE-2023-3523" title="CVE-2023-3523" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gpac" epoch="0" version="0.7.1" release="4.el7" arch="x86_64" src="">
					<filename>gpac-0:0.7.1-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230911-05</id>
		<issued date="2023-09-12" />
		<updated date="2023-09-12" />
		<title>Уязвимость Ghostscript </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ghostscript</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ghostscript-cve-2023-36664/</description>
               <solution>
                    Запретить использование в ОС пакета ghostscript
                или
                    Установить обновление для пакета(ов) ghostscript
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ghostscript-cve-2023-36664/" type="self" id="ROS-20230911-05" title="ROS-20230911-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36664" type="cve" id="CVE-2023-36664" title="CVE-2023-36664" />
			<reference href="https://bdu.fstec.ru/vul/2023-03466" type="self" id="BDU:2023-03466" title="BDU:2023-03466" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ghostscript" epoch="0" version="9.52" release="4.el7" arch="x86_64" src="">
					<filename>ghostscript-0:9.52-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230911-06</id>
		<issued date="2023-09-12" />
		<updated date="2023-09-12" />
		<title>Уязвимость OpenSSH </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в openssh</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssh-cve-2023-28531/</description>
               <solution>
                    Запретить использование в ОС пакета openssh
                или
                    Установить обновление для пакета(ов) openssh
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssh-cve-2023-28531/" type="self" id="ROS-20230911-06" title="ROS-20230911-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28531" type="cve" id="CVE-2023-28531" title="CVE-2023-28531" />
			<reference href="https://bdu.fstec.ru/vul/2023-02094" type="self" id="BDU:2023-02094" title="BDU:2023-02094" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssh" epoch="0" version="8.9p1" release="8.el7" arch="x86_64" src="">
					<filename>openssh-0:8.9p1-8.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230911-07</id>
		<issued date="2023-09-12" />
		<updated date="2023-09-12" />
		<title>Множественные уязвимости Moodle</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-moodle-cve-2023-35131-cve-2023-35132-cve-2023-35133/</description>
               <solution>
                    Запретить использование в ОС пакета Мoodle
                или
                    Установить обновление для пакета(ов) Мoodle
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-moodle-cve-2023-35131-cve-2023-35132-cve-2023-35133/" type="self" id="ROS-20230911-07" title="ROS-20230911-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35131" type="cve" id="CVE-2023-35131" title="CVE-2023-35131" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35132" type="cve" id="CVE-2023-35132" title="CVE-2023-35132" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35133" type="cve" id="CVE-2023-35133" title="CVE-2023-35133" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="moodle" epoch="0" version="3.11.15" release="1.el7.3" arch="noarch" src="">
					<filename>moodle-0:3.11.15-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230911-08</id>
		<issued date="2023-09-12" />
		<updated date="2023-09-12" />
		<title>Уязвимость UnRAR </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в unrar</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-unrar-cve-2022-48579/</description>
               <solution>
                    Запретить использование в ОС пакета UnRAR
                или
                    Установить обновление для пакета(ов) UnRAR
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-unrar-cve-2022-48579/" type="self" id="ROS-20230911-08" title="ROS-20230911-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48579" type="cve" id="CVE-2022-48579" title="CVE-2022-48579" />
			<reference href="https://bdu.fstec.ru/vul/2023-07638" type="self" id="BDU:2023-07638" title="BDU:2023-07638" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="unrar" epoch="0" version="6.2.8" release="1.el7" arch="x86_64" src="">
					<filename>unrar-0:6.2.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230911-09</id>
		<issued date="2023-09-12" />
		<updated date="2023-09-12" />
		<title>Уязвимость librsvg </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в librsvg2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-librsvg-cve-2023-38633/</description>
               <solution>
                    Запретить использование в ОС пакета librsvg2
                или
                    Установить обновление для пакета(ов) librsvg2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-librsvg-cve-2023-38633/" type="self" id="ROS-20230911-09" title="ROS-20230911-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38633" type="cve" id="CVE-2023-38633" title="CVE-2023-38633" />
			<reference href="https://bdu.fstec.ru/vul/2023-05427" type="self" id="BDU:2023-05427" title="BDU:2023-05427" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="librsvg2" epoch="0" version="2.50.0" release="4.el7" arch="x86_64" src="">
					<filename>librsvg2-0:2.50.0-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230911-10</id>
		<issued date="2023-09-12" />
		<updated date="2023-10-24" />
		<title>Уязвимость django </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-django</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-django-cve-2023-36053/</description>
               <solution>
                    Запретить использование в ОС пакета Django
                или
                    Установить обновление для пакета(ов) Django
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-django-cve-2023-36053/" type="self" id="ROS-20230911-10" title="ROS-20230911-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36053" type="cve" id="CVE-2023-36053" title="CVE-2023-36053" />
			<reference href="https://bdu.fstec.ru/vul/2023-04481" type="self" id="BDU:2023-04481" title="BDU:2023-04481" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-django" epoch="0" version="3.2.20" release="2.el7" arch="noarch" src="">
					<filename>python3-django-0:3.2.20-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230912-01</id>
		<issued date="2023-09-18" />
		<updated date="2023-09-18" />
		<title>Множественные уязвимости Wireshark </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в wireshark</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-wireshark-cve-2023-4511-cve-2023-4512-cve-2023-4513/</description>
               <solution>
                    Запретить использование в ОС пакета Wireshark
                или
                    Установить обновление для пакета(ов) Wireshark
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-wireshark-cve-2023-4511-cve-2023-4512-cve-2023-4513/" type="self" id="ROS-20230912-01" title="ROS-20230912-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4511" type="cve" id="CVE-2023-4511" title="CVE-2023-4511" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4512" type="cve" id="CVE-2023-4512" title="CVE-2023-4512" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4513" type="cve" id="CVE-2023-4513" title="CVE-2023-4513" />
			<reference href="https://bdu.fstec.ru/vul/2023-05711" type="self" id="BDU:2023-05711" title="BDU:2023-05711" />
			<reference href="https://bdu.fstec.ru/vul/2023-05713" type="self" id="BDU:2023-05713" title="BDU:2023-05713" />
			<reference href="https://bdu.fstec.ru/vul/2023-05712" type="self" id="BDU:2023-05712" title="BDU:2023-05712" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="wireshark" epoch="1" version="4.0.8" release="1.el7" arch="x86_64" src="">
					<filename>wireshark-1:4.0.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230913-02</id>
		<issued date="2023-09-18" />
		<updated date="2023-09-18" />
		<title>Множественные уязвимости Nextcloud </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nextcloud</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nextcloud-cve-2023-39958-cve-2023-39959-cve-2023-39962-cve-2023-39963-cve/</description>
               <solution>
                    Запретить использование в ОС пакета Nextcloud 
                или
                    Установить обновление для пакета(ов) Nextcloud 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nextcloud-cve-2023-39958-cve-2023-39959-cve-2023-39962-cve-2023-39963-cve/" type="self" id="ROS-20230913-02" title="ROS-20230913-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39958" type="cve" id="CVE-2023-39958" title="CVE-2023-39958" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39959" type="cve" id="CVE-2023-39959" title="CVE-2023-39959" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39962" type="cve" id="CVE-2023-39962" title="CVE-2023-39962" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39963" type="cve" id="CVE-2023-39963" title="CVE-2023-39963" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39952" type="cve" id="CVE-2023-39952" title="CVE-2023-39952" />
			<reference href="https://bdu.fstec.ru/vul/2023-05877" type="self" id="BDU:2023-05877" title="BDU:2023-05877" />
			<reference href="https://bdu.fstec.ru/vul/2023-05876" type="self" id="BDU:2023-05876" title="BDU:2023-05876" />
			<reference href="https://bdu.fstec.ru/vul/2023-05875" type="self" id="BDU:2023-05875" title="BDU:2023-05875" />
			<reference href="https://bdu.fstec.ru/vul/2023-05874" type="self" id="BDU:2023-05874" title="BDU:2023-05874" />
			<reference href="https://bdu.fstec.ru/vul/2023-05873" type="self" id="BDU:2023-05873" title="BDU:2023-05873" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nextcloud" epoch="0" version="25.0.5" release="3.el7" arch="noarch" src="">
					<filename>nextcloud-0:25.0.5-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230913-03</id>
		<issued date="2023-09-18" />
		<updated date="2023-09-18" />
		<title>Множественные уязвимости libreswan </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libreswan</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libreswan-cve-2023-38710-cve-2023-38711-cve-2023-38712/</description>
               <solution>
                    Запретить использование в ОС пакета Libreswan
                или
                    Установить обновление для пакета(ов) Libreswan
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libreswan-cve-2023-38710-cve-2023-38711-cve-2023-38712/" type="self" id="ROS-20230913-03" title="ROS-20230913-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38710" type="cve" id="CVE-2023-38710" title="CVE-2023-38710" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38711" type="cve" id="CVE-2023-38711" title="CVE-2023-38711" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38712" type="cve" id="CVE-2023-38712" title="CVE-2023-38712" />
			<reference href="https://bdu.fstec.ru/vul/2023-05883" type="self" id="BDU:2023-05883" title="BDU:2023-05883" />
			<reference href="https://bdu.fstec.ru/vul/2023-05882" type="self" id="BDU:2023-05882" title="BDU:2023-05882" />
			<reference href="https://bdu.fstec.ru/vul/2023-05880" type="self" id="BDU:2023-05880" title="BDU:2023-05880" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libreswan" epoch="0" version="4.12" release="1.el7" arch="x86_64" src="">
					<filename>libreswan-0:4.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230914-04</id>
		<issued date="2023-09-18" />
		<updated date="2023-09-18" />
		<title>Уязвимость nasm </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nasm</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nasm-cve-2022-29654/</description>
               <solution>
                    Запретить использование в ОС пакета Nasm
                или
                    Установить обновление для пакета(ов) Nasm
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nasm-cve-2022-29654/" type="self" id="ROS-20230914-04" title="ROS-20230914-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29654" type="cve" id="CVE-2022-29654" title="CVE-2022-29654" />
			<reference href="https://bdu.fstec.ru/vul/2023-05881" type="self" id="BDU:2023-05881" title="BDU:2023-05881" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nasm" epoch="0" version="2.15.05" release="1.el7" arch="x86_64" src="">
					<filename>nasm-0:2.15.05-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230914-05</id>
		<issued date="2023-09-18" />
		<updated date="2023-09-18" />
		<title>Множественные уязвимости djvulibre </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в djvulibre</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-djvulibre-cve-2021-46312-cve-2021-46310/</description>
               <solution>
                    Запретить использование в ОС пакета Djvulibre
                или
                    Установить обновление для пакета(ов) Djvulibre
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-djvulibre-cve-2021-46312-cve-2021-46310/" type="self" id="ROS-20230914-05" title="ROS-20230914-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46312" type="cve" id="CVE-2021-46312" title="CVE-2021-46312" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46310" type="cve" id="CVE-2021-46310" title="CVE-2021-46310" />
			<reference href="https://bdu.fstec.ru/vul/2023-05878" type="self" id="BDU:2023-05878" title="BDU:2023-05878" />
			<reference href="https://bdu.fstec.ru/vul/2023-05879" type="self" id="BDU:2023-05879" title="BDU:2023-05879" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="djvulibre" epoch="0" version="3.5.28" release="4.el7" arch="x86_64" src="">
					<filename>djvulibre-0:3.5.28-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230914-06</id>
		<issued date="2023-09-18" />
		<updated date="2023-09-18" />
		<title>Уязвимость iperf3 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в iperf3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-iperf3-cve-2023-38403/</description>
               <solution>
                    Запретить использование в ОС пакета iperf3
                или
                    Установить обновление для пакета(ов) iperf3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-iperf3-cve-2023-38403/" type="self" id="ROS-20230914-06" title="ROS-20230914-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38403" type="cve" id="CVE-2023-38403" title="CVE-2023-38403" />
			<reference href="https://bdu.fstec.ru/vul/2023-03980" type="self" id="BDU:2023-03980" title="BDU:2023-03980" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="iperf3" epoch="0" version="3.14" release="1.el7" arch="x86_64" src="">
					<filename>iperf3-0:3.14-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230914-07</id>
		<issued date="2023-09-18" />
		<updated date="2023-09-18" />
		<title>Уязвимость open-vm-tools </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в open-vm-tools</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-open-vm-tools-cve-2023-20900/</description>
               <solution>
                    Запретить использование в ОС пакета open-vm-tools
                или
                    Установить обновление для пакета(ов) open-vm-tools
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-open-vm-tools-cve-2023-20900/" type="self" id="ROS-20230914-07" title="ROS-20230914-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20900" type="cve" id="CVE-2023-20900" title="CVE-2023-20900" />
			<reference href="https://bdu.fstec.ru/vul/2023-05064" type="self" id="BDU:2023-05064" title="BDU:2023-05064" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="open-vm-tools" epoch="0" version="12.2.5" release="4.el7" arch="x86_64" src="">
					<filename>open-vm-tools-0:12.2.5-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230914-08</id>
		<issued date="2023-09-18" />
		<updated date="2023-09-18" />
		<title>Множественные уязвимости gpac </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gpac</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gpac-cve-2023-4721-cve-2023-4722-cve-2023-4682-cve-2023-4683/</description>
               <solution>
                    Запретить использование в ОС пакета Gpac
                или
                    Установить обновление для пакета(ов) Gpac
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gpac-cve-2023-4721-cve-2023-4722-cve-2023-4682-cve-2023-4683/" type="self" id="ROS-20230914-08" title="ROS-20230914-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4721" type="cve" id="CVE-2023-4721" title="CVE-2023-4721" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4722" type="cve" id="CVE-2023-4722" title="CVE-2023-4722" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4682" type="cve" id="CVE-2023-4682" title="CVE-2023-4682" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4683" type="cve" id="CVE-2023-4683" title="CVE-2023-4683" />
			<reference href="https://bdu.fstec.ru/vul/2023-05867" type="self" id="BDU:2023-05867" title="BDU:2023-05867" />
			<reference href="https://bdu.fstec.ru/vul/2023-05866" type="self" id="BDU:2023-05866" title="BDU:2023-05866" />
			<reference href="https://bdu.fstec.ru/vul/2023-05865" type="self" id="BDU:2023-05865" title="BDU:2023-05865" />
			<reference href="https://bdu.fstec.ru/vul/2023-05864" type="self" id="BDU:2023-05864" title="BDU:2023-05864" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gpac" epoch="0" version="0.7.1" release="5.el7" arch="x86_64" src="">
					<filename>gpac-0:0.7.1-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230915-09</id>
		<issued date="2023-09-18" />
		<updated date="2023-09-18" />
		<title>Уязвимость nftables </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nftables-cve-2023-0179/</description>
               <solution>Установить обновление для пакета(ов) ядра РЕД ОС</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nftables-cve-2023-0179/" type="self" id="ROS-20230915-09" title="ROS-20230915-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179" type="cve" id="CVE-2023-0179" title="CVE-2023-0179" />
			<reference href="https://bdu.fstec.ru/vul/2023-00383" type="self" id="BDU:2023-00383" title="BDU:2023-00383" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="5.15.125" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:5.15.125-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230915-10</id>
		<issued date="2023-09-18" />
		<updated date="2023-09-18" />
		<title>Множественные уязвимости ядра ОС</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-yadra-os-18-09-2023/</description>
               <solution>Установить обновление для пакета(ов) ядра РЕД ОС</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-yadra-os-18-09-2023/" type="self" id="ROS-20230915-10" title="ROS-20230915-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0597" type="cve" id="CVE-2023-0597" title="CVE-2023-0597" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4378" type="cve" id="CVE-2022-4378" title="CVE-2022-4378" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266" type="cve" id="CVE-2023-0266" title="CVE-2023-0266" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1281" type="cve" id="CVE-2023-1281" title="CVE-2023-1281" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0386" type="cve" id="CVE-2023-0386" title="CVE-2023-0386" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212" type="cve" id="CVE-2023-3212" title="CVE-2023-3212" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269" type="cve" id="CVE-2023-2269" title="CVE-2023-2269" />
			<reference href="https://bdu.fstec.ru/vul/2023-00625" type="self" id="BDU:2023-00625" title="BDU:2023-00625" />
			<reference href="https://bdu.fstec.ru/vul/2022-07336" type="self" id="BDU:2022-07336" title="BDU:2022-07336" />
			<reference href="https://bdu.fstec.ru/vul/2023-00382" type="self" id="BDU:2023-00382" title="BDU:2023-00382" />
			<reference href="https://bdu.fstec.ru/vul/2023-01571" type="self" id="BDU:2023-01571" title="BDU:2023-01571" />
			<reference href="https://bdu.fstec.ru/vul/2023-01572" type="self" id="BDU:2023-01572" title="BDU:2023-01572" />
			<reference href="https://bdu.fstec.ru/vul/2023-03169" type="self" id="BDU:2023-03169" title="BDU:2023-03169" />
			<reference href="https://bdu.fstec.ru/vul/2023-02523" type="self" id="BDU:2023-02523" title="BDU:2023-02523" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="5.15.125" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:5.15.125-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230915-11</id>
		<issued date="2023-09-18" />
		<updated date="2023-09-18" />
		<title>Уязвимость GStreamer </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gstreamer1-plugins-base</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gstreamer-cve-2023-37329/</description>
               <solution>
                    Запретить использование в ОС пакета gstreamer1-plugins-base
                или
                    Установить обновление для пакета(ов) gstreamer1-plugins-base
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gstreamer-cve-2023-37329/" type="self" id="ROS-20230915-11" title="ROS-20230915-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37329" type="cve" id="CVE-2023-37329" title="CVE-2023-37329" />
			<reference href="https://bdu.fstec.ru/vul/2023-04340" type="self" id="BDU:2023-04340" title="BDU:2023-04340" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gstreamer1-plugins-base" epoch="0" version="1.16.2" release="4.el7" arch="x86_64" src="">
					<filename>gstreamer1-plugins-base-0:1.16.2-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230915-12</id>
		<issued date="2023-09-18" />
		<updated date="2023-09-18" />
		<title>Уязвимость redis </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в redis</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-redis-cve-2023-41053/</description>
               <solution>
                    Запретить использование в ОС пакета redis
                или
                    Установить обновление для пакета(ов) redis
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-redis-cve-2023-41053/" type="self" id="ROS-20230915-12" title="ROS-20230915-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41053" type="cve" id="CVE-2023-41053" title="CVE-2023-41053" />
			<reference href="https://bdu.fstec.ru/vul/2023-05475" type="self" id="BDU:2023-05475" title="BDU:2023-05475" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="redis" epoch="0" version="7.0.13" release="1.el7" arch="x86_64" src="">
					<filename>redis-0:7.0.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230915-13</id>
		<issued date="2023-09-18" />
		<updated date="2023-09-18" />
		<title>Уязвимость GitPython </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-GitPython</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gitpython-cve-2023-41040-/</description>
               <solution>
                    Запретить использование в ОС пакета python3-GitPython
                или
                    Установить обновление для пакета(ов) python3-GitPython
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gitpython-cve-2023-41040-/" type="self" id="ROS-20230915-13" title="ROS-20230915-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41040" type="cve" id="CVE-2023-41040" title="CVE-2023-41040" />
			<reference href="https://bdu.fstec.ru/vul/2023-05476" type="self" id="BDU:2023-05476" title="BDU:2023-05476" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-GitPython" epoch="0" version="3.1.35" release="1.el7" arch="noarch" src="">
					<filename>python3-GitPython-0:3.1.35-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230915-14</id>
		<issued date="2023-09-18" />
		<updated date="2023-09-18" />
		<title>Уязвимость OpenSSL </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openssl3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl-cve-2023-2975/</description>
               <solution>
                    Запретить использование в ОС пакета openssl3
                или
                    Установить обновление для пакета(ов) openssl3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl-cve-2023-2975/" type="self" id="ROS-20230915-14" title="ROS-20230915-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2975" type="cve" id="CVE-2023-2975" title="CVE-2023-2975" />
			<reference href="https://bdu.fstec.ru/vul/2023-04959" type="self" id="BDU:2023-04959" title="BDU:2023-04959" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl3" epoch="0" version="3.0.9" release="2.el7" arch="x86_64" src="">
					<filename>openssl3-0:3.0.9-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230915-15</id>
		<issued date="2023-09-18" />
		<updated date="2023-09-18" />
		<title>Уязвимость mailcap</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в python3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mailcap-cve-2015-20107/</description>
               <solution>
                    Запретить использование в ОС пакета python3
                или
                    Установить обновление для пакета(ов) python3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mailcap-cve-2015-20107/" type="self" id="ROS-20230915-15" title="ROS-20230915-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107" type="cve" id="CVE-2015-20107" title="CVE-2015-20107" />
			<reference href="https://bdu.fstec.ru/vul/2022-03962" type="self" id="BDU:2022-03962" title="BDU:2022-03962" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3" epoch="0" version="3.8.2" release="15.el7" arch="x86_64" src="">
					<filename>python3-0:3.8.2-15.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230918-01</id>
		<issued date="2023-09-19" />
		<updated date="2023-09-19" />
		<title>Множественные уязвимости giflib </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в giflib</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-giflib-cve-2023-39742-cve-2022-28506/</description>
               <solution>
                    Запретить использование в ОС пакета GIFLIB
                или
                    Установить обновление для пакета(ов) GIFLIB
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-giflib-cve-2023-39742-cve-2022-28506/" type="self" id="ROS-20230918-01" title="ROS-20230918-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39742" type="cve" id="CVE-2023-39742" title="CVE-2023-39742" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28506" type="cve" id="CVE-2022-28506" title="CVE-2022-28506" />
			<reference href="https://bdu.fstec.ru/vul/2023-05863" type="self" id="BDU:2023-05863" title="BDU:2023-05863" />
			<reference href="https://bdu.fstec.ru/vul/2023-05862" type="self" id="BDU:2023-05862" title="BDU:2023-05862" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="giflib" epoch="0" version="5.2.1" release="3.el7" arch="x86_64" src="">
					<filename>giflib-0:5.2.1-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230918-02</id>
		<issued date="2023-09-19" />
		<updated date="2023-09-19" />
		<title>Уязвимость OpenSSL </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в openssl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl-cve-2023-4807/</description>
               <solution>
                    Запретить использование в ОС пакета OpenSSL 
                или
                    Установить обновление для пакета(ов) OpenSSL 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl-cve-2023-4807/" type="self" id="ROS-20230918-02" title="ROS-20230918-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4807" type="cve" id="CVE-2023-4807" title="CVE-2023-4807" />
			<reference href="https://bdu.fstec.ru/vul/2023-05872" type="self" id="BDU:2023-05872" title="BDU:2023-05872" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl" epoch="1" version="1.1.1q" release="8.el7.3" arch="x86_64" src="">
					<filename>openssl-1:1.1.1q-8.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230918-03</id>
		<issued date="2023-09-19" />
		<updated date="2023-09-19" />
		<title>Множественные уязвимости gpac </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gpac</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gpac-cve-2023-4758-cve-2023-4754-cve-2023-4756-cve-2023-4778/</description>
               <solution>
                    Запретить использование в ОС пакета Gpac
                или
                    Установить обновление для пакета(ов) Gpac
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gpac-cve-2023-4758-cve-2023-4754-cve-2023-4756-cve-2023-4778/" type="self" id="ROS-20230918-03" title="ROS-20230918-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4758" type="cve" id="CVE-2023-4758" title="CVE-2023-4758" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4754" type="cve" id="CVE-2023-4754" title="CVE-2023-4754" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4756" type="cve" id="CVE-2023-4756" title="CVE-2023-4756" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4778" type="cve" id="CVE-2023-4778" title="CVE-2023-4778" />
			<reference href="https://bdu.fstec.ru/vul/2023-05871" type="self" id="BDU:2023-05871" title="BDU:2023-05871" />
			<reference href="https://bdu.fstec.ru/vul/2023-05870" type="self" id="BDU:2023-05870" title="BDU:2023-05870" />
			<reference href="https://bdu.fstec.ru/vul/2023-05869" type="self" id="BDU:2023-05869" title="BDU:2023-05869" />
			<reference href="https://bdu.fstec.ru/vul/2023-05868" type="self" id="BDU:2023-05868" title="BDU:2023-05868" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gpac" epoch="0" version="0.7.1" release="8.el7" arch="x86_64" src="">
					<filename>gpac-0:0.7.1-8.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230918-04</id>
		<issued date="2023-09-19" />
		<updated date="2023-09-19" />
		<title>Множественные уязвимости Poppler </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в poppler</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-poppler-cve-2022-38349-cve-2022-37052-cve-2022-37051-cve-2022-37050/</description>
               <solution>
                    Запретить использование в ОС пакета Poppler
                или
                    Установить обновление для пакета(ов) Poppler
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-poppler-cve-2022-38349-cve-2022-37052-cve-2022-37051-cve-2022-37050/" type="self" id="ROS-20230918-04" title="ROS-20230918-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38349" type="cve" id="CVE-2022-38349" title="CVE-2022-38349" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37052" type="cve" id="CVE-2022-37052" title="CVE-2022-37052" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37051" type="cve" id="CVE-2022-37051" title="CVE-2022-37051" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37050" type="cve" id="CVE-2022-37050" title="CVE-2022-37050" />
			<reference href="https://bdu.fstec.ru/vul/2023-05861" type="self" id="BDU:2023-05861" title="BDU:2023-05861" />
			<reference href="https://bdu.fstec.ru/vul/2023-05860" type="self" id="BDU:2023-05860" title="BDU:2023-05860" />
			<reference href="https://bdu.fstec.ru/vul/2023-05859" type="self" id="BDU:2023-05859" title="BDU:2023-05859" />
			<reference href="https://bdu.fstec.ru/vul/2023-05858" type="self" id="BDU:2023-05858" title="BDU:2023-05858" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="poppler" epoch="0" version="21.08.0" release="14.el7" arch="x86_64" src="">
					<filename>poppler-0:21.08.0-14.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230919-01</id>
		<issued date="2023-09-20" />
		<updated date="2023-09-20" />
		<title>Множественные уязвимости firefox</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-20-09-2023/</description>
               <solution>
                    Запретить использование в ОС пакета Firefox
                или
                    Установить обновление для пакета(ов) Firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-20-09-2023/" type="self" id="ROS-20230919-01" title="ROS-20230919-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573" type="cve" id="CVE-2023-4573" title="CVE-2023-4573" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574" type="cve" id="CVE-2023-4574" title="CVE-2023-4574" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575" type="cve" id="CVE-2023-4575" title="CVE-2023-4575" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4576" type="cve" id="CVE-2023-4576" title="CVE-2023-4576" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4577" type="cve" id="CVE-2023-4577" title="CVE-2023-4577" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4578" type="cve" id="CVE-2023-4578" title="CVE-2023-4578" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4580" type="cve" id="CVE-2023-4580" title="CVE-2023-4580" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581" type="cve" id="CVE-2023-4581" title="CVE-2023-4581" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4582" type="cve" id="CVE-2023-4582" title="CVE-2023-4582" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4583" type="cve" id="CVE-2023-4583" title="CVE-2023-4583" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584" type="cve" id="CVE-2023-4584" title="CVE-2023-4584" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4585" type="cve" id="CVE-2023-4585" title="CVE-2023-4585" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4579" type="cve" id="CVE-2023-4579" title="CVE-2023-4579" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46884" type="cve" id="CVE-2022-46884" title="CVE-2022-46884" />
			<reference href="https://bdu.fstec.ru/vul/2023-05181" type="self" id="BDU:2023-05181" title="BDU:2023-05181" />
			<reference href="https://bdu.fstec.ru/vul/2023-05176" type="self" id="BDU:2023-05176" title="BDU:2023-05176" />
			<reference href="https://bdu.fstec.ru/vul/2023-05175" type="self" id="BDU:2023-05175" title="BDU:2023-05175" />
			<reference href="https://bdu.fstec.ru/vul/2023-05177" type="self" id="BDU:2023-05177" title="BDU:2023-05177" />
			<reference href="https://bdu.fstec.ru/vul/2023-05174" type="self" id="BDU:2023-05174" title="BDU:2023-05174" />
			<reference href="https://bdu.fstec.ru/vul/2023-05179" type="self" id="BDU:2023-05179" title="BDU:2023-05179" />
			<reference href="https://bdu.fstec.ru/vul/2023-05178" type="self" id="BDU:2023-05178" title="BDU:2023-05178" />
			<reference href="https://bdu.fstec.ru/vul/2023-05173" type="self" id="BDU:2023-05173" title="BDU:2023-05173" />
			<reference href="https://bdu.fstec.ru/vul/2023-05180" type="self" id="BDU:2023-05180" title="BDU:2023-05180" />
			<reference href="https://bdu.fstec.ru/vul/2023-05182" type="self" id="BDU:2023-05182" title="BDU:2023-05182" />
			<reference href="https://bdu.fstec.ru/vul/2023-05102" type="self" id="BDU:2023-05102" title="BDU:2023-05102" />
			<reference href="https://bdu.fstec.ru/vul/2023-05101" type="self" id="BDU:2023-05101" title="BDU:2023-05101" />
			<reference href="https://bdu.fstec.ru/vul/2023-05100" type="self" id="BDU:2023-05100" title="BDU:2023-05100" />
			<reference href="https://bdu.fstec.ru/vul/2023-05886" type="self" id="BDU:2023-05886" title="BDU:2023-05886" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="102.15.0" release="1.el7.3" arch="x86_64" src="">
					<filename>firefox-0:102.15.0-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230919-02</id>
		<issued date="2023-09-20" />
		<updated date="2023-09-20" />
		<title>Множественные уязвимости thunderbird</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-20-09-2023-1/</description>
               <solution>
                    Запретить использование в ОС пакета Firefox
                или
                    Установить обновление для пакета(ов) Firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-20-09-2023-1/" type="self" id="ROS-20230919-02" title="ROS-20230919-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573" type="cve" id="CVE-2023-4573" title="CVE-2023-4573" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574" type="cve" id="CVE-2023-4574" title="CVE-2023-4574" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575" type="cve" id="CVE-2023-4575" title="CVE-2023-4575" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4576" type="cve" id="CVE-2023-4576" title="CVE-2023-4576" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4577" type="cve" id="CVE-2023-4577" title="CVE-2023-4577" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4578" type="cve" id="CVE-2023-4578" title="CVE-2023-4578" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4580" type="cve" id="CVE-2023-4580" title="CVE-2023-4580" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581" type="cve" id="CVE-2023-4581" title="CVE-2023-4581" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4582" type="cve" id="CVE-2023-4582" title="CVE-2023-4582" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4583" type="cve" id="CVE-2023-4583" title="CVE-2023-4583" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584" type="cve" id="CVE-2023-4584" title="CVE-2023-4584" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4585" type="cve" id="CVE-2023-4585" title="CVE-2023-4585" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4579" type="cve" id="CVE-2023-4579" title="CVE-2023-4579" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46884" type="cve" id="CVE-2022-46884" title="CVE-2022-46884" />
			<reference href="https://bdu.fstec.ru/vul/2023-05181" type="self" id="BDU:2023-05181" title="BDU:2023-05181" />
			<reference href="https://bdu.fstec.ru/vul/2023-05176" type="self" id="BDU:2023-05176" title="BDU:2023-05176" />
			<reference href="https://bdu.fstec.ru/vul/2023-05175" type="self" id="BDU:2023-05175" title="BDU:2023-05175" />
			<reference href="https://bdu.fstec.ru/vul/2023-05177" type="self" id="BDU:2023-05177" title="BDU:2023-05177" />
			<reference href="https://bdu.fstec.ru/vul/2023-05174" type="self" id="BDU:2023-05174" title="BDU:2023-05174" />
			<reference href="https://bdu.fstec.ru/vul/2023-05179" type="self" id="BDU:2023-05179" title="BDU:2023-05179" />
			<reference href="https://bdu.fstec.ru/vul/2023-05178" type="self" id="BDU:2023-05178" title="BDU:2023-05178" />
			<reference href="https://bdu.fstec.ru/vul/2023-05173" type="self" id="BDU:2023-05173" title="BDU:2023-05173" />
			<reference href="https://bdu.fstec.ru/vul/2023-05180" type="self" id="BDU:2023-05180" title="BDU:2023-05180" />
			<reference href="https://bdu.fstec.ru/vul/2023-05182" type="self" id="BDU:2023-05182" title="BDU:2023-05182" />
			<reference href="https://bdu.fstec.ru/vul/2023-05102" type="self" id="BDU:2023-05102" title="BDU:2023-05102" />
			<reference href="https://bdu.fstec.ru/vul/2023-05101" type="self" id="BDU:2023-05101" title="BDU:2023-05101" />
			<reference href="https://bdu.fstec.ru/vul/2023-05100" type="self" id="BDU:2023-05100" title="BDU:2023-05100" />
			<reference href="https://bdu.fstec.ru/vul/2023-05886" type="self" id="BDU:2023-05886" title="BDU:2023-05886" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="102.15.0" release="1.el7.3" arch="x86_64" src="">
					<filename>thunderbird-0:102.15.0-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230920-03</id>
		<issued date="2023-09-20" />
		<updated date="2023-09-20" />
		<title>Уязвимость libwebp </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libwebp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libwebp-cve-2023-4863/</description>
               <solution>
                    Запретить использование в ОС пакета libwebp
                или
                    Установить обновление для пакета(ов) libwebp
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libwebp-cve-2023-4863/" type="self" id="ROS-20230920-03" title="ROS-20230920-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4863" type="cve" id="CVE-2023-4863" title="CVE-2023-4863" />
			<reference href="https://bdu.fstec.ru/vul/2023-05510" type="self" id="BDU:2023-05510" title="BDU:2023-05510" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libwebp" epoch="0" version="1.3.2" release="1.el7" arch="x86_64" src="">
					<filename>libwebp-0:1.3.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230919-04</id>
		<issued date="2023-09-20" />
		<updated date="2023-09-20" />
		<title>Множественные уязвимости thunderbird</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-20-09-2023-2/</description>
               <solution>
                    Запретить использование в ОС пакета Mozilla Thunderbird
                или
                    Установить обновление для пакета(ов) Mozilla Thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-20-09-2023-2/" type="self" id="ROS-20230919-04" title="ROS-20230919-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045" type="cve" id="CVE-2023-4045" title="CVE-2023-4045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046" type="cve" id="CVE-2023-4046" title="CVE-2023-4046" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047" type="cve" id="CVE-2023-4047" title="CVE-2023-4047" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048" type="cve" id="CVE-2023-4048" title="CVE-2023-4048" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049" type="cve" id="CVE-2023-4049" title="CVE-2023-4049" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050" type="cve" id="CVE-2023-4050" title="CVE-2023-4050" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4054" type="cve" id="CVE-2023-4054" title="CVE-2023-4054" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055" type="cve" id="CVE-2023-4055" title="CVE-2023-4055" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056" type="cve" id="CVE-2023-4056" title="CVE-2023-4056" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201" type="cve" id="CVE-2023-37201" title="CVE-2023-37201" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202" type="cve" id="CVE-2023-37202" title="CVE-2023-37202" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207" type="cve" id="CVE-2023-37207" title="CVE-2023-37207" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208" type="cve" id="CVE-2023-37208" title="CVE-2023-37208" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211" type="cve" id="CVE-2023-37211" title="CVE-2023-37211" />
			<reference href="https://bdu.fstec.ru/vul/2023-04326" type="self" id="BDU:2023-04326" title="BDU:2023-04326" />
			<reference href="https://bdu.fstec.ru/vul/2023-04327" type="self" id="BDU:2023-04327" title="BDU:2023-04327" />
			<reference href="https://bdu.fstec.ru/vul/2023-04325" type="self" id="BDU:2023-04325" title="BDU:2023-04325" />
			<reference href="https://bdu.fstec.ru/vul/2023-04498" type="self" id="BDU:2023-04498" title="BDU:2023-04498" />
			<reference href="https://bdu.fstec.ru/vul/2023-04440" type="self" id="BDU:2023-04440" title="BDU:2023-04440" />
			<reference href="https://bdu.fstec.ru/vul/2023-04024" type="self" id="BDU:2023-04024" title="BDU:2023-04024" />
			<reference href="https://bdu.fstec.ru/vul/2023-04025" type="self" id="BDU:2023-04025" title="BDU:2023-04025" />
			<reference href="https://bdu.fstec.ru/vul/2023-04019" type="self" id="BDU:2023-04019" title="BDU:2023-04019" />
			<reference href="https://bdu.fstec.ru/vul/2023-04018" type="self" id="BDU:2023-04018" title="BDU:2023-04018" />
			<reference href="https://bdu.fstec.ru/vul/2023-04020" type="self" id="BDU:2023-04020" title="BDU:2023-04020" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="102.14.0" release="1.el7.3" arch="x86_64" src="">
					<filename>thunderbird-0:102.14.0-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230922-01</id>
		<issued date="2023-09-22" />
		<updated date="2023-09-22" />
		<title>Уязвимость Apache Common Text </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в candlepin</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-common-text-cve-2022-42889/</description>
               <solution>
                    Запретить использование в ОС пакета candlepin
                или
                    Установить обновление для пакета(ов) candlepin
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-common-text-cve-2022-42889/" type="self" id="ROS-20230922-01" title="ROS-20230922-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42889" type="cve" id="CVE-2022-42889" title="CVE-2022-42889" />
			<reference href="https://bdu.fstec.ru/vul/2022-06275" type="self" id="BDU:2022-06275" title="BDU:2022-06275" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="candlepin" epoch="0" version="4.2.13" release="3.el7" arch="noarch" src="">
					<filename>candlepin-0:4.2.13-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230926-01</id>
		<issued date="2023-09-26" />
		<updated date="2023-09-26" />
		<title>Уязвимость gpac </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gpac</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gpac-cve-2023-41000/</description>
               <solution>
                    Запретить использование в ОС пакета GPAC
                или
                    Установить обновление для пакета(ов) GPAC
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gpac-cve-2023-41000/" type="self" id="ROS-20230926-01" title="ROS-20230926-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41000" type="cve" id="CVE-2023-41000" title="CVE-2023-41000" />
			<reference href="https://bdu.fstec.ru/vul/2023-06205" type="self" id="BDU:2023-06205" title="BDU:2023-06205" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gpac" epoch="0" version="0.7.1" release="9.el7" arch="x86_64" src="">
					<filename>gpac-0:0.7.1-9.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230928-01</id>
		<issued date="2023-09-28" />
		<updated date="2023-09-28" />
		<title>Уязвимость Logstash </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в logstash</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-logstash-cve-2021-22138/</description>
               <solution>
                    Запретить использование в ОС пакета Logstash
                или
                    Установить обновление для пакета(ов) Logstash
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-logstash-cve-2021-22138/" type="self" id="ROS-20230928-01" title="ROS-20230928-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22138" type="cve" id="CVE-2021-22138" title="CVE-2021-22138" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="logstash" epoch="1" version="7.17.0" release="1.el7" arch="x86_64" src="">
					<filename>logstash-1:7.17.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230929-01</id>
		<issued date="2023-10-03" />
		<updated date="2024-08-28" />
		<title>Множественные уязвимости Puppet </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в puppet</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-puppet-cve-2022-23476-cve-2023-36617/</description>
               <solution>
                    Запретить использование в ОС пакета puppet
                или
                    Установить обновление для пакета(ов) puppet
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-puppet-cve-2022-23476-cve-2023-36617/" type="self" id="ROS-20230929-01" title="ROS-20230929-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23476" type="cve" id="CVE-2022-23476" title="CVE-2022-23476" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36617" type="cve" id="CVE-2023-36617" title="CVE-2023-36617" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3446" type="cve" id="CVE-2023-3446" title="CVE-2023-3446" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3817" type="cve" id="CVE-2023-3817" title="CVE-2023-3817" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2975" type="cve" id="CVE-2023-2975" title="CVE-2023-2975" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0464" type="cve" id="CVE-2023-0464" title="CVE-2023-0464" />
			<reference href="https://bdu.fstec.ru/vul/2024-00198" type="self" id="BDU:2024-00198" title="BDU:2024-00198" />
			<reference href="https://bdu.fstec.ru/vul/2023-04957" type="self" id="BDU:2023-04957" title="BDU:2023-04957" />
			<reference href="https://bdu.fstec.ru/vul/2023-04960" type="self" id="BDU:2023-04960" title="BDU:2023-04960" />
			<reference href="https://bdu.fstec.ru/vul/2023-04959" type="self" id="BDU:2023-04959" title="BDU:2023-04959" />
			<reference href="https://bdu.fstec.ru/vul/2023-02108" type="self" id="BDU:2023-02108" title="BDU:2023-02108" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="puppet" epoch="0" version="7.26.0" release="2.el7" arch="x86_64" src="">
					<filename>puppet-0:7.26.0-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231009-01</id>
		<issued date="2023-10-09" />
		<updated date="2023-10-09" />
		<title>Уязвимость PostgreSQL 14 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql14</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-14-cve-2023-39417/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql14
                или
                    Установить обновление для пакета(ов) postgresql14
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-14-cve-2023-39417/" type="self" id="ROS-20231009-01" title="ROS-20231009-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417" type="cve" id="CVE-2023-39417" title="CVE-2023-39417" />
			<reference href="https://bdu.fstec.ru/vul/2023-04767" type="self" id="BDU:2023-04767" title="BDU:2023-04767" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql14" epoch="0" version="14.9" release="1.el7" arch="x86_64" src="">
					<filename>postgresql14-0:14.9-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231009-03</id>
		<issued date="2023-10-09" />
		<updated date="2024-12-23" />
		<title>Уязвимость PostgreSQL 15 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql15</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-15-cve-2023-39417/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql15
                или
                    Установить обновление для пакета(ов) postgresql15
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-15-cve-2023-39417/" type="self" id="ROS-20231009-03" title="ROS-20231009-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417" type="cve" id="CVE-2023-39417" title="CVE-2023-39417" />
			<reference href="https://bdu.fstec.ru/vul/2023-04767" type="self" id="BDU:2023-04767" title="BDU:2023-04767" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql15" epoch="0" version="15.4" release="1.el7" arch="x86_64" src="">
					<filename>postgresql15-0:15.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231009-02</id>
		<issued date="2023-10-09" />
		<updated date="2023-10-18" />
		<title>Множественные уязвимости ядра ОС </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-yadra-os-cve-2023-4569-5/</description>
               <solution>Установить обновление для пакета(ов) ядра РЕД ОС</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-yadra-os-cve-2023-4569-5/" type="self" id="ROS-20231009-02" title="ROS-20231009-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4569" type="cve" id="CVE-2023-4569" title="CVE-2023-4569" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206" type="cve" id="CVE-2023-1206" title="CVE-2023-1206" />
			<reference href="https://bdu.fstec.ru/vul/2023-05142" type="self" id="BDU:2023-05142" title="BDU:2023-05142" />
			<reference href="https://bdu.fstec.ru/vul/2023-03642" type="self" id="BDU:2023-03642" title="BDU:2023-03642" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="5.15.125" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:5.15.125-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231009-04</id>
		<issued date="2023-10-09" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости ядра ОС </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-yadra-os-cve-2023-4569-6/</description>
               <solution>Установить обновление для пакета(ов) ядра РЕД ОС</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-yadra-os-cve-2023-4569-6/" type="self" id="ROS-20231009-04" title="ROS-20231009-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4569" type="cve" id="CVE-2023-4569" title="CVE-2023-4569" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206" type="cve" id="CVE-2023-1206" title="CVE-2023-1206" />
			<reference href="https://bdu.fstec.ru/vul/2023-05142" type="self" id="BDU:2023-05142" title="BDU:2023-05142" />
			<reference href="https://bdu.fstec.ru/vul/2023-03642" type="self" id="BDU:2023-03642" title="BDU:2023-03642" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231011-01</id>
		<issued date="2023-10-13" />
		<updated date="2023-10-13" />
		<title>Уязвимость pgAdmin </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в pgadmin4</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pgadmin-cve-2023-5002/</description>
               <solution>
                    Запретить использование в ОС пакета pgAdmin 4 
                или
                    Установить обновление для пакета(ов) pgAdmin 4 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pgadmin-cve-2023-5002/" type="self" id="ROS-20231011-01" title="ROS-20231011-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5002" type="cve" id="CVE-2023-5002" title="CVE-2023-5002" />
			<reference href="https://bdu.fstec.ru/vul/2023-06044" type="self" id="BDU:2023-06044" title="BDU:2023-06044" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pgadmin4" epoch="0" version="6.19" release="2.el7" arch="x86_64" src="">
					<filename>pgadmin4-0:6.19-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231013-02</id>
		<issued date="2023-10-13" />
		<updated date="2023-10-13" />
		<title>Уязвимость ncurses </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ncurses</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ncurses-cve-2022-29458/</description>
               <solution>
                    Запретить использование в ОС пакета ncurses
                или
                    Установить обновление для пакета(ов) ncurses
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ncurses-cve-2022-29458/" type="self" id="ROS-20231013-02" title="ROS-20231013-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458" type="cve" id="CVE-2022-29458" title="CVE-2022-29458" />
			<reference href="https://bdu.fstec.ru/vul/2023-00296" type="self" id="BDU:2023-00296" title="BDU:2023-00296" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ncurses" epoch="0" version="6.2" release="5.20200222.el7" arch="x86_64" src="">
					<filename>ncurses-0:6.2-5.20200222.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231013-03</id>
		<issued date="2023-10-13" />
		<updated date="2023-10-13" />
		<title>Уязвимость libxml2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libxml2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libxml2-cve-2023-45322/</description>
               <solution>
                    Запретить использование в ОС пакета libxml2
                или
                    Установить обновление для пакета(ов) libxml2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libxml2-cve-2023-45322/" type="self" id="ROS-20231013-03" title="ROS-20231013-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45322" type="cve" id="CVE-2023-45322" title="CVE-2023-45322" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libxml2" epoch="0" version="2.9.8" release="14.el7.3" arch="x86_64" src="">
					<filename>libxml2-0:2.9.8-14.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231013-04</id>
		<issued date="2023-10-13" />
		<updated date="2023-10-13" />
		<title>Множественные уязвимости binutils</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в binutils</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-binutils-cve-2023-1579-cve-2023-1972/</description>
               <solution>
                    Запретить использование в ОС пакета GNU Binutils
                или
                    Установить обновление для пакета(ов) GNU Binutils
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-binutils-cve-2023-1579-cve-2023-1972/" type="self" id="ROS-20231013-04" title="ROS-20231013-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1579" type="cve" id="CVE-2023-1579" title="CVE-2023-1579" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1972" type="cve" id="CVE-2023-1972" title="CVE-2023-1972" />
			<reference href="https://bdu.fstec.ru/vul/2026-01797" type="self" id="BDU:2026-01797" title="BDU:2026-01797" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="binutils" epoch="0" version="2.40" release="9.el7" arch="x86_64" src="">
					<filename>binutils-0:2.40-9.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231013-05</id>
		<issued date="2023-10-13" />
		<updated date="2023-10-13" />
		<title>Множественные уязвимости binutils </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в binutils</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-binutils-cve-2022-48065-cve-2022-48064-cve-2022-48063-cve-2022-47011-cve-/</description>
               <solution>
                    Запретить использование в ОС пакета GNU Binutils
                или
                    Установить обновление для пакета(ов) GNU Binutils
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-binutils-cve-2022-48065-cve-2022-48064-cve-2022-48063-cve-2022-47011-cve-/" type="self" id="ROS-20231013-05" title="ROS-20231013-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48065" type="cve" id="CVE-2022-48065" title="CVE-2022-48065" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48064" type="cve" id="CVE-2022-48064" title="CVE-2022-48064" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48063" type="cve" id="CVE-2022-48063" title="CVE-2022-48063" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47011" type="cve" id="CVE-2022-47011" title="CVE-2022-47011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47010" type="cve" id="CVE-2022-47010" title="CVE-2022-47010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47008" type="cve" id="CVE-2022-47008" title="CVE-2022-47008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47007" type="cve" id="CVE-2022-47007" title="CVE-2022-47007" />
			<reference href="https://bdu.fstec.ru/vul/2023-06828" type="self" id="BDU:2023-06828" title="BDU:2023-06828" />
			<reference href="https://bdu.fstec.ru/vul/2023-06833" type="self" id="BDU:2023-06833" title="BDU:2023-06833" />
			<reference href="https://bdu.fstec.ru/vul/2023-06832" type="self" id="BDU:2023-06832" title="BDU:2023-06832" />
			<reference href="https://bdu.fstec.ru/vul/2023-05785" type="self" id="BDU:2023-05785" title="BDU:2023-05785" />
			<reference href="https://bdu.fstec.ru/vul/2023-06831" type="self" id="BDU:2023-06831" title="BDU:2023-06831" />
			<reference href="https://bdu.fstec.ru/vul/2023-06830" type="self" id="BDU:2023-06830" title="BDU:2023-06830" />
			<reference href="https://bdu.fstec.ru/vul/2023-06829" type="self" id="BDU:2023-06829" title="BDU:2023-06829" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="binutils" epoch="0" version="2.40" release="9.el7" arch="x86_64" src="">
					<filename>binutils-0:2.40-9.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231013-06</id>
		<issued date="2023-10-13" />
		<updated date="2023-10-13" />
		<title>Уязвимости Wireshark </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в wireshark</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimosti-wireshark-cve-2023-5371/</description>
               <solution>
                    Запретить использование в ОС пакета Wireshark
                или
                    Установить обновление для пакета(ов) Wireshark
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimosti-wireshark-cve-2023-5371/" type="self" id="ROS-20231013-06" title="ROS-20231013-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5371" type="cve" id="CVE-2023-5371" title="CVE-2023-5371" />
			<reference href="https://bdu.fstec.ru/vul/2023-06834" type="self" id="BDU:2023-06834" title="BDU:2023-06834" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="wireshark" epoch="1" version="4.0.10" release="1.el7" arch="x86_64" src="">
					<filename>wireshark-1:4.0.10-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231016-01</id>
		<issued date="2023-10-16" />
		<updated date="2023-10-16" />
		<title>Уязвимости libXpm </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libXpm</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimosti-libxpm-cve-2023-43788/</description>
               <solution>
                    Запретить использование в ОС пакета libXpm
                или
                    Установить обновление для пакета(ов) libXpm
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimosti-libxpm-cve-2023-43788/" type="self" id="ROS-20231016-01" title="ROS-20231016-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43788" type="cve" id="CVE-2023-43788" title="CVE-2023-43788" />
			<reference href="https://bdu.fstec.ru/vul/2023-06887" type="self" id="BDU:2023-06887" title="BDU:2023-06887" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libXpm" epoch="0" version="3.5.15" release="3.el7" arch="x86_64" src="">
					<filename>libXpm-0:3.5.15-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231016-02</id>
		<issued date="2023-10-16" />
		<updated date="2023-10-16" />
		<title>Уязвимости libvpx </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libvpx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimosti-libvpx-cve-2023-44488/</description>
               <solution>
                    Запретить использование в ОС пакета libvpx
                или
                    Установить обновление для пакета(ов) libvpx
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimosti-libvpx-cve-2023-44488/" type="self" id="ROS-20231016-02" title="ROS-20231016-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44488" type="cve" id="CVE-2023-44488" title="CVE-2023-44488" />
			<reference href="https://bdu.fstec.ru/vul/2023-06350" type="self" id="BDU:2023-06350" title="BDU:2023-06350" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libvpx" epoch="0" version="1.8.2" release="3.el7" arch="x86_64" src="">
					<filename>libvpx-0:1.8.2-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231016-03</id>
		<issued date="2023-10-16" />
		<updated date="2023-10-16" />
		<title>Уязвимости ImageMagick </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в ImageMagick</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimosti-imagemagick-cve-2023-3428/</description>
               <solution>
                    Запретить использование в ОС пакета ImageMagick
                или
                    Установить обновление для пакета(ов) ImageMagick
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimosti-imagemagick-cve-2023-3428/" type="self" id="ROS-20231016-03" title="ROS-20231016-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3428" type="cve" id="CVE-2023-3428" title="CVE-2023-3428" />
			<reference href="https://bdu.fstec.ru/vul/2023-06874" type="self" id="BDU:2023-06874" title="BDU:2023-06874" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ImageMagick" epoch="0" version="6.9.12.89" release="1.el7" arch="x86_64" src="">
					<filename>ImageMagick-0:6.9.12.89-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231016-07</id>
		<issued date="2023-10-16" />
		<updated date="2024-12-23" />
		<title>Уязвимости ImageMagick </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в ImageMagick7</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimosti-imagemagick-cve-2023-3428-7/</description>
               <solution>
                    Запретить использование в ОС пакета ImageMagick7
                или
                    Установить обновление для пакета(ов) ImageMagick7
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimosti-imagemagick-cve-2023-3428-7/" type="self" id="ROS-20231016-07" title="ROS-20231016-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3428" type="cve" id="CVE-2023-3428" title="CVE-2023-3428" />
			<reference href="https://bdu.fstec.ru/vul/2023-06874" type="self" id="BDU:2023-06874" title="BDU:2023-06874" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ImageMagick7" epoch="0" version="7.1.1.11" release="3.el7" arch="x86_64" src="">
					<filename>ImageMagick7-0:7.1.1.11-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231016-04</id>
		<issued date="2023-10-16" />
		<updated date="2023-10-16" />
		<title>Уязвимости libvpx </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в libvpx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimosti-libvpx-cve-2023-5217/</description>
               <solution>
                    Запретить использование в ОС пакета libvpx
                или
                    Установить обновление для пакета(ов) libvpx
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimosti-libvpx-cve-2023-5217/" type="self" id="ROS-20231016-04" title="ROS-20231016-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217" type="cve" id="CVE-2023-5217" title="CVE-2023-5217" />
			<reference href="https://bdu.fstec.ru/vul/2023-06157" type="self" id="BDU:2023-06157" title="BDU:2023-06157" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libvpx" epoch="0" version="1.8.2" release="4.el7" arch="x86_64" src="">
					<filename>libvpx-0:1.8.2-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231016-05</id>
		<issued date="2023-10-16" />
		<updated date="2025-09-09" />
		<title>Уязвимость curl </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-curl-cve-2023-38546-cve-2023-38545/</description>
               <solution>
                    Запретить использование в ОС пакета Curl
                или
                    Установить обновление для пакета(ов) Curl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-curl-cve-2023-38546-cve-2023-38545/" type="self" id="ROS-20231016-05" title="ROS-20231016-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38545" type="cve" id="CVE-2023-38545" title="CVE-2023-38545" />
			<reference href="https://bdu.fstec.ru/vul/2023-06576" type="self" id="BDU:2023-06576" title="BDU:2023-06576" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="curl" epoch="0" version="7.85.0" release="15.el7.3" arch="x86_64" src="">
					<filename>curl-0:7.85.0-15.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231016-06</id>
		<issued date="2023-10-16" />
		<updated date="2023-10-16" />
		<title>Множественные уязвимости squid</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в squid</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-squid-cve-2021-31807-cve-2021-33620/</description>
               <solution>
                    Запретить использование в ОС пакета squid
                или
                    Установить обновление для пакета(ов) squid
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-squid-cve-2021-31807-cve-2021-33620/" type="self" id="ROS-20231016-06" title="ROS-20231016-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31807" type="cve" id="CVE-2021-31807" title="CVE-2021-31807" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33620" type="cve" id="CVE-2021-33620" title="CVE-2021-33620" />
			<reference href="https://bdu.fstec.ru/vul/2021-05158" type="self" id="BDU:2021-05158" title="BDU:2021-05158" />
			<reference href="https://bdu.fstec.ru/vul/2021-05301" type="self" id="BDU:2021-05301" title="BDU:2021-05301" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="squid" epoch="7" version="6.1" release="1.el7" arch="x86_64" src="">
					<filename>squid-7:6.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230416-10</id>
		<issued date="2023-10-18" />
		<updated date="2023-10-18" />
		<title>Уязвимость ядра ОС </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-yadra-os-cve-2022-47929/</description>
               <solution>Установить обновление для пакета(ов) ядра РЕД ОС</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-yadra-os-cve-2022-47929/" type="self" id="ROS-20230416-10" title="ROS-20230416-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929" type="cve" id="CVE-2022-47929" title="CVE-2022-47929" />
			<reference href="https://bdu.fstec.ru/vul/2023-00358" type="self" id="BDU:2023-00358" title="BDU:2023-00358" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="5.15.106" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:5.15.106-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231018-01</id>
		<issued date="2023-10-19" />
		<updated date="2023-10-19" />
		<title>Уязвимости gpac </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gpac</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimosti-gpac-cve-2023-42298/</description>
               <solution>
                    Запретить использование в ОС пакета GPAC
                или
                    Установить обновление для пакета(ов) GPAC
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimosti-gpac-cve-2023-42298/" type="self" id="ROS-20231018-01" title="ROS-20231018-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42298" type="cve" id="CVE-2023-42298" title="CVE-2023-42298" />
			<reference href="https://bdu.fstec.ru/vul/2023-06926" type="self" id="BDU:2023-06926" title="BDU:2023-06926" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gpac" epoch="0" version="0.7.1" release="10.el7" arch="x86_64" src="">
					<filename>gpac-0:0.7.1-10.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231018-02</id>
		<issued date="2023-10-19" />
		<updated date="2023-10-19" />
		<title>Уязвимость libXpm </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libXpm</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libxpm-cve-2023-43789/</description>
               <solution>
                    Запретить использование в ОС пакета libXpm
                или
                    Установить обновление для пакета(ов) libXpm
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libxpm-cve-2023-43789/" type="self" id="ROS-20231018-02" title="ROS-20231018-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43789" type="cve" id="CVE-2023-43789" title="CVE-2023-43789" />
			<reference href="https://bdu.fstec.ru/vul/2023-06927" type="self" id="BDU:2023-06927" title="BDU:2023-06927" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libXpm" epoch="0" version="3.5.15" release="4.el7" arch="x86_64" src="">
					<filename>libXpm-0:3.5.15-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231018-03</id>
		<issued date="2023-10-19" />
		<updated date="2023-10-19" />
		<title>Уязвимость subscription-manager </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в subscription-manager</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-subscription-manager-cve-2023-3899/</description>
               <solution>
                    Запретить использование в ОС пакета subscription-manager
                или
                    Установить обновление для пакета(ов) subscription-manager
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-subscription-manager-cve-2023-3899/" type="self" id="ROS-20231018-03" title="ROS-20231018-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3899" type="cve" id="CVE-2023-3899" title="CVE-2023-3899" />
			<reference href="https://bdu.fstec.ru/vul/2023-04878" type="self" id="BDU:2023-04878" title="BDU:2023-04878" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="subscription-manager" epoch="0" version="1.29.0" release="3.el7" arch="x86_64" src="">
					<filename>subscription-manager-0:1.29.0-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231018-04</id>
		<issued date="2023-10-19" />
		<updated date="2023-10-19" />
		<title>Множественные уязвимости libX11</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libX11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libx11-cve-2023-43785-cve-2023-43786-cve-2023-43787/</description>
               <solution>
                    Запретить использование в ОС пакета libX11
                или
                    Установить обновление для пакета(ов) libX11
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libx11-cve-2023-43785-cve-2023-43786-cve-2023-43787/" type="self" id="ROS-20231018-04" title="ROS-20231018-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787" type="cve" id="CVE-2023-43787" title="CVE-2023-43787" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786" type="cve" id="CVE-2023-43786" title="CVE-2023-43786" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785" type="cve" id="CVE-2023-43785" title="CVE-2023-43785" />
			<reference href="https://bdu.fstec.ru/vul/2023-06816" type="self" id="BDU:2023-06816" title="BDU:2023-06816" />
			<reference href="https://bdu.fstec.ru/vul/2023-06817" type="self" id="BDU:2023-06817" title="BDU:2023-06817" />
			<reference href="https://bdu.fstec.ru/vul/2023-07664" type="self" id="BDU:2023-07664" title="BDU:2023-07664" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libX11" epoch="0" version="1.6.12" release="7.el7.3" arch="x86_64" src="">
					<filename>libX11-0:1.6.12-7.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231019-01</id>
		<issued date="2023-10-19" />
		<updated date="2023-10-19" />
		<title>Уязвимость nextcloud-server </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nextcloud</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nextcloud-server-cve-2023-39960/</description>
               <solution>
                    Запретить использование в ОС пакета Nextcloud Server
                или
                    Установить обновление для пакета(ов) Nextcloud Server
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nextcloud-server-cve-2023-39960/" type="self" id="ROS-20231019-01" title="ROS-20231019-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39960" type="cve" id="CVE-2023-39960" title="CVE-2023-39960" />
			<reference href="https://bdu.fstec.ru/vul/2023-06928" type="self" id="BDU:2023-06928" title="BDU:2023-06928" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nextcloud" epoch="0" version="25.0.5" release="4.el7" arch="noarch" src="">
					<filename>nextcloud-0:25.0.5-4.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231018-05</id>
		<issued date="2023-10-20" />
		<updated date="2023-10-20" />
		<title>Уязвимость sqlite </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в sqlite</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sqlite-cve-2022-35737/</description>
               <solution>
                    Запретить использование в ОС пакета sqlite
                или
                    Установить обновление для пакета(ов) sqlite
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sqlite-cve-2022-35737/" type="self" id="ROS-20231018-05" title="ROS-20231018-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35737" type="cve" id="CVE-2022-35737" title="CVE-2022-35737" />
			<reference href="https://bdu.fstec.ru/vul/2022-06495" type="self" id="BDU:2022-06495" title="BDU:2022-06495" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="sqlite" epoch="0" version="3.35.3" release="3.el7" arch="x86_64" src="">
					<filename>sqlite-0:3.35.3-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231020-01</id>
		<issued date="2023-10-20" />
		<updated date="2023-10-20" />
		<title>Уязвимость zlib </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в zlib</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zlib-cve-2023-45853/</description>
               <solution>
                    Запретить использование в ОС пакета zlib
                или
                    Установить обновление для пакета(ов) zlib
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zlib-cve-2023-45853/" type="self" id="ROS-20231020-01" title="ROS-20231020-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45853" type="cve" id="CVE-2023-45853" title="CVE-2023-45853" />
			<reference href="https://bdu.fstec.ru/vul/2023-07116" type="self" id="BDU:2023-07116" title="BDU:2023-07116" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zlib" epoch="0" version="1.2.11" release="17.el7" arch="x86_64" src="">
					<filename>zlib-0:1.2.11-17.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231020-02</id>
		<issued date="2023-10-20" />
		<updated date="2023-10-20" />
		<title>Уязвимость nextcloud-calendar </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nextcloud-app-calendar</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nextcloud-calendar-cve-2023-45150/</description>
               <solution>
                    Запретить использование в ОС пакета Nextcloud calendar
                или
                    Установить обновление для пакета(ов) Nextcloud calendar
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nextcloud-calendar-cve-2023-45150/" type="self" id="ROS-20231020-02" title="ROS-20231020-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45150" type="cve" id="CVE-2023-45150" title="CVE-2023-45150" />
			<reference href="https://bdu.fstec.ru/vul/2023-07118" type="self" id="BDU:2023-07118" title="BDU:2023-07118" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nextcloud-app-calendar" epoch="0" version="2.3.1" release="2.el7" arch="noarch" src="">
					<filename>nextcloud-app-calendar-0:2.3.1-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231020-03</id>
		<issued date="2023-10-20" />
		<updated date="2023-10-20" />
		<title>Уязвимость procps-ng </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в procps-ng</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-procps-ng-cve-2023-4016/</description>
               <solution>
                    Запретить использование в ОС пакета procps-ng
                или
                    Установить обновление для пакета(ов) procps-ng
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-procps-ng-cve-2023-4016/" type="self" id="ROS-20231020-03" title="ROS-20231020-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4016" type="cve" id="CVE-2023-4016" title="CVE-2023-4016" />
			<reference href="https://bdu.fstec.ru/vul/2023-07117" type="self" id="BDU:2023-07117" title="BDU:2023-07117" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="procps-ng" epoch="0" version="3.3.17" release="1.el7" arch="x86_64" src="">
					<filename>procps-ng-0:3.3.17-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231023-01</id>
		<issued date="2023-10-23" />
		<updated date="2023-10-23" />
		<title>Уязвимость libtommath </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в libtommath</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libtommath-cve-2023-36328/</description>
               <solution>
                    Запретить использование в ОС пакета libtommath
                или
                    Установить обновление для пакета(ов) libtommath
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libtommath-cve-2023-36328/" type="self" id="ROS-20231023-01" title="ROS-20231023-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36328" type="cve" id="CVE-2023-36328" title="CVE-2023-36328" />
			<reference href="https://bdu.fstec.ru/vul/2023-06241" type="self" id="BDU:2023-06241" title="BDU:2023-06241" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libtommath" epoch="0" version="1.2.0" release="3.el7" arch="x86_64" src="">
					<filename>libtommath-0:1.2.0-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231020-10</id>
		<issued date="2023-10-23" />
		<updated date="2023-10-23" />
		<title>Уязвимость glibc</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в glibc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glibc-cve-2016-10228/</description>
               <solution>
                    Запретить использование в ОС пакета glibc
                или
                    Установить обновление для пакета(ов) glibc
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glibc-cve-2016-10228/" type="self" id="ROS-20231020-10" title="ROS-20231020-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228" type="cve" id="CVE-2016-10228" title="CVE-2016-10228" />
			<reference href="https://bdu.fstec.ru/vul/2020-04683" type="self" id="BDU:2020-04683" title="BDU:2020-04683" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glibc" epoch="0" version="2.28" release="9.el7" arch="x86_64" src="">
					<filename>glibc-0:2.28-9.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231024-01</id>
		<issued date="2023-10-24" />
		<updated date="2023-10-24" />
		<title>Уязвимость ядра ОС </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-yadra-os-cve-2023-4273/</description>
               <solution>Установить обновление для пакета(ов) ядра РЕД ОС</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-yadra-os-cve-2023-4273/" type="self" id="ROS-20231024-01" title="ROS-20231024-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273" type="cve" id="CVE-2023-4273" title="CVE-2023-4273" />
			<reference href="https://bdu.fstec.ru/vul/2023-04661" type="self" id="BDU:2023-04661" title="BDU:2023-04661" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="5.15.131" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:5.15.131-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231024-04</id>
		<issued date="2023-10-24" />
		<updated date="2024-12-23" />
		<title>Уязвимость ядра ОС </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-yadra-os-cve-2023-4273-6/</description>
               <solution>Установить обновление для пакета(ов) ядра РЕД ОС</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-yadra-os-cve-2023-4273-6/" type="self" id="ROS-20231024-04" title="ROS-20231024-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273" type="cve" id="CVE-2023-4273" title="CVE-2023-4273" />
			<reference href="https://bdu.fstec.ru/vul/2023-04661" type="self" id="BDU:2023-04661" title="BDU:2023-04661" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231024-02</id>
		<issued date="2023-10-24" />
		<updated date="2023-10-24" />
		<title>Уязвимость xrdp </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в xrdp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-xrdp-cve-2023-42822/</description>
               <solution>
                    Запретить использование в ОС пакета xrdp
                или
                    Установить обновление для пакета(ов) xrdp
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-xrdp-cve-2023-42822/" type="self" id="ROS-20231024-02" title="ROS-20231024-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42822" type="cve" id="CVE-2023-42822" title="CVE-2023-42822" />
			<reference href="https://bdu.fstec.ru/vul/2023-06266" type="self" id="BDU:2023-06266" title="BDU:2023-06266" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="xrdp" epoch="1" version="0.9.22.1" release="2.el7.3" arch="x86_64" src="">
					<filename>xrdp-1:0.9.22.1-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231024-03</id>
		<issued date="2023-10-24" />
		<updated date="2023-10-27" />
		<title>Множественные уязвимости nextcloud</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nextcloud</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nextcloud-cve-2023-45148-cve-2023-45151/</description>
               <solution>
                    Запретить использование в ОС пакета Nextcloud Server
                или
                    Установить обновление для пакета(ов) Nextcloud Server
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nextcloud-cve-2023-45148-cve-2023-45151/" type="self" id="ROS-20231024-03" title="ROS-20231024-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45148" type="cve" id="CVE-2023-45148" title="CVE-2023-45148" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45151" type="cve" id="CVE-2023-45151" title="CVE-2023-45151" />
			<reference href="https://bdu.fstec.ru/vul/2023-07159" type="self" id="BDU:2023-07159" title="BDU:2023-07159" />
			<reference href="https://bdu.fstec.ru/vul/2023-07158" type="self" id="BDU:2023-07158" title="BDU:2023-07158" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nextcloud" epoch="0" version="25.0.5" release="5.el7" arch="noarch" src="">
					<filename>nextcloud-0:25.0.5-5.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231025-01</id>
		<issued date="2023-10-26" />
		<updated date="2023-10-26" />
		<title>Уязвимость Roundcube </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в roundcubemail</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-roundcube-cve-2023-5631/</description>
               <solution>
                    Запретить использование в ОС пакета Roundcube
                или
                    Установить обновление для пакета(ов) Roundcube
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-roundcube-cve-2023-5631/" type="self" id="ROS-20231025-01" title="ROS-20231025-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5631" type="cve" id="CVE-2023-5631" title="CVE-2023-5631" />
			<reference href="https://bdu.fstec.ru/vul/2023-07143" type="self" id="BDU:2023-07143" title="BDU:2023-07143" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="roundcubemail" epoch="0" version="1.5.5" release="1.el7" arch="noarch" src="">
					<filename>roundcubemail-0:1.5.5-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231030-01</id>
		<issued date="2023-10-30" />
		<updated date="2023-10-30" />
		<title>Уязвимость Apache httpd </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в httpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-httpd-cve-2023-31122/</description>
               <solution>
                    Запретить использование в ОС пакета httpd
                или
                    Установить обновление для пакета(ов) httpd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-httpd-cve-2023-31122/" type="self" id="ROS-20231030-01" title="ROS-20231030-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31122" type="cve" id="CVE-2023-31122" title="CVE-2023-31122" />
			<reference href="https://bdu.fstec.ru/vul/2023-07124" type="self" id="BDU:2023-07124" title="BDU:2023-07124" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="httpd" epoch="0" version="2.4.58" release="1.el7" arch="x86_64" src="">
					<filename>httpd-0:2.4.58-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231030-02</id>
		<issued date="2023-10-30" />
		<updated date="2023-10-30" />
		<title>Уязвимость Django </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-django</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-django-cve-2023-43665/</description>
               <solution>
                    Запретить использование в ОС пакета Django
                или
                    Установить обновление для пакета(ов) Django
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-django-cve-2023-43665/" type="self" id="ROS-20231030-02" title="ROS-20231030-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43665" type="cve" id="CVE-2023-43665" title="CVE-2023-43665" />
			<reference href="https://bdu.fstec.ru/vul/2023-07321" type="self" id="BDU:2023-07321" title="BDU:2023-07321" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-django" epoch="0" version="3.2.22" release="1.el7" arch="noarch" src="">
					<filename>python3-django-0:3.2.22-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231030-03</id>
		<issued date="2023-10-30" />
		<updated date="2023-10-30" />
		<title>Уязвимость zchunk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в zchunk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zchunk-cve-2023-46228/</description>
               <solution>
                    Запретить использование в ОС пакета zchunk
                или
                    Установить обновление для пакета(ов) zchunk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zchunk-cve-2023-46228/" type="self" id="ROS-20231030-03" title="ROS-20231030-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46228" type="cve" id="CVE-2023-46228" title="CVE-2023-46228" />
			<reference href="https://bdu.fstec.ru/vul/2023-07324" type="self" id="BDU:2023-07324" title="BDU:2023-07324" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zchunk" epoch="0" version="1.3.2" release="1.el7" arch="x86_64" src="">
					<filename>zchunk-0:1.3.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231030-04</id>
		<issued date="2023-10-30" />
		<updated date="2023-10-30" />
		<title>Уязвимость podman </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в podman</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-podman-cve-2022-41723/</description>
               <solution>
                    Запретить использование в ОС пакета podman
                или
                    Установить обновление для пакета(ов) podman
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-podman-cve-2022-41723/" type="self" id="ROS-20231030-04" title="ROS-20231030-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41723" type="cve" id="CVE-2022-41723" title="CVE-2022-41723" />
			<reference href="https://bdu.fstec.ru/vul/2023-07322" type="self" id="BDU:2023-07322" title="BDU:2023-07322" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="podman" epoch="0" version="4.4.3" release="1.el7" arch="x86_64" src="">
					<filename>podman-0:4.4.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231030-05</id>
		<issued date="2023-10-30" />
		<updated date="2023-10-30" />
		<title>Уязвимость Apache httpd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в httpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-httpd-cve-2023-43622/</description>
               <solution>
                    Запретить использование в ОС пакета httpd
                или
                    Установить обновление для пакета(ов) httpd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-httpd-cve-2023-43622/" type="self" id="ROS-20231030-05" title="ROS-20231030-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43622" type="cve" id="CVE-2023-43622" title="CVE-2023-43622" />
			<reference href="https://bdu.fstec.ru/vul/2023-07171" type="self" id="BDU:2023-07171" title="BDU:2023-07171" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="httpd" epoch="0" version="2.4.58" release="1.el7" arch="x86_64" src="">
					<filename>httpd-0:2.4.58-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231030-06</id>
		<issued date="2023-10-30" />
		<updated date="2023-10-30" />
		<title>Уязвимость redis </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в redis</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-redis-cve-2023-45145/</description>
               <solution>
                    Запретить использование в ОС пакета Redis
                или
                    Установить обновление для пакета(ов) Redis
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-redis-cve-2023-45145/" type="self" id="ROS-20231030-06" title="ROS-20231030-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45145" type="cve" id="CVE-2023-45145" title="CVE-2023-45145" />
			<reference href="https://bdu.fstec.ru/vul/2023-07323" type="self" id="BDU:2023-07323" title="BDU:2023-07323" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="redis" epoch="0" version="7.0.13" release="2.el7" arch="x86_64" src="">
					<filename>redis-0:7.0.13-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231031-01</id>
		<issued date="2023-10-31" />
		<updated date="2023-10-31" />
		<title>Множественные уязвимости runc </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в runc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-runc-cve-2023-28642-cve-2023-25809/</description>
               <solution>
                    Запретить использование в ОС пакета runc
                или
                    Установить обновление для пакета(ов) runc
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-runc-cve-2023-28642-cve-2023-25809/" type="self" id="ROS-20231031-01" title="ROS-20231031-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28642" type="cve" id="CVE-2023-28642" title="CVE-2023-28642" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25809" type="cve" id="CVE-2023-25809" title="CVE-2023-25809" />
			<reference href="https://bdu.fstec.ru/vul/2023-03869" type="self" id="BDU:2023-03869" title="BDU:2023-03869" />
			<reference href="https://bdu.fstec.ru/vul/2023-03860" type="self" id="BDU:2023-03860" title="BDU:2023-03860" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="runc" epoch="2" version="1.1.8" release="1.el7" arch="x86_64" src="">
					<filename>runc-2:1.1.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231102-01</id>
		<issued date="2023-11-02" />
		<updated date="2023-11-02" />
		<title>Уязвимость Traceroute </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в traceroute</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-traceroute-cve-2023-46316/</description>
               <solution>
                    Запретить использование в ОС пакета traceroute
                или
                    Установить обновление для пакета(ов) traceroute
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-traceroute-cve-2023-46316/" type="self" id="ROS-20231102-01" title="ROS-20231102-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46316" type="cve" id="CVE-2023-46316" title="CVE-2023-46316" />
			<reference href="https://bdu.fstec.ru/vul/2023-07542" type="self" id="BDU:2023-07542" title="BDU:2023-07542" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="traceroute" epoch="3" version="2.1.3" release="1.el7" arch="x86_64" src="">
					<filename>traceroute-3:2.1.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231107-01</id>
		<issued date="2023-11-07" />
		<updated date="2023-11-07" />
		<title>Уязвимость lighttpd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в lighttpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-lighttpd-cve-2023-44487/</description>
               <solution>
                    Запретить использование в ОС пакета lighttpd
                или
                    Установить обновление для пакета(ов) lighttpd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-lighttpd-cve-2023-44487/" type="self" id="ROS-20231107-01" title="ROS-20231107-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487" type="cve" id="CVE-2023-44487" title="CVE-2023-44487" />
			<reference href="https://bdu.fstec.ru/vul/2023-06559" type="self" id="BDU:2023-06559" title="BDU:2023-06559" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="lighttpd" epoch="0" version="1.4.73" release="1.el7" arch="x86_64" src="">
					<filename>lighttpd-0:1.4.73-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231109-01</id>
		<issued date="2023-11-09" />
		<updated date="2023-11-09" />
		<title>Множественные уязвимости golang </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-golang-cve-2023-39323-cve-2023-5363-cve-2023-29402-cve-2023-29403-cve-202/</description>
               <solution>
                    Запретить использование в ОС пакета golang
                или
                    Установить обновление для пакета(ов) golang
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-golang-cve-2023-39323-cve-2023-5363-cve-2023-29402-cve-2023-29403-cve-202/" type="self" id="ROS-20231109-01" title="ROS-20231109-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39323" type="cve" id="CVE-2023-39323" title="CVE-2023-39323" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5363" type="cve" id="CVE-2023-5363" title="CVE-2023-5363" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29402" type="cve" id="CVE-2023-29402" title="CVE-2023-29402" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29403" type="cve" id="CVE-2023-29403" title="CVE-2023-29403" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29404" type="cve" id="CVE-2023-29404" title="CVE-2023-29404" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29405" type="cve" id="CVE-2023-29405" title="CVE-2023-29405" />
			<reference href="https://bdu.fstec.ru/vul/2023-07201" type="self" id="BDU:2023-07201" title="BDU:2023-07201" />
			<reference href="https://bdu.fstec.ru/vul/2023-07691" type="self" id="BDU:2023-07691" title="BDU:2023-07691" />
			<reference href="https://bdu.fstec.ru/vul/2023-03201" type="self" id="BDU:2023-03201" title="BDU:2023-03201" />
			<reference href="https://bdu.fstec.ru/vul/2023-03200" type="self" id="BDU:2023-03200" title="BDU:2023-03200" />
			<reference href="https://bdu.fstec.ru/vul/2023-04161" type="self" id="BDU:2023-04161" title="BDU:2023-04161" />
			<reference href="https://bdu.fstec.ru/vul/2023-04160" type="self" id="BDU:2023-04160" title="BDU:2023-04160" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.19.13" release="1.el7" arch="x86_64" src="">
					<filename>golang-0:1.19.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231109-02</id>
		<issued date="2023-11-09" />
		<updated date="2023-11-09" />
		<title>Множественные уязвимости glpi </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-glpi-cve-2023-41320-cve-2023-41321-cve-2023-41322-cve-2023-41323-cve-2023/</description>
               <solution>
                    Запретить использование в ОС пакета GLPI
                или
                    Установить обновление для пакета(ов) GLPI
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-glpi-cve-2023-41320-cve-2023-41321-cve-2023-41322-cve-2023-41323-cve-2023/" type="self" id="ROS-20231109-02" title="ROS-20231109-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41320" type="cve" id="CVE-2023-41320" title="CVE-2023-41320" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41321" type="cve" id="CVE-2023-41321" title="CVE-2023-41321" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41322" type="cve" id="CVE-2023-41322" title="CVE-2023-41322" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41323" type="cve" id="CVE-2023-41323" title="CVE-2023-41323" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41324" type="cve" id="CVE-2023-41324" title="CVE-2023-41324" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41326" type="cve" id="CVE-2023-41326" title="CVE-2023-41326" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41888" type="cve" id="CVE-2023-41888" title="CVE-2023-41888" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42461" type="cve" id="CVE-2023-42461" title="CVE-2023-42461" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42462" type="cve" id="CVE-2023-42462" title="CVE-2023-42462" />
			<reference href="https://bdu.fstec.ru/vul/2023-07696" type="self" id="BDU:2023-07696" title="BDU:2023-07696" />
			<reference href="https://bdu.fstec.ru/vul/2023-07695" type="self" id="BDU:2023-07695" title="BDU:2023-07695" />
			<reference href="https://bdu.fstec.ru/vul/2023-07698" type="self" id="BDU:2023-07698" title="BDU:2023-07698" />
			<reference href="https://bdu.fstec.ru/vul/2023-07701" type="self" id="BDU:2023-07701" title="BDU:2023-07701" />
			<reference href="https://bdu.fstec.ru/vul/2023-07843" type="self" id="BDU:2023-07843" title="BDU:2023-07843" />
			<reference href="https://bdu.fstec.ru/vul/2023-07847" type="self" id="BDU:2023-07847" title="BDU:2023-07847" />
			<reference href="https://bdu.fstec.ru/vul/2023-07849" type="self" id="BDU:2023-07849" title="BDU:2023-07849" />
			<reference href="https://bdu.fstec.ru/vul/2023-07850" type="self" id="BDU:2023-07850" title="BDU:2023-07850" />
			<reference href="https://bdu.fstec.ru/vul/2023-07851" type="self" id="BDU:2023-07851" title="BDU:2023-07851" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi" epoch="0" version="10.0.10" release="1.el7" arch="noarch" src="">
					<filename>glpi-0:10.0.10-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231110-01</id>
		<issued date="2023-11-10" />
		<updated date="2023-11-10" />
		<title>Множественные уязвимости gpac </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gpac</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gpac-cve-2023-46930-cve-2023-46927-cve-2023-46928/</description>
               <solution>
                    Запретить использование в ОС пакета gpac
                или
                    Установить обновление для пакета(ов) gpac
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gpac-cve-2023-46930-cve-2023-46927-cve-2023-46928/" type="self" id="ROS-20231110-01" title="ROS-20231110-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46930" type="cve" id="CVE-2023-46930" title="CVE-2023-46930" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46927" type="cve" id="CVE-2023-46927" title="CVE-2023-46927" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46928" type="cve" id="CVE-2023-46928" title="CVE-2023-46928" />
			<reference href="https://bdu.fstec.ru/vul/2023-07694" type="self" id="BDU:2023-07694" title="BDU:2023-07694" />
			<reference href="https://bdu.fstec.ru/vul/2023-07692" type="self" id="BDU:2023-07692" title="BDU:2023-07692" />
			<reference href="https://bdu.fstec.ru/vul/2023-07693" type="self" id="BDU:2023-07693" title="BDU:2023-07693" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gpac" epoch="0" version="0.7.1" release="11.el7" arch="x86_64" src="">
					<filename>gpac-0:0.7.1-11.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231110-02</id>
		<issued date="2023-11-10" />
		<updated date="2023-11-10" />
		<title>Уязвимость OpenSSL </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в openssl3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl-cve-2023-5363/</description>
               <solution>
                    Запретить использование в ОС пакета OpenSSL
                или
                    Установить обновление для пакета(ов) OpenSSL
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl-cve-2023-5363/" type="self" id="ROS-20231110-02" title="ROS-20231110-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5363" type="cve" id="CVE-2023-5363" title="CVE-2023-5363" />
			<reference href="https://bdu.fstec.ru/vul/2023-07691" type="self" id="BDU:2023-07691" title="BDU:2023-07691" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl3" epoch="0" version="3.0.9" release="3.el7" arch="x86_64" src="">
					<filename>openssl3-0:3.0.9-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231110-03</id>
		<issued date="2023-11-13" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости samba </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в samba</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-samba-cve-2023-42670-cve-2023-3961-cve-2023-4091-cve-2023-4154-cve-2023-4/</description>
               <solution>
                    Запретить использование в ОС пакета Samba
                или
                    Установить обновление для пакета(ов) Samba
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-samba-cve-2023-42670-cve-2023-3961-cve-2023-4091-cve-2023-4154-cve-2023-4/" type="self" id="ROS-20231110-03" title="ROS-20231110-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42670" type="cve" id="CVE-2023-42670" title="CVE-2023-42670" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3961" type="cve" id="CVE-2023-3961" title="CVE-2023-3961" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091" type="cve" id="CVE-2023-4091" title="CVE-2023-4091" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4154" type="cve" id="CVE-2023-4154" title="CVE-2023-4154" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42669" type="cve" id="CVE-2023-42669" title="CVE-2023-42669" />
			<reference href="https://bdu.fstec.ru/vul/2023-06939" type="self" id="BDU:2023-06939" title="BDU:2023-06939" />
			<reference href="https://bdu.fstec.ru/vul/2023-07174" type="self" id="BDU:2023-07174" title="BDU:2023-07174" />
			<reference href="https://bdu.fstec.ru/vul/2023-06941" type="self" id="BDU:2023-06941" title="BDU:2023-06941" />
			<reference href="https://bdu.fstec.ru/vul/2023-06942" type="self" id="BDU:2023-06942" title="BDU:2023-06942" />
			<reference href="https://bdu.fstec.ru/vul/2023-06940" type="self" id="BDU:2023-06940" title="BDU:2023-06940" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="samba" epoch="0" version="4.17.12" release="1m.el7.3" arch="x86_64" src="">
					<filename>samba-0:4.17.12-1m.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231114-01</id>
		<issued date="2023-11-15" />
		<updated date="2023-11-15" />
		<title>Множественные уязвимости chromium </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-cve-2022-4440-cve-2022-4438-cve-2022-4437-cve-2022-4436-cve-2022/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-cve-2022-4440-cve-2022-4438-cve-2022-4437-cve-2022-4436-cve-2022/" type="self" id="ROS-20231114-01" title="ROS-20231114-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4440" type="cve" id="CVE-2022-4440" title="CVE-2022-4440" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4438" type="cve" id="CVE-2022-4438" title="CVE-2022-4438" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4437" type="cve" id="CVE-2022-4437" title="CVE-2022-4437" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4436" type="cve" id="CVE-2022-4436" title="CVE-2022-4436" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4135" type="cve" id="CVE-2022-4135" title="CVE-2022-4135" />
			<reference href="https://bdu.fstec.ru/vul/2022-07321" type="self" id="BDU:2022-07321" title="BDU:2022-07321" />
			<reference href="https://bdu.fstec.ru/vul/2022-07315" type="self" id="BDU:2022-07315" title="BDU:2022-07315" />
			<reference href="https://bdu.fstec.ru/vul/2022-07258" type="self" id="BDU:2022-07258" title="BDU:2022-07258" />
			<reference href="https://bdu.fstec.ru/vul/2022-07256" type="self" id="BDU:2022-07256" title="BDU:2022-07256" />
			<reference href="https://bdu.fstec.ru/vul/2022-06993" type="self" id="BDU:2022-06993" title="BDU:2022-06993" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="112.0.5615.165" release="1.el7" arch="x86_64" src="">
					<filename>chromium-0:112.0.5615.165-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231114-02</id>
		<issued date="2023-11-15" />
		<updated date="2023-11-15" />
		<title>Множественные уязвимости xorg-x11-server-Xorg </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в xorg-x11-server-Xorg</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-xorg-x11-server-xorg-cve-2023-5367-cve-2023-5380-cve-2023-5574/</description>
               <solution>
                    Запретить использование в ОС пакета xorg-x11-server
                или
                    Установить обновление для пакета(ов) xorg-x11-server
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-xorg-x11-server-xorg-cve-2023-5367-cve-2023-5380-cve-2023-5574/" type="self" id="ROS-20231114-02" title="ROS-20231114-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5367" type="cve" id="CVE-2023-5367" title="CVE-2023-5367" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5380" type="cve" id="CVE-2023-5380" title="CVE-2023-5380" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5574" type="cve" id="CVE-2023-5574" title="CVE-2023-5574" />
			<reference href="https://bdu.fstec.ru/vul/2023-07145" type="self" id="BDU:2023-07145" title="BDU:2023-07145" />
			<reference href="https://bdu.fstec.ru/vul/2023-07412" type="self" id="BDU:2023-07412" title="BDU:2023-07412" />
			<reference href="https://bdu.fstec.ru/vul/2023-07411" type="self" id="BDU:2023-07411" title="BDU:2023-07411" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="xorg-x11-server-Xorg" epoch="0" version="1.20.14" release="7.el7.3" arch="x86_64" src="">
					<filename>xorg-x11-server-Xorg-0:1.20.14-7.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231114-03</id>
		<issued date="2023-11-15" />
		<updated date="2023-11-15" />
		<title>Уязвимость pdns-recursor </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в pdns-recursor</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pdns-recursor-CVE-2023-26437/</description>
               <solution>
                    Запретить использование в ОС пакета PowerDNS Recursor
                или
                    Установить обновление для пакета(ов) PowerDNS Recursor
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pdns-recursor-CVE-2023-26437/" type="self" id="ROS-20231114-03" title="ROS-20231114-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26437" type="cve" id="CVE-2023-26437" title="CVE-2023-26437" />
			<reference href="https://bdu.fstec.ru/vul/2023-07902" type="self" id="BDU:2023-07902" title="BDU:2023-07902" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pdns-recursor" epoch="0" version="4.7.5" release="1.el7" arch="x86_64" src="">
					<filename>pdns-recursor-0:4.7.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231116-01</id>
		<issued date="2023-11-16" />
		<updated date="2023-11-16" />
		<title>Уязвимость Roundcube </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в roundcubemail</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-roundcube-cve-2023-47272/</description>
               <solution>
                    Запретить использование в ОС пакета Roundcube
                или
                    Установить обновление для пакета(ов) Roundcube
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-roundcube-cve-2023-47272/" type="self" id="ROS-20231116-01" title="ROS-20231116-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47272" type="cve" id="CVE-2023-47272" title="CVE-2023-47272" />
			<reference href="https://bdu.fstec.ru/vul/2023-07982" type="self" id="BDU:2023-07982" title="BDU:2023-07982" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="roundcubemail" epoch="0" version="1.5.6" release="1.el7" arch="noarch" src="">
					<filename>roundcubemail-0:1.5.6-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231116-02</id>
		<issued date="2023-11-16" />
		<updated date="2023-11-16" />
		<title>Множественные уязвимости golang-x-image </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang-x-image-devel</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-golang-x-image-cve-2022-41727-cve-2023-29408-cve-2023-29407/</description>
               <solution>
                    Запретить использование в ОС пакета golang-x-image-devel
                или
                    Установить обновление для пакета(ов) golang-x-image-devel
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-golang-x-image-cve-2022-41727-cve-2023-29408-cve-2023-29407/" type="self" id="ROS-20231116-02" title="ROS-20231116-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41727" type="cve" id="CVE-2022-41727" title="CVE-2022-41727" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29408" type="cve" id="CVE-2023-29408" title="CVE-2023-29408" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29407" type="cve" id="CVE-2023-29407" title="CVE-2023-29407" />
			<reference href="https://bdu.fstec.ru/vul/2023-07980" type="self" id="BDU:2023-07980" title="BDU:2023-07980" />
			<reference href="https://bdu.fstec.ru/vul/2023-07981" type="self" id="BDU:2023-07981" title="BDU:2023-07981" />
			<reference href="https://bdu.fstec.ru/vul/2023-07979" type="self" id="BDU:2023-07979" title="BDU:2023-07979" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang-x-image-devel" epoch="0" version="0.13.0" release="1.el7" arch="noarch" src="">
					<filename>golang-x-image-devel-0:0.13.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231120-01</id>
		<issued date="2023-11-20" />
		<updated date="2023-11-20" />
		<title>Уязвимость в gpac </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gpac</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-v-gpac-cve-2023-46001/</description>
               <solution>
                    Запретить использование в ОС пакета gpac
                или
                    Установить обновление для пакета(ов) gpac
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-v-gpac-cve-2023-46001/" type="self" id="ROS-20231120-01" title="ROS-20231120-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46001" type="cve" id="CVE-2023-46001" title="CVE-2023-46001" />
			<reference href="https://bdu.fstec.ru/vul/2023-07983" type="self" id="BDU:2023-07983" title="BDU:2023-07983" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gpac" epoch="0" version="0.7.1" release="12.el7" arch="x86_64" src="">
					<filename>gpac-0:0.7.1-12.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231115-01</id>
		<issued date="2023-11-21" />
		<updated date="2023-11-21" />
		<title>Множественные уязвимости squid </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в squid</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-squid-cve-2023-5824-cve-2023-46848-cve-2023-46847-cve-2023-46846/</description>
               <solution>
                    Запретить использование в ОС пакета Squid
                или
                    Установить обновление для пакета(ов) Squid
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-squid-cve-2023-5824-cve-2023-46848-cve-2023-46847-cve-2023-46846/" type="self" id="ROS-20231115-01" title="ROS-20231115-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5824" type="cve" id="CVE-2023-5824" title="CVE-2023-5824" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46848" type="cve" id="CVE-2023-46848" title="CVE-2023-46848" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46847" type="cve" id="CVE-2023-46847" title="CVE-2023-46847" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46846" type="cve" id="CVE-2023-46846" title="CVE-2023-46846" />
			<reference href="https://bdu.fstec.ru/vul/2023-08061" type="self" id="BDU:2023-08061" title="BDU:2023-08061" />
			<reference href="https://bdu.fstec.ru/vul/2023-08062" type="self" id="BDU:2023-08062" title="BDU:2023-08062" />
			<reference href="https://bdu.fstec.ru/vul/2023-07920" type="self" id="BDU:2023-07920" title="BDU:2023-07920" />
			<reference href="https://bdu.fstec.ru/vul/2023-08063" type="self" id="BDU:2023-08063" title="BDU:2023-08063" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="squid" epoch="7" version="6.5" release="1.el7" arch="x86_64" src="">
					<filename>squid-7:6.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231115-02</id>
		<issued date="2023-11-21" />
		<updated date="2023-11-21" />
		<title>Множественные уязвимости vlc </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в vlc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vlc-cve-2023-47359-cve-2023-47360/</description>
               <solution>
                    Запретить использование в ОС пакета VLC
                или
                    Установить обновление для пакета(ов) VLC
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vlc-cve-2023-47359-cve-2023-47360/" type="self" id="ROS-20231115-02" title="ROS-20231115-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47359" type="cve" id="CVE-2023-47359" title="CVE-2023-47359" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47360" type="cve" id="CVE-2023-47360" title="CVE-2023-47360" />
			<reference href="https://bdu.fstec.ru/vul/2023-08056" type="self" id="BDU:2023-08056" title="BDU:2023-08056" />
			<reference href="https://bdu.fstec.ru/vul/2023-08060" type="self" id="BDU:2023-08060" title="BDU:2023-08060" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vlc" epoch="0" version="3.0.20" release="1.el7.3" arch="x86_64" src="">
					<filename>vlc-0:3.0.20-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231121-03</id>
		<issued date="2023-11-21" />
		<updated date="2023-11-21" />
		<title>Уязвимость opensearch </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в opensearch</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opensearch-cve-2023-45807/</description>
               <solution>
                    Запретить использование в ОС пакета OpenSearch
                или
                    Установить обновление для пакета(ов) OpenSearch
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opensearch-cve-2023-45807/" type="self" id="ROS-20231121-03" title="ROS-20231121-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45807" type="cve" id="CVE-2023-45807" title="CVE-2023-45807" />
			<reference href="https://bdu.fstec.ru/vul/2023-08057" type="self" id="BDU:2023-08057" title="BDU:2023-08057" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="opensearch" epoch="0" version="2.11.0" release="1.el7" arch="x86_64" src="">
					<filename>opensearch-0:2.11.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231115-04</id>
		<issued date="2023-11-21" />
		<updated date="2023-11-21" />
		<title>Множественные уязвимости codium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в codium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-codium-cve-2023-36742-cve-2023-39956-cve-2023-33144-cve-2023-29338-cve-20/</description>
               <solution>
                    Запретить использование в ОС пакета codium
                или
                    Установить обновление для пакета(ов) codium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-codium-cve-2023-36742-cve-2023-39956-cve-2023-33144-cve-2023-29338-cve-20/" type="self" id="ROS-20231115-04" title="ROS-20231115-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36742" type="cve" id="CVE-2023-36742" title="CVE-2023-36742" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39956" type="cve" id="CVE-2023-39956" title="CVE-2023-39956" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33144" type="cve" id="CVE-2023-33144" title="CVE-2023-33144" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29338" type="cve" id="CVE-2023-29338" title="CVE-2023-29338" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24893" type="cve" id="CVE-2023-24893" title="CVE-2023-24893" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21779" type="cve" id="CVE-2023-21779" title="CVE-2023-21779" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41034" type="cve" id="CVE-2022-41034" title="CVE-2022-41034" />
			<reference href="https://bdu.fstec.ru/vul/2023-05616" type="self" id="BDU:2023-05616" title="BDU:2023-05616" />
			<reference href="https://bdu.fstec.ru/vul/2023-08058" type="self" id="BDU:2023-08058" title="BDU:2023-08058" />
			<reference href="https://bdu.fstec.ru/vul/2023-03235" type="self" id="BDU:2023-03235" title="BDU:2023-03235" />
			<reference href="https://bdu.fstec.ru/vul/2023-02559" type="self" id="BDU:2023-02559" title="BDU:2023-02559" />
			<reference href="https://bdu.fstec.ru/vul/2023-02217" type="self" id="BDU:2023-02217" title="BDU:2023-02217" />
			<reference href="https://bdu.fstec.ru/vul/2023-08059" type="self" id="BDU:2023-08059" title="BDU:2023-08059" />
			<reference href="https://bdu.fstec.ru/vul/2022-07154" type="self" id="BDU:2022-07154" title="BDU:2022-07154" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="codium" epoch="0" version="1.84.2.23314" release="1.el7" arch="x86_64" src="">
					<filename>codium-0:1.84.2.23314-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231122-01</id>
		<issued date="2023-11-22" />
		<updated date="2023-11-22" />
		<title>Уязвимость Kubernetes </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kubernetes</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kubernetes-cve-2023-5528/</description>
               <solution>
                    Запретить использование в ОС пакета kubernetes
                или
                    Установить обновление для пакета(ов) kubernetes
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kubernetes-cve-2023-5528/" type="self" id="ROS-20231122-01" title="ROS-20231122-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5528" type="cve" id="CVE-2023-5528" title="CVE-2023-5528" />
			<reference href="https://bdu.fstec.ru/vul/2023-07938" type="self" id="BDU:2023-07938" title="BDU:2023-07938" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kubernetes" epoch="0" version="1.24.17" release="3.el7" arch="x86_64" src="">
					<filename>kubernetes-0:1.24.17-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240123-01</id>
		<issued date="2024-01-23" />
		<updated date="2024-01-23" />
		<title>Уязвимость Уязвимость в Atril </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в atril</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-uyazvimost-v-atril-cve-2023-51698/</description>
               <solution>
                    Запретить использование в ОС пакета Atril
                или
                    Установить обновление для пакета(ов) Atril
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-uyazvimost-v-atril-cve-2023-51698/" type="self" id="ROS-20240123-01" title="ROS-20240123-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51698" type="cve" id="CVE-2023-51698" title="CVE-2023-51698" />
			<reference href="https://bdu.fstec.ru/vul/2024-00525" type="self" id="BDU:2024-00525" title="BDU:2024-00525" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="atril" epoch="1" version="1.26.0" release="11.el7" arch="x86_64" src="">
					<filename>atril-1:1.26.0-11.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240201-01</id>
		<issued date="2024-02-01" />
		<updated date="2024-02-01" />
		<title>Множественные уязвимости xterm </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в xterm</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-xterm-cve-2023-40359-cve-2022-45063/</description>
               <solution>
                    Запретить использование в ОС пакета xterm
                или
                    Установить обновление для пакета(ов) xterm
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-xterm-cve-2023-40359-cve-2022-45063/" type="self" id="ROS-20240201-01" title="ROS-20240201-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40359" type="cve" id="CVE-2023-40359" title="CVE-2023-40359" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45063" type="cve" id="CVE-2022-45063" title="CVE-2022-45063" />
			<reference href="https://bdu.fstec.ru/vul/2023-07914" type="self" id="BDU:2023-07914" title="BDU:2023-07914" />
			<reference href="https://bdu.fstec.ru/vul/2023-04813" type="self" id="BDU:2023-04813" title="BDU:2023-04813" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="xterm" epoch="0" version="388" release="1.el7" arch="x86_64" src="">
					<filename>xterm-0:388-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230920-01</id>
		<issued date="2024-02-02" />
		<updated date="2024-02-02" />
		<title>Множественные уязвимости samba </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в samba</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-samba-cve-2023-34967-cve-2022-2127-cve-2023-34966-cve-2023-34968-cve-2023/</description>
               <solution>
                    Запретить использование в ОС пакета Samba
                или
                    Установить обновление для пакета(ов) Samba
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-samba-cve-2023-34967-cve-2022-2127-cve-2023-34966-cve-2023-34968-cve-2023/" type="self" id="ROS-20230920-01" title="ROS-20230920-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967" type="cve" id="CVE-2023-34967" title="CVE-2023-34967" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127" type="cve" id="CVE-2022-2127" title="CVE-2022-2127" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966" type="cve" id="CVE-2023-34966" title="CVE-2023-34966" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968" type="cve" id="CVE-2023-34968" title="CVE-2023-34968" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3347" type="cve" id="CVE-2023-3347" title="CVE-2023-3347" />
			<reference href="https://bdu.fstec.ru/vul/2023-09107" type="self" id="BDU:2023-09107" title="BDU:2023-09107" />
			<reference href="https://bdu.fstec.ru/vul/2023-03963" type="self" id="BDU:2023-03963" title="BDU:2023-03963" />
			<reference href="https://bdu.fstec.ru/vul/2023-04385" type="self" id="BDU:2023-04385" title="BDU:2023-04385" />
			<reference href="https://bdu.fstec.ru/vul/2024-06935" type="self" id="BDU:2024-06935" title="BDU:2024-06935" />
			<reference href="https://bdu.fstec.ru/vul/2024-01904" type="self" id="BDU:2024-01904" title="BDU:2024-01904" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="samba" epoch="0" version="4.17.10" release="1m.el7.3" arch="x86_64" src="">
					<filename>samba-0:4.17.10-1m.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230920-02</id>
		<issued date="2024-02-02" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости samba </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в samba</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-sambacve-2023-34967-cve-2022-2127-cve-2023-34966-cve-2023-34968-cve-2023/</description>
               <solution>
                    Запретить использование в ОС пакета Samba
                или
                    Установить обновление для пакета(ов) Samba
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-sambacve-2023-34967-cve-2022-2127-cve-2023-34966-cve-2023-34968-cve-2023/" type="self" id="ROS-20230920-02" title="ROS-20230920-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967" type="cve" id="CVE-2023-34967" title="CVE-2023-34967" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127" type="cve" id="CVE-2022-2127" title="CVE-2022-2127" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966" type="cve" id="CVE-2023-34966" title="CVE-2023-34966" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968" type="cve" id="CVE-2023-34968" title="CVE-2023-34968" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3347" type="cve" id="CVE-2023-3347" title="CVE-2023-3347" />
			<reference href="https://bdu.fstec.ru/vul/2023-09107" type="self" id="BDU:2023-09107" title="BDU:2023-09107" />
			<reference href="https://bdu.fstec.ru/vul/2023-03963" type="self" id="BDU:2023-03963" title="BDU:2023-03963" />
			<reference href="https://bdu.fstec.ru/vul/2023-04385" type="self" id="BDU:2023-04385" title="BDU:2023-04385" />
			<reference href="https://bdu.fstec.ru/vul/2024-06935" type="self" id="BDU:2024-06935" title="BDU:2024-06935" />
			<reference href="https://bdu.fstec.ru/vul/2024-01904" type="self" id="BDU:2024-01904" title="BDU:2024-01904" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="samba" epoch="0" version="4.17.10" release="2h.el7.3" arch="x86_64" src="">
					<filename>samba-0:4.17.10-2h.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240208-01</id>
		<issued date="2024-02-08" />
		<updated date="2024-03-29" />
		<title>Уязвимость в sudo </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в sudo</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-v-sudo-cve-2023-7090/</description>
               <solution>
                    Запретить использование в ОС пакета sudo
                или
                    Установить обновление для пакета(ов) sudo
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-v-sudo-cve-2023-7090/" type="self" id="ROS-20240208-01" title="ROS-20240208-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7090" type="cve" id="CVE-2023-7090" title="CVE-2023-7090" />
			<reference href="https://bdu.fstec.ru/vul/2024-01198" type="self" id="BDU:2024-01198" title="BDU:2024-01198" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="sudo" epoch="0" version="1.9.15p1" release="1.el7" arch="x86_64" src="">
					<filename>sudo-0:1.9.15p1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240208-02</id>
		<issued date="2024-02-08" />
		<updated date="2024-02-08" />
		<title>Уязвимость в shim </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в shim-x64</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-v-shim-cve-2022-28737/</description>
               <solution>
                    Запретить использование в ОС пакета shim-x64
                или
                    Установить обновление для пакета(ов) shim-x64
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-v-shim-cve-2022-28737/" type="self" id="ROS-20240208-02" title="ROS-20240208-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28737" type="cve" id="CVE-2022-28737" title="CVE-2022-28737" />
			<reference href="https://bdu.fstec.ru/vul/2023-05303" type="self" id="BDU:2023-05303" title="BDU:2023-05303" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="shim-x64" epoch="0" version="15.6" release="3.3" arch="x86_64" src="">
					<filename>shim-x64-0:15.6-3.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240208-03</id>
		<issued date="2024-02-08" />
		<updated date="2024-02-08" />
		<title>Множественные уязвимости grub2 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в grub2-common</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-grub2-cve-2021-3697-cve-2021-3696-cve-2021-3695-cve-2022-28736-cve-2022-2/</description>
               <solution>
                    Запретить использование в ОС пакета grub2
                или
                    Установить обновление для пакета(ов) grub2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-grub2-cve-2021-3697-cve-2021-3696-cve-2021-3695-cve-2022-28736-cve-2022-2/" type="self" id="ROS-20240208-03" title="ROS-20240208-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3696" type="cve" id="CVE-2021-3696" title="CVE-2021-3696" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3695" type="cve" id="CVE-2021-3695" title="CVE-2021-3695" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3697" type="cve" id="CVE-2021-3697" title="CVE-2021-3697" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28733" type="cve" id="CVE-2022-28733" title="CVE-2022-28733" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28734" type="cve" id="CVE-2022-28734" title="CVE-2022-28734" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28735" type="cve" id="CVE-2022-28735" title="CVE-2022-28735" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28736" type="cve" id="CVE-2022-28736" title="CVE-2022-28736" />
			<reference href="https://bdu.fstec.ru/vul/2022-06896" type="self" id="BDU:2022-06896" title="BDU:2022-06896" />
			<reference href="https://bdu.fstec.ru/vul/2023-00286" type="self" id="BDU:2023-00286" title="BDU:2023-00286" />
			<reference href="https://bdu.fstec.ru/vul/2022-06891" type="self" id="BDU:2022-06891" title="BDU:2022-06891" />
			<reference href="https://bdu.fstec.ru/vul/2022-03372" type="self" id="BDU:2022-03372" title="BDU:2022-03372" />
			<reference href="https://bdu.fstec.ru/vul/2024-01201" type="self" id="BDU:2024-01201" title="BDU:2024-01201" />
			<reference href="https://bdu.fstec.ru/vul/2024-01200" type="self" id="BDU:2024-01200" title="BDU:2024-01200" />
			<reference href="https://bdu.fstec.ru/vul/2024-01199" type="self" id="BDU:2024-01199" title="BDU:2024-01199" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="grub2-common" epoch="1" version="2.06" release="55.el7.3" arch="noarch" src="">
					<filename>grub2-common-1:2.06-55.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240212-01</id>
		<issued date="2024-02-12" />
		<updated date="2024-02-12" />
		<title>Уязвимость OpenSSH </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в openssh</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssh-cve-2023-38408/</description>
               <solution>
                    Запретить использование в ОС пакета openssh
                или
                    Установить обновление для пакета(ов) openssh
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssh-cve-2023-38408/" type="self" id="ROS-20240212-01" title="ROS-20240212-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38408" type="cve" id="CVE-2023-38408" title="CVE-2023-38408" />
			<reference href="https://bdu.fstec.ru/vul/2023-03950" type="self" id="BDU:2023-03950" title="BDU:2023-03950" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssh" epoch="0" version="8.9p1" release="10.el7" arch="x86_64" src="">
					<filename>openssh-0:8.9p1-10.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240226-01</id>
		<issued date="2024-02-26" />
		<updated date="2024-02-26" />
		<title>Уязвимость Snap </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в snapd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-snap-cve-2022-3328/</description>
               <solution>
                    Запретить использование в ОС пакета snapd
                или
                    Установить обновление для пакета(ов) snapd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-snap-cve-2022-3328/" type="self" id="ROS-20240226-01" title="ROS-20240226-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3328" type="cve" id="CVE-2022-3328" title="CVE-2022-3328" />
			<reference href="https://bdu.fstec.ru/vul/2022-07107" type="self" id="BDU:2022-07107" title="BDU:2022-07107" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="snapd" epoch="0" version="2.58.3" release="1.el7" arch="x86_64" src="">
					<filename>snapd-0:2.58.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240226-02</id>
		<issued date="2024-02-29" />
		<updated date="2024-02-29" />
		<title>Уязвимость dotnet </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в dotnet</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet-cve-2022-34716/</description>
               <solution>
                    Запретить использование в ОС пакета dotnet
                или
                    Установить обновление для пакета(ов) dotnet
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet-cve-2022-34716/" type="self" id="ROS-20240226-02" title="ROS-20240226-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34716" type="cve" id="CVE-2022-34716" title="CVE-2022-34716" />
			<reference href="https://bdu.fstec.ru/vul/2023-06583" type="self" id="BDU:2023-06583" title="BDU:2023-06583" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dotnet" epoch="0" version="6.0.125" release="3.el7" arch="x86_64" src="">
					<filename>dotnet-0:6.0.125-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240318-01</id>
		<issued date="2024-03-18" />
		<updated date="2024-03-18" />
		<title>Множественные уязвимости python3-aiohttp </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-aiohttp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-aiohttp-cve-2023-49081-cve-2023-49082-cve-2023-47627-cve-2023-372/</description>
               <solution>
                    Запретить использование в ОС пакета python3-aiohttp
                или
                    Установить обновление для пакета(ов) python3-aiohttp
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-aiohttp-cve-2023-49081-cve-2023-49082-cve-2023-47627-cve-2023-372/" type="self" id="ROS-20240318-01" title="ROS-20240318-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49081" type="cve" id="CVE-2023-49081" title="CVE-2023-49081" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49082" type="cve" id="CVE-2023-49082" title="CVE-2023-49082" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47627" type="cve" id="CVE-2023-47627" title="CVE-2023-47627" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37276" type="cve" id="CVE-2023-37276" title="CVE-2023-37276" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47641" type="cve" id="CVE-2023-47641" title="CVE-2023-47641" />
			<reference href="https://bdu.fstec.ru/vul/2023-08455" type="self" id="BDU:2023-08455" title="BDU:2023-08455" />
			<reference href="https://bdu.fstec.ru/vul/2023-08273" type="self" id="BDU:2023-08273" title="BDU:2023-08273" />
			<reference href="https://bdu.fstec.ru/vul/2024-02173" type="self" id="BDU:2024-02173" title="BDU:2024-02173" />
			<reference href="https://bdu.fstec.ru/vul/2023-05462" type="self" id="BDU:2023-05462" title="BDU:2023-05462" />
			<reference href="https://bdu.fstec.ru/vul/2024-02174" type="self" id="BDU:2024-02174" title="BDU:2024-02174" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-aiohttp" epoch="0" version="3.8.1" release="2.el7" arch="x86_64" src="">
					<filename>python3-aiohttp-0:3.8.1-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240319-01</id>
		<issued date="2024-03-19" />
		<updated date="2024-03-19" />
		<title>Множественные уязвимости openssh </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в openssh</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-openssh-cve-2023-51385-cve-2023-51384-cve-2023-48795/</description>
               <solution>
                    Запретить использование в ОС пакета openssh
                или
                    Установить обновление для пакета(ов) openssh
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-openssh-cve-2023-51385-cve-2023-51384-cve-2023-48795/" type="self" id="ROS-20240319-01" title="ROS-20240319-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51385" type="cve" id="CVE-2023-51385" title="CVE-2023-51385" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51384" type="cve" id="CVE-2023-51384" title="CVE-2023-51384" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48795" type="cve" id="CVE-2023-48795" title="CVE-2023-48795" />
			<reference href="https://bdu.fstec.ru/vul/2023-08955" type="self" id="BDU:2023-08955" title="BDU:2023-08955" />
			<reference href="https://bdu.fstec.ru/vul/2023-08956" type="self" id="BDU:2023-08956" title="BDU:2023-08956" />
			<reference href="https://bdu.fstec.ru/vul/2023-08853" type="self" id="BDU:2023-08853" title="BDU:2023-08853" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssh" epoch="0" version="8.9p1" release="11.el7" arch="x86_64" src="">
					<filename>openssh-0:8.9p1-11.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240322-01</id>
		<issued date="2024-03-22" />
		<updated date="2024-03-22" />
		<title>Уязвимость PostgreSQL 12 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-12-cve-2024-0985/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql
                или
                    Установить обновление для пакета(ов) postgresql
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-12-cve-2024-0985/" type="self" id="ROS-20240322-01" title="ROS-20240322-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0985" type="cve" id="CVE-2024-0985" title="CVE-2024-0985" />
			<reference href="https://bdu.fstec.ru/vul/2024-01121" type="self" id="BDU:2024-01121" title="BDU:2024-01121" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql" epoch="0" version="12.18" release="2.el7" arch="x86_64" src="">
					<filename>postgresql-0:12.18-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240322-02</id>
		<issued date="2024-03-22" />
		<updated date="2024-12-23" />
		<title>Уязвимость PostgreSQL 13 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql13</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-13-cve-2024-0985/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql13
                или
                    Установить обновление для пакета(ов) postgresql13
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-13-cve-2024-0985/" type="self" id="ROS-20240322-02" title="ROS-20240322-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0985" type="cve" id="CVE-2024-0985" title="CVE-2024-0985" />
			<reference href="https://bdu.fstec.ru/vul/2024-01121" type="self" id="BDU:2024-01121" title="BDU:2024-01121" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql13" epoch="0" version="13.14" release="2.el7" arch="x86_64" src="">
					<filename>postgresql13-0:13.14-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240322-03</id>
		<issued date="2024-03-22" />
		<updated date="2024-12-23" />
		<title>Уязвимость PostgreSQL 14 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql14</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-14-cve-2024-0985/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql14
                или
                    Установить обновление для пакета(ов) postgresql14
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-14-cve-2024-0985/" type="self" id="ROS-20240322-03" title="ROS-20240322-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0985" type="cve" id="CVE-2024-0985" title="CVE-2024-0985" />
			<reference href="https://bdu.fstec.ru/vul/2024-01121" type="self" id="BDU:2024-01121" title="BDU:2024-01121" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql14" epoch="0" version="14.11" release="1.el7" arch="x86_64" src="">
					<filename>postgresql14-0:14.11-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240322-04</id>
		<issued date="2024-03-22" />
		<updated date="2024-12-23" />
		<title>Уязвимость PostgreSQL 15 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql15</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-15-cve-2024-0985/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql15
                или
                    Установить обновление для пакета(ов) postgresql15
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-15-cve-2024-0985/" type="self" id="ROS-20240322-04" title="ROS-20240322-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0985" type="cve" id="CVE-2024-0985" title="CVE-2024-0985" />
			<reference href="https://bdu.fstec.ru/vul/2024-01121" type="self" id="BDU:2024-01121" title="BDU:2024-01121" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql15" epoch="0" version="15.6" release="1.el7" arch="x86_64" src="">
					<filename>postgresql15-0:15.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240322-05</id>
		<issued date="2024-03-22" />
		<updated date="2024-12-23" />
		<title>Уязвимость PostgreSQL 16 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql16</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-16-cve-2024-0985/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql16
                или
                    Установить обновление для пакета(ов) postgresql16
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-16-cve-2024-0985/" type="self" id="ROS-20240322-05" title="ROS-20240322-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0985" type="cve" id="CVE-2024-0985" title="CVE-2024-0985" />
			<reference href="https://bdu.fstec.ru/vul/2024-01121" type="self" id="BDU:2024-01121" title="BDU:2024-01121" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql16" epoch="0" version="16.2" release="1.el7" arch="x86_64" src="">
					<filename>postgresql16-0:16.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240327-01</id>
		<issued date="2024-03-27" />
		<updated date="2024-03-27" />
		<title>Множественные уязвимости skopeo </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в skopeo</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-skopeo-cve-2022-30629-cve-2022-41717/</description>
               <solution>
                    Запретить использование в ОС пакета skopeo
                или
                    Установить обновление для пакета(ов) skopeo
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-skopeo-cve-2022-30629-cve-2022-41717/" type="self" id="ROS-20240327-01" title="ROS-20240327-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30629" type="cve" id="CVE-2022-30629" title="CVE-2022-30629" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41717" type="cve" id="CVE-2022-41717" title="CVE-2022-41717" />
			<reference href="https://bdu.fstec.ru/vul/2024-02373" type="self" id="BDU:2024-02373" title="BDU:2024-02373" />
			<reference href="https://bdu.fstec.ru/vul/2024-02376" type="self" id="BDU:2024-02376" title="BDU:2024-02376" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="skopeo" epoch="2" version="1.13.3" release="1.el7.3" arch="x86_64" src="">
					<filename>skopeo-2:1.13.3-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240328-01</id>
		<issued date="2024-03-28" />
		<updated date="2024-03-28" />
		<title>Уязвимость glpi </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2023-37278/</description>
               <solution>
                    Запретить использование в ОС пакета GLPI
                или
                    Установить обновление для пакета(ов) GLPI
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2023-37278/" type="self" id="ROS-20240328-01" title="ROS-20240328-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37278" type="cve" id="CVE-2023-37278" title="CVE-2023-37278" />
			<reference href="https://bdu.fstec.ru/vul/2024-02422" type="self" id="BDU:2024-02422" title="BDU:2024-02422" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi" epoch="0" version="10.0.10" release="1.el7" arch="noarch" src="">
					<filename>glpi-0:10.0.10-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240328-02</id>
		<issued date="2024-03-28" />
		<updated date="2024-03-28" />
		<title>Уязвимость VIM </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в vim-X11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-cve-2023-46246/</description>
               <solution>
                    Запретить использование в ОС пакета vim
                или
                    Установить обновление для пакета(ов) vim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-cve-2023-46246/" type="self" id="ROS-20240328-02" title="ROS-20240328-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46246" type="cve" id="CVE-2023-46246" title="CVE-2023-46246" />
			<reference href="https://bdu.fstec.ru/vul/2023-07250" type="self" id="BDU:2023-07250" title="BDU:2023-07250" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-X11" epoch="2" version="9.1.016" release="1.el7.3" arch="x86_64" src="">
					<filename>vim-X11-2:9.1.016-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240328-03</id>
		<issued date="2024-03-28" />
		<updated date="2024-03-28" />
		<title>Множественные уязвимости freerdp3 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в freerdp3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-freerdp3-cve-2023-40187-cve-2023-40574-cve-2023-40575/</description>
               <solution>
                    Запретить использование в ОС пакета freerdp3
                или
                    Установить обновление для пакета(ов) freerdp3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-freerdp3-cve-2023-40187-cve-2023-40574-cve-2023-40575/" type="self" id="ROS-20240328-03" title="ROS-20240328-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40187" type="cve" id="CVE-2023-40187" title="CVE-2023-40187" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40574" type="cve" id="CVE-2023-40574" title="CVE-2023-40574" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40575" type="cve" id="CVE-2023-40575" title="CVE-2023-40575" />
			<reference href="https://bdu.fstec.ru/vul/2023-05086" type="self" id="BDU:2023-05086" title="BDU:2023-05086" />
			<reference href="https://bdu.fstec.ru/vul/2023-05075" type="self" id="BDU:2023-05075" title="BDU:2023-05075" />
			<reference href="https://bdu.fstec.ru/vul/2023-05074" type="self" id="BDU:2023-05074" title="BDU:2023-05074" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="freerdp3" epoch="3" version="3.0.0" release="4.el7" arch="x86_64" src="">
					<filename>freerdp3-3:3.0.0-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240328-04</id>
		<issued date="2024-03-28" />
		<updated date="2024-03-28" />
		<title>Множественные уязвимости sudo </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в sudo</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sudo-cve-2023-42456/</description>
               <solution>
                    Запретить использование в ОС пакета sudo
                или
                    Установить обновление для пакета(ов) sudo
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sudo-cve-2023-42456/" type="self" id="ROS-20240328-04" title="ROS-20240328-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42456" type="cve" id="CVE-2023-42456" title="CVE-2023-42456" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42465" type="cve" id="CVE-2023-42465" title="CVE-2023-42465" />
			<reference href="https://bdu.fstec.ru/vul/2023-07551" type="self" id="BDU:2023-07551" title="BDU:2023-07551" />
			<reference href="https://bdu.fstec.ru/vul/2024-01160" type="self" id="BDU:2024-01160" title="BDU:2024-01160" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="sudo" epoch="0" version="1.9.15p1" release="1.el7" arch="x86_64" src="">
					<filename>sudo-0:1.9.15p1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240328-05</id>
		<issued date="2024-03-28" />
		<updated date="2024-03-28" />
		<title>Множественные уязвимости zabbix </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в zabbix-server-mysql</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix-cve-2023-32728-cve-2023-32727-cve-2023-32726-cve-2023-32725/</description>
               <solution>
                    Запретить использование в ОС пакета zabbix
                или
                    Установить обновление для пакета(ов) zabbix
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix-cve-2023-32728-cve-2023-32727-cve-2023-32726-cve-2023-32725/" type="self" id="ROS-20240328-05" title="ROS-20240328-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32728" type="cve" id="CVE-2023-32728" title="CVE-2023-32728" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32727" type="cve" id="CVE-2023-32727" title="CVE-2023-32727" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32726" type="cve" id="CVE-2023-32726" title="CVE-2023-32726" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32725" type="cve" id="CVE-2023-32725" title="CVE-2023-32725" />
			<reference href="https://bdu.fstec.ru/vul/2024-02409" type="self" id="BDU:2024-02409" title="BDU:2024-02409" />
			<reference href="https://bdu.fstec.ru/vul/2024-00033" type="self" id="BDU:2024-00033" title="BDU:2024-00033" />
			<reference href="https://bdu.fstec.ru/vul/2024-00645" type="self" id="BDU:2024-00645" title="BDU:2024-00645" />
			<reference href="https://bdu.fstec.ru/vul/2023-09066" type="self" id="BDU:2023-09066" title="BDU:2023-09066" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix-server-mysql" epoch="1" version="6.4.9" release="3.el7" arch="x86_64" src="">
					<filename>zabbix-server-mysql-1:6.4.9-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240328-06</id>
		<issued date="2024-03-28" />
		<updated date="2024-03-28" />
		<title>Множественные уязвимости libssh </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libssh</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libssh-cve-2023-6004-cve-2023-6918/</description>
               <solution>
                    Запретить использование в ОС пакета libssh
                или
                    Установить обновление для пакета(ов) libssh
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libssh-cve-2023-6004-cve-2023-6918/" type="self" id="ROS-20240328-06" title="ROS-20240328-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6918" type="cve" id="CVE-2023-6918" title="CVE-2023-6918" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6004" type="cve" id="CVE-2023-6004" title="CVE-2023-6004" />
			<reference href="https://bdu.fstec.ru/vul/2024-00200" type="self" id="BDU:2024-00200" title="BDU:2024-00200" />
			<reference href="https://bdu.fstec.ru/vul/2024-00199" type="self" id="BDU:2024-00199" title="BDU:2024-00199" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libssh" epoch="0" version="0.9.8" release="1.el7" arch="x86_64" src="">
					<filename>libssh-0:0.9.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240328-07</id>
		<issued date="2024-03-28" />
		<updated date="2025-10-09" />
		<title>Уязвимость qemu </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в qemu-common</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qemu-cve-2023-1544/</description>
               <solution>
                    Запретить использование в ОС пакета qemu-common
                или
                    Установить обновление для пакета(ов) qemu-common
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qemu-cve-2023-1544/" type="self" id="ROS-20240328-07" title="ROS-20240328-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1544" type="cve" id="CVE-2023-1544" title="CVE-2023-1544" />
			<reference href="https://bdu.fstec.ru/vul/2023-02140" type="self" id="BDU:2023-02140" title="BDU:2023-02140" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="qemu-common" epoch="15" version="7.2.7" release="1.el7" arch="x86_64" src="">
					<filename>qemu-common-15:7.2.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240328-08</id>
		<issued date="2024-03-28" />
		<updated date="2024-03-28" />
		<title>Множественные уязвимости chromium</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium/" type="self" id="ROS-20240328-08" title="ROS-20240328-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6345" type="cve" id="CVE-2023-6345" title="CVE-2023-6345" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6346" type="cve" id="CVE-2023-6346" title="CVE-2023-6346" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6347" type="cve" id="CVE-2023-6347" title="CVE-2023-6347" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6348" type="cve" id="CVE-2023-6348" title="CVE-2023-6348" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6350" type="cve" id="CVE-2023-6350" title="CVE-2023-6350" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6351" type="cve" id="CVE-2023-6351" title="CVE-2023-6351" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6508" type="cve" id="CVE-2023-6508" title="CVE-2023-6508" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6509" type="cve" id="CVE-2023-6509" title="CVE-2023-6509" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6510" type="cve" id="CVE-2023-6510" title="CVE-2023-6510" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6511" type="cve" id="CVE-2023-6511" title="CVE-2023-6511" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6512" type="cve" id="CVE-2023-6512" title="CVE-2023-6512" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2931" type="cve" id="CVE-2023-2931" title="CVE-2023-2931" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7024" type="cve" id="CVE-2023-7024" title="CVE-2023-7024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0222" type="cve" id="CVE-2024-0222" title="CVE-2024-0222" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0223" type="cve" id="CVE-2024-0223" title="CVE-2024-0223" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0224" type="cve" id="CVE-2024-0224" title="CVE-2024-0224" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0225" type="cve" id="CVE-2024-0225" title="CVE-2024-0225" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0333" type="cve" id="CVE-2024-0333" title="CVE-2024-0333" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0517" type="cve" id="CVE-2024-0517" title="CVE-2024-0517" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0518" type="cve" id="CVE-2024-0518" title="CVE-2024-0518" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0519" type="cve" id="CVE-2024-0519" title="CVE-2024-0519" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702" type="cve" id="CVE-2023-6702" title="CVE-2023-6702" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703" type="cve" id="CVE-2023-6703" title="CVE-2023-6703" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704" type="cve" id="CVE-2023-6704" title="CVE-2023-6704" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705" type="cve" id="CVE-2023-6705" title="CVE-2023-6705" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706" type="cve" id="CVE-2023-6706" title="CVE-2023-6706" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707" type="cve" id="CVE-2023-6707" title="CVE-2023-6707" />
			<reference href="https://bdu.fstec.ru/vul/2023-08264" type="self" id="BDU:2023-08264" title="BDU:2023-08264" />
			<reference href="https://bdu.fstec.ru/vul/2023-08357" type="self" id="BDU:2023-08357" title="BDU:2023-08357" />
			<reference href="https://bdu.fstec.ru/vul/2023-08361" type="self" id="BDU:2023-08361" title="BDU:2023-08361" />
			<reference href="https://bdu.fstec.ru/vul/2023-08360" type="self" id="BDU:2023-08360" title="BDU:2023-08360" />
			<reference href="https://bdu.fstec.ru/vul/2023-08358" type="self" id="BDU:2023-08358" title="BDU:2023-08358" />
			<reference href="https://bdu.fstec.ru/vul/2023-08359" type="self" id="BDU:2023-08359" title="BDU:2023-08359" />
			<reference href="https://bdu.fstec.ru/vul/2023-09063" type="self" id="BDU:2023-09063" title="BDU:2023-09063" />
			<reference href="https://bdu.fstec.ru/vul/2023-08557" type="self" id="BDU:2023-08557" title="BDU:2023-08557" />
			<reference href="https://bdu.fstec.ru/vul/2023-08558" type="self" id="BDU:2023-08558" title="BDU:2023-08558" />
			<reference href="https://bdu.fstec.ru/vul/2023-08556" type="self" id="BDU:2023-08556" title="BDU:2023-08556" />
			<reference href="https://bdu.fstec.ru/vul/2023-08555" type="self" id="BDU:2023-08555" title="BDU:2023-08555" />
			<reference href="https://bdu.fstec.ru/vul/2023-09068" type="self" id="BDU:2023-09068" title="BDU:2023-09068" />
			<reference href="https://bdu.fstec.ru/vul/2024-00166" type="self" id="BDU:2024-00166" title="BDU:2024-00166" />
			<reference href="https://bdu.fstec.ru/vul/2024-00297" type="self" id="BDU:2024-00297" title="BDU:2024-00297" />
			<reference href="https://bdu.fstec.ru/vul/2024-00234" type="self" id="BDU:2024-00234" title="BDU:2024-00234" />
			<reference href="https://bdu.fstec.ru/vul/2024-00165" type="self" id="BDU:2024-00165" title="BDU:2024-00165" />
			<reference href="https://bdu.fstec.ru/vul/2024-00348" type="self" id="BDU:2024-00348" title="BDU:2024-00348" />
			<reference href="https://bdu.fstec.ru/vul/2024-00491" type="self" id="BDU:2024-00491" title="BDU:2024-00491" />
			<reference href="https://bdu.fstec.ru/vul/2024-00490" type="self" id="BDU:2024-00490" title="BDU:2024-00490" />
			<reference href="https://bdu.fstec.ru/vul/2024-00492" type="self" id="BDU:2024-00492" title="BDU:2024-00492" />
			<reference href="https://bdu.fstec.ru/vul/2023-08756" type="self" id="BDU:2023-08756" title="BDU:2023-08756" />
			<reference href="https://bdu.fstec.ru/vul/2023-08757" type="self" id="BDU:2023-08757" title="BDU:2023-08757" />
			<reference href="https://bdu.fstec.ru/vul/2023-08754" type="self" id="BDU:2023-08754" title="BDU:2023-08754" />
			<reference href="https://bdu.fstec.ru/vul/2023-08755" type="self" id="BDU:2023-08755" title="BDU:2023-08755" />
			<reference href="https://bdu.fstec.ru/vul/2023-08751" type="self" id="BDU:2023-08751" title="BDU:2023-08751" />
			<reference href="https://bdu.fstec.ru/vul/2023-08750" type="self" id="BDU:2023-08750" title="BDU:2023-08750" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="120.0.6099.224" release="1.el7" arch="x86_64" src="">
					<filename>chromium-0:120.0.6099.224-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240328-09</id>
		<issued date="2024-03-28" />
		<updated date="2024-03-28" />
		<title>Уязвимость rear </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в rear</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rear-cve-2024-23301/</description>
               <solution>
                    Запретить использование в ОС пакета rear
                или
                    Установить обновление для пакета(ов) rear
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rear-cve-2024-23301/" type="self" id="ROS-20240328-09" title="ROS-20240328-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23301" type="cve" id="CVE-2024-23301" title="CVE-2024-23301" />
			<reference href="https://bdu.fstec.ru/vul/2024-00450" type="self" id="BDU:2024-00450" title="BDU:2024-00450" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rear" epoch="0" version="2.7" release="1.el7" arch="x86_64" src="">
					<filename>rear-0:2.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240328-10</id>
		<issued date="2024-03-28" />
		<updated date="2024-03-28" />
		<title>Уязвимость haproxy </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в haproxy</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-haproxy-cve-2023-45539/</description>
               <solution>
                    Запретить использование в ОС пакета haproxy
                или
                    Установить обновление для пакета(ов) haproxy
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-haproxy-cve-2023-45539/" type="self" id="ROS-20240328-10" title="ROS-20240328-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45539" type="cve" id="CVE-2023-45539" title="CVE-2023-45539" />
			<reference href="https://bdu.fstec.ru/vul/2024-02423" type="self" id="BDU:2024-02423" title="BDU:2024-02423" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="haproxy" epoch="0" version="2.6.11" release="4.el7" arch="x86_64" src="">
					<filename>haproxy-0:2.6.11-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240328-11</id>
		<issued date="2024-03-28" />
		<updated date="2024-03-28" />
		<title>Уязвимость curl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2023-46218/</description>
               <solution>
                    Запретить использование в ОС пакета curl
                или
                    Установить обновление для пакета(ов) curl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2023-46218/" type="self" id="ROS-20240328-11" title="ROS-20240328-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46218" type="cve" id="CVE-2023-46218" title="CVE-2023-46218" />
			<reference href="https://bdu.fstec.ru/vul/2024-02420" type="self" id="BDU:2024-02420" title="BDU:2024-02420" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="curl" epoch="0" version="7.85.0" release="17.el7.3" arch="x86_64" src="">
					<filename>curl-0:7.85.0-17.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240328-12</id>
		<issued date="2024-03-28" />
		<updated date="2024-03-28" />
		<title>Уязвимость perl </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в perl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-cve-2023-47100/</description>
               <solution>
                    Запретить использование в ОС пакета perl
                или
                    Установить обновление для пакета(ов) perl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-cve-2023-47100/" type="self" id="ROS-20240328-12" title="ROS-20240328-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47100" type="cve" id="CVE-2023-47100" title="CVE-2023-47100" />
			<reference href="https://bdu.fstec.ru/vul/2023-08382" type="self" id="BDU:2023-08382" title="BDU:2023-08382" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="perl" epoch="4" version="5.30.1" release="466.el7" arch="x86_64" src="">
					<filename>perl-4:5.30.1-466.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240328-13</id>
		<issued date="2024-03-28" />
		<updated date="2024-03-28" />
		<title>Множественные уязвимости minizip-ng </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в minizip-ng</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-minizip-ng-cve-2023-48107-cve-2023-48106/</description>
               <solution>
                    Запретить использование в ОС пакета Minizip-ng
                или
                    Установить обновление для пакета(ов) Minizip-ng
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-minizip-ng-cve-2023-48107-cve-2023-48106/" type="self" id="ROS-20240328-13" title="ROS-20240328-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48107" type="cve" id="CVE-2023-48107" title="CVE-2023-48107" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48106" type="cve" id="CVE-2023-48106" title="CVE-2023-48106" />
			<reference href="https://bdu.fstec.ru/vul/2024-02424" type="self" id="BDU:2024-02424" title="BDU:2024-02424" />
			<reference href="https://bdu.fstec.ru/vul/2024-02425" type="self" id="BDU:2024-02425" title="BDU:2024-02425" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="minizip-ng" epoch="0" version="4.0.3" release="1.el7" arch="x86_64" src="">
					<filename>minizip-ng-0:4.0.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240328-14</id>
		<issued date="2024-03-28" />
		<updated date="2024-03-28" />
		<title>Уязвимость libtiff </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libtiff</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libtiff-cve-2023-6277/</description>
               <solution>
                    Запретить использование в ОС пакета libtiff
                или
                    Установить обновление для пакета(ов) libtiff
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libtiff-cve-2023-6277/" type="self" id="ROS-20240328-14" title="ROS-20240328-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6277" type="cve" id="CVE-2023-6277" title="CVE-2023-6277" />
			<reference href="https://bdu.fstec.ru/vul/2024-00969" type="self" id="BDU:2024-00969" title="BDU:2024-00969" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libtiff" epoch="0" version="4.5.1" release="7.el7" arch="x86_64" src="">
					<filename>libtiff-0:4.5.1-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240328-15</id>
		<issued date="2024-03-28" />
		<updated date="2024-03-28" />
		<title>Множественные уязвимости chromium</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-2/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-2/" type="self" id="ROS-20240328-15" title="ROS-20240328-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6508" type="cve" id="CVE-2023-6508" title="CVE-2023-6508" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6509" type="cve" id="CVE-2023-6509" title="CVE-2023-6509" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6510" type="cve" id="CVE-2023-6510" title="CVE-2023-6510" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6511" type="cve" id="CVE-2023-6511" title="CVE-2023-6511" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6512" type="cve" id="CVE-2023-6512" title="CVE-2023-6512" />
			<reference href="https://bdu.fstec.ru/vul/2023-09063" type="self" id="BDU:2023-09063" title="BDU:2023-09063" />
			<reference href="https://bdu.fstec.ru/vul/2023-08557" type="self" id="BDU:2023-08557" title="BDU:2023-08557" />
			<reference href="https://bdu.fstec.ru/vul/2023-08558" type="self" id="BDU:2023-08558" title="BDU:2023-08558" />
			<reference href="https://bdu.fstec.ru/vul/2023-08556" type="self" id="BDU:2023-08556" title="BDU:2023-08556" />
			<reference href="https://bdu.fstec.ru/vul/2023-08555" type="self" id="BDU:2023-08555" title="BDU:2023-08555" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="120.0.6099.224" release="1.el7" arch="x86_64" src="">
					<filename>chromium-0:120.0.6099.224-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240328-16</id>
		<issued date="2024-03-28" />
		<updated date="2024-03-28" />
		<title>Уязвимость VIM </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в vim-X11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-cve-2023-48706/</description>
               <solution>
                    Запретить использование в ОС пакета vim
                или
                    Установить обновление для пакета(ов) vim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-cve-2023-48706/" type="self" id="ROS-20240328-16" title="ROS-20240328-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48706" type="cve" id="CVE-2023-48706" title="CVE-2023-48706" />
			<reference href="https://bdu.fstec.ru/vul/2023-08297" type="self" id="BDU:2023-08297" title="BDU:2023-08297" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-X11" epoch="2" version="9.1.016" release="1.el7.3" arch="x86_64" src="">
					<filename>vim-X11-2:9.1.016-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240328-17</id>
		<issued date="2024-03-28" />
		<updated date="2024-03-28" />
		<title>Уязвимость sudo </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в sudo</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sudo-cve-2023-28487/</description>
               <solution>
                    Запретить использование в ОС пакета Sudo
                или
                    Установить обновление для пакета(ов) Sudo
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sudo-cve-2023-28487/" type="self" id="ROS-20240328-17" title="ROS-20240328-17" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28487" type="cve" id="CVE-2023-28487" title="CVE-2023-28487" />
			<reference href="https://bdu.fstec.ru/vul/2023-03867" type="self" id="BDU:2023-03867" title="BDU:2023-03867" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="sudo" epoch="0" version="1.9.15p1" release="1.el7" arch="x86_64" src="">
					<filename>sudo-0:1.9.15p1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240329-01</id>
		<issued date="2024-03-29" />
		<updated date="2024-03-29" />
		<title>Множественные уязвимости VIM </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в vim-X11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim-cve-2023-48231-cve-2023-48232-cve-2023-48233-cve-2023-48234-cve-2023-/</description>
               <solution>
                    Запретить использование в ОС пакета vim
                или
                    Установить обновление для пакета(ов) vim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim-cve-2023-48231-cve-2023-48232-cve-2023-48233-cve-2023-48234-cve-2023-/" type="self" id="ROS-20240329-01" title="ROS-20240329-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48231" type="cve" id="CVE-2023-48231" title="CVE-2023-48231" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48232" type="cve" id="CVE-2023-48232" title="CVE-2023-48232" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48233" type="cve" id="CVE-2023-48233" title="CVE-2023-48233" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48234" type="cve" id="CVE-2023-48234" title="CVE-2023-48234" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48235" type="cve" id="CVE-2023-48235" title="CVE-2023-48235" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48236" type="cve" id="CVE-2023-48236" title="CVE-2023-48236" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48237" type="cve" id="CVE-2023-48237" title="CVE-2023-48237" />
			<reference href="https://bdu.fstec.ru/vul/2024-02412" type="self" id="BDU:2024-02412" title="BDU:2024-02412" />
			<reference href="https://bdu.fstec.ru/vul/2024-02413" type="self" id="BDU:2024-02413" title="BDU:2024-02413" />
			<reference href="https://bdu.fstec.ru/vul/2024-02414" type="self" id="BDU:2024-02414" title="BDU:2024-02414" />
			<reference href="https://bdu.fstec.ru/vul/2024-02415" type="self" id="BDU:2024-02415" title="BDU:2024-02415" />
			<reference href="https://bdu.fstec.ru/vul/2024-02416" type="self" id="BDU:2024-02416" title="BDU:2024-02416" />
			<reference href="https://bdu.fstec.ru/vul/2024-02417" type="self" id="BDU:2024-02417" title="BDU:2024-02417" />
			<reference href="https://bdu.fstec.ru/vul/2024-02418" type="self" id="BDU:2024-02418" title="BDU:2024-02418" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-X11" epoch="2" version="9.1.016" release="1.el7.3" arch="x86_64" src="">
					<filename>vim-X11-2:9.1.016-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240329-02</id>
		<issued date="2024-03-29" />
		<updated date="2024-03-29" />
		<title>Уязвимость squid </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в squid</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-squid-cve-2024-23638/</description>
               <solution>
                    Запретить использование в ОС пакета squid
                или
                    Установить обновление для пакета(ов) squid
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-squid-cve-2024-23638/" type="self" id="ROS-20240329-02" title="ROS-20240329-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23638" type="cve" id="CVE-2024-23638" title="CVE-2024-23638" />
			<reference href="https://bdu.fstec.ru/vul/2024-00895" type="self" id="BDU:2024-00895" title="BDU:2024-00895" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="squid" epoch="7" version="6.6" release="1.el7" arch="x86_64" src="">
					<filename>squid-7:6.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240329-03</id>
		<issued date="2024-03-29" />
		<updated date="2024-03-29" />
		<title>Уязвимость composer </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в composer</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-composer-cve-2024-24821/</description>
               <solution>
                    Запретить использование в ОС пакета composer
                или
                    Установить обновление для пакета(ов) composer
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-composer-cve-2024-24821/" type="self" id="ROS-20240329-03" title="ROS-20240329-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24821" type="cve" id="CVE-2024-24821" title="CVE-2024-24821" />
			<reference href="https://bdu.fstec.ru/vul/2024-01128" type="self" id="BDU:2024-01128" title="BDU:2024-01128" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="composer" epoch="0" version="2.7.1" release="1.el7" arch="noarch" src="">
					<filename>composer-0:2.7.1-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240329-04</id>
		<issued date="2024-03-29" />
		<updated date="2024-03-29" />
		<title>Уязвимость aspnetcore-runtime </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в aspnetcore-runtime-6.0</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-aspnetcore-runtime-cve-2023-36558/</description>
               <solution>
                    Запретить использование в ОС пакета aspnetcore-runtime
                или
                    Установить обновление для пакета(ов) aspnetcore-runtime
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-aspnetcore-runtime-cve-2023-36558/" type="self" id="ROS-20240329-04" title="ROS-20240329-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36558" type="cve" id="CVE-2023-36558" title="CVE-2023-36558" />
			<reference href="https://bdu.fstec.ru/vul/2023-08245" type="self" id="BDU:2023-08245" title="BDU:2023-08245" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="aspnetcore-runtime-6.0" epoch="0" version="6.0.25" release="3.el7" arch="x86_64" src="">
					<filename>aspnetcore-runtime-6.0-0:6.0.25-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240329-05</id>
		<issued date="2024-03-29" />
		<updated date="2024-03-29" />
		<title>Множественные уязвимости VIM </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в vim-X11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim-cve-2023-4734-cve-2023-4735-cve-2023-4736-cve-2023-4738/</description>
               <solution>
                    Запретить использование в ОС пакета vim
                или
                    Установить обновление для пакета(ов) vim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim-cve-2023-4734-cve-2023-4735-cve-2023-4736-cve-2023-4738/" type="self" id="ROS-20240329-05" title="ROS-20240329-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4734" type="cve" id="CVE-2023-4734" title="CVE-2023-4734" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4735" type="cve" id="CVE-2023-4735" title="CVE-2023-4735" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4736" type="cve" id="CVE-2023-4736" title="CVE-2023-4736" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4738" type="cve" id="CVE-2023-4738" title="CVE-2023-4738" />
			<reference href="https://bdu.fstec.ru/vul/2023-05671" type="self" id="BDU:2023-05671" title="BDU:2023-05671" />
			<reference href="https://bdu.fstec.ru/vul/2023-05672" type="self" id="BDU:2023-05672" title="BDU:2023-05672" />
			<reference href="https://bdu.fstec.ru/vul/2023-05670" type="self" id="BDU:2023-05670" title="BDU:2023-05670" />
			<reference href="https://bdu.fstec.ru/vul/2023-05673" type="self" id="BDU:2023-05673" title="BDU:2023-05673" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-X11" epoch="2" version="9.1.016" release="1.el7.3" arch="x86_64" src="">
					<filename>vim-X11-2:9.1.016-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240329-06</id>
		<issued date="2024-03-29" />
		<updated date="2024-03-29" />
		<title>Множественные уязвимости chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-cve-2023-5997-cve-2023-6112-cve-2023-5996/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-cve-2023-5997-cve-2023-6112-cve-2023-5996/" type="self" id="ROS-20240329-06" title="ROS-20240329-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5997" type="cve" id="CVE-2023-5997" title="CVE-2023-5997" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6112" type="cve" id="CVE-2023-6112" title="CVE-2023-6112" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5996" type="cve" id="CVE-2023-5996" title="CVE-2023-5996" />
			<reference href="https://bdu.fstec.ru/vul/2023-08092" type="self" id="BDU:2023-08092" title="BDU:2023-08092" />
			<reference href="https://bdu.fstec.ru/vul/2023-08091" type="self" id="BDU:2023-08091" title="BDU:2023-08091" />
			<reference href="https://bdu.fstec.ru/vul/2023-07841" type="self" id="BDU:2023-07841" title="BDU:2023-07841" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="120.0.6099.224" release="1.el7" arch="x86_64" src="">
					<filename>chromium-0:120.0.6099.224-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240329-07</id>
		<issued date="2024-03-29" />
		<updated date="2024-03-29" />
		<title>Множественные уязвимости chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-cve-2023-5218-cve-2023-5473-cve-2023-5482-cve-2023-5483-cve-2023/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-cve-2023-5218-cve-2023-5473-cve-2023-5482-cve-2023-5483-cve-2023/" type="self" id="ROS-20240329-07" title="ROS-20240329-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5218" type="cve" id="CVE-2023-5218" title="CVE-2023-5218" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5473" type="cve" id="CVE-2023-5473" title="CVE-2023-5473" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5474" type="cve" id="CVE-2023-5474" title="CVE-2023-5474" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5475" type="cve" id="CVE-2023-5475" title="CVE-2023-5475" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5476" type="cve" id="CVE-2023-5476" title="CVE-2023-5476" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5477" type="cve" id="CVE-2023-5477" title="CVE-2023-5477" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5478" type="cve" id="CVE-2023-5478" title="CVE-2023-5478" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5479" type="cve" id="CVE-2023-5479" title="CVE-2023-5479" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5481" type="cve" id="CVE-2023-5481" title="CVE-2023-5481" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5483" type="cve" id="CVE-2023-5483" title="CVE-2023-5483" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5484" type="cve" id="CVE-2023-5484" title="CVE-2023-5484" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5485" type="cve" id="CVE-2023-5485" title="CVE-2023-5485" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5486" type="cve" id="CVE-2023-5486" title="CVE-2023-5486" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5487" type="cve" id="CVE-2023-5487" title="CVE-2023-5487" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26156" type="cve" id="CVE-2023-26156" title="CVE-2023-26156" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5480" type="cve" id="CVE-2023-5480" title="CVE-2023-5480" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5482" type="cve" id="CVE-2023-5482" title="CVE-2023-5482" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5849" type="cve" id="CVE-2023-5849" title="CVE-2023-5849" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5850" type="cve" id="CVE-2023-5850" title="CVE-2023-5850" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5851" type="cve" id="CVE-2023-5851" title="CVE-2023-5851" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5852" type="cve" id="CVE-2023-5852" title="CVE-2023-5852" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5853" type="cve" id="CVE-2023-5853" title="CVE-2023-5853" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5854" type="cve" id="CVE-2023-5854" title="CVE-2023-5854" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5855" type="cve" id="CVE-2023-5855" title="CVE-2023-5855" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5856" type="cve" id="CVE-2023-5856" title="CVE-2023-5856" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5857" type="cve" id="CVE-2023-5857" title="CVE-2023-5857" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5858" type="cve" id="CVE-2023-5858" title="CVE-2023-5858" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5859" type="cve" id="CVE-2023-5859" title="CVE-2023-5859" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5472" type="cve" id="CVE-2023-5472" title="CVE-2023-5472" />
			<reference href="https://bdu.fstec.ru/vul/2023-06604" type="self" id="BDU:2023-06604" title="BDU:2023-06604" />
			<reference href="https://bdu.fstec.ru/vul/2023-06611" type="self" id="BDU:2023-06611" title="BDU:2023-06611" />
			<reference href="https://bdu.fstec.ru/vul/2023-06780" type="self" id="BDU:2023-06780" title="BDU:2023-06780" />
			<reference href="https://bdu.fstec.ru/vul/2023-06824" type="self" id="BDU:2023-06824" title="BDU:2023-06824" />
			<reference href="https://bdu.fstec.ru/vul/2023-06823" type="self" id="BDU:2023-06823" title="BDU:2023-06823" />
			<reference href="https://bdu.fstec.ru/vul/2023-06607" type="self" id="BDU:2023-06607" title="BDU:2023-06607" />
			<reference href="https://bdu.fstec.ru/vul/2023-06605" type="self" id="BDU:2023-06605" title="BDU:2023-06605" />
			<reference href="https://bdu.fstec.ru/vul/2023-06825" type="self" id="BDU:2023-06825" title="BDU:2023-06825" />
			<reference href="https://bdu.fstec.ru/vul/2023-06670" type="self" id="BDU:2023-06670" title="BDU:2023-06670" />
			<reference href="https://bdu.fstec.ru/vul/2023-06826" type="self" id="BDU:2023-06826" title="BDU:2023-06826" />
			<reference href="https://bdu.fstec.ru/vul/2023-06606" type="self" id="BDU:2023-06606" title="BDU:2023-06606" />
			<reference href="https://bdu.fstec.ru/vul/2023-06669" type="self" id="BDU:2023-06669" title="BDU:2023-06669" />
			<reference href="https://bdu.fstec.ru/vul/2023-06608" type="self" id="BDU:2023-06608" title="BDU:2023-06608" />
			<reference href="https://bdu.fstec.ru/vul/2023-06671" type="self" id="BDU:2023-06671" title="BDU:2023-06671" />
			<reference href="https://bdu.fstec.ru/vul/2023-08040" type="self" id="BDU:2023-08040" title="BDU:2023-08040" />
			<reference href="https://bdu.fstec.ru/vul/2023-07433" type="self" id="BDU:2023-07433" title="BDU:2023-07433" />
			<reference href="https://bdu.fstec.ru/vul/2023-07415" type="self" id="BDU:2023-07415" title="BDU:2023-07415" />
			<reference href="https://bdu.fstec.ru/vul/2023-07413" type="self" id="BDU:2023-07413" title="BDU:2023-07413" />
			<reference href="https://bdu.fstec.ru/vul/2023-07404" type="self" id="BDU:2023-07404" title="BDU:2023-07404" />
			<reference href="https://bdu.fstec.ru/vul/2023-07403" type="self" id="BDU:2023-07403" title="BDU:2023-07403" />
			<reference href="https://bdu.fstec.ru/vul/2023-07402" type="self" id="BDU:2023-07402" title="BDU:2023-07402" />
			<reference href="https://bdu.fstec.ru/vul/2023-07405" type="self" id="BDU:2023-07405" title="BDU:2023-07405" />
			<reference href="https://bdu.fstec.ru/vul/2023-07401" type="self" id="BDU:2023-07401" title="BDU:2023-07401" />
			<reference href="https://bdu.fstec.ru/vul/2023-07414" type="self" id="BDU:2023-07414" title="BDU:2023-07414" />
			<reference href="https://bdu.fstec.ru/vul/2023-07431" type="self" id="BDU:2023-07431" title="BDU:2023-07431" />
			<reference href="https://bdu.fstec.ru/vul/2023-07429" type="self" id="BDU:2023-07429" title="BDU:2023-07429" />
			<reference href="https://bdu.fstec.ru/vul/2023-07430" type="self" id="BDU:2023-07430" title="BDU:2023-07430" />
			<reference href="https://bdu.fstec.ru/vul/2023-07432" type="self" id="BDU:2023-07432" title="BDU:2023-07432" />
			<reference href="https://bdu.fstec.ru/vul/2023-07287" type="self" id="BDU:2023-07287" title="BDU:2023-07287" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="120.0.6099.224" release="1.el7" arch="x86_64" src="">
					<filename>chromium-0:120.0.6099.224-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240329-08</id>
		<issued date="2024-03-29" />
		<updated date="2024-03-29" />
		<title>Уязвимость engrampa </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в engrampa</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-engrampa-cve-2023-52138/</description>
               <solution>
                    Запретить использование в ОС пакета Engrampa
                или
                    Установить обновление для пакета(ов) Engrampa
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-engrampa-cve-2023-52138/" type="self" id="ROS-20240329-08" title="ROS-20240329-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52138" type="cve" id="CVE-2023-52138" title="CVE-2023-52138" />
			<reference href="https://bdu.fstec.ru/vul/2024-02421" type="self" id="BDU:2024-02421" title="BDU:2024-02421" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="engrampa" epoch="1" version="1.26.0" release="13.el7" arch="x86_64" src="">
					<filename>engrampa-1:1.26.0-13.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240329-09</id>
		<issued date="2024-03-29" />
		<updated date="2024-03-29" />
		<title>Множественные уязвимости xorg-x11-server </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в xorg-x11-server-Xorg</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-xorg-x11-server-cve-2023-6816-cve-2024-0229-cve-2024-0229-cve-2024-21885-/</description>
               <solution>
                    Запретить использование в ОС пакета xorg-x11-server
                или
                    Установить обновление для пакета(ов) xorg-x11-server
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-xorg-x11-server-cve-2023-6816-cve-2024-0229-cve-2024-0229-cve-2024-21885-/" type="self" id="ROS-20240329-09" title="ROS-20240329-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816" type="cve" id="CVE-2023-6816" title="CVE-2023-6816" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229" type="cve" id="CVE-2024-0229" title="CVE-2024-0229" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885" type="cve" id="CVE-2024-21885" title="CVE-2024-21885" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886" type="cve" id="CVE-2024-21886" title="CVE-2024-21886" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409" type="cve" id="CVE-2024-0409" title="CVE-2024-0409" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408" type="cve" id="CVE-2024-0408" title="CVE-2024-0408" />
			<reference href="https://bdu.fstec.ru/vul/2024-00405" type="self" id="BDU:2024-00405" title="BDU:2024-00405" />
			<reference href="https://bdu.fstec.ru/vul/2024-00676" type="self" id="BDU:2024-00676" title="BDU:2024-00676" />
			<reference href="https://bdu.fstec.ru/vul/2024-00667" type="self" id="BDU:2024-00667" title="BDU:2024-00667" />
			<reference href="https://bdu.fstec.ru/vul/2024-00675" type="self" id="BDU:2024-00675" title="BDU:2024-00675" />
			<reference href="https://bdu.fstec.ru/vul/2024-00639" type="self" id="BDU:2024-00639" title="BDU:2024-00639" />
			<reference href="https://bdu.fstec.ru/vul/2024-00638" type="self" id="BDU:2024-00638" title="BDU:2024-00638" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="xorg-x11-server-Xorg" epoch="0" version="1.20.14" release="10.el7.3" arch="x86_64" src="">
					<filename>xorg-x11-server-Xorg-0:1.20.14-10.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240329-10</id>
		<issued date="2024-03-29" />
		<updated date="2024-04-02" />
		<title>Множественные уязвимости cri-o </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в cri-o</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-cri-o-cve-2022-2995-cve-2023-39325-cve-2023-4448/</description>
               <solution>
                    Запретить использование в ОС пакета Cri-o
                или
                    Установить обновление для пакета(ов) Cri-o
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-cri-o-cve-2022-2995-cve-2023-39325-cve-2023-4448/" type="self" id="ROS-20240329-10" title="ROS-20240329-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2995" type="cve" id="CVE-2022-2995" title="CVE-2022-2995" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39325" type="cve" id="CVE-2023-39325" title="CVE-2023-39325" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4448" type="cve" id="CVE-2023-4448" title="CVE-2023-4448" />
			<reference href="https://bdu.fstec.ru/vul/2024-02407" type="self" id="BDU:2024-02407" title="BDU:2024-02407" />
			<reference href="https://bdu.fstec.ru/vul/2023-07013" type="self" id="BDU:2023-07013" title="BDU:2023-07013" />
			<reference href="https://bdu.fstec.ru/vul/2024-02408" type="self" id="BDU:2024-02408" title="BDU:2024-02408" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cri-o" epoch="0" version="1.24.1" release="4.el7" arch="x86_64" src="">
					<filename>cri-o-0:1.24.1-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240329-11</id>
		<issued date="2024-03-29" />
		<updated date="2024-03-29" />
		<title>Множественные уязвимости postgresql </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql-cve-2022-41862-cve-2023-2454-cve-2023-2455-cve-2023-39417-cve-/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql
                или
                    Установить обновление для пакета(ов) postgresql
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql-cve-2022-41862-cve-2023-2454-cve-2023-2455-cve-2023-39417-cve-/" type="self" id="ROS-20240329-11" title="ROS-20240329-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41862" type="cve" id="CVE-2022-41862" title="CVE-2022-41862" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2454" type="cve" id="CVE-2023-2454" title="CVE-2023-2454" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2455" type="cve" id="CVE-2023-2455" title="CVE-2023-2455" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417" type="cve" id="CVE-2023-39417" title="CVE-2023-39417" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868" type="cve" id="CVE-2023-5868" title="CVE-2023-5868" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869" type="cve" id="CVE-2023-5869" title="CVE-2023-5869" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870" type="cve" id="CVE-2023-5870" title="CVE-2023-5870" />
			<reference href="https://bdu.fstec.ru/vul/2023-02003" type="self" id="BDU:2023-02003" title="BDU:2023-02003" />
			<reference href="https://bdu.fstec.ru/vul/2023-03247" type="self" id="BDU:2023-03247" title="BDU:2023-03247" />
			<reference href="https://bdu.fstec.ru/vul/2023-03024" type="self" id="BDU:2023-03024" title="BDU:2023-03024" />
			<reference href="https://bdu.fstec.ru/vul/2023-04767" type="self" id="BDU:2023-04767" title="BDU:2023-04767" />
			<reference href="https://bdu.fstec.ru/vul/2023-07905" type="self" id="BDU:2023-07905" title="BDU:2023-07905" />
			<reference href="https://bdu.fstec.ru/vul/2023-07840" type="self" id="BDU:2023-07840" title="BDU:2023-07840" />
			<reference href="https://bdu.fstec.ru/vul/2023-07904" type="self" id="BDU:2023-07904" title="BDU:2023-07904" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql" epoch="0" version="12.18" release="2.el7" arch="x86_64" src="">
					<filename>postgresql-0:12.18-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240329-12</id>
		<issued date="2024-03-29" />
		<updated date="2024-03-29" />
		<title>Множественные уязвимости postgresql13 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql13</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql13-cve-2022-41862-cve-2023-2454-cve-2023-2455-cve-2023-39417-cv/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql13
                или
                    Установить обновление для пакета(ов) postgresql13
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql13-cve-2022-41862-cve-2023-2454-cve-2023-2455-cve-2023-39417-cv/" type="self" id="ROS-20240329-12" title="ROS-20240329-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41862" type="cve" id="CVE-2022-41862" title="CVE-2022-41862" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2454" type="cve" id="CVE-2023-2454" title="CVE-2023-2454" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2455" type="cve" id="CVE-2023-2455" title="CVE-2023-2455" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417" type="cve" id="CVE-2023-39417" title="CVE-2023-39417" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868" type="cve" id="CVE-2023-5868" title="CVE-2023-5868" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869" type="cve" id="CVE-2023-5869" title="CVE-2023-5869" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870" type="cve" id="CVE-2023-5870" title="CVE-2023-5870" />
			<reference href="https://bdu.fstec.ru/vul/2023-02003" type="self" id="BDU:2023-02003" title="BDU:2023-02003" />
			<reference href="https://bdu.fstec.ru/vul/2023-03247" type="self" id="BDU:2023-03247" title="BDU:2023-03247" />
			<reference href="https://bdu.fstec.ru/vul/2023-03024" type="self" id="BDU:2023-03024" title="BDU:2023-03024" />
			<reference href="https://bdu.fstec.ru/vul/2023-04767" type="self" id="BDU:2023-04767" title="BDU:2023-04767" />
			<reference href="https://bdu.fstec.ru/vul/2023-07905" type="self" id="BDU:2023-07905" title="BDU:2023-07905" />
			<reference href="https://bdu.fstec.ru/vul/2023-07840" type="self" id="BDU:2023-07840" title="BDU:2023-07840" />
			<reference href="https://bdu.fstec.ru/vul/2023-07904" type="self" id="BDU:2023-07904" title="BDU:2023-07904" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql13" epoch="0" version="13.14" release="2.el7" arch="x86_64" src="">
					<filename>postgresql13-0:13.14-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240329-13</id>
		<issued date="2024-03-29" />
		<updated date="2024-03-29" />
		<title>Множественные уязвимости postgresql14 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql14</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql14-cve-2023-5868-cve-2023-5869-cve-2023-5870/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql14
                или
                    Установить обновление для пакета(ов) postgresql14
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql14-cve-2023-5868-cve-2023-5869-cve-2023-5870/" type="self" id="ROS-20240329-13" title="ROS-20240329-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868" type="cve" id="CVE-2023-5868" title="CVE-2023-5868" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869" type="cve" id="CVE-2023-5869" title="CVE-2023-5869" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870" type="cve" id="CVE-2023-5870" title="CVE-2023-5870" />
			<reference href="https://bdu.fstec.ru/vul/2023-07905" type="self" id="BDU:2023-07905" title="BDU:2023-07905" />
			<reference href="https://bdu.fstec.ru/vul/2023-07840" type="self" id="BDU:2023-07840" title="BDU:2023-07840" />
			<reference href="https://bdu.fstec.ru/vul/2023-07904" type="self" id="BDU:2023-07904" title="BDU:2023-07904" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql14" epoch="0" version="14.11" release="1.el7" arch="x86_64" src="">
					<filename>postgresql14-0:14.11-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240329-14</id>
		<issued date="2024-03-29" />
		<updated date="2024-03-29" />
		<title>Множественные уязвимости postgresql15 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql15</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql15-cve-2023-5868-cve-2023-5869-cve-2023-5870-cve-2023-39418/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql15
                или
                    Установить обновление для пакета(ов) postgresql15
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql15-cve-2023-5868-cve-2023-5869-cve-2023-5870-cve-2023-39418/" type="self" id="ROS-20240329-14" title="ROS-20240329-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868" type="cve" id="CVE-2023-5868" title="CVE-2023-5868" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869" type="cve" id="CVE-2023-5869" title="CVE-2023-5869" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870" type="cve" id="CVE-2023-5870" title="CVE-2023-5870" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39418" type="cve" id="CVE-2023-39418" title="CVE-2023-39418" />
			<reference href="https://bdu.fstec.ru/vul/2023-07905" type="self" id="BDU:2023-07905" title="BDU:2023-07905" />
			<reference href="https://bdu.fstec.ru/vul/2023-07840" type="self" id="BDU:2023-07840" title="BDU:2023-07840" />
			<reference href="https://bdu.fstec.ru/vul/2023-07904" type="self" id="BDU:2023-07904" title="BDU:2023-07904" />
			<reference href="https://bdu.fstec.ru/vul/2023-04768" type="self" id="BDU:2023-04768" title="BDU:2023-04768" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql15" epoch="0" version="15.5" release="1.el7" arch="x86_64" src="">
					<filename>postgresql15-0:15.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240329-15</id>
		<issued date="2024-03-29" />
		<updated date="2025-10-09" />
		<title>Множественные уязвимости qemu </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в qemu-common</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-qemu-cve-2022-4144-cve-2023-3180-cve-2023-0330-cve-2022-3165-cve-2023-424/</description>
               <solution>
                    Запретить использование в ОС пакета qemu-common
                или
                    Установить обновление для пакета(ов) qemu-common
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-qemu-cve-2022-4144-cve-2023-3180-cve-2023-0330-cve-2022-3165-cve-2023-424/" type="self" id="ROS-20240329-15" title="ROS-20240329-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4144" type="cve" id="CVE-2022-4144" title="CVE-2022-4144" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3180" type="cve" id="CVE-2023-3180" title="CVE-2023-3180" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0330" type="cve" id="CVE-2023-0330" title="CVE-2023-0330" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3165" type="cve" id="CVE-2022-3165" title="CVE-2022-3165" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42467" type="cve" id="CVE-2023-42467" title="CVE-2023-42467" />
			<reference href="https://bdu.fstec.ru/vul/2024-02426" type="self" id="BDU:2024-02426" title="BDU:2024-02426" />
			<reference href="https://bdu.fstec.ru/vul/2023-08901" type="self" id="BDU:2023-08901" title="BDU:2023-08901" />
			<reference href="https://bdu.fstec.ru/vul/2023-04834" type="self" id="BDU:2023-04834" title="BDU:2023-04834" />
			<reference href="https://bdu.fstec.ru/vul/2024-02427" type="self" id="BDU:2024-02427" title="BDU:2024-02427" />
			<reference href="https://bdu.fstec.ru/vul/2023-05459" type="self" id="BDU:2023-05459" title="BDU:2023-05459" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="qemu-common" epoch="15" version="7.2.7" release="1.el7" arch="x86_64" src="">
					<filename>qemu-common-15:7.2.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240329-16</id>
		<issued date="2024-03-29" />
		<updated date="2024-09-11" />
		<title>Множественные уязвимости VIM </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в vim-X11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim-cve-2023-4733-cve-2023-4750-cve-2023-4752-cve-2023-4781-cve-2023-5344/</description>
               <solution>
                    Запретить использование в ОС пакета vim
                или
                    Установить обновление для пакета(ов) vim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim-cve-2023-4733-cve-2023-4750-cve-2023-4752-cve-2023-4781-cve-2023-5344/" type="self" id="ROS-20240329-16" title="ROS-20240329-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4733" type="cve" id="CVE-2023-4733" title="CVE-2023-4733" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4750" type="cve" id="CVE-2023-4750" title="CVE-2023-4750" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4752" type="cve" id="CVE-2023-4752" title="CVE-2023-4752" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4781" type="cve" id="CVE-2023-4781" title="CVE-2023-4781" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5344" type="cve" id="CVE-2023-5344" title="CVE-2023-5344" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5441" type="cve" id="CVE-2023-5441" title="CVE-2023-5441" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5535" type="cve" id="CVE-2023-5535" title="CVE-2023-5535" />
			<reference href="https://bdu.fstec.ru/vul/2023-05668" type="self" id="BDU:2023-05668" title="BDU:2023-05668" />
			<reference href="https://bdu.fstec.ru/vul/2023-05667" type="self" id="BDU:2023-05667" title="BDU:2023-05667" />
			<reference href="https://bdu.fstec.ru/vul/2023-05669" type="self" id="BDU:2023-05669" title="BDU:2023-05669" />
			<reference href="https://bdu.fstec.ru/vul/2023-05534" type="self" id="BDU:2023-05534" title="BDU:2023-05534" />
			<reference href="https://bdu.fstec.ru/vul/2023-06596" type="self" id="BDU:2023-06596" title="BDU:2023-06596" />
			<reference href="https://bdu.fstec.ru/vul/2024-02410" type="self" id="BDU:2024-02410" title="BDU:2024-02410" />
			<reference href="https://bdu.fstec.ru/vul/2024-02411" type="self" id="BDU:2024-02411" title="BDU:2024-02411" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-X11" epoch="2" version="9.1.016" release="1.el7.3" arch="x86_64" src="">
					<filename>vim-X11-2:9.1.016-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240329-17</id>
		<issued date="2024-03-29" />
		<updated date="2025-10-09" />
		<title>Уязвимость qemu </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в qemu-common</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qemu-cve-2022-3872/</description>
               <solution>
                    Запретить использование в ОС пакета qemu-common
                или
                    Установить обновление для пакета(ов) qemu-common
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qemu-cve-2022-3872/" type="self" id="ROS-20240329-17" title="ROS-20240329-17" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3872" type="cve" id="CVE-2022-3872" title="CVE-2022-3872" />
			<reference href="https://bdu.fstec.ru/vul/2023-04792" type="self" id="BDU:2023-04792" title="BDU:2023-04792" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="qemu-common" epoch="15" version="7.2.7" release="1.el7" arch="x86_64" src="">
					<filename>qemu-common-15:7.2.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240329-18</id>
		<issued date="2024-03-29" />
		<updated date="2024-03-29" />
		<title>Множественные уязвимости LibSSH </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libssh</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libssh-cve-2023-2283-cve-2023-1667/</description>
               <solution>
                    Запретить использование в ОС пакета libssh
                или
                    Установить обновление для пакета(ов) libssh
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libssh-cve-2023-2283-cve-2023-1667/" type="self" id="ROS-20240329-18" title="ROS-20240329-18" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2283" type="cve" id="CVE-2023-2283" title="CVE-2023-2283" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1667" type="cve" id="CVE-2023-1667" title="CVE-2023-1667" />
			<reference href="https://bdu.fstec.ru/vul/2023-05381" type="self" id="BDU:2023-05381" title="BDU:2023-05381" />
			<reference href="https://bdu.fstec.ru/vul/2023-03857" type="self" id="BDU:2023-03857" title="BDU:2023-03857" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libssh" epoch="0" version="0.9.8" release="1.el7" arch="x86_64" src="">
					<filename>libssh-0:0.9.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240329-19</id>
		<issued date="2024-03-29" />
		<updated date="2024-03-29" />
		<title>Уязвимость harfbuzz </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в harfbuzz</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-harfbuzz-cve-2023-25193/</description>
               <solution>
                    Запретить использование в ОС пакета harfbuzz
                или
                    Установить обновление для пакета(ов) harfbuzz
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-harfbuzz-cve-2023-25193/" type="self" id="ROS-20240329-19" title="ROS-20240329-19" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25193" type="cve" id="CVE-2023-25193" title="CVE-2023-25193" />
			<reference href="https://bdu.fstec.ru/vul/2023-06149" type="self" id="BDU:2023-06149" title="BDU:2023-06149" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="harfbuzz" epoch="0" version="7.3.0" release="3.el7" arch="x86_64" src="">
					<filename>harfbuzz-0:7.3.0-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240329-20</id>
		<issued date="2024-03-29" />
		<updated date="2024-03-29" />
		<title>Множественные уязвимости libvirt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libvirt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libvirt-cve-2021-3631-cve-2021-3667-cve-2022-0897/</description>
               <solution>
                    Запретить использование в ОС пакета Libvirt
                или
                    Установить обновление для пакета(ов) Libvirt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libvirt-cve-2021-3631-cve-2021-3667-cve-2022-0897/" type="self" id="ROS-20240329-20" title="ROS-20240329-20" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3631" type="cve" id="CVE-2021-3631" title="CVE-2021-3631" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3667" type="cve" id="CVE-2021-3667" title="CVE-2021-3667" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0897" type="cve" id="CVE-2022-0897" title="CVE-2022-0897" />
			<reference href="https://bdu.fstec.ru/vul/2024-02428" type="self" id="BDU:2024-02428" title="BDU:2024-02428" />
			<reference href="https://bdu.fstec.ru/vul/2022-05841" type="self" id="BDU:2022-05841" title="BDU:2022-05841" />
			<reference href="https://bdu.fstec.ru/vul/2022-05846" type="self" id="BDU:2022-05846" title="BDU:2022-05846" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libvirt" epoch="0" version="7.6.0" release="4.el7" arch="x86_64" src="">
					<filename>libvirt-0:7.6.0-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240329-21</id>
		<issued date="2024-03-29" />
		<updated date="2024-03-29" />
		<title>Множественные уязвимости LibTIFF </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libtiff</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libtiff-cve-2023-40745-cve-2023-41175/</description>
               <solution>
                    Запретить использование в ОС пакета libtiff
                или
                    Установить обновление для пакета(ов) libtiff
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libtiff-cve-2023-40745-cve-2023-41175/" type="self" id="ROS-20240329-21" title="ROS-20240329-21" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40745" type="cve" id="CVE-2023-40745" title="CVE-2023-40745" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41175" type="cve" id="CVE-2023-41175" title="CVE-2023-41175" />
			<reference href="https://bdu.fstec.ru/vul/2023-06407" type="self" id="BDU:2023-06407" title="BDU:2023-06407" />
			<reference href="https://bdu.fstec.ru/vul/2023-07663" type="self" id="BDU:2023-07663" title="BDU:2023-07663" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libtiff" epoch="0" version="4.5.1" release="6.el7" arch="x86_64" src="">
					<filename>libtiff-0:4.5.1-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240329-22</id>
		<issued date="2024-03-29" />
		<updated date="2024-03-29" />
		<title>Уязвимость xerces-c </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в xerces-c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-xerces-c-cve-2023-37536/</description>
               <solution>
                    Запретить использование в ОС пакета xerces-c
                или
                    Установить обновление для пакета(ов) xerces-c
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-xerces-c-cve-2023-37536/" type="self" id="ROS-20240329-22" title="ROS-20240329-22" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37536" type="cve" id="CVE-2023-37536" title="CVE-2023-37536" />
			<reference href="https://bdu.fstec.ru/vul/2023-06960" type="self" id="BDU:2023-06960" title="BDU:2023-06960" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="xerces-c" epoch="0" version="3.2.4" release="1.el7" arch="x86_64" src="">
					<filename>xerces-c-0:3.2.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240329-23</id>
		<issued date="2024-03-29" />
		<updated date="2024-03-29" />
		<title>Множественные уязвимости zabbix-lts </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в zabbix-lts-agent</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix-lts-cve-2023-32723-cve-2023-32722-cve-2023-32721-cve-2023-29453/</description>
               <solution>
                    Запретить использование в ОС пакета Zabbix
                или
                    Установить обновление для пакета(ов) Zabbix
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix-lts-cve-2023-32723-cve-2023-32722-cve-2023-32721-cve-2023-29453/" type="self" id="ROS-20240329-23" title="ROS-20240329-23" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32723" type="cve" id="CVE-2023-32723" title="CVE-2023-32723" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32722" type="cve" id="CVE-2023-32722" title="CVE-2023-32722" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32721" type="cve" id="CVE-2023-32721" title="CVE-2023-32721" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29453" type="cve" id="CVE-2023-29453" title="CVE-2023-29453" />
			<reference href="https://bdu.fstec.ru/vul/2024-02419" type="self" id="BDU:2024-02419" title="BDU:2024-02419" />
			<reference href="https://bdu.fstec.ru/vul/2023-08246" type="self" id="BDU:2023-08246" title="BDU:2023-08246" />
			<reference href="https://bdu.fstec.ru/vul/2023-06803" type="self" id="BDU:2023-06803" title="BDU:2023-06803" />
			<reference href="https://bdu.fstec.ru/vul/2023-08247" type="self" id="BDU:2023-08247" title="BDU:2023-08247" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix-lts-agent" epoch="1" version="6.0.24" release="3.el7" arch="x86_64" src="">
					<filename>zabbix-lts-agent-1:6.0.24-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240329-25</id>
		<issued date="2024-03-29" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости zabbix </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в zabbix-agent</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix-cve-2023-32723-cve-2023-32722-cve-2023-32721-cve-2023-29453/</description>
               <solution>
                    Запретить использование в ОС пакета Zabbix
                или
                    Установить обновление для пакета(ов) Zabbix
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix-cve-2023-32723-cve-2023-32722-cve-2023-32721-cve-2023-29453/" type="self" id="ROS-20240329-25" title="ROS-20240329-25" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32723" type="cve" id="CVE-2023-32723" title="CVE-2023-32723" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32722" type="cve" id="CVE-2023-32722" title="CVE-2023-32722" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32721" type="cve" id="CVE-2023-32721" title="CVE-2023-32721" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29453" type="cve" id="CVE-2023-29453" title="CVE-2023-29453" />
			<reference href="https://bdu.fstec.ru/vul/2024-02419" type="self" id="BDU:2024-02419" title="BDU:2024-02419" />
			<reference href="https://bdu.fstec.ru/vul/2023-08246" type="self" id="BDU:2023-08246" title="BDU:2023-08246" />
			<reference href="https://bdu.fstec.ru/vul/2023-06803" type="self" id="BDU:2023-06803" title="BDU:2023-06803" />
			<reference href="https://bdu.fstec.ru/vul/2023-08247" type="self" id="BDU:2023-08247" title="BDU:2023-08247" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix-agent" epoch="1" version="6.4.9" release="3.el7" arch="x86_64" src="">
					<filename>zabbix-agent-1:6.4.9-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240329-24</id>
		<issued date="2024-03-29" />
		<updated date="2024-03-29" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2023-5346/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2023-5346/" type="self" id="ROS-20240329-24" title="ROS-20240329-24" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5346" type="cve" id="CVE-2023-5346" title="CVE-2023-5346" />
			<reference href="https://bdu.fstec.ru/vul/2023-06341" type="self" id="BDU:2023-06341" title="BDU:2023-06341" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="120.0.6099.224" release="1.el7" arch="x86_64" src="">
					<filename>chromium-0:120.0.6099.224-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240401-01</id>
		<issued date="2024-04-01" />
		<updated date="2025-10-09" />
		<title>Множественные уязвимости qemu </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в qemu-common</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-qemu-cve-2023-5088-cve-2022-36648/</description>
               <solution>
                    Запретить использование в ОС пакета qemu-common
                или
                    Установить обновление для пакета(ов) qemu-common
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-qemu-cve-2023-5088-cve-2022-36648/" type="self" id="ROS-20240401-01" title="ROS-20240401-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5088" type="cve" id="CVE-2023-5088" title="CVE-2023-5088" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36648" type="cve" id="CVE-2022-36648" title="CVE-2022-36648" />
			<reference href="https://bdu.fstec.ru/vul/2023-07853" type="self" id="BDU:2023-07853" title="BDU:2023-07853" />
			<reference href="https://bdu.fstec.ru/vul/2023-04956" type="self" id="BDU:2023-04956" title="BDU:2023-04956" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="qemu-common" epoch="15" version="7.2.7" release="1.el7" arch="x86_64" src="">
					<filename>qemu-common-15:7.2.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240401-02</id>
		<issued date="2024-04-01" />
		<updated date="2024-04-01" />
		<title>Уязвимость openssl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openssl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl-cve-2023-5678/</description>
               <solution>
                    Запретить использование в ОС пакета openssl
                или
                    Установить обновление для пакета(ов) openssl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl-cve-2023-5678/" type="self" id="ROS-20240401-02" title="ROS-20240401-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5678" type="cve" id="CVE-2023-5678" title="CVE-2023-5678" />
			<reference href="https://bdu.fstec.ru/vul/2023-08615" type="self" id="BDU:2023-08615" title="BDU:2023-08615" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl" epoch="1" version="1.1.1q" release="9.el7.3" arch="x86_64" src="">
					<filename>openssl-1:1.1.1q-9.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240401-03</id>
		<issued date="2024-04-01" />
		<updated date="2024-04-01" />
		<title>Уязвимость cri-o </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в cri-o</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cri-o-cve-2022-4318/</description>
               <solution>
                    Запретить использование в ОС пакета Cri-o
                или
                    Установить обновление для пакета(ов) Cri-o
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cri-o-cve-2022-4318/" type="self" id="ROS-20240401-03" title="ROS-20240401-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4318" type="cve" id="CVE-2022-4318" title="CVE-2022-4318" />
			<reference href="https://bdu.fstec.ru/vul/2024-02430" type="self" id="BDU:2024-02430" title="BDU:2024-02430" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cri-o" epoch="0" version="1.24.1" release="4.el7" arch="x86_64" src="">
					<filename>cri-o-0:1.24.1-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240401-04</id>
		<issued date="2024-04-01" />
		<updated date="2024-04-01" />
		<title>Уязвимость haproxy </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в haproxy</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-haproxy-cve-2023-40225/</description>
               <solution>
                    Запретить использование в ОС пакета HAProxy
                или
                    Установить обновление для пакета(ов) HAProxy
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-haproxy-cve-2023-40225/" type="self" id="ROS-20240401-04" title="ROS-20240401-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40225" type="cve" id="CVE-2023-40225" title="CVE-2023-40225" />
			<reference href="https://bdu.fstec.ru/vul/2024-02429" type="self" id="BDU:2024-02429" title="BDU:2024-02429" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="haproxy" epoch="0" version="2.6.11" release="4.el7" arch="x86_64" src="">
					<filename>haproxy-0:2.6.11-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240401-05</id>
		<issued date="2024-04-01" />
		<updated date="2024-04-01" />
		<title>Уязвимость ядра ОС </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-yadra-os-cve-2023-23000/</description>
               <solution>
                
                    Установить обновление для пакета(ов) ядра РЕД ОС
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-yadra-os-cve-2023-23000/" type="self" id="ROS-20240401-05" title="ROS-20240401-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23000" type="cve" id="CVE-2023-23000" title="CVE-2023-23000" />
			<reference href="https://bdu.fstec.ru/vul/2023-01211" type="self" id="BDU:2023-01211" title="BDU:2023-01211" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="5.15.125" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:5.15.125-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240402-01</id>
		<issued date="2024-04-02" />
		<updated date="2024-04-02" />
		<title>Уязвимость pmix </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в pmix</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pmix-cve-2023-41915/</description>
               <solution>
                    Запретить использование в ОС пакета pmix
                или
                    Установить обновление для пакета(ов) pmix
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pmix-cve-2023-41915/" type="self" id="ROS-20240402-01" title="ROS-20240402-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41915" type="cve" id="CVE-2023-41915" title="CVE-2023-41915" />
			<reference href="https://bdu.fstec.ru/vul/2024-02538" type="self" id="BDU:2024-02538" title="BDU:2024-02538" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pmix" epoch="0" version="2.1.1" release="4.el7" arch="x86_64" src="">
					<filename>pmix-0:2.1.1-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240402-02</id>
		<issued date="2024-04-02" />
		<updated date="2024-04-02" />
		<title>Уязвимость Cri-o </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в cri-o</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cri-o-cve-2023-6476/</description>
               <solution>
                    Запретить использование в ОС пакета Cri-o
                или
                    Установить обновление для пакета(ов) Cri-o
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cri-o-cve-2023-6476/" type="self" id="ROS-20240402-02" title="ROS-20240402-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6476" type="cve" id="CVE-2023-6476" title="CVE-2023-6476" />
			<reference href="https://bdu.fstec.ru/vul/2024-02537" type="self" id="BDU:2024-02537" title="BDU:2024-02537" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cri-o" epoch="0" version="1.24.1" release="4.el7" arch="x86_64" src="">
					<filename>cri-o-0:1.24.1-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240402-03</id>
		<issued date="2024-04-02" />
		<updated date="2024-04-02" />
		<title>Уязвимость redis </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в redis</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-redis-cve-2023-41056/</description>
               <solution>
                    Запретить использование в ОС пакета redis
                или
                    Установить обновление для пакета(ов) redis
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-redis-cve-2023-41056/" type="self" id="ROS-20240402-03" title="ROS-20240402-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41056" type="cve" id="CVE-2023-41056" title="CVE-2023-41056" />
			<reference href="https://bdu.fstec.ru/vul/2024-00349" type="self" id="BDU:2024-00349" title="BDU:2024-00349" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="redis" epoch="0" version="7.0.15" release="1.el7" arch="x86_64" src="">
					<filename>redis-0:7.0.15-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240402-04</id>
		<issued date="2024-04-02" />
		<updated date="2024-04-02" />
		<title>Уязвимость libebml </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libebml</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libebml-cve-2023-52339/</description>
               <solution>
                    Запретить использование в ОС пакета libebml
                или
                    Установить обновление для пакета(ов) libebml
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libebml-cve-2023-52339/" type="self" id="ROS-20240402-04" title="ROS-20240402-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52339" type="cve" id="CVE-2023-52339" title="CVE-2023-52339" />
			<reference href="https://bdu.fstec.ru/vul/2024-02535" type="self" id="BDU:2024-02535" title="BDU:2024-02535" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libebml" epoch="0" version="1.3.7" release="4.el7" arch="x86_64" src="">
					<filename>libebml-0:1.3.7-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240402-05</id>
		<issued date="2024-04-02" />
		<updated date="2024-04-02" />
		<title>Уязвимость tinyxml </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tinyxml</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tinyxml-cve-2023-34194/</description>
               <solution>
                    Запретить использование в ОС пакета tinyxml
                или
                    Установить обновление для пакета(ов) tinyxml
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tinyxml-cve-2023-34194/" type="self" id="ROS-20240402-05" title="ROS-20240402-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34194" type="cve" id="CVE-2023-34194" title="CVE-2023-34194" />
			<reference href="https://bdu.fstec.ru/vul/2024-00003" type="self" id="BDU:2024-00003" title="BDU:2024-00003" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tinyxml" epoch="0" version="2.6.2" release="7.el7" arch="x86_64" src="">
					<filename>tinyxml-0:2.6.2-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240402-06</id>
		<issued date="2024-04-02" />
		<updated date="2024-04-02" />
		<title>Уязвимость grub2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в grub2-common</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grub2-cve-2023-4001/</description>
               <solution>
                    Запретить использование в ОС пакета grub2
                или
                    Установить обновление для пакета(ов) grub2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grub2-cve-2023-4001/" type="self" id="ROS-20240402-06" title="ROS-20240402-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4001" type="cve" id="CVE-2023-4001" title="CVE-2023-4001" />
			<reference href="https://bdu.fstec.ru/vul/2024-00324" type="self" id="BDU:2024-00324" title="BDU:2024-00324" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="grub2-common" epoch="1" version="2.06" release="63.el7.3" arch="noarch" src="">
					<filename>grub2-common-1:2.06-63.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240402-07</id>
		<issued date="2024-04-02" />
		<updated date="2024-04-02" />
		<title>Уязвимость libnghttp2 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libnghttp2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libnghttp2-cve-2023-44487/</description>
               <solution>
                    Запретить использование в ОС пакета libnghttp2
                или
                    Установить обновление для пакета(ов) libnghttp2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libnghttp2-cve-2023-44487/" type="self" id="ROS-20240402-07" title="ROS-20240402-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487" type="cve" id="CVE-2023-44487" title="CVE-2023-44487" />
			<reference href="https://bdu.fstec.ru/vul/2023-06559" type="self" id="BDU:2023-06559" title="BDU:2023-06559" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libnghttp2" epoch="0" version="1.51.0" release="2.el7" arch="x86_64" src="">
					<filename>libnghttp2-0:1.51.0-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240402-08</id>
		<issued date="2024-04-02" />
		<updated date="2024-04-02" />
		<title>Уязвимость dnsdist </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dnsdist</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dnsdist-cve-2023-444871524/</description>
               <solution>
                    Запретить использование в ОС пакета dnsdist
                или
                    Установить обновление для пакета(ов) dnsdist
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dnsdist-cve-2023-444871524/" type="self" id="ROS-20240402-08" title="ROS-20240402-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487" type="cve" id="CVE-2023-44487" title="CVE-2023-44487" />
			<reference href="https://bdu.fstec.ru/vul/2023-06559" type="self" id="BDU:2023-06559" title="BDU:2023-06559" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dnsdist" epoch="0" version="1.8.3" release="2.el7" arch="x86_64" src="">
					<filename>dnsdist-0:1.8.3-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240402-09</id>
		<issued date="2024-04-02" />
		<updated date="2024-04-02" />
		<title>Уязвимость IPA </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в ipa-server-common</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ipa-cve-2023-5455/</description>
               <solution>
                    Запретить использование в ОС пакета FreeIPA
                или
                    Установить обновление для пакета(ов) FreeIPA
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ipa-cve-2023-5455/" type="self" id="ROS-20240402-09" title="ROS-20240402-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5455" type="cve" id="CVE-2023-5455" title="CVE-2023-5455" />
			<reference href="https://bdu.fstec.ru/vul/2024-02540" type="self" id="BDU:2024-02540" title="BDU:2024-02540" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ipa-server-common" epoch="0" version="4.10.3" release="3.el7" arch="noarch" src="">
					<filename>ipa-server-common-0:4.10.3-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240402-10</id>
		<issued date="2024-04-02" />
		<updated date="2024-04-02" />
		<title>Множественные уязвимости wireshark </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в wireshark</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-wireshark-cve-2023-6174-cve-2023-6175/</description>
               <solution>
                    Запретить использование в ОС пакета wireshark
                или
                    Установить обновление для пакета(ов) wireshark
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-wireshark-cve-2023-6174-cve-2023-6175/" type="self" id="ROS-20240402-10" title="ROS-20240402-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6174" type="cve" id="CVE-2023-6174" title="CVE-2023-6174" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6175" type="cve" id="CVE-2023-6175" title="CVE-2023-6175" />
			<reference href="https://bdu.fstec.ru/vul/2023-08355" type="self" id="BDU:2023-08355" title="BDU:2023-08355" />
			<reference href="https://bdu.fstec.ru/vul/2023-08203" type="self" id="BDU:2023-08203" title="BDU:2023-08203" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="wireshark" epoch="1" version="4.0.12" release="1.el7" arch="x86_64" src="">
					<filename>wireshark-1:4.0.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240402-11</id>
		<issued date="2024-04-02" />
		<updated date="2024-04-02" />
		<title>Множественные уязвимости gpac </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gpac</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gpac-cve-2023-48039-cve-2023-48090/</description>
               <solution>
                    Запретить использование в ОС пакета gpac
                или
                    Установить обновление для пакета(ов) gpac
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gpac-cve-2023-48039-cve-2023-48090/" type="self" id="ROS-20240402-11" title="ROS-20240402-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48039" type="cve" id="CVE-2023-48039" title="CVE-2023-48039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48090" type="cve" id="CVE-2023-48090" title="CVE-2023-48090" />
			<reference href="https://bdu.fstec.ru/vul/2024-02551" type="self" id="BDU:2024-02551" title="BDU:2024-02551" />
			<reference href="https://bdu.fstec.ru/vul/2024-02550" type="self" id="BDU:2024-02550" title="BDU:2024-02550" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gpac" epoch="0" version="2.3.0" release="2.20240126gitf30e0d1.el7" arch="x86_64" src="">
					<filename>gpac-0:2.3.0-2.20240126gitf30e0d1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240402-12</id>
		<issued date="2024-04-02" />
		<updated date="2024-04-02" />
		<title>Множественные уязвимости nextcloud </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в nextcloud</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nextcloud-cve-2023-48301-cve-2023-48302/</description>
               <solution>
                    Запретить использование в ОС пакета Nextcloud Server
                или
                    Установить обновление для пакета(ов) Nextcloud Server
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nextcloud-cve-2023-48301-cve-2023-48302/" type="self" id="ROS-20240402-12" title="ROS-20240402-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48301" type="cve" id="CVE-2023-48301" title="CVE-2023-48301" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48302" type="cve" id="CVE-2023-48302" title="CVE-2023-48302" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48303" type="cve" id="CVE-2023-48303" title="CVE-2023-48303" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48304" type="cve" id="CVE-2023-48304" title="CVE-2023-48304" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48306" type="cve" id="CVE-2023-48306" title="CVE-2023-48306" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48239" type="cve" id="CVE-2023-48239" title="CVE-2023-48239" />
			<reference href="https://bdu.fstec.ru/vul/2024-02549" type="self" id="BDU:2024-02549" title="BDU:2024-02549" />
			<reference href="https://bdu.fstec.ru/vul/2024-02548" type="self" id="BDU:2024-02548" title="BDU:2024-02548" />
			<reference href="https://bdu.fstec.ru/vul/2024-02547" type="self" id="BDU:2024-02547" title="BDU:2024-02547" />
			<reference href="https://bdu.fstec.ru/vul/2024-02546" type="self" id="BDU:2024-02546" title="BDU:2024-02546" />
			<reference href="https://bdu.fstec.ru/vul/2024-00716" type="self" id="BDU:2024-00716" title="BDU:2024-00716" />
			<reference href="https://bdu.fstec.ru/vul/2024-02545" type="self" id="BDU:2024-02545" title="BDU:2024-02545" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nextcloud" epoch="0" version="25.0.5" release="7.el7" arch="noarch" src="">
					<filename>nextcloud-0:25.0.5-7.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240402-13</id>
		<issued date="2024-04-02" />
		<updated date="2024-04-02" />
		<title>Уязвимость libde265 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libde265</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libde265-cve-2023-43887/</description>
               <solution>
                    Запретить использование в ОС пакета Libde265
                или
                    Установить обновление для пакета(ов) Libde265
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libde265-cve-2023-43887/" type="self" id="ROS-20240402-13" title="ROS-20240402-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43887" type="cve" id="CVE-2023-43887" title="CVE-2023-43887" />
			<reference href="https://bdu.fstec.ru/vul/2024-02536" type="self" id="BDU:2024-02536" title="BDU:2024-02536" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libde265" epoch="0" version="1.0.14" release="1.el7" arch="x86_64" src="">
					<filename>libde265-0:1.0.14-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240402-14</id>
		<issued date="2024-04-02" />
		<updated date="2024-04-02" />
		<title>Уязвимость strongswan </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в strongswan</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-strongswan-cve-2023-41913/</description>
               <solution>
                    Запретить использование в ОС пакета strongswan
                или
                    Установить обновление для пакета(ов) strongswan
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-strongswan-cve-2023-41913/" type="self" id="ROS-20240402-14" title="ROS-20240402-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41913" type="cve" id="CVE-2023-41913" title="CVE-2023-41913" />
			<reference href="https://bdu.fstec.ru/vul/2023-08128" type="self" id="BDU:2023-08128" title="BDU:2023-08128" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="strongswan" epoch="0" version="5.9.10" release="2.el7" arch="x86_64" src="">
					<filename>strongswan-0:5.9.10-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240402-15</id>
		<issued date="2024-04-02" />
		<updated date="2024-04-02" />
		<title>Множественные уязвимости virtuoso-opensource </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в virtuoso-opensource</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-virtuoso-opensource-cve-2023-48949-cve-2023-48950-cve-2023-48951-cve-2023/</description>
               <solution>
                    Запретить использование в ОС пакета Virtuoso-opensource
                или
                    Установить обновление для пакета(ов) Virtuoso-opensource
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-virtuoso-opensource-cve-2023-48949-cve-2023-48950-cve-2023-48951-cve-2023/" type="self" id="ROS-20240402-15" title="ROS-20240402-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48949" type="cve" id="CVE-2023-48949" title="CVE-2023-48949" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48950" type="cve" id="CVE-2023-48950" title="CVE-2023-48950" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48951" type="cve" id="CVE-2023-48951" title="CVE-2023-48951" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48945" type="cve" id="CVE-2023-48945" title="CVE-2023-48945" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48946" type="cve" id="CVE-2023-48946" title="CVE-2023-48946" />
			<reference href="https://bdu.fstec.ru/vul/2024-02544" type="self" id="BDU:2024-02544" title="BDU:2024-02544" />
			<reference href="https://bdu.fstec.ru/vul/2024-02543" type="self" id="BDU:2024-02543" title="BDU:2024-02543" />
			<reference href="https://bdu.fstec.ru/vul/2024-02542" type="self" id="BDU:2024-02542" title="BDU:2024-02542" />
			<reference href="https://bdu.fstec.ru/vul/2024-02541" type="self" id="BDU:2024-02541" title="BDU:2024-02541" />
			<reference href="https://bdu.fstec.ru/vul/2024-02539" type="self" id="BDU:2024-02539" title="BDU:2024-02539" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="virtuoso-opensource" epoch="1" version="7.2.6.1" release="2.el7" arch="x86_64" src="">
					<filename>virtuoso-opensource-1:7.2.6.1-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240402-16</id>
		<issued date="2024-04-02" />
		<updated date="2024-04-02" />
		<title>Уязвимость python3-cryptography </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-cryptography</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cryptography-cve-2023-49083/</description>
               <solution>
                    Запретить использование в ОС пакета python3-cryptography
                или
                    Установить обновление для пакета(ов) python3-cryptography
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cryptography-cve-2023-49083/" type="self" id="ROS-20240402-16" title="ROS-20240402-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49083" type="cve" id="CVE-2023-49083" title="CVE-2023-49083" />
			<reference href="https://bdu.fstec.ru/vul/2024-02534" type="self" id="BDU:2024-02534" title="BDU:2024-02534" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-cryptography" epoch="0" version="39.0.2" release="4.el7" arch="x86_64" src="">
					<filename>python3-cryptography-0:39.0.2-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240402-17</id>
		<issued date="2024-04-02" />
		<updated date="2024-04-02" />
		<title>Множественные уязвимости golang </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-golang-cve-2023-39326-cve-2023-45285-cve-2023-45283/</description>
               <solution>
                    Запретить использование в ОС пакета golang
                или
                    Установить обновление для пакета(ов) golang
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-golang-cve-2023-39326-cve-2023-45285-cve-2023-45283/" type="self" id="ROS-20240402-17" title="ROS-20240402-17" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39326" type="cve" id="CVE-2023-39326" title="CVE-2023-39326" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45285" type="cve" id="CVE-2023-45285" title="CVE-2023-45285" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45283" type="cve" id="CVE-2023-45283" title="CVE-2023-45283" />
			<reference href="https://bdu.fstec.ru/vul/2024-00175" type="self" id="BDU:2024-00175" title="BDU:2024-00175" />
			<reference href="https://bdu.fstec.ru/vul/2024-00176" type="self" id="BDU:2024-00176" title="BDU:2024-00176" />
			<reference href="https://bdu.fstec.ru/vul/2023-09013" type="self" id="BDU:2023-09013" title="BDU:2023-09013" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.21.6" release="1.el7" arch="x86_64" src="">
					<filename>golang-0:1.21.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240403-01</id>
		<issued date="2024-04-03" />
		<updated date="2024-04-03" />
		<title>Множественные уязвимости grafana</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в grafana</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-grafana-03-04-24/</description>
               <solution>
                    Запретить использование в ОС пакета grafana
                или
                    Установить обновление для пакета(ов) grafana
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-grafana-03-04-24/" type="self" id="ROS-20240403-01" title="ROS-20240403-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31107" type="cve" id="CVE-2022-31107" title="CVE-2022-31107" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31097" type="cve" id="CVE-2022-31097" title="CVE-2022-31097" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7753" type="cve" id="CVE-2020-7753" title="CVE-2020-7753" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3807" type="cve" id="CVE-2021-3807" title="CVE-2021-3807" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3918" type="cve" id="CVE-2021-3918" title="CVE-2021-3918" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43138" type="cve" id="CVE-2021-43138" title="CVE-2021-43138" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0155" type="cve" id="CVE-2022-0155" title="CVE-2022-0155" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21673" type="cve" id="CVE-2022-21673" title="CVE-2022-21673" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21703" type="cve" id="CVE-2022-21703" title="CVE-2022-21703" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21702" type="cve" id="CVE-2022-21702" title="CVE-2022-21702" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29170" type="cve" id="CVE-2022-29170" title="CVE-2022-29170" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4822" type="cve" id="CVE-2023-4822" title="CVE-2023-4822" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4399" type="cve" id="CVE-2023-4399" title="CVE-2023-4399" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4457" type="cve" id="CVE-2023-4457" title="CVE-2023-4457" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3010" type="cve" id="CVE-2023-3010" title="CVE-2023-3010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0507" type="cve" id="CVE-2023-0507" title="CVE-2023-0507" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1387" type="cve" id="CVE-2023-1387" title="CVE-2023-1387" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1410" type="cve" id="CVE-2023-1410" title="CVE-2023-1410" />
			<reference href="https://bdu.fstec.ru/vul/2024-02573" type="self" id="BDU:2024-02573" title="BDU:2024-02573" />
			<reference href="https://bdu.fstec.ru/vul/2022-07077" type="self" id="BDU:2022-07077" title="BDU:2022-07077" />
			<reference href="https://bdu.fstec.ru/vul/2024-02583" type="self" id="BDU:2024-02583" title="BDU:2024-02583" />
			<reference href="https://bdu.fstec.ru/vul/2022-00256" type="self" id="BDU:2022-00256" title="BDU:2022-00256" />
			<reference href="https://bdu.fstec.ru/vul/2022-04683" type="self" id="BDU:2022-04683" title="BDU:2022-04683" />
			<reference href="https://bdu.fstec.ru/vul/2024-02595" type="self" id="BDU:2024-02595" title="BDU:2024-02595" />
			<reference href="https://bdu.fstec.ru/vul/2022-02815" type="self" id="BDU:2022-02815" title="BDU:2022-02815" />
			<reference href="https://bdu.fstec.ru/vul/2024-02596" type="self" id="BDU:2024-02596" title="BDU:2024-02596" />
			<reference href="https://bdu.fstec.ru/vul/2024-02597" type="self" id="BDU:2024-02597" title="BDU:2024-02597" />
			<reference href="https://bdu.fstec.ru/vul/2023-02415" type="self" id="BDU:2023-02415" title="BDU:2023-02415" />
			<reference href="https://bdu.fstec.ru/vul/2024-02598" type="self" id="BDU:2024-02598" title="BDU:2024-02598" />
			<reference href="https://bdu.fstec.ru/vul/2024-02572" type="self" id="BDU:2024-02572" title="BDU:2024-02572" />
			<reference href="https://bdu.fstec.ru/vul/2024-02599" type="self" id="BDU:2024-02599" title="BDU:2024-02599" />
			<reference href="https://bdu.fstec.ru/vul/2024-02600" type="self" id="BDU:2024-02600" title="BDU:2024-02600" />
			<reference href="https://bdu.fstec.ru/vul/2024-02594" type="self" id="BDU:2024-02594" title="BDU:2024-02594" />
			<reference href="https://bdu.fstec.ru/vul/2023-01605" type="self" id="BDU:2023-01605" title="BDU:2023-01605" />
			<reference href="https://bdu.fstec.ru/vul/2024-02593" type="self" id="BDU:2024-02593" title="BDU:2024-02593" />
			<reference href="https://bdu.fstec.ru/vul/2024-02575" type="self" id="BDU:2024-02575" title="BDU:2024-02575" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="grafana" epoch="0" version="10.3.3" release="1.1.el7" arch="x86_64" src="">
					<filename>grafana-0:10.3.3-1.1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240403-02</id>
		<issued date="2024-04-03" />
		<updated date="2024-04-03" />
		<title>Множественные уязвимости ntfs-3g </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в ntfs-3g</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-ntfs-3g-cve-2022-30789-cve-2022-30783-cve-2022-30785-cve-2022-30787-cve-2/</description>
               <solution>
                    Запретить использование в ОС пакета ntfs-3g
                или
                    Установить обновление для пакета(ов) ntfs-3g
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-ntfs-3g-cve-2022-30789-cve-2022-30783-cve-2022-30785-cve-2022-30787-cve-2/" type="self" id="ROS-20240403-02" title="ROS-20240403-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30789" type="cve" id="CVE-2022-30789" title="CVE-2022-30789" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30783" type="cve" id="CVE-2022-30783" title="CVE-2022-30783" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30785" type="cve" id="CVE-2022-30785" title="CVE-2022-30785" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30787" type="cve" id="CVE-2022-30787" title="CVE-2022-30787" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46790" type="cve" id="CVE-2021-46790" title="CVE-2021-46790" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30784" type="cve" id="CVE-2022-30784" title="CVE-2022-30784" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30786" type="cve" id="CVE-2022-30786" title="CVE-2022-30786" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30788" type="cve" id="CVE-2022-30788" title="CVE-2022-30788" />
			<reference href="https://bdu.fstec.ru/vul/2022-03707" type="self" id="BDU:2022-03707" title="BDU:2022-03707" />
			<reference href="https://bdu.fstec.ru/vul/2022-03919" type="self" id="BDU:2022-03919" title="BDU:2022-03919" />
			<reference href="https://bdu.fstec.ru/vul/2022-03951" type="self" id="BDU:2022-03951" title="BDU:2022-03951" />
			<reference href="https://bdu.fstec.ru/vul/2022-03924" type="self" id="BDU:2022-03924" title="BDU:2022-03924" />
			<reference href="https://bdu.fstec.ru/vul/2022-03917" type="self" id="BDU:2022-03917" title="BDU:2022-03917" />
			<reference href="https://bdu.fstec.ru/vul/2022-03378" type="self" id="BDU:2022-03378" title="BDU:2022-03378" />
			<reference href="https://bdu.fstec.ru/vul/2022-03700" type="self" id="BDU:2022-03700" title="BDU:2022-03700" />
			<reference href="https://bdu.fstec.ru/vul/2022-03701" type="self" id="BDU:2022-03701" title="BDU:2022-03701" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ntfs-3g" epoch="2" version="2022.10.3" release="1.el7" arch="x86_64" src="">
					<filename>ntfs-3g-2:2022.10.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240402-18</id>
		<issued date="2024-04-03" />
		<updated date="2024-12-23" />
		<title>Уязвимость rabbitmq-server </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в rabbitmq-server</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rabbitmq-server-cve-2023-46118/</description>
               <solution>
                    Запретить использование в ОС пакета RabbitMQ
                или
                    Установить обновление для пакета(ов) RabbitMQ
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rabbitmq-server-cve-2023-46118/" type="self" id="ROS-20240402-18" title="ROS-20240402-18" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46118" type="cve" id="CVE-2023-46118" title="CVE-2023-46118" />
			<reference href="https://bdu.fstec.ru/vul/2024-02584" type="self" id="BDU:2024-02584" title="BDU:2024-02584" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rabbitmq-server" epoch="0" version="3.11.20" release="2.el7" arch="x86_64" src="">
					<filename>rabbitmq-server-0:3.11.20-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240402-19</id>
		<issued date="2024-04-03" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости open-vm-tools </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в open-vm-tools</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-open-vm-tools-cve-2023-34059-cve-2023-34058/</description>
               <solution>
                    Запретить использование в ОС пакета Open vm tools
                или
                    Установить обновление для пакета(ов) Open vm tools
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-open-vm-tools-cve-2023-34059-cve-2023-34058/" type="self" id="ROS-20240402-19" title="ROS-20240402-19" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34059" type="cve" id="CVE-2023-34059" title="CVE-2023-34059" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34058" type="cve" id="CVE-2023-34058" title="CVE-2023-34058" />
			<reference href="https://bdu.fstec.ru/vul/2024-02571" type="self" id="BDU:2024-02571" title="BDU:2024-02571" />
			<reference href="https://bdu.fstec.ru/vul/2023-07234" type="self" id="BDU:2023-07234" title="BDU:2023-07234" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="open-vm-tools" epoch="0" version="12.2.5" release="5.el7" arch="x86_64" src="">
					<filename>open-vm-tools-0:12.2.5-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240402-20</id>
		<issued date="2024-04-03" />
		<updated date="2024-12-23" />
		<title>Уязвимость cargo </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в cargo</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cargo-cve-2022-46176/</description>
               <solution>
                    Запретить использование в ОС пакета cargo
                или
                    Установить обновление для пакета(ов) cargo
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cargo-cve-2022-46176/" type="self" id="ROS-20240402-20" title="ROS-20240402-20" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46176" type="cve" id="CVE-2022-46176" title="CVE-2022-46176" />
			<reference href="https://bdu.fstec.ru/vul/2023-00687" type="self" id="BDU:2023-00687" title="BDU:2023-00687" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cargo" epoch="0" version="1.71.1" release="7.el7" arch="x86_64" src="">
					<filename>cargo-0:1.71.1-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240402-21</id>
		<issued date="2024-04-03" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости opensc </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в opensc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-opensc-cve-2023-40660-cve-2023-40661-cve-2023-4535/</description>
               <solution>
                    Запретить использование в ОС пакета opensc
                или
                    Установить обновление для пакета(ов) opensc
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-opensc-cve-2023-40660-cve-2023-40661-cve-2023-4535/" type="self" id="ROS-20240402-21" title="ROS-20240402-21" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40660" type="cve" id="CVE-2023-40660" title="CVE-2023-40660" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40661" type="cve" id="CVE-2023-40661" title="CVE-2023-40661" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4535" type="cve" id="CVE-2023-4535" title="CVE-2023-4535" />
			<reference href="https://bdu.fstec.ru/vul/2024-02589" type="self" id="BDU:2024-02589" title="BDU:2024-02589" />
			<reference href="https://bdu.fstec.ru/vul/2024-02588" type="self" id="BDU:2024-02588" title="BDU:2024-02588" />
			<reference href="https://bdu.fstec.ru/vul/2024-02587" type="self" id="BDU:2024-02587" title="BDU:2024-02587" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="opensc" epoch="0" version="0.24.0" release="2.el7" arch="x86_64" src="">
					<filename>opensc-0:0.24.0-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240402-22</id>
		<issued date="2024-04-03" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости moodle </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-moodle-cve-2023-5551-cve-2023-5550-cve-2023-5547-cve-2023-5544/</description>
               <solution>
                    Запретить использование в ОС пакета Moodle
                или
                    Установить обновление для пакета(ов) Moodle
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-moodle-cve-2023-5551-cve-2023-5550-cve-2023-5547-cve-2023-5544/" type="self" id="ROS-20240402-22" title="ROS-20240402-22" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5551" type="cve" id="CVE-2023-5551" title="CVE-2023-5551" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5550" type="cve" id="CVE-2023-5550" title="CVE-2023-5550" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5547" type="cve" id="CVE-2023-5547" title="CVE-2023-5547" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5544" type="cve" id="CVE-2023-5544" title="CVE-2023-5544" />
			<reference href="https://bdu.fstec.ru/vul/2024-02592" type="self" id="BDU:2024-02592" title="BDU:2024-02592" />
			<reference href="https://bdu.fstec.ru/vul/2023-07958" type="self" id="BDU:2023-07958" title="BDU:2023-07958" />
			<reference href="https://bdu.fstec.ru/vul/2024-02591" type="self" id="BDU:2024-02591" title="BDU:2024-02591" />
			<reference href="https://bdu.fstec.ru/vul/2024-02590" type="self" id="BDU:2024-02590" title="BDU:2024-02590" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="moodle" epoch="0" version="3.11.15" release="3.el7.3" arch="noarch" src="">
					<filename>moodle-0:3.11.15-3.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240402-23</id>
		<issued date="2024-04-03" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости openvpn </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в openvpn</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-openvpn-cve-2023-46850-cve-2023-46849/</description>
               <solution>
                    Запретить использование в ОС пакета openvpn
                или
                    Установить обновление для пакета(ов) openvpn
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-openvpn-cve-2023-46850-cve-2023-46849/" type="self" id="ROS-20240402-23" title="ROS-20240402-23" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46850" type="cve" id="CVE-2023-46850" title="CVE-2023-46850" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46849" type="cve" id="CVE-2023-46849" title="CVE-2023-46849" />
			<reference href="https://bdu.fstec.ru/vul/2024-02574" type="self" id="BDU:2024-02574" title="BDU:2024-02574" />
			<reference href="https://bdu.fstec.ru/vul/2024-02585" type="self" id="BDU:2024-02585" title="BDU:2024-02585" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openvpn" epoch="0" version="2.6.8" release="1.el7" arch="x86_64" src="">
					<filename>openvpn-0:2.6.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240403-09</id>
		<issued date="2024-04-03" />
		<updated date="2024-04-03" />
		<title>Множественные уязвимости frr </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в frr</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-frr-cve-2023-41358-cve-2023-38802-cve-2023-31490-cve-2022-43681-cve-2022-/</description>
               <solution>
                    Запретить использование в ОС пакета frrouting
                или
                    Установить обновление для пакета(ов) frrouting
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-frr-cve-2023-41358-cve-2023-38802-cve-2023-31490-cve-2022-43681-cve-2022-/" type="self" id="ROS-20240403-09" title="ROS-20240403-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41358" type="cve" id="CVE-2023-41358" title="CVE-2023-41358" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38802" type="cve" id="CVE-2023-38802" title="CVE-2023-38802" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31490" type="cve" id="CVE-2023-31490" title="CVE-2023-31490" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43681" type="cve" id="CVE-2022-43681" title="CVE-2022-43681" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40318" type="cve" id="CVE-2022-40318" title="CVE-2022-40318" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40302" type="cve" id="CVE-2022-40302" title="CVE-2022-40302" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36440" type="cve" id="CVE-2022-36440" title="CVE-2022-36440" />
			<reference href="https://bdu.fstec.ru/vul/2024-02577" type="self" id="BDU:2024-02577" title="BDU:2024-02577" />
			<reference href="https://bdu.fstec.ru/vul/2023-05649" type="self" id="BDU:2023-05649" title="BDU:2023-05649" />
			<reference href="https://bdu.fstec.ru/vul/2024-02578" type="self" id="BDU:2024-02578" title="BDU:2024-02578" />
			<reference href="https://bdu.fstec.ru/vul/2023-02673" type="self" id="BDU:2023-02673" title="BDU:2023-02673" />
			<reference href="https://bdu.fstec.ru/vul/2023-02672" type="self" id="BDU:2023-02672" title="BDU:2023-02672" />
			<reference href="https://bdu.fstec.ru/vul/2023-02322" type="self" id="BDU:2023-02322" title="BDU:2023-02322" />
			<reference href="https://bdu.fstec.ru/vul/2023-02836" type="self" id="BDU:2023-02836" title="BDU:2023-02836" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="frr" epoch="0" version="9.1" release="1.el7" arch="x86_64" src="">
					<filename>frr-0:9.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240328-18</id>
		<issued date="2024-04-03" />
		<updated date="2024-12-23" />
		<title>Уязвимость tomcat </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в tomcat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2023-41080/</description>
               <solution>
                    Запретить использование в ОС пакета tomcat
                или
                    Установить обновление для пакета(ов) tomcat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2023-41080/" type="self" id="ROS-20240328-18" title="ROS-20240328-18" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41080" type="cve" id="CVE-2023-41080" title="CVE-2023-41080" />
			<reference href="https://bdu.fstec.ru/vul/2023-04989" type="self" id="BDU:2023-04989" title="BDU:2023-04989" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat" epoch="1" version="9.0.83" release="1.el7" arch="noarch" src="">
					<filename>tomcat-1:9.0.83-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240403-11</id>
		<issued date="2024-04-03" />
		<updated date="2024-04-03" />
		<title>Уязвимость python3-urllib3 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-urllib3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-urllib3-cve-2023-45803/</description>
               <solution>
                    Запретить использование в ОС пакета python3-urllib3
                или
                    Установить обновление для пакета(ов) python3-urllib3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-urllib3-cve-2023-45803/" type="self" id="ROS-20240403-11" title="ROS-20240403-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45803" type="cve" id="CVE-2023-45803" title="CVE-2023-45803" />
			<reference href="https://bdu.fstec.ru/vul/2023-06977" type="self" id="BDU:2023-06977" title="BDU:2023-06977" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-urllib3" epoch="0" version="1.26.5" release="3.el7.3" arch="noarch" src="">
					<filename>python3-urllib3-0:1.26.5-3.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240403-12</id>
		<issued date="2024-04-03" />
		<updated date="2024-04-03" />
		<title>Множественные уязвимости rubygem-rack </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в rubygem-rack</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rubygem-rack-cve-2022-44570-cve-2022-44571-cve-2022-44572-cve-2023-27539/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-rack
                или
                    Установить обновление для пакета(ов) rubygem-rack
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rubygem-rack-cve-2022-44570-cve-2022-44571-cve-2022-44572-cve-2023-27539/" type="self" id="ROS-20240403-12" title="ROS-20240403-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44570" type="cve" id="CVE-2022-44570" title="CVE-2022-44570" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44571" type="cve" id="CVE-2022-44571" title="CVE-2022-44571" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44572" type="cve" id="CVE-2022-44572" title="CVE-2022-44572" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27539" type="cve" id="CVE-2023-27539" title="CVE-2023-27539" />
			<reference href="https://bdu.fstec.ru/vul/2024-02579" type="self" id="BDU:2024-02579" title="BDU:2024-02579" />
			<reference href="https://bdu.fstec.ru/vul/2024-02580" type="self" id="BDU:2024-02580" title="BDU:2024-02580" />
			<reference href="https://bdu.fstec.ru/vul/2024-02581" type="self" id="BDU:2024-02581" title="BDU:2024-02581" />
			<reference href="https://bdu.fstec.ru/vul/2024-02582" type="self" id="BDU:2024-02582" title="BDU:2024-02582" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-rack" epoch="1" version="2.2.4" release="3.el7" arch="noarch" src="">
					<filename>rubygem-rack-1:2.2.4-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240403-13</id>
		<issued date="2024-04-03" />
		<updated date="2024-04-03" />
		<title>Уязвимость jetty </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в jetty</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jetty-cve-2023-41900/</description>
               <solution>
                    Запретить использование в ОС пакета jetty
                или
                    Установить обновление для пакета(ов) jetty
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jetty-cve-2023-41900/" type="self" id="ROS-20240403-13" title="ROS-20240403-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41900" type="cve" id="CVE-2023-41900" title="CVE-2023-41900" />
			<reference href="https://bdu.fstec.ru/vul/2023-06394" type="self" id="BDU:2023-06394" title="BDU:2023-06394" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jetty" epoch="0" version="9.4.54" release="1.el7" arch="noarch" src="">
					<filename>jetty-0:9.4.54-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230403-14</id>
		<issued date="2024-04-03" />
		<updated date="2024-04-03" />
		<title>Уязвимость zeromq </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в zeromq</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zeromq-cve-2021-20236/</description>
               <solution>
                    Запретить использование в ОС пакета zeromq
                или
                    Установить обновление для пакета(ов) zeromq
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zeromq-cve-2021-20236/" type="self" id="ROS-20230403-14" title="ROS-20230403-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20236" type="cve" id="CVE-2021-20236" title="CVE-2021-20236" />
			<reference href="https://bdu.fstec.ru/vul/2024-02576" type="self" id="BDU:2024-02576" title="BDU:2024-02576" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zeromq" epoch="0" version="4.3.2" release="2.el7" arch="x86_64" src="">
					<filename>zeromq-0:4.3.2-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240403-15</id>
		<issued date="2024-04-03" />
		<updated date="2024-12-11" />
		<title>Множественные уязвимости systemd </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в systemd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-systemd-cve-2021-3997-cve-2021-33910-cve-2020-13529/</description>
               <solution>Установить обновление для пакета(ов) systemd</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-systemd-cve-2021-3997-cve-2021-33910-cve-2020-13529/" type="self" id="ROS-20240403-15" title="ROS-20240403-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997" type="cve" id="CVE-2021-3997" title="CVE-2021-3997" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910" type="cve" id="CVE-2021-33910" title="CVE-2021-33910" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529" type="cve" id="CVE-2020-13529" title="CVE-2020-13529" />
			<reference href="https://bdu.fstec.ru/vul/2024-02586" type="self" id="BDU:2024-02586" title="BDU:2024-02586" />
			<reference href="https://bdu.fstec.ru/vul/2021-04153" type="self" id="BDU:2021-04153" title="BDU:2021-04153" />
			<reference href="https://bdu.fstec.ru/vul/2022-06889" type="self" id="BDU:2022-06889" title="BDU:2022-06889" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="systemd" epoch="0" version="249.12" release="2.el7" arch="x86_64" src="">
					<filename>systemd-0:249.12-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240403-16</id>
		<issued date="2024-04-03" />
		<updated date="2024-04-03" />
		<title>Уязвимость rsyslog </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в rsyslog</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rsyslog-cve-2022-24903/</description>
               <solution>
                    Запретить использование в ОС пакета rsyslog
                или
                    Установить обновление для пакета(ов) rsyslog
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rsyslog-cve-2022-24903/" type="self" id="ROS-20240403-16" title="ROS-20240403-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24903" type="cve" id="CVE-2022-24903" title="CVE-2022-24903" />
			<reference href="https://bdu.fstec.ru/vul/2022-04363" type="self" id="BDU:2022-04363" title="BDU:2022-04363" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rsyslog" epoch="0" version="8.2102.0" release="12.el7" arch="x86_64" src="">
					<filename>rsyslog-0:8.2102.0-12.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240404-01</id>
		<issued date="2024-04-04" />
		<updated date="2024-04-04" />
		<title>Множественные уязвимости grafana</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в grafana</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-grafana-04-04-24/</description>
               <solution>
                    Запретить использование в ОС пакета grafana
                или
                    Установить обновление для пакета(ов) grafana
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-grafana-04-04-24/" type="self" id="ROS-20240404-01" title="ROS-20240404-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3128" type="cve" id="CVE-2023-3128" title="CVE-2023-3128" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2183" type="cve" id="CVE-2023-2183" title="CVE-2023-2183" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0594" type="cve" id="CVE-2023-0594" title="CVE-2023-0594" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22462" type="cve" id="CVE-2023-22462" title="CVE-2023-22462" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23498" type="cve" id="CVE-2022-23498" title="CVE-2022-23498" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39324" type="cve" id="CVE-2022-39324" title="CVE-2022-39324" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23552" type="cve" id="CVE-2022-23552" title="CVE-2022-23552" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39328" type="cve" id="CVE-2022-39328" title="CVE-2022-39328" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39307" type="cve" id="CVE-2022-39307" title="CVE-2022-39307" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39306" type="cve" id="CVE-2022-39306" title="CVE-2022-39306" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39229" type="cve" id="CVE-2022-39229" title="CVE-2022-39229" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39201" type="cve" id="CVE-2022-39201" title="CVE-2022-39201" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31130" type="cve" id="CVE-2022-31130" title="CVE-2022-31130" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31123" type="cve" id="CVE-2022-31123" title="CVE-2022-31123" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35957" type="cve" id="CVE-2022-35957" title="CVE-2022-35957" />
			<reference href="https://bdu.fstec.ru/vul/2023-03343" type="self" id="BDU:2023-03343" title="BDU:2023-03343" />
			<reference href="https://bdu.fstec.ru/vul/2023-03205" type="self" id="BDU:2023-03205" title="BDU:2023-03205" />
			<reference href="https://bdu.fstec.ru/vul/2023-01776" type="self" id="BDU:2023-01776" title="BDU:2023-01776" />
			<reference href="https://bdu.fstec.ru/vul/2023-01731" type="self" id="BDU:2023-01731" title="BDU:2023-01731" />
			<reference href="https://bdu.fstec.ru/vul/2023-01071" type="self" id="BDU:2023-01071" title="BDU:2023-01071" />
			<reference href="https://bdu.fstec.ru/vul/2024-02614" type="self" id="BDU:2024-02614" title="BDU:2024-02614" />
			<reference href="https://bdu.fstec.ru/vul/2024-02615" type="self" id="BDU:2024-02615" title="BDU:2024-02615" />
			<reference href="https://bdu.fstec.ru/vul/2024-02627" type="self" id="BDU:2024-02627" title="BDU:2024-02627" />
			<reference href="https://bdu.fstec.ru/vul/2024-02616" type="self" id="BDU:2024-02616" title="BDU:2024-02616" />
			<reference href="https://bdu.fstec.ru/vul/2024-02617" type="self" id="BDU:2024-02617" title="BDU:2024-02617" />
			<reference href="https://bdu.fstec.ru/vul/2024-02618" type="self" id="BDU:2024-02618" title="BDU:2024-02618" />
			<reference href="https://bdu.fstec.ru/vul/2024-02619" type="self" id="BDU:2024-02619" title="BDU:2024-02619" />
			<reference href="https://bdu.fstec.ru/vul/2024-02620" type="self" id="BDU:2024-02620" title="BDU:2024-02620" />
			<reference href="https://bdu.fstec.ru/vul/2024-02621" type="self" id="BDU:2024-02621" title="BDU:2024-02621" />
			<reference href="https://bdu.fstec.ru/vul/2024-02622" type="self" id="BDU:2024-02622" title="BDU:2024-02622" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="grafana" epoch="0" version="10.3.3" release="1.1.el7" arch="x86_64" src="">
					<filename>grafana-0:10.3.3-1.1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240404-02</id>
		<issued date="2024-04-04" />
		<updated date="2024-04-04" />
		<title>Множественные уязвимости c-ares </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в c-ares</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-c-ares-cve-2023-31130-cve-2023-31124/</description>
               <solution>
                    Запретить использование в ОС пакета c-ares
                или
                    Установить обновление для пакета(ов) c-ares
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-c-ares-cve-2023-31130-cve-2023-31124/" type="self" id="ROS-20240404-02" title="ROS-20240404-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31130" type="cve" id="CVE-2023-31130" title="CVE-2023-31130" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31124" type="cve" id="CVE-2023-31124" title="CVE-2023-31124" />
			<reference href="https://bdu.fstec.ru/vul/2023-07647" type="self" id="BDU:2023-07647" title="BDU:2023-07647" />
			<reference href="https://bdu.fstec.ru/vul/2024-02612" type="self" id="BDU:2024-02612" title="BDU:2024-02612" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="c-ares" epoch="0" version="1.17.2" release="5.el7" arch="x86_64" src="">
					<filename>c-ares-0:1.17.2-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240403-03</id>
		<issued date="2024-04-04" />
		<updated date="2024-04-04" />
		<title>Уязвимость libtirpc </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libtirpc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libtirpc-cve-2021-46828/</description>
               <solution>
                    Запретить использование в ОС пакета libtirpc
                или
                    Установить обновление для пакета(ов) libtirpc
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libtirpc-cve-2021-46828/" type="self" id="ROS-20240403-03" title="ROS-20240403-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46828" type="cve" id="CVE-2021-46828" title="CVE-2021-46828" />
			<reference href="https://bdu.fstec.ru/vul/2024-02624" type="self" id="BDU:2024-02624" title="BDU:2024-02624" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libtirpc" epoch="0" version="1.2.6" release="3.el7" arch="x86_64" src="">
					<filename>libtirpc-0:1.2.6-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240403-04</id>
		<issued date="2024-04-04" />
		<updated date="2024-04-04" />
		<title>Уязвимость systemd </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в systemd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-systemd-cve-2022-2526/</description>
               <solution>Установить обновление для пакета(ов) systemd</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-systemd-cve-2022-2526/" type="self" id="ROS-20240403-04" title="ROS-20240403-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2526" type="cve" id="CVE-2022-2526" title="CVE-2022-2526" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="systemd" epoch="0" version="246.10" release="6.el7" arch="x86_64" src="">
					<filename>systemd-0:246.10-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240403-05</id>
		<issued date="2024-04-04" />
		<updated date="2024-04-04" />
		<title>Множественные уязвимости grub </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в grub2-common</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-grub-cve-2022-2601-cve-2022-3775/</description>
               <solution>
                    Запретить использование в ОС пакета grub2
                или
                    Установить обновление для пакета(ов) grub2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-grub-cve-2022-2601-cve-2022-3775/" type="self" id="ROS-20240403-05" title="ROS-20240403-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2601" type="cve" id="CVE-2022-2601" title="CVE-2022-2601" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3775" type="cve" id="CVE-2022-3775" title="CVE-2022-3775" />
			<reference href="https://bdu.fstec.ru/vul/2022-06819" type="self" id="BDU:2022-06819" title="BDU:2022-06819" />
			<reference href="https://bdu.fstec.ru/vul/2022-06820" type="self" id="BDU:2022-06820" title="BDU:2022-06820" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="grub2-common" epoch="1" version="2.06" release="63.el7.3" arch="noarch" src="">
					<filename>grub2-common-1:2.06-63.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240403-06</id>
		<issued date="2024-04-04" />
		<updated date="2024-04-04" />
		<title>Уязвимость php-adodb </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в php-adodb</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-adodb-cve-2021-3850/</description>
               <solution>
                    Запретить использование в ОС пакета php-adodb
                или
                    Установить обновление для пакета(ов) php-adodb
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-adodb-cve-2021-3850/" type="self" id="ROS-20240403-06" title="ROS-20240403-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3850" type="cve" id="CVE-2021-3850" title="CVE-2021-3850" />
			<reference href="https://bdu.fstec.ru/vul/2024-02613" type="self" id="BDU:2024-02613" title="BDU:2024-02613" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php-adodb" epoch="0" version="5.20.6" release="2.el7" arch="noarch" src="">
					<filename>php-adodb-0:5.20.6-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240404-07</id>
		<issued date="2024-04-04" />
		<updated date="2024-04-04" />
		<title>Уязвимость proftpd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в proftpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-proftpd-cve-2021-46854/</description>
               <solution>
                    Запретить использование в ОС пакета proftpd
                или
                    Установить обновление для пакета(ов) proftpd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-proftpd-cve-2021-46854/" type="self" id="ROS-20240404-07" title="ROS-20240404-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46854" type="cve" id="CVE-2021-46854" title="CVE-2021-46854" />
			<reference href="https://bdu.fstec.ru/vul/2023-05663" type="self" id="BDU:2023-05663" title="BDU:2023-05663" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="proftpd" epoch="0" version="1.3.8b" release="1.el7" arch="x86_64" src="">
					<filename>proftpd-0:1.3.8b-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240404-08</id>
		<issued date="2024-04-04" />
		<updated date="2024-04-04" />
		<title>Уязвимость gnutls </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gnutls</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gnutls-cve-2023-0361/</description>
               <solution>
                    Запретить использование в ОС пакета gnutls
                или
                    Установить обновление для пакета(ов) gnutls
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gnutls-cve-2023-0361/" type="self" id="ROS-20240404-08" title="ROS-20240404-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0361" type="cve" id="CVE-2023-0361" title="CVE-2023-0361" />
			<reference href="https://bdu.fstec.ru/vul/2023-07001" type="self" id="BDU:2023-07001" title="BDU:2023-07001" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gnutls" epoch="0" version="3.6.16" release="2.el7" arch="x86_64" src="">
					<filename>gnutls-0:3.6.16-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240404-09</id>
		<issued date="2024-04-04" />
		<updated date="2024-04-04" />
		<title>Уязвимость avahi </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в avahi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-avahi-cve-2023-1981/</description>
               <solution>
                    Запретить использование в ОС пакета avahi
                или
                    Установить обновление для пакета(ов) avahi
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-avahi-cve-2023-1981/" type="self" id="ROS-20240404-09" title="ROS-20240404-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1981" type="cve" id="CVE-2023-1981" title="CVE-2023-1981" />
			<reference href="https://bdu.fstec.ru/vul/2023-03858" type="self" id="BDU:2023-03858" title="BDU:2023-03858" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="avahi" epoch="0" version="0.8" release="5.el7" arch="x86_64" src="">
					<filename>avahi-0:0.8-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240404-10</id>
		<issued date="2024-04-04" />
		<updated date="2024-04-04" />
		<title>Уязвимость rubygem-rack </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в rubygem-rack</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-rack-cve-2023-27530/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-rack
                или
                    Установить обновление для пакета(ов) rubygem-rack
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-rack-cve-2023-27530/" type="self" id="ROS-20240404-10" title="ROS-20240404-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27530" type="cve" id="CVE-2023-27530" title="CVE-2023-27530" />
			<reference href="https://bdu.fstec.ru/vul/2023-01752" type="self" id="BDU:2023-01752" title="BDU:2023-01752" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-rack" epoch="1" version="2.2.4" release="3.el7" arch="noarch" src="">
					<filename>rubygem-rack-1:2.2.4-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240404-11</id>
		<issued date="2024-04-04" />
		<updated date="2024-04-04" />
		<title>Уязвимость libcap </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libcap</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libcap-cve-2023-2603/</description>
               <solution>
                    Запретить использование в ОС пакета libcap
                или
                    Установить обновление для пакета(ов) libcap
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libcap-cve-2023-2603/" type="self" id="ROS-20240404-11" title="ROS-20240404-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2603" type="cve" id="CVE-2023-2603" title="CVE-2023-2603" />
			<reference href="https://bdu.fstec.ru/vul/2024-02623" type="self" id="BDU:2024-02623" title="BDU:2024-02623" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libcap" epoch="0" version="2.26" release="3.el7" arch="x86_64" src="">
					<filename>libcap-0:2.26-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240404-12</id>
		<issued date="2024-04-04" />
		<updated date="2024-04-04" />
		<title>Уязвимость mediawiki </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mediawiki</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mediawiki-cve-2023-36675/</description>
               <solution>
                    Запретить использование в ОС пакета mediawiki
                или
                    Установить обновление для пакета(ов) mediawiki
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mediawiki-cve-2023-36675/" type="self" id="ROS-20240404-12" title="ROS-20240404-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36675" type="cve" id="CVE-2023-36675" title="CVE-2023-36675" />
			<reference href="https://bdu.fstec.ru/vul/2024-02628" type="self" id="BDU:2024-02628" title="BDU:2024-02628" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mediawiki" epoch="0" version="1.40.2" release="1.el7" arch="noarch" src="">
					<filename>mediawiki-0:1.40.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240404-13</id>
		<issued date="2024-04-04" />
		<updated date="2024-04-04" />
		<title>Уязвимость p7zip </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в p7zip</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-p7zip-cve-2023-31102/</description>
               <solution>
                    Запретить использование в ОС пакета p7zip
                или
                    Установить обновление для пакета(ов) p7zip
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-p7zip-cve-2023-31102/" type="self" id="ROS-20240404-13" title="ROS-20240404-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31102" type="cve" id="CVE-2023-31102" title="CVE-2023-31102" />
			<reference href="https://bdu.fstec.ru/vul/2023-04942" type="self" id="BDU:2023-04942" title="BDU:2023-04942" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="p7zip" epoch="0" version="17.05" release="3.el7.3" arch="x86_64" src="">
					<filename>p7zip-0:17.05-3.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240404-14</id>
		<issued date="2024-04-04" />
		<updated date="2024-04-04" />
		<title>Уязвимость ncurses </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ncurses</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ncurses-cve-2023-29491/</description>
               <solution>
                    Запретить использование в ОС пакета ncurses
                или
                    Установить обновление для пакета(ов) ncurses
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ncurses-cve-2023-29491/" type="self" id="ROS-20240404-14" title="ROS-20240404-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29491" type="cve" id="CVE-2023-29491" title="CVE-2023-29491" />
			<reference href="https://bdu.fstec.ru/vul/2023-05772" type="self" id="BDU:2023-05772" title="BDU:2023-05772" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ncurses" epoch="0" version="6.2" release="9.20210508.el7" arch="x86_64" src="">
					<filename>ncurses-0:6.2-9.20210508.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240404-15</id>
		<issued date="2024-04-04" />
		<updated date="2024-04-04" />
		<title>Уязвимость libwebp </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libwebp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libwebp-cve-2023-5129/</description>
               <solution>
                    Запретить использование в ОС пакета libwebp
                или
                    Установить обновление для пакета(ов) libwebp
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libwebp-cve-2023-5129/" type="self" id="ROS-20240404-15" title="ROS-20240404-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5129" type="cve" id="CVE-2023-5129" title="CVE-2023-5129" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libwebp" epoch="0" version="1.3.2" release="2.el7" arch="x86_64" src="">
					<filename>libwebp-0:1.3.2-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240404-16</id>
		<issued date="2024-04-04" />
		<updated date="2024-04-04" />
		<title>Уязвимость gawk </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в gawk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gawk-cve-2023-4156/</description>
               <solution>
                    Запретить использование в ОС пакета gawk
                или
                    Установить обновление для пакета(ов) gawk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gawk-cve-2023-4156/" type="self" id="ROS-20240404-16" title="ROS-20240404-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4156" type="cve" id="CVE-2023-4156" title="CVE-2023-4156" />
			<reference href="https://bdu.fstec.ru/vul/2023-05957" type="self" id="BDU:2023-05957" title="BDU:2023-05957" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gawk" epoch="0" version="5.1.0" release="2.el7" arch="x86_64" src="">
					<filename>gawk-0:5.1.0-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240404-17</id>
		<issued date="2024-04-04" />
		<updated date="2024-04-04" />
		<title>Множественные уязвимости exim </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в exim</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-exim-cve-2023-42114-cve-2023-42119/</description>
               <solution>
                    Запретить использование в ОС пакета exim
                или
                    Установить обновление для пакета(ов) exim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-exim-cve-2023-42114-cve-2023-42119/" type="self" id="ROS-20240404-17" title="ROS-20240404-17" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42114" type="cve" id="CVE-2023-42114" title="CVE-2023-42114" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42115" type="cve" id="CVE-2023-42115" title="CVE-2023-42115" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42116" type="cve" id="CVE-2023-42116" title="CVE-2023-42116" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42117" type="cve" id="CVE-2023-42117" title="CVE-2023-42117" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42118" type="cve" id="CVE-2023-42118" title="CVE-2023-42118" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42119" type="cve" id="CVE-2023-42119" title="CVE-2023-42119" />
			<reference href="https://bdu.fstec.ru/vul/2023-06277" type="self" id="BDU:2023-06277" title="BDU:2023-06277" />
			<reference href="https://bdu.fstec.ru/vul/2023-06268" type="self" id="BDU:2023-06268" title="BDU:2023-06268" />
			<reference href="https://bdu.fstec.ru/vul/2023-06278" type="self" id="BDU:2023-06278" title="BDU:2023-06278" />
			<reference href="https://bdu.fstec.ru/vul/2023-06274" type="self" id="BDU:2023-06274" title="BDU:2023-06274" />
			<reference href="https://bdu.fstec.ru/vul/2023-06275" type="self" id="BDU:2023-06275" title="BDU:2023-06275" />
			<reference href="https://bdu.fstec.ru/vul/2023-06276" type="self" id="BDU:2023-06276" title="BDU:2023-06276" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="exim" epoch="0" version="4.96" release="4.el7.3" arch="x86_64" src="">
					<filename>exim-0:4.96-4.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240404-18</id>
		<issued date="2024-04-04" />
		<updated date="2024-04-04" />
		<title>Уязвимость mariadb </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в mariadb</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mariadb-cve-2023-5157/</description>
               <solution>
                    Запретить использование в ОС пакета mariadb
                или
                    Установить обновление для пакета(ов) mariadb
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mariadb-cve-2023-5157/" type="self" id="ROS-20240404-18" title="ROS-20240404-18" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5157" type="cve" id="CVE-2023-5157" title="CVE-2023-5157" />
			<reference href="https://bdu.fstec.ru/vul/2023-06357" type="self" id="BDU:2023-06357" title="BDU:2023-06357" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mariadb" epoch="3" version="10.11.6" release="1.el7" arch="x86_64" src="">
					<filename>mariadb-3:10.11.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240404-19</id>
		<issued date="2024-04-04" />
		<updated date="2024-04-04" />
		<title>Уязвимость optipng </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в optipng</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-optipng-cve-2023-43907/</description>
               <solution>
                    Запретить использование в ОС пакета optipng
                или
                    Установить обновление для пакета(ов) optipng
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-optipng-cve-2023-43907/" type="self" id="ROS-20240404-19" title="ROS-20240404-19" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43907" type="cve" id="CVE-2023-43907" title="CVE-2023-43907" />
			<reference href="https://bdu.fstec.ru/vul/2024-02626" type="self" id="BDU:2024-02626" title="BDU:2024-02626" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="optipng" epoch="0" version="0.7.8" release="1.el7" arch="x86_64" src="">
					<filename>optipng-0:0.7.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240404-20</id>
		<issued date="2024-04-04" />
		<updated date="2024-04-04" />
		<title>Уязвимость vorbis-tools </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в vorbis-tools</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vorbis-tools-cve-2023-43361/</description>
               <solution>
                    Запретить использование в ОС пакета Vorbis-tools
                или
                    Установить обновление для пакета(ов) Vorbis-tools
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vorbis-tools-cve-2023-43361/" type="self" id="ROS-20240404-20" title="ROS-20240404-20" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43361" type="cve" id="CVE-2023-43361" title="CVE-2023-43361" />
			<reference href="https://bdu.fstec.ru/vul/2024-02625" type="self" id="BDU:2024-02625" title="BDU:2024-02625" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vorbis-tools" epoch="1" version="1.4.0" release="30.el7" arch="x86_64" src="">
					<filename>vorbis-tools-1:1.4.0-30.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240405-01</id>
		<issued date="2024-04-05" />
		<updated date="2024-06-20" />
		<title>Множественные уязвимости grub </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в grub2-common</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-grub-cve-2023-4693-cve-2023-4692/</description>
               <solution>
                    Запретить использование в ОС пакета grub2
                или
                    Установить обновление для пакета(ов) grub2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-grub-cve-2023-4693-cve-2023-4692/" type="self" id="ROS-20240405-01" title="ROS-20240405-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4693" type="cve" id="CVE-2023-4693" title="CVE-2023-4693" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4692" type="cve" id="CVE-2023-4692" title="CVE-2023-4692" />
			<reference href="https://bdu.fstec.ru/vul/2023-06578" type="self" id="BDU:2023-06578" title="BDU:2023-06578" />
			<reference href="https://bdu.fstec.ru/vul/2023-06822" type="self" id="BDU:2023-06822" title="BDU:2023-06822" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="grub2-common" epoch="1" version="2.06" release="63.el7.3" arch="noarch" src="">
					<filename>grub2-common-1:2.06-63.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240405-02</id>
		<issued date="2024-04-05" />
		<updated date="2024-04-05" />
		<title>Уязвимость python3-urllib3 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-urllib3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-urllib3-cve-2023-43804/</description>
               <solution>
                    Запретить использование в ОС пакета python3-urllib3
                или
                    Установить обновление для пакета(ов) python3-urllib3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-urllib3-cve-2023-43804/" type="self" id="ROS-20240405-02" title="ROS-20240405-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43804" type="cve" id="CVE-2023-43804" title="CVE-2023-43804" />
			<reference href="https://bdu.fstec.ru/vul/2023-08730" type="self" id="BDU:2023-08730" title="BDU:2023-08730" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-urllib3" epoch="0" version="1.26.5" release="3.el7.3" arch="noarch" src="">
					<filename>python3-urllib3-0:1.26.5-3.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240505-03</id>
		<issued date="2024-04-05" />
		<updated date="2024-04-09" />
		<title>Уязвимость qbittorrent </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в qbittorrent</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qbittorrent-cve-2023-30801/</description>
               <solution>
                    Запретить использование в ОС пакета qbittorrent
                или
                    Установить обновление для пакета(ов) qbittorrent
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qbittorrent-cve-2023-30801/" type="self" id="ROS-20240505-03" title="ROS-20240505-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30801" type="cve" id="CVE-2023-30801" title="CVE-2023-30801" />
			<reference href="https://bdu.fstec.ru/vul/2024-02758" type="self" id="BDU:2024-02758" title="BDU:2024-02758" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="qbittorrent" epoch="1" version="4.6.2" release="1.el7" arch="x86_64" src="">
					<filename>qbittorrent-1:4.6.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240405-04</id>
		<issued date="2024-04-05" />
		<updated date="2024-04-05" />
		<title>Уязвимость krb5-server </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в krb5-server</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-krb5-server-cve-2023-36054/</description>
               <solution>
                    Запретить использование в ОС пакета Kerberos 5
                или
                    Установить обновление для пакета(ов) Kerberos 5
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-krb5-server-cve-2023-36054/" type="self" id="ROS-20240405-04" title="ROS-20240405-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36054" type="cve" id="CVE-2023-36054" title="CVE-2023-36054" />
			<reference href="https://bdu.fstec.ru/vul/2024-02770" type="self" id="BDU:2024-02770" title="BDU:2024-02770" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="krb5-server" epoch="0" version="1.20.1" release="2.el7" arch="x86_64" src="">
					<filename>krb5-server-0:1.20.1-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240405-05</id>
		<issued date="2024-04-05" />
		<updated date="2024-04-05" />
		<title>Уязвимость dbus </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в dbus</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dbus-cve-2023-34969/</description>
               <solution>
                    Запретить использование в ОС пакета dbus
                или
                    Установить обновление для пакета(ов) dbus
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dbus-cve-2023-34969/" type="self" id="ROS-20240405-05" title="ROS-20240405-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34969" type="cve" id="CVE-2023-34969" title="CVE-2023-34969" />
			<reference href="https://bdu.fstec.ru/vul/2024-02756" type="self" id="BDU:2024-02756" title="BDU:2024-02756" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dbus" epoch="1" version="1.12.28" release="1.el7" arch="x86_64" src="">
					<filename>dbus-1:1.12.28-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240405-06</id>
		<issued date="2024-04-05" />
		<updated date="2024-04-05" />
		<title>Уязвимость gnutls </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gnutls</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gnutls-cve-2023-5981/</description>
               <solution>
                    Запретить использование в ОС пакета gnutls
                или
                    Установить обновление для пакета(ов) gnutls
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gnutls-cve-2023-5981/" type="self" id="ROS-20240405-06" title="ROS-20240405-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5981" type="cve" id="CVE-2023-5981" title="CVE-2023-5981" />
			<reference href="https://bdu.fstec.ru/vul/2024-01500" type="self" id="BDU:2024-01500" title="BDU:2024-01500" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gnutls" epoch="0" version="3.6.16" release="3.el7" arch="x86_64" src="">
					<filename>gnutls-0:3.6.16-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240405-07</id>
		<issued date="2024-04-05" />
		<updated date="2024-04-05" />
		<title>Уязвимость libde265 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libde265</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libde265-cve-2023-47471/</description>
               <solution>
                    Запретить использование в ОС пакета libde265
                или
                    Установить обновление для пакета(ов) libde265
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libde265-cve-2023-47471/" type="self" id="ROS-20240405-07" title="ROS-20240405-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47471" type="cve" id="CVE-2023-47471" title="CVE-2023-47471" />
			<reference href="https://bdu.fstec.ru/vul/2024-02757" type="self" id="BDU:2024-02757" title="BDU:2024-02757" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libde265" epoch="0" version="1.0.11" release="3.el7" arch="x86_64" src="">
					<filename>libde265-0:1.0.11-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240405-08</id>
		<issued date="2024-04-05" />
		<updated date="2024-04-05" />
		<title>Уязвимость wireshark </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в wireshark</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-wireshark-cve-2023-6174/</description>
               <solution>
                    Запретить использование в ОС пакета wireshark
                или
                    Установить обновление для пакета(ов) wireshark
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-wireshark-cve-2023-6174/" type="self" id="ROS-20240405-08" title="ROS-20240405-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6174" type="cve" id="CVE-2023-6174" title="CVE-2023-6174" />
			<reference href="https://bdu.fstec.ru/vul/2023-08355" type="self" id="BDU:2023-08355" title="BDU:2023-08355" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="wireshark" epoch="1" version="4.0.12" release="1.el7" arch="x86_64" src="">
					<filename>wireshark-1:4.0.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240405-09</id>
		<issued date="2024-04-05" />
		<updated date="2024-04-05" />
		<title>Уязвимость ghostscript </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ghostscript</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ghostscript-cve-2023-46751/</description>
               <solution>
                    Запретить использование в ОС пакета ghostscript
                или
                    Установить обновление для пакета(ов) ghostscript
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ghostscript-cve-2023-46751/" type="self" id="ROS-20240405-09" title="ROS-20240405-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46751" type="cve" id="CVE-2023-46751" title="CVE-2023-46751" />
			<reference href="https://bdu.fstec.ru/vul/2024-00187" type="self" id="BDU:2024-00187" title="BDU:2024-00187" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ghostscript" epoch="0" version="9.52" release="7.el7" arch="x86_64" src="">
					<filename>ghostscript-0:9.52-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240405-10</id>
		<issued date="2024-04-05" />
		<updated date="2024-04-05" />
		<title>Уязвимость perl </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в perl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-cve-2023-47038/</description>
               <solution>
                    Запретить использование в ОС пакета perl
                или
                    Установить обновление для пакета(ов) perl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-cve-2023-47038/" type="self" id="ROS-20240405-10" title="ROS-20240405-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47038" type="cve" id="CVE-2023-47038" title="CVE-2023-47038" />
			<reference href="https://bdu.fstec.ru/vul/2023-08229" type="self" id="BDU:2023-08229" title="BDU:2023-08229" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="perl" epoch="4" version="5.30.1" release="466.el7" arch="x86_64" src="">
					<filename>perl-4:5.30.1-466.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240405-11</id>
		<issued date="2024-04-05" />
		<updated date="2024-04-05" />
		<title>Множественные уязвимости gpac </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gpac</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gpac-cve-2023-46871-cve-2023-48958-cve-2023-48011-cve-2023-48013-cve-2023/</description>
               <solution>
                    Запретить использование в ОС пакета gpac
                или
                    Установить обновление для пакета(ов) gpac
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gpac-cve-2023-46871-cve-2023-48958-cve-2023-48011-cve-2023-48013-cve-2023/" type="self" id="ROS-20240405-11" title="ROS-20240405-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46871" type="cve" id="CVE-2023-46871" title="CVE-2023-46871" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48958" type="cve" id="CVE-2023-48958" title="CVE-2023-48958" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48011" type="cve" id="CVE-2023-48011" title="CVE-2023-48011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48013" type="cve" id="CVE-2023-48013" title="CVE-2023-48013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48014" type="cve" id="CVE-2023-48014" title="CVE-2023-48014" />
			<reference href="https://bdu.fstec.ru/vul/2024-02771" type="self" id="BDU:2024-02771" title="BDU:2024-02771" />
			<reference href="https://bdu.fstec.ru/vul/2024-02742" type="self" id="BDU:2024-02742" title="BDU:2024-02742" />
			<reference href="https://bdu.fstec.ru/vul/2024-02743" type="self" id="BDU:2024-02743" title="BDU:2024-02743" />
			<reference href="https://bdu.fstec.ru/vul/2024-02744" type="self" id="BDU:2024-02744" title="BDU:2024-02744" />
			<reference href="https://bdu.fstec.ru/vul/2024-02745" type="self" id="BDU:2024-02745" title="BDU:2024-02745" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gpac" epoch="0" version="2.3.0" release="2.20240126gitf30e0d1.el7" arch="x86_64" src="">
					<filename>gpac-0:2.3.0-2.20240126gitf30e0d1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240405-12</id>
		<issued date="2024-04-05" />
		<updated date="2024-04-05" />
		<title>Множественные уязвимости tomcat </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-tomcat-cve-2023-45648-cve-2023-42795-cve-2023-42794-cve-2023-46589/</description>
               <solution>
                    Запретить использование в ОС пакета tomcat
                или
                    Установить обновление для пакета(ов) tomcat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-tomcat-cve-2023-45648-cve-2023-42795-cve-2023-42794-cve-2023-46589/" type="self" id="ROS-20240405-12" title="ROS-20240405-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45648" type="cve" id="CVE-2023-45648" title="CVE-2023-45648" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42795" type="cve" id="CVE-2023-42795" title="CVE-2023-42795" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42794" type="cve" id="CVE-2023-42794" title="CVE-2023-42794" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46589" type="cve" id="CVE-2023-46589" title="CVE-2023-46589" />
			<reference href="https://bdu.fstec.ru/vul/2023-07041" type="self" id="BDU:2023-07041" title="BDU:2023-07041" />
			<reference href="https://bdu.fstec.ru/vul/2023-06728" type="self" id="BDU:2023-06728" title="BDU:2023-06728" />
			<reference href="https://bdu.fstec.ru/vul/2023-06729" type="self" id="BDU:2023-06729" title="BDU:2023-06729" />
			<reference href="https://bdu.fstec.ru/vul/2024-01300" type="self" id="BDU:2024-01300" title="BDU:2024-01300" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat" epoch="1" version="9.0.83" release="1.el7" arch="noarch" src="">
					<filename>tomcat-1:9.0.83-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240505-13</id>
		<issued date="2024-04-05" />
		<updated date="2024-04-08" />
		<title>Множественные уязвимости mediawiki</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в mediawiki</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mediawiki-05-04-24/</description>
               <solution>
                    Запретить использование в ОС пакета mediawiki
                или
                    Установить обновление для пакета(ов) mediawiki
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mediawiki-05-04-24/" type="self" id="ROS-20240505-13" title="ROS-20240505-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45362" type="cve" id="CVE-2023-45362" title="CVE-2023-45362" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45374" type="cve" id="CVE-2023-45374" title="CVE-2023-45374" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45364" type="cve" id="CVE-2023-45364" title="CVE-2023-45364" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45373" type="cve" id="CVE-2023-45373" title="CVE-2023-45373" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45372" type="cve" id="CVE-2023-45372" title="CVE-2023-45372" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45371" type="cve" id="CVE-2023-45371" title="CVE-2023-45371" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45370" type="cve" id="CVE-2023-45370" title="CVE-2023-45370" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45369" type="cve" id="CVE-2023-45369" title="CVE-2023-45369" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45367" type="cve" id="CVE-2023-45367" title="CVE-2023-45367" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45363" type="cve" id="CVE-2023-45363" title="CVE-2023-45363" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45360" type="cve" id="CVE-2023-45360" title="CVE-2023-45360" />
			<reference href="https://bdu.fstec.ru/vul/2024-02746" type="self" id="BDU:2024-02746" title="BDU:2024-02746" />
			<reference href="https://bdu.fstec.ru/vul/2024-02747" type="self" id="BDU:2024-02747" title="BDU:2024-02747" />
			<reference href="https://bdu.fstec.ru/vul/2023-07040" type="self" id="BDU:2023-07040" title="BDU:2023-07040" />
			<reference href="https://bdu.fstec.ru/vul/2024-02748" type="self" id="BDU:2024-02748" title="BDU:2024-02748" />
			<reference href="https://bdu.fstec.ru/vul/2024-02749" type="self" id="BDU:2024-02749" title="BDU:2024-02749" />
			<reference href="https://bdu.fstec.ru/vul/2024-02750" type="self" id="BDU:2024-02750" title="BDU:2024-02750" />
			<reference href="https://bdu.fstec.ru/vul/2024-02751" type="self" id="BDU:2024-02751" title="BDU:2024-02751" />
			<reference href="https://bdu.fstec.ru/vul/2024-02752" type="self" id="BDU:2024-02752" title="BDU:2024-02752" />
			<reference href="https://bdu.fstec.ru/vul/2024-02753" type="self" id="BDU:2024-02753" title="BDU:2024-02753" />
			<reference href="https://bdu.fstec.ru/vul/2024-02754" type="self" id="BDU:2024-02754" title="BDU:2024-02754" />
			<reference href="https://bdu.fstec.ru/vul/2024-02755" type="self" id="BDU:2024-02755" title="BDU:2024-02755" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mediawiki" epoch="0" version="1.40.2" release="1.el7" arch="noarch" src="">
					<filename>mediawiki-0:1.40.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240403-14</id>
		<issued date="2024-04-05" />
		<updated date="2024-04-05" />
		<title>Множественные уязвимости grafana </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в grafana</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-grafana-cve-2023-4457-cve-2022-23498-cve-2023-0594/</description>
               <solution>
                    Запретить использование в ОС пакета grafana
                или
                    Установить обновление для пакета(ов) grafana
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-grafana-cve-2023-4457-cve-2022-23498-cve-2023-0594/" type="self" id="ROS-20240403-14" title="ROS-20240403-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4457" type="cve" id="CVE-2023-4457" title="CVE-2023-4457" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23498" type="cve" id="CVE-2022-23498" title="CVE-2022-23498" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0594" type="cve" id="CVE-2023-0594" title="CVE-2023-0594" />
			<reference href="https://bdu.fstec.ru/vul/2024-02600" type="self" id="BDU:2024-02600" title="BDU:2024-02600" />
			<reference href="https://bdu.fstec.ru/vul/2023-01071" type="self" id="BDU:2023-01071" title="BDU:2023-01071" />
			<reference href="https://bdu.fstec.ru/vul/2023-01776" type="self" id="BDU:2023-01776" title="BDU:2023-01776" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="grafana" epoch="0" version="10.3.3" release="1.1.el7" arch="x86_64" src="">
					<filename>grafana-0:10.3.3-1.1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240408-01</id>
		<issued date="2024-04-08" />
		<updated date="2024-04-08" />
		<title>Множественные уязвимости libheif </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libheif</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libheif-cve-2023-49460-cve-2023-49462-cve-2023-49463-cve-2023-49464/</description>
               <solution>
                    Запретить использование в ОС пакета Libheif
                или
                    Установить обновление для пакета(ов) Libheif
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libheif-cve-2023-49460-cve-2023-49462-cve-2023-49463-cve-2023-49464/" type="self" id="ROS-20240408-01" title="ROS-20240408-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49460" type="cve" id="CVE-2023-49460" title="CVE-2023-49460" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49462" type="cve" id="CVE-2023-49462" title="CVE-2023-49462" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49463" type="cve" id="CVE-2023-49463" title="CVE-2023-49463" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49464" type="cve" id="CVE-2023-49464" title="CVE-2023-49464" />
			<reference href="https://bdu.fstec.ru/vul/2024-02761" type="self" id="BDU:2024-02761" title="BDU:2024-02761" />
			<reference href="https://bdu.fstec.ru/vul/2024-02769" type="self" id="BDU:2024-02769" title="BDU:2024-02769" />
			<reference href="https://bdu.fstec.ru/vul/2024-02762" type="self" id="BDU:2024-02762" title="BDU:2024-02762" />
			<reference href="https://bdu.fstec.ru/vul/2024-02763" type="self" id="BDU:2024-02763" title="BDU:2024-02763" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libheif" epoch="0" version="1.16.1" release="4.el7" arch="x86_64" src="">
					<filename>libheif-0:1.16.1-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240408-02</id>
		<issued date="2024-04-08" />
		<updated date="2024-04-08" />
		<title>Уязвимость golang-x-net-devel </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang-x-net-devel</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-x-net-devel-cve-2023-3978/</description>
               <solution>
                    Запретить использование в ОС пакета golang-x-net-devel
                или
                    Установить обновление для пакета(ов) golang-x-net-devel
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-x-net-devel-cve-2023-3978/" type="self" id="ROS-20240408-02" title="ROS-20240408-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3978" type="cve" id="CVE-2023-3978" title="CVE-2023-3978" />
			<reference href="https://bdu.fstec.ru/vul/2023-07327" type="self" id="BDU:2023-07327" title="BDU:2023-07327" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang-x-net-devel" epoch="0" version="0.17.0" release="1.el7" arch="noarch" src="">
					<filename>golang-x-net-devel-0:0.17.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240408-03</id>
		<issued date="2024-04-08" />
		<updated date="2024-04-08" />
		<title>Множественные уязвимости libde265 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libde265</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libde265-cve-2023-49465-cve-2023-49467-cve-2023-49468/</description>
               <solution>
                    Запретить использование в ОС пакета libde265
                или
                    Установить обновление для пакета(ов) libde265
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libde265-cve-2023-49465-cve-2023-49467-cve-2023-49468/" type="self" id="ROS-20240408-03" title="ROS-20240408-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49465" type="cve" id="CVE-2023-49465" title="CVE-2023-49465" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49467" type="cve" id="CVE-2023-49467" title="CVE-2023-49467" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49468" type="cve" id="CVE-2023-49468" title="CVE-2023-49468" />
			<reference href="https://bdu.fstec.ru/vul/2024-00520" type="self" id="BDU:2024-00520" title="BDU:2024-00520" />
			<reference href="https://bdu.fstec.ru/vul/2024-01356" type="self" id="BDU:2024-01356" title="BDU:2024-01356" />
			<reference href="https://bdu.fstec.ru/vul/2024-01357" type="self" id="BDU:2024-01357" title="BDU:2024-01357" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libde265" epoch="0" version="1.0.14" release="1.el7" arch="x86_64" src="">
					<filename>libde265-0:1.0.14-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240408-04</id>
		<issued date="2024-04-08" />
		<updated date="2024-04-08" />
		<title>Множественные уязвимости gpac </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в gpac</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gpac-cve-2023-47465-cve-2023-46932/</description>
               <solution>
                    Запретить использование в ОС пакета gpac
                или
                    Установить обновление для пакета(ов) gpac
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gpac-cve-2023-47465-cve-2023-46932/" type="self" id="ROS-20240408-04" title="ROS-20240408-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47465" type="cve" id="CVE-2023-47465" title="CVE-2023-47465" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46932" type="cve" id="CVE-2023-46932" title="CVE-2023-46932" />
			<reference href="https://bdu.fstec.ru/vul/2024-02765" type="self" id="BDU:2024-02765" title="BDU:2024-02765" />
			<reference href="https://bdu.fstec.ru/vul/2024-02766" type="self" id="BDU:2024-02766" title="BDU:2024-02766" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gpac" epoch="0" version="2.3.0" release="2.20240126gitf30e0d1.el7" arch="x86_64" src="">
					<filename>gpac-0:2.3.0-2.20240126gitf30e0d1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240408-05</id>
		<issued date="2024-04-08" />
		<updated date="2024-04-08" />
		<title>Уязвимость syslog-ng </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в syslog-ng</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-syslog-ng-cve-2022-38725/</description>
               <solution>
                    Запретить использование в ОС пакета syslog-ng
                или
                    Установить обновление для пакета(ов) syslog-ng
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-syslog-ng-cve-2022-38725/" type="self" id="ROS-20240408-05" title="ROS-20240408-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38725" type="cve" id="CVE-2022-38725" title="CVE-2022-38725" />
			<reference href="https://bdu.fstec.ru/vul/2023-09093" type="self" id="BDU:2023-09093" title="BDU:2023-09093" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="syslog-ng" epoch="0" version="3.38.1" release="1.el7" arch="x86_64" src="">
					<filename>syslog-ng-0:3.38.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240408-06</id>
		<issued date="2024-04-08" />
		<updated date="2024-04-08" />
		<title>Уязвимость bluez </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в bluez</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-bluez-cve-2023-45866/</description>
               <solution>
                    Запретить использование в ОС пакета bluez
                или
                    Установить обновление для пакета(ов) bluez
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-bluez-cve-2023-45866/" type="self" id="ROS-20240408-06" title="ROS-20240408-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45866" type="cve" id="CVE-2023-45866" title="CVE-2023-45866" />
			<reference href="https://bdu.fstec.ru/vul/2023-08562" type="self" id="BDU:2023-08562" title="BDU:2023-08562" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="bluez" epoch="0" version="5.66" release="2.el7" arch="x86_64" src="">
					<filename>bluez-0:5.66-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240408-07</id>
		<issued date="2024-04-08" />
		<updated date="2024-04-08" />
		<title>Множественные уязвимости libreoffice </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libreoffice</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libreoffice-cve-2023-6185-cve-2023-6186/</description>
               <solution>
                    Запретить использование в ОС пакета libreoffice
                или
                    Установить обновление для пакета(ов) libreoffice
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libreoffice-cve-2023-6185-cve-2023-6186/" type="self" id="ROS-20240408-07" title="ROS-20240408-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6185" type="cve" id="CVE-2023-6185" title="CVE-2023-6185" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6186" type="cve" id="CVE-2023-6186" title="CVE-2023-6186" />
			<reference href="https://bdu.fstec.ru/vul/2023-08957" type="self" id="BDU:2023-08957" title="BDU:2023-08957" />
			<reference href="https://bdu.fstec.ru/vul/2023-08655" type="self" id="BDU:2023-08655" title="BDU:2023-08655" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libreoffice" epoch="1" version="7.6.4.1" release="1.el7" arch="x86_64" src="">
					<filename>libreoffice-1:7.6.4.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240408-08</id>
		<issued date="2024-04-08" />
		<updated date="2024-04-08" />
		<title>Множественные уязвимости xorg-x11-server </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в xorg-x11-server-common</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-xorg-x11-server-cve-2023-6478-cve-2023-6377/</description>
               <solution>
                    Запретить использование в ОС пакета xorg-x11-server
                или
                    Установить обновление для пакета(ов) xorg-x11-server
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-xorg-x11-server-cve-2023-6478-cve-2023-6377/" type="self" id="ROS-20240408-08" title="ROS-20240408-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6478" type="cve" id="CVE-2023-6478" title="CVE-2023-6478" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6377" type="cve" id="CVE-2023-6377" title="CVE-2023-6377" />
			<reference href="https://bdu.fstec.ru/vul/2024-02764" type="self" id="BDU:2024-02764" title="BDU:2024-02764" />
			<reference href="https://bdu.fstec.ru/vul/2024-00457" type="self" id="BDU:2024-00457" title="BDU:2024-00457" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="xorg-x11-server-common" epoch="0" version="1.20.14" release="10.el7.3" arch="x86_64" src="">
					<filename>xorg-x11-server-common-0:1.20.14-10.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240408-09</id>
		<issued date="2024-04-08" />
		<updated date="2024-04-08" />
		<title>Множественные уязвимости gdk-pixbuf2 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gdk-pixbuf2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gdk-pixbuf2-cve-2020-29385-cve-2021-20240/</description>
               <solution>
                    Запретить использование в ОС пакета Gdk-pixbuf
                или
                    Установить обновление для пакета(ов) Gdk-pixbuf
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gdk-pixbuf2-cve-2020-29385-cve-2021-20240/" type="self" id="ROS-20240408-09" title="ROS-20240408-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29385" type="cve" id="CVE-2020-29385" title="CVE-2020-29385" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20240" type="cve" id="CVE-2021-20240" title="CVE-2021-20240" />
			<reference href="https://bdu.fstec.ru/vul/2024-02767" type="self" id="BDU:2024-02767" title="BDU:2024-02767" />
			<reference href="https://bdu.fstec.ru/vul/2021-04598" type="self" id="BDU:2021-04598" title="BDU:2021-04598" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gdk-pixbuf2" epoch="0" version="2.40.0" release="9.el7" arch="x86_64" src="">
					<filename>gdk-pixbuf2-0:2.40.0-9.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240408-10</id>
		<issued date="2024-04-08" />
		<updated date="2024-04-08" />
		<title>Множественные уязвимости fribidi </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в fribidi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-fribidi-cve-2022-25308-cve-2022-25309-cve-2022-25310/</description>
               <solution>
                    Запретить использование в ОС пакета fribidi
                или
                    Установить обновление для пакета(ов) fribidi
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-fribidi-cve-2022-25308-cve-2022-25309-cve-2022-25310/" type="self" id="ROS-20240408-10" title="ROS-20240408-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25308" type="cve" id="CVE-2022-25308" title="CVE-2022-25308" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25309" type="cve" id="CVE-2022-25309" title="CVE-2022-25309" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25310" type="cve" id="CVE-2022-25310" title="CVE-2022-25310" />
			<reference href="https://bdu.fstec.ru/vul/2022-02659" type="self" id="BDU:2022-02659" title="BDU:2022-02659" />
			<reference href="https://bdu.fstec.ru/vul/2022-02660" type="self" id="BDU:2022-02660" title="BDU:2022-02660" />
			<reference href="https://bdu.fstec.ru/vul/2022-02658" type="self" id="BDU:2022-02658" title="BDU:2022-02658" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="fribidi" epoch="0" version="1.0.13" release="1.el7" arch="x86_64" src="">
					<filename>fribidi-0:1.0.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240408-11</id>
		<issued date="2024-04-08" />
		<updated date="2024-04-08" />
		<title>Уязвимость python3-requests </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-requests</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-requests-cve-2023-32681/</description>
               <solution>
                    Запретить использование в ОС пакета python3-requests
                или
                    Установить обновление для пакета(ов) python3-requests
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-requests-cve-2023-32681/" type="self" id="ROS-20240408-11" title="ROS-20240408-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32681" type="cve" id="CVE-2023-32681" title="CVE-2023-32681" />
			<reference href="https://bdu.fstec.ru/vul/2023-03874" type="self" id="BDU:2023-03874" title="BDU:2023-03874" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-requests" epoch="0" version="2.26.0" release="4.el7" arch="noarch" src="">
					<filename>python3-requests-0:2.26.0-4.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240408-12</id>
		<issued date="2024-04-08" />
		<updated date="2024-04-08" />
		<title>Уязвимость OpenImageIO </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в OpenImageIO</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openimageio-cve-2023-3430/</description>
               <solution>
                    Запретить использование в ОС пакета openimageio
                или
                    Установить обновление для пакета(ов) openimageio
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openimageio-cve-2023-3430/" type="self" id="ROS-20240408-12" title="ROS-20240408-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3430" type="cve" id="CVE-2023-3430" title="CVE-2023-3430" />
			<reference href="https://bdu.fstec.ru/vul/2024-02768" type="self" id="BDU:2024-02768" title="BDU:2024-02768" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="OpenImageIO" epoch="0" version="2.2.8.0" release="4.el7" arch="x86_64" src="">
					<filename>OpenImageIO-0:2.2.8.0-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240408-13</id>
		<issued date="2024-04-08" />
		<updated date="2024-04-08" />
		<title>Уязвимость putty </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в putty</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-putty-cve-2023-48795/</description>
               <solution>
                    Запретить использование в ОС пакета putty
                или
                    Установить обновление для пакета(ов) putty
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-putty-cve-2023-48795/" type="self" id="ROS-20240408-13" title="ROS-20240408-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48795" type="cve" id="CVE-2023-48795" title="CVE-2023-48795" />
			<reference href="https://bdu.fstec.ru/vul/2023-08853" type="self" id="BDU:2023-08853" title="BDU:2023-08853" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="putty" epoch="0" version="0.80" release="1.el7" arch="x86_64" src="">
					<filename>putty-0:0.80-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240408-14</id>
		<issued date="2024-04-08" />
		<updated date="2024-04-08" />
		<title>Множественные уязвимости jq </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в jq</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-jq-cve-2023-50246-cve-2023-50268/</description>
               <solution>
                    Запретить использование в ОС пакета jq
                или
                    Установить обновление для пакета(ов) jq
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-jq-cve-2023-50246-cve-2023-50268/" type="self" id="ROS-20240408-14" title="ROS-20240408-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50246" type="cve" id="CVE-2023-50246" title="CVE-2023-50246" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50268" type="cve" id="CVE-2023-50268" title="CVE-2023-50268" />
			<reference href="https://bdu.fstec.ru/vul/2024-02759" type="self" id="BDU:2024-02759" title="BDU:2024-02759" />
			<reference href="https://bdu.fstec.ru/vul/2024-02760" type="self" id="BDU:2024-02760" title="BDU:2024-02760" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jq" epoch="0" version="1.7.1" release="1.el7" arch="x86_64" src="">
					<filename>jq-0:1.7.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240408-22</id>
		<issued date="2024-04-08" />
		<updated date="2024-12-23" />
		<title>Уязвимость python3-paramiko </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-paramiko</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-paramiko-cve-2023-487958009/</description>
               <solution>
                    Запретить использование в ОС пакета python3-paramiko
                или
                    Установить обновление для пакета(ов) python3-paramiko
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-paramiko-cve-2023-487958009/" type="self" id="ROS-20240408-22" title="ROS-20240408-22" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48795" type="cve" id="CVE-2023-48795" title="CVE-2023-48795" />
			<reference href="https://bdu.fstec.ru/vul/2023-08853" type="self" id="BDU:2023-08853" title="BDU:2023-08853" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-paramiko" epoch="0" version="3.4.0" release="1.el7" arch="noarch" src="">
					<filename>python3-paramiko-0:3.4.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240408-15</id>
		<issued date="2024-04-08" />
		<updated date="2024-04-08" />
		<title>Уязвимость libssh2 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libssh2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libssh2-cve-2023-4879580098456/</description>
               <solution>
                    Запретить использование в ОС пакета libssh2
                или
                    Установить обновление для пакета(ов) libssh2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libssh2-cve-2023-4879580098456/" type="self" id="ROS-20240408-15" title="ROS-20240408-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48795" type="cve" id="CVE-2023-48795" title="CVE-2023-48795" />
			<reference href="https://bdu.fstec.ru/vul/2023-08853" type="self" id="BDU:2023-08853" title="BDU:2023-08853" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libssh2" epoch="0" version="1.11.0" release="1.el7" arch="x86_64" src="">
					<filename>libssh2-0:1.11.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240408-16</id>
		<issued date="2024-04-08" />
		<updated date="2024-04-08" />
		<title>Уязвимость sendmail </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в sendmail</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sendmail-cve-2023-51765/</description>
               <solution>
                    Запретить использование в ОС пакета sendmail
                или
                    Установить обновление для пакета(ов) sendmail
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sendmail-cve-2023-51765/" type="self" id="ROS-20240408-16" title="ROS-20240408-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51765" type="cve" id="CVE-2023-51765" title="CVE-2023-51765" />
			<reference href="https://bdu.fstec.ru/vul/2024-02339" type="self" id="BDU:2024-02339" title="BDU:2024-02339" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="sendmail" epoch="0" version="8.18.1" release="1.el7" arch="x86_64" src="">
					<filename>sendmail-0:8.18.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240408-17</id>
		<issued date="2024-04-08" />
		<updated date="2024-04-08" />
		<title>Уязвимость python3-flask-security-too </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-flask-security-too</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-flask-security-too-cve-2023-49438/</description>
               <solution>
                    Запретить использование в ОС пакета python3-flask-security-too
                или
                    Установить обновление для пакета(ов) python3-flask-security-too
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-flask-security-too-cve-2023-49438/" type="self" id="ROS-20240408-17" title="ROS-20240408-17" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49438" type="cve" id="CVE-2023-49438" title="CVE-2023-49438" />
			<reference href="https://bdu.fstec.ru/vul/2024-00063" type="self" id="BDU:2024-00063" title="BDU:2024-00063" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-flask-security-too" epoch="0" version="4.1.2" release="2.el7" arch="noarch" src="">
					<filename>python3-flask-security-too-0:4.1.2-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240408-18</id>
		<issued date="2024-04-08" />
		<updated date="2024-04-08" />
		<title>Уязвимость proftpd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в proftpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-proftpd-cve-2023-51713/</description>
               <solution>
                    Запретить использование в ОС пакета proftpd
                или
                    Установить обновление для пакета(ов) proftpd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-proftpd-cve-2023-51713/" type="self" id="ROS-20240408-18" title="ROS-20240408-18" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51713" type="cve" id="CVE-2023-51713" title="CVE-2023-51713" />
			<reference href="https://bdu.fstec.ru/vul/2024-02777" type="self" id="BDU:2024-02777" title="BDU:2024-02777" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="proftpd" epoch="0" version="1.3.8b" release="1.el7" arch="x86_64" src="">
					<filename>proftpd-0:1.3.8b-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240408-19</id>
		<issued date="2024-04-08" />
		<updated date="2024-04-08" />
		<title>Уязвимость mediawiki </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mediawiki</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mediawiki-cve-2023-51704/</description>
               <solution>
                    Запретить использование в ОС пакета mediawiki
                или
                    Установить обновление для пакета(ов) mediawiki
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mediawiki-cve-2023-51704/" type="self" id="ROS-20240408-19" title="ROS-20240408-19" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51704" type="cve" id="CVE-2023-51704" title="CVE-2023-51704" />
			<reference href="https://bdu.fstec.ru/vul/2024-02778" type="self" id="BDU:2024-02778" title="BDU:2024-02778" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mediawiki" epoch="0" version="1.40.2" release="1.el7" arch="noarch" src="">
					<filename>mediawiki-0:1.40.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240408-20</id>
		<issued date="2024-04-08" />
		<updated date="2024-04-08" />
		<title>Уязвимость exim </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в exim</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-exim-cve-2023-51766/</description>
               <solution>
                    Запретить использование в ОС пакета exim
                или
                    Установить обновление для пакета(ов) exim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-exim-cve-2023-51766/" type="self" id="ROS-20240408-20" title="ROS-20240408-20" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51766" type="cve" id="CVE-2023-51766" title="CVE-2023-51766" />
			<reference href="https://bdu.fstec.ru/vul/2024-00108" type="self" id="BDU:2024-00108" title="BDU:2024-00108" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="exim" epoch="0" version="4.97.1" release="1.el7" arch="x86_64" src="">
					<filename>exim-0:4.97.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240408-21</id>
		<issued date="2024-04-08" />
		<updated date="2024-04-08" />
		<title>Уязвимость postfix </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в postfix</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postfix-cve-2023-51764/</description>
               <solution>
                    Запретить использование в ОС пакета postfix
                или
                    Установить обновление для пакета(ов) postfix
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postfix-cve-2023-51764/" type="self" id="ROS-20240408-21" title="ROS-20240408-21" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51764" type="cve" id="CVE-2023-51764" title="CVE-2023-51764" />
			<reference href="https://bdu.fstec.ru/vul/2024-00106" type="self" id="BDU:2024-00106" title="BDU:2024-00106" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postfix" epoch="2" version="3.8.4" release="1.el7" arch="x86_64" src="">
					<filename>postfix-2:3.8.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240409-01</id>
		<issued date="2024-04-09" />
		<updated date="2024-04-09" />
		<title>Множественные уязвимости python3 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-cve-2022-45061-cve-2023-24329/</description>
               <solution>
                    Запретить использование в ОС пакета python3
                или
                    Установить обновление для пакета(ов) python3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-cve-2022-45061-cve-2023-24329/" type="self" id="ROS-20240409-01" title="ROS-20240409-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45061" type="cve" id="CVE-2022-45061" title="CVE-2022-45061" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24329" type="cve" id="CVE-2023-24329" title="CVE-2023-24329" />
			<reference href="https://bdu.fstec.ru/vul/2023-03855" type="self" id="BDU:2023-03855" title="BDU:2023-03855" />
			<reference href="https://bdu.fstec.ru/vul/2023-04978" type="self" id="BDU:2023-04978" title="BDU:2023-04978" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3" epoch="0" version="3.8.18" release="1.el7" arch="x86_64" src="">
					<filename>python3-0:3.8.18-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240409-02</id>
		<issued date="2024-04-09" />
		<updated date="2024-04-09" />
		<title>Множественные уязвимости python3 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в python3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-cve-2022-48566-cve-2022-48565-cve-2023-40217/</description>
               <solution>
                    Запретить использование в ОС пакета python3
                или
                    Установить обновление для пакета(ов) python3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-cve-2022-48566-cve-2022-48565-cve-2023-40217/" type="self" id="ROS-20240409-02" title="ROS-20240409-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48566" type="cve" id="CVE-2022-48566" title="CVE-2022-48566" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48565" type="cve" id="CVE-2022-48565" title="CVE-2022-48565" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40217" type="cve" id="CVE-2023-40217" title="CVE-2023-40217" />
			<reference href="https://bdu.fstec.ru/vul/2023-06654" type="self" id="BDU:2023-06654" title="BDU:2023-06654" />
			<reference href="https://bdu.fstec.ru/vul/2023-06655" type="self" id="BDU:2023-06655" title="BDU:2023-06655" />
			<reference href="https://bdu.fstec.ru/vul/2023-05002" type="self" id="BDU:2023-05002" title="BDU:2023-05002" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3" epoch="0" version="3.8.18" release="1.el7" arch="x86_64" src="">
					<filename>python3-0:3.8.18-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240409-03</id>
		<issued date="2024-04-09" />
		<updated date="2024-04-09" />
		<title>Уязвимость ImageMagick </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в ImageMagick</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick-cve-2023-5341/</description>
               <solution>
                    Запретить использование в ОС пакета ImageMagick
                или
                    Установить обновление для пакета(ов) ImageMagick
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick-cve-2023-5341/" type="self" id="ROS-20240409-03" title="ROS-20240409-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5341" type="cve" id="CVE-2023-5341" title="CVE-2023-5341" />
			<reference href="https://bdu.fstec.ru/vul/2023-06621" type="self" id="BDU:2023-06621" title="BDU:2023-06621" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ImageMagick" epoch="0" version="6.9.12.89" release="3.el7" arch="x86_64" src="">
					<filename>ImageMagick-0:6.9.12.89-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240409-18</id>
		<issued date="2024-04-09" />
		<updated date="2024-12-23" />
		<title>Уязвимость ImageMagick7 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в ImageMagick7</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick7-cve-2023-53419469/</description>
               <solution>
                    Запретить использование в ОС пакета ImageMagick7
                или
                    Установить обновление для пакета(ов) ImageMagick7
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick7-cve-2023-53419469/" type="self" id="ROS-20240409-18" title="ROS-20240409-18" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5341" type="cve" id="CVE-2023-5341" title="CVE-2023-5341" />
			<reference href="https://bdu.fstec.ru/vul/2023-06621" type="self" id="BDU:2023-06621" title="BDU:2023-06621" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ImageMagick7" epoch="0" version="7.1.1.11" release="4.el7" arch="x86_64" src="">
					<filename>ImageMagick7-0:7.1.1.11-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240409-04</id>
		<issued date="2024-04-09" />
		<updated date="2024-04-09" />
		<title>Уязвимость erlang </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в erlang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-erlang-cve-2023-48795/</description>
               <solution>
                    Запретить использование в ОС пакета erlang
                или
                    Установить обновление для пакета(ов) erlang
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-erlang-cve-2023-48795/" type="self" id="ROS-20240409-04" title="ROS-20240409-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48795" type="cve" id="CVE-2023-48795" title="CVE-2023-48795" />
			<reference href="https://bdu.fstec.ru/vul/2023-08853" type="self" id="BDU:2023-08853" title="BDU:2023-08853" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="erlang" epoch="0" version="26.2.1" release="2.el7" arch="x86_64" src="">
					<filename>erlang-0:26.2.1-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240409-05</id>
		<issued date="2024-04-09" />
		<updated date="2024-04-09" />
		<title>Уязвимость ядра ОС </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-yadra-os-cve-2023-39197/</description>
               <solution>
                    Запретить использование в ОС пакета kernel-lt
                или
                    Установить обновление для пакета(ов) kernel-lt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-yadra-os-cve-2023-39197/" type="self" id="ROS-20240409-05" title="ROS-20240409-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39197" type="cve" id="CVE-2023-39197" title="CVE-2023-39197" />
			<reference href="https://bdu.fstec.ru/vul/2023-07976" type="self" id="BDU:2023-07976" title="BDU:2023-07976" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="5.15.131" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:5.15.131-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240409-19</id>
		<issued date="2024-04-09" />
		<updated date="2024-12-23" />
		<title>Уязвимость ядра ОС </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-yadra-os-cve-2023-391978788/</description>
               <solution>
                    Запретить использование в ОС пакета kernel-lt
                или
                    Установить обновление для пакета(ов) kernel-lt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-yadra-os-cve-2023-391978788/" type="self" id="ROS-20240409-19" title="ROS-20240409-19" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39197" type="cve" id="CVE-2023-39197" title="CVE-2023-39197" />
			<reference href="https://bdu.fstec.ru/vul/2023-07976" type="self" id="BDU:2023-07976" title="BDU:2023-07976" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240408-23</id>
		<issued date="2024-04-09" />
		<updated date="2024-12-23" />
		<title>Уязвимость python3-cryptography </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-cryptography</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2023-4879580093755/</description>
               <solution>
                    Запретить использование в ОС пакета python3-cryptography
                или
                    Установить обновление для пакета(ов) python3-cryptography
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2023-4879580093755/" type="self" id="ROS-20240408-23" title="ROS-20240408-23" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48795" type="cve" id="CVE-2023-48795" title="CVE-2023-48795" />
			<reference href="https://bdu.fstec.ru/vul/2023-08853" type="self" id="BDU:2023-08853" title="BDU:2023-08853" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-cryptography" epoch="0" version="39.0.2" release="4.el7" arch="x86_64" src="">
					<filename>python3-cryptography-0:39.0.2-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240408-24</id>
		<issued date="2024-04-09" />
		<updated date="2024-12-23" />
		<title>Уязвимость python3-pyOpenSSL </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-pyOpenSSL</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2023-4879580093755476/</description>
               <solution>
                    Запретить использование в ОС пакета python3-pyOpenSSL
                или
                    Установить обновление для пакета(ов) python3-pyOpenSSL
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2023-4879580093755476/" type="self" id="ROS-20240408-24" title="ROS-20240408-24" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48795" type="cve" id="CVE-2023-48795" title="CVE-2023-48795" />
			<reference href="https://bdu.fstec.ru/vul/2023-08853" type="self" id="BDU:2023-08853" title="BDU:2023-08853" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-pyOpenSSL" epoch="0" version="23.2.0" release="0.1.el7" arch="noarch" src="">
					<filename>python3-pyOpenSSL-0:23.2.0-0.1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240408-25</id>
		<issued date="2024-04-09" />
		<updated date="2024-12-23" />
		<title>Уязвимость python3-asyncssh </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-asyncssh</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2023-48795800937554767065/</description>
               <solution>
                    Запретить использование в ОС пакета python3-asyncssh
                или
                    Установить обновление для пакета(ов) python3-asyncssh
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2023-48795800937554767065/" type="self" id="ROS-20240408-25" title="ROS-20240408-25" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48795" type="cve" id="CVE-2023-48795" title="CVE-2023-48795" />
			<reference href="https://bdu.fstec.ru/vul/2023-08853" type="self" id="BDU:2023-08853" title="BDU:2023-08853" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-asyncssh" epoch="0" version="2.14.2" release="1.el7" arch="noarch" src="">
					<filename>python3-asyncssh-0:2.14.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240409-06</id>
		<issued date="2024-04-09" />
		<updated date="2024-04-09" />
		<title>Множественные уязвимости salt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в salt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-salt-cve-2023-20897-cve-2023-20898-cve-2023-5363-cve-2023-4807-cve-2023-4/</description>
               <solution>
                    Запретить использование в ОС пакета salt
                или
                    Установить обновление для пакета(ов) salt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-salt-cve-2023-20897-cve-2023-20898-cve-2023-5363-cve-2023-4807-cve-2023-4/" type="self" id="ROS-20240409-06" title="ROS-20240409-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20897" type="cve" id="CVE-2023-20897" title="CVE-2023-20897" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20898" type="cve" id="CVE-2023-20898" title="CVE-2023-20898" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5363" type="cve" id="CVE-2023-5363" title="CVE-2023-5363" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4807" type="cve" id="CVE-2023-4807" title="CVE-2023-4807" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49083" type="cve" id="CVE-2023-49083" title="CVE-2023-49083" />
			<reference href="https://bdu.fstec.ru/vul/2023-05935" type="self" id="BDU:2023-05935" title="BDU:2023-05935" />
			<reference href="https://bdu.fstec.ru/vul/2023-07691" type="self" id="BDU:2023-07691" title="BDU:2023-07691" />
			<reference href="https://bdu.fstec.ru/vul/2023-05872" type="self" id="BDU:2023-05872" title="BDU:2023-05872" />
			<reference href="https://bdu.fstec.ru/vul/2024-02534" type="self" id="BDU:2024-02534" title="BDU:2024-02534" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="salt" epoch="0" version="3006.6" release="1.el7" arch="noarch" src="">
					<filename>salt-0:3006.6-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240409-07</id>
		<issued date="2024-04-09" />
		<updated date="2024-04-09" />
		<title>Уязвимость shadow-utils </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в shadow-utils</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-shadow-utils-cve-2023-4641/</description>
               <solution>
                    Запретить использование в ОС пакета Shadow-utils
                или
                    Установить обновление для пакета(ов) Shadow-utils
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-shadow-utils-cve-2023-4641/" type="self" id="ROS-20240409-07" title="ROS-20240409-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4641" type="cve" id="CVE-2023-4641" title="CVE-2023-4641" />
			<reference href="https://bdu.fstec.ru/vul/2024-02776" type="self" id="BDU:2024-02776" title="BDU:2024-02776" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="shadow-utils" epoch="2" version="4.6" release="23.el7" arch="x86_64" src="">
					<filename>shadow-utils-2:4.6-23.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240409-08</id>
		<issued date="2024-04-09" />
		<updated date="2024-04-09" />
		<title>Уязвимость libtiff </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libtiff</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libtiff-cve-2023-6228/</description>
               <solution>
                    Запретить использование в ОС пакета libtiff
                или
                    Установить обновление для пакета(ов) libtiff
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libtiff-cve-2023-6228/" type="self" id="ROS-20240409-08" title="ROS-20240409-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6228" type="cve" id="CVE-2023-6228" title="CVE-2023-6228" />
			<reference href="https://bdu.fstec.ru/vul/2024-01277" type="self" id="BDU:2024-01277" title="BDU:2024-01277" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libtiff" epoch="0" version="4.5.1" release="6.el7" arch="x86_64" src="">
					<filename>libtiff-0:4.5.1-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240409-09</id>
		<issued date="2024-04-09" />
		<updated date="2024-04-09" />
		<title>Множественные уязвимости yasm </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в yasm</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-yasm-cve-2023-49554-cve-2023-49555-cve-2023-49556-cve-2023-49557-cve-2023/</description>
               <solution>
                    Запретить использование в ОС пакета yasm
                или
                    Установить обновление для пакета(ов) yasm
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-yasm-cve-2023-49554-cve-2023-49555-cve-2023-49556-cve-2023-49557-cve-2023/" type="self" id="ROS-20240409-09" title="ROS-20240409-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49554" type="cve" id="CVE-2023-49554" title="CVE-2023-49554" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49555" type="cve" id="CVE-2023-49555" title="CVE-2023-49555" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49556" type="cve" id="CVE-2023-49556" title="CVE-2023-49556" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49557" type="cve" id="CVE-2023-49557" title="CVE-2023-49557" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49558" type="cve" id="CVE-2023-49558" title="CVE-2023-49558" />
			<reference href="https://bdu.fstec.ru/vul/2024-02783" type="self" id="BDU:2024-02783" title="BDU:2024-02783" />
			<reference href="https://bdu.fstec.ru/vul/2024-02782" type="self" id="BDU:2024-02782" title="BDU:2024-02782" />
			<reference href="https://bdu.fstec.ru/vul/2024-02781" type="self" id="BDU:2024-02781" title="BDU:2024-02781" />
			<reference href="https://bdu.fstec.ru/vul/2024-02780" type="self" id="BDU:2024-02780" title="BDU:2024-02780" />
			<reference href="https://bdu.fstec.ru/vul/2024-02779" type="self" id="BDU:2024-02779" title="BDU:2024-02779" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="yasm" epoch="0" version="1.3.0" release="6.el7" arch="x86_64" src="">
					<filename>yasm-0:1.3.0-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240409-10</id>
		<issued date="2024-04-09" />
		<updated date="2024-04-09" />
		<title>Множественные уязвимости wireshark </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в wireshark</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-wireshark-cve-2024-0208-cve-2024-0209/</description>
               <solution>
                    Запретить использование в ОС пакета wireshark
                или
                    Установить обновление для пакета(ов) wireshark
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-wireshark-cve-2024-0208-cve-2024-0209/" type="self" id="ROS-20240409-10" title="ROS-20240409-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0208" type="cve" id="CVE-2024-0208" title="CVE-2024-0208" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0209" type="cve" id="CVE-2024-0209" title="CVE-2024-0209" />
			<reference href="https://bdu.fstec.ru/vul/2024-00164" type="self" id="BDU:2024-00164" title="BDU:2024-00164" />
			<reference href="https://bdu.fstec.ru/vul/2024-00215" type="self" id="BDU:2024-00215" title="BDU:2024-00215" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="wireshark" epoch="1" version="4.0.12" release="1.el7" arch="x86_64" src="">
					<filename>wireshark-1:4.0.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240409-11</id>
		<issued date="2024-04-09" />
		<updated date="2024-04-09" />
		<title>Множественные уязвимости mediawiki</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mediawiki</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mediawiki-090424/</description>
               <solution>
                    Запретить использование в ОС пакета mediawiki
                или
                    Установить обновление для пакета(ов) mediawiki
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mediawiki-090424/" type="self" id="ROS-20240409-11" title="ROS-20240409-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23179" type="cve" id="CVE-2024-23179" title="CVE-2024-23179" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23178" type="cve" id="CVE-2024-23178" title="CVE-2024-23178" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23177" type="cve" id="CVE-2024-23177" title="CVE-2024-23177" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23174" type="cve" id="CVE-2024-23174" title="CVE-2024-23174" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23173" type="cve" id="CVE-2024-23173" title="CVE-2024-23173" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23172" type="cve" id="CVE-2024-23172" title="CVE-2024-23172" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23171" type="cve" id="CVE-2024-23171" title="CVE-2024-23171" />
			<reference href="https://bdu.fstec.ru/vul/2024-02790" type="self" id="BDU:2024-02790" title="BDU:2024-02790" />
			<reference href="https://bdu.fstec.ru/vul/2024-02789" type="self" id="BDU:2024-02789" title="BDU:2024-02789" />
			<reference href="https://bdu.fstec.ru/vul/2024-02788" type="self" id="BDU:2024-02788" title="BDU:2024-02788" />
			<reference href="https://bdu.fstec.ru/vul/2024-02787" type="self" id="BDU:2024-02787" title="BDU:2024-02787" />
			<reference href="https://bdu.fstec.ru/vul/2024-02786" type="self" id="BDU:2024-02786" title="BDU:2024-02786" />
			<reference href="https://bdu.fstec.ru/vul/2024-02785" type="self" id="BDU:2024-02785" title="BDU:2024-02785" />
			<reference href="https://bdu.fstec.ru/vul/2024-02784" type="self" id="BDU:2024-02784" title="BDU:2024-02784" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mediawiki" epoch="0" version="1.40.2" release="1.el7" arch="noarch" src="">
					<filename>mediawiki-0:1.40.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240409-12</id>
		<issued date="2024-04-09" />
		<updated date="2024-04-09" />
		<title>Множественные уязвимости apache-kafka </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в apache-kafka</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-apache-kafka-cve-2023-36479-cve-2023-40167-cve-2022-37434/</description>
               <solution>
                    Запретить использование в ОС пакета apache-kafka
                или
                    Установить обновление для пакета(ов) apache-kafka
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-apache-kafka-cve-2023-36479-cve-2023-40167-cve-2022-37434/" type="self" id="ROS-20240409-12" title="ROS-20240409-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36479" type="cve" id="CVE-2023-36479" title="CVE-2023-36479" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40167" type="cve" id="CVE-2023-40167" title="CVE-2023-40167" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37434" type="cve" id="CVE-2022-37434" title="CVE-2022-37434" />
			<reference href="https://bdu.fstec.ru/vul/2024-05833" type="self" id="BDU:2024-05833" title="BDU:2024-05833" />
			<reference href="https://bdu.fstec.ru/vul/2024-02254" type="self" id="BDU:2024-02254" title="BDU:2024-02254" />
			<reference href="https://bdu.fstec.ru/vul/2022-05325" type="self" id="BDU:2022-05325" title="BDU:2022-05325" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="apache-kafka" epoch="0" version="3.6.1" release="1.el7" arch="x86_64" src="">
					<filename>apache-kafka-0:3.6.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240409-13</id>
		<issued date="2024-04-09" />
		<updated date="2024-04-09" />
		<title>Уязвимость python3-eventlet </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-eventlet</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-eventlet-cve-2023-5625/</description>
               <solution>
                    Запретить использование в ОС пакета python3-eventlet
                или
                    Установить обновление для пакета(ов) python3-eventlet
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-eventlet-cve-2023-5625/" type="self" id="ROS-20240409-13" title="ROS-20240409-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5625" type="cve" id="CVE-2023-5625" title="CVE-2023-5625" />
			<reference href="https://bdu.fstec.ru/vul/2023-08199" type="self" id="BDU:2023-08199" title="BDU:2023-08199" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-eventlet" epoch="0" version="0.33.0" release="2.el7" arch="noarch" src="">
					<filename>python3-eventlet-0:0.33.0-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240409-14</id>
		<issued date="2024-04-09" />
		<updated date="2024-04-09" />
		<title>Уязвимость pam </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в pam</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pam-cve-2024-22365/</description>
               <solution>
                    Запретить использование в ОС пакета pam
                или
                    Установить обновление для пакета(ов) pam
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pam-cve-2024-22365/" type="self" id="ROS-20240409-14" title="ROS-20240409-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22365" type="cve" id="CVE-2024-22365" title="CVE-2024-22365" />
			<reference href="https://bdu.fstec.ru/vul/2024-00829" type="self" id="BDU:2024-00829" title="BDU:2024-00829" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pam" epoch="0" version="1.4.0" release="9.el7" arch="x86_64" src="">
					<filename>pam-0:1.4.0-9.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240409-15</id>
		<issued date="2024-04-09" />
		<updated date="2024-04-09" />
		<title>Уязвимость gnutls </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gnutls</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gnutls-cve-2024-0567/</description>
               <solution>
                    Запретить использование в ОС пакета gnutls
                или
                    Установить обновление для пакета(ов) gnutls
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gnutls-cve-2024-0567/" type="self" id="ROS-20240409-15" title="ROS-20240409-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0567" type="cve" id="CVE-2024-0567" title="CVE-2024-0567" />
			<reference href="https://bdu.fstec.ru/vul/2024-00705" type="self" id="BDU:2024-00705" title="BDU:2024-00705" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gnutls" epoch="0" version="3.6.16" release="3.el7" arch="x86_64" src="">
					<filename>gnutls-0:3.6.16-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240409-16</id>
		<issued date="2024-04-09" />
		<updated date="2024-04-09" />
		<title>Уязвимость mariadb </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mariadb</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mariadb-cve-2022-47015/</description>
               <solution>
                    Запретить использование в ОС пакета mariadb
                или
                    Установить обновление для пакета(ов) mariadb
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mariadb-cve-2022-47015/" type="self" id="ROS-20240409-16" title="ROS-20240409-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47015" type="cve" id="CVE-2022-47015" title="CVE-2022-47015" />
			<reference href="https://bdu.fstec.ru/vul/2023-03856" type="self" id="BDU:2023-03856" title="BDU:2023-03856" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mariadb" epoch="3" version="10.11.6" release="1.el7" arch="x86_64" src="">
					<filename>mariadb-3:10.11.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240409-17</id>
		<issued date="2024-04-09" />
		<updated date="2024-04-09" />
		<title>Уязвимость coreutils </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в coreutils</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-coreutils-cve-2024-0684/</description>
               <solution>
                    Запретить использование в ОС пакета coreutils
                или
                    Установить обновление для пакета(ов) coreutils
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-coreutils-cve-2024-0684/" type="self" id="ROS-20240409-17" title="ROS-20240409-17" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0684" type="cve" id="CVE-2024-0684" title="CVE-2024-0684" />
			<reference href="https://bdu.fstec.ru/vul/2024-00722" type="self" id="BDU:2024-00722" title="BDU:2024-00722" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="coreutils" epoch="0" version="8.32" release="7.el7" arch="x86_64" src="">
					<filename>coreutils-0:8.32-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240410-01</id>
		<issued date="2024-04-10" />
		<updated date="2024-04-10" />
		<title>Уязвимость tomcat </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2023-34981/</description>
               <solution>
                    Запретить использование в ОС пакета tomcat
                или
                    Установить обновление для пакета(ов) tomcat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2023-34981/" type="self" id="ROS-20240410-01" title="ROS-20240410-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34981" type="cve" id="CVE-2023-34981" title="CVE-2023-34981" />
			<reference href="https://bdu.fstec.ru/vul/2023-04867" type="self" id="BDU:2023-04867" title="BDU:2023-04867" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat" epoch="1" version="9.0.83" release="1.el7" arch="noarch" src="">
					<filename>tomcat-1:9.0.83-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240410-02</id>
		<issued date="2024-04-10" />
		<updated date="2024-04-10" />
		<title>Множественные уязвимости nginx </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nginx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nginx-cve-2024-24989-cve-2024-24990/</description>
               <solution>
                    Запретить использование в ОС пакета nginx
                или
                    Установить обновление для пакета(ов) nginx
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nginx-cve-2024-24989-cve-2024-24990/" type="self" id="ROS-20240410-02" title="ROS-20240410-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24989" type="cve" id="CVE-2024-24989" title="CVE-2024-24989" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24990" type="cve" id="CVE-2024-24990" title="CVE-2024-24990" />
			<reference href="https://bdu.fstec.ru/vul/2024-01321" type="self" id="BDU:2024-01321" title="BDU:2024-01321" />
			<reference href="https://bdu.fstec.ru/vul/2024-01328" type="self" id="BDU:2024-01328" title="BDU:2024-01328" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nginx" epoch="1" version="1.25.4" release="1.el7.3" arch="x86_64" src="">
					<filename>nginx-1:1.25.4-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240410-03</id>
		<issued date="2024-04-10" />
		<updated date="2024-04-10" />
		<title>Уязвимость libvirt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libvirt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libvirt-cve-2021-4147/</description>
               <solution>
                    Запретить использование в ОС пакета libvirt
                или
                    Установить обновление для пакета(ов) libvirt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libvirt-cve-2021-4147/" type="self" id="ROS-20240410-03" title="ROS-20240410-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4147" type="cve" id="CVE-2021-4147" title="CVE-2021-4147" />
			<reference href="https://bdu.fstec.ru/vul/2022-05679" type="self" id="BDU:2022-05679" title="BDU:2022-05679" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libvirt" epoch="0" version="7.6.0" release="4.el7" arch="x86_64" src="">
					<filename>libvirt-0:7.6.0-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240410-04</id>
		<issued date="2024-04-10" />
		<updated date="2024-04-10" />
		<title>Множественные уязвимости с-ares </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в c-ares</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-s-ares-cve-2024-25629/</description>
               <solution>
                    Запретить использование в ОС пакета c-ares
                или
                    Установить обновление для пакета(ов) c-ares
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-s-ares-cve-2024-25629/" type="self" id="ROS-20240410-04" title="ROS-20240410-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25629" type="cve" id="CVE-2024-25629" title="CVE-2024-25629" />
			<reference href="https://bdu.fstec.ru/vul/2024-01708" type="self" id="BDU:2024-01708" title="BDU:2024-01708" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="c-ares" epoch="0" version="1.17.2" release="5.el7" arch="x86_64" src="">
					<filename>c-ares-0:1.17.2-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240410-05</id>
		<issued date="2024-04-10" />
		<updated date="2024-04-10" />
		<title>Уязвимость docker-ce </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в docker-ce</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-docker-ce-cve-2024-29018/</description>
               <solution>
                    Запретить использование в ОС пакета docker-ce
                или
                    Установить обновление для пакета(ов) docker-ce
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-docker-ce-cve-2024-29018/" type="self" id="ROS-20240410-05" title="ROS-20240410-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29018" type="cve" id="CVE-2024-29018" title="CVE-2024-29018" />
			<reference href="https://bdu.fstec.ru/vul/2024-02382" type="self" id="BDU:2024-02382" title="BDU:2024-02382" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="docker-ce" epoch="4" version="24.0.9" release="1.el7" arch="x86_64" src="">
					<filename>docker-ce-4:24.0.9-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240410-06</id>
		<issued date="2024-04-10" />
		<updated date="2024-04-10" />
		<title>Уязвимость sudo </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в sudo</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sudo-cve-2023-28486/</description>
               <solution>
                    Запретить использование в ОС пакета sudo
                или
                    Установить обновление для пакета(ов) sudo
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sudo-cve-2023-28486/" type="self" id="ROS-20240410-06" title="ROS-20240410-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28486" type="cve" id="CVE-2023-28486" title="CVE-2023-28486" />
			<reference href="https://bdu.fstec.ru/vul/2023-03866" type="self" id="BDU:2023-03866" title="BDU:2023-03866" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="sudo" epoch="0" version="1.9.15p1" release="1.el7" arch="x86_64" src="">
					<filename>sudo-0:1.9.15p1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240410-07</id>
		<issued date="2024-04-10" />
		<updated date="2024-04-10" />
		<title>Уязвимость buildah </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в buildah</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-buildah-cve-2024-1753/</description>
               <solution>
                    Запретить использование в ОС пакета buildah
                или
                    Установить обновление для пакета(ов) buildah
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-buildah-cve-2024-1753/" type="self" id="ROS-20240410-07" title="ROS-20240410-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1753" type="cve" id="CVE-2024-1753" title="CVE-2024-1753" />
			<reference href="https://bdu.fstec.ru/vul/2024-02163" type="self" id="BDU:2024-02163" title="BDU:2024-02163" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="buildah" epoch="0" version="1.35.1" release="1.el7" arch="x86_64" src="">
					<filename>buildah-0:1.35.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240410-08</id>
		<issued date="2024-04-10" />
		<updated date="2024-04-10" />
		<title>Уязвимость binutils </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в binutils</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-binutils-cve-2022-47695/</description>
               <solution>
                    Запретить использование в ОС пакета binutils
                или
                    Установить обновление для пакета(ов) binutils
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-binutils-cve-2022-47695/" type="self" id="ROS-20240410-08" title="ROS-20240410-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47695" type="cve" id="CVE-2022-47695" title="CVE-2022-47695" />
			<reference href="https://bdu.fstec.ru/vul/2023-05798" type="self" id="BDU:2023-05798" title="BDU:2023-05798" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="binutils" epoch="0" version="2.40" release="9.el7" arch="x86_64" src="">
					<filename>binutils-0:2.40-9.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240410-09</id>
		<issued date="2024-04-10" />
		<updated date="2024-04-10" />
		<title>Множественные уязвимости python3-unbound </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-unbound</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-unbound-cve-2023-50868-cve-2023-50387/</description>
               <solution>
                    Запретить использование в ОС пакета python3-unbound
                или
                    Установить обновление для пакета(ов) python3-unbound
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-unbound-cve-2023-50868-cve-2023-50387/" type="self" id="ROS-20240410-09" title="ROS-20240410-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868" type="cve" id="CVE-2023-50868" title="CVE-2023-50868" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387" type="cve" id="CVE-2023-50387" title="CVE-2023-50387" />
			<reference href="https://bdu.fstec.ru/vul/2024-01462" type="self" id="BDU:2024-01462" title="BDU:2024-01462" />
			<reference href="https://bdu.fstec.ru/vul/2024-01359" type="self" id="BDU:2024-01359" title="BDU:2024-01359" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-unbound" epoch="0" version="1.19.2" release="1.el7" arch="x86_64" src="">
					<filename>python3-unbound-0:1.19.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240410-24</id>
		<issued date="2024-04-10" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости pdns-recursor </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в pdns-recursor</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-pdns-recursor-cve-2023-50868-cve-2023-503872620/</description>
               <solution>
                    Запретить использование в ОС пакета pdns-recursor
                или
                    Установить обновление для пакета(ов) pdns-recursor
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-pdns-recursor-cve-2023-50868-cve-2023-503872620/" type="self" id="ROS-20240410-24" title="ROS-20240410-24" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868" type="cve" id="CVE-2023-50868" title="CVE-2023-50868" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387" type="cve" id="CVE-2023-50387" title="CVE-2023-50387" />
			<reference href="https://bdu.fstec.ru/vul/2024-01462" type="self" id="BDU:2024-01462" title="BDU:2024-01462" />
			<reference href="https://bdu.fstec.ru/vul/2024-01359" type="self" id="BDU:2024-01359" title="BDU:2024-01359" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pdns-recursor" epoch="0" version="4.8.6" release="1.el7" arch="x86_64" src="">
					<filename>pdns-recursor-0:4.8.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240410-10</id>
		<issued date="2024-04-10" />
		<updated date="2024-04-10" />
		<title>Уязвимость rust-vmm-sys-util </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в rust-vmm-sys-util-devel</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rust-vmm-sys-util-cve-2023-50711/</description>
               <solution>
                    Запретить использование в ОС пакета rust-vmm-sys-util-devel
                или
                    Установить обновление для пакета(ов) rust-vmm-sys-util-devel
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rust-vmm-sys-util-cve-2023-50711/" type="self" id="ROS-20240410-10" title="ROS-20240410-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50711" type="cve" id="CVE-2023-50711" title="CVE-2023-50711" />
			<reference href="https://bdu.fstec.ru/vul/2024-02842" type="self" id="BDU:2024-02842" title="BDU:2024-02842" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rust-vmm-sys-util-devel" epoch="0" version="0.12.1" release="1.el7" arch="noarch" src="">
					<filename>rust-vmm-sys-util-devel-0:0.12.1-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240410-11</id>
		<issued date="2024-04-10" />
		<updated date="2024-04-10" />
		<title>Уязвимость grub2 </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в grub2-common</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grub2-cve-2024-1048/</description>
               <solution>
                    Запретить использование в ОС пакета grub2
                или
                    Установить обновление для пакета(ов) grub2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grub2-cve-2024-1048/" type="self" id="ROS-20240410-11" title="ROS-20240410-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1048" type="cve" id="CVE-2024-1048" title="CVE-2024-1048" />
			<reference href="https://bdu.fstec.ru/vul/2024-01386" type="self" id="BDU:2024-01386" title="BDU:2024-01386" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="grub2-common" epoch="1" version="2.06" release="63.el7.3" arch="noarch" src="">
					<filename>grub2-common-1:2.06-63.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240410-12</id>
		<issued date="2024-04-10" />
		<updated date="2024-04-10" />
		<title>Уязвимость python3-pysaml2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-pysaml2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-pysaml2-cve-2021-21238/</description>
               <solution>
                    Запретить использование в ОС пакета python3-pysaml2
                или
                    Установить обновление для пакета(ов) python3-pysaml2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-pysaml2-cve-2021-21238/" type="self" id="ROS-20240410-12" title="ROS-20240410-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21238" type="cve" id="CVE-2021-21238" title="CVE-2021-21238" />
			<reference href="https://bdu.fstec.ru/vul/2024-02841" type="self" id="BDU:2024-02841" title="BDU:2024-02841" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-pysaml2" epoch="0" version="7.0.1" release="1.el7" arch="noarch" src="">
					<filename>python3-pysaml2-0:7.0.1-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240410-13</id>
		<issued date="2024-04-10" />
		<updated date="2024-04-10" />
		<title>Множественные уязвимости libgit2 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в libgit2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libgit2-cve-2024-24575-cve-2024-24577/</description>
               <solution>
                    Запретить использование в ОС пакета libgit2
                или
                    Установить обновление для пакета(ов) libgit2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libgit2-cve-2024-24575-cve-2024-24577/" type="self" id="ROS-20240410-13" title="ROS-20240410-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24575" type="cve" id="CVE-2024-24575" title="CVE-2024-24575" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24577" type="cve" id="CVE-2024-24577" title="CVE-2024-24577" />
			<reference href="https://bdu.fstec.ru/vul/2024-01378" type="self" id="BDU:2024-01378" title="BDU:2024-01378" />
			<reference href="https://bdu.fstec.ru/vul/2024-01377" type="self" id="BDU:2024-01377" title="BDU:2024-01377" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libgit2" epoch="0" version="1.7.2" release="1.el7" arch="x86_64" src="">
					<filename>libgit2-0:1.7.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240410-14</id>
		<issued date="2024-04-10" />
		<updated date="2024-04-10" />
		<title>Уязвимость python3-django </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-django</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-django-cve-2024-24680/</description>
               <solution>
                    Запретить использование в ОС пакета python3-django
                или
                    Установить обновление для пакета(ов) python3-django
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-django-cve-2024-24680/" type="self" id="ROS-20240410-14" title="ROS-20240410-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24680" type="cve" id="CVE-2024-24680" title="CVE-2024-24680" />
			<reference href="https://bdu.fstec.ru/vul/2024-01517" type="self" id="BDU:2024-01517" title="BDU:2024-01517" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-django" epoch="0" version="3.2.24" release="1.el7" arch="noarch" src="">
					<filename>python3-django-0:3.2.24-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240410-15</id>
		<issued date="2024-04-10" />
		<updated date="2024-04-10" />
		<title>Уязвимость VIM </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в vim-X11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-cve-2024-22667/</description>
               <solution>
                    Запретить использование в ОС пакета vim
                или
                    Установить обновление для пакета(ов) vim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-cve-2024-22667/" type="self" id="ROS-20240410-15" title="ROS-20240410-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22667" type="cve" id="CVE-2024-22667" title="CVE-2024-22667" />
			<reference href="https://bdu.fstec.ru/vul/2024-02840" type="self" id="BDU:2024-02840" title="BDU:2024-02840" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-X11" epoch="2" version="9.1.016" release="1.el7.3" arch="x86_64" src="">
					<filename>vim-X11-2:9.1.016-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240410-16</id>
		<issued date="2024-04-10" />
		<updated date="2024-04-10" />
		<title>Уязвимость libxml2 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libxml2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libxml2-cve-2024-25062/</description>
               <solution>
                    Запретить использование в ОС пакета libxml2
                или
                    Установить обновление для пакета(ов) libxml2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libxml2-cve-2024-25062/" type="self" id="ROS-20240410-16" title="ROS-20240410-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25062" type="cve" id="CVE-2024-25062" title="CVE-2024-25062" />
			<reference href="https://bdu.fstec.ru/vul/2024-01415" type="self" id="BDU:2024-01415" title="BDU:2024-01415" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libxml2" epoch="0" version="2.9.8" release="15.el7.3" arch="x86_64" src="">
					<filename>libxml2-0:2.9.8-15.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240410-17</id>
		<issued date="2024-04-10" />
		<updated date="2024-04-10" />
		<title>Уязвимость docker-ce </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в docker-ce</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-docker-ce-cve-2024-24557/</description>
               <solution>
                    Запретить использование в ОС пакета docker-ce
                или
                    Установить обновление для пакета(ов) docker-ce
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-docker-ce-cve-2024-24557/" type="self" id="ROS-20240410-17" title="ROS-20240410-17" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24557" type="cve" id="CVE-2024-24557" title="CVE-2024-24557" />
			<reference href="https://bdu.fstec.ru/vul/2024-01020" type="self" id="BDU:2024-01020" title="BDU:2024-01020" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="docker-ce" epoch="4" version="24.0.9" release="1.el7" arch="x86_64" src="">
					<filename>docker-ce-4:24.0.9-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240410-18</id>
		<issued date="2024-04-10" />
		<updated date="2024-04-10" />
		<title>Уязвимость runc </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в runc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-runc-cve-2024-21626/</description>
               <solution>
                    Запретить использование в ОС пакета runc
                или
                    Установить обновление для пакета(ов) runc
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-runc-cve-2024-21626/" type="self" id="ROS-20240410-18" title="ROS-20240410-18" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21626" type="cve" id="CVE-2024-21626" title="CVE-2024-21626" />
			<reference href="https://bdu.fstec.ru/vul/2024-00973" type="self" id="BDU:2024-00973" title="BDU:2024-00973" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="runc" epoch="2" version="1.1.8" release="2.el7" arch="x86_64" src="">
					<filename>runc-2:1.1.8-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240410-19</id>
		<issued date="2024-04-10" />
		<updated date="2024-04-10" />
		<title>Уязвимость minio </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в minio</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-minio-cve-2024-24747/</description>
               <solution>
                    Запретить использование в ОС пакета minio
                или
                    Установить обновление для пакета(ов) minio
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-minio-cve-2024-24747/" type="self" id="ROS-20240410-19" title="ROS-20240410-19" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24747" type="cve" id="CVE-2024-24747" title="CVE-2024-24747" />
			<reference href="https://bdu.fstec.ru/vul/2024-01131" type="self" id="BDU:2024-01131" title="BDU:2024-01131" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="minio" epoch="0" version="20230210T184839Z" release="4.el7" arch="x86_64" src="">
					<filename>minio-0:20230210T184839Z-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240410-20</id>
		<issued date="2024-04-10" />
		<updated date="2024-04-10" />
		<title>Уязвимость python3-certifi </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-certifi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-certifi-cve-2023-37920/</description>
               <solution>
                    Запретить использование в ОС пакета python3-certifi
                или
                    Установить обновление для пакета(ов) python3-certifi
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-certifi-cve-2023-37920/" type="self" id="ROS-20240410-20" title="ROS-20240410-20" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37920" type="cve" id="CVE-2023-37920" title="CVE-2023-37920" />
			<reference href="https://bdu.fstec.ru/vul/2023-05463" type="self" id="BDU:2023-05463" title="BDU:2023-05463" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-certifi" epoch="0" version="2024.02.02" release="2.el7" arch="noarch" src="">
					<filename>python3-certifi-0:2024.02.02-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240410-25</id>
		<issued date="2024-04-10" />
		<updated date="2024-12-23" />
		<title>Уязвимость ca-certificates </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ca-certificates</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-certifi-cve-2023-379207127/</description>
               <solution>
                    Запретить использование в ОС пакета ca-certificates
                или
                    Установить обновление для пакета(ов) ca-certificates
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-certifi-cve-2023-379207127/" type="self" id="ROS-20240410-25" title="ROS-20240410-25" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37920" type="cve" id="CVE-2023-37920" title="CVE-2023-37920" />
			<reference href="https://bdu.fstec.ru/vul/2023-05463" type="self" id="BDU:2023-05463" title="BDU:2023-05463" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ca-certificates" epoch="0" version="2021.2.50" release="5.el7" arch="noarch" src="">
					<filename>ca-certificates-0:2021.2.50-5.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240410-21</id>
		<issued date="2024-04-10" />
		<updated date="2024-04-10" />
		<title>Множественные уязвимости rpm </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в rpm</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rpm-cve-2021-3521-cve-2021-35937-cve-2021-35938-cve-2021-35939/</description>
               <solution>
                    Запретить использование в ОС пакета rpm
                или
                    Установить обновление для пакета(ов) rpm
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rpm-cve-2021-3521-cve-2021-35937-cve-2021-35938-cve-2021-35939/" type="self" id="ROS-20240410-21" title="ROS-20240410-21" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3521" type="cve" id="CVE-2021-3521" title="CVE-2021-3521" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35937" type="cve" id="CVE-2021-35937" title="CVE-2021-35937" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35938" type="cve" id="CVE-2021-35938" title="CVE-2021-35938" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35939" type="cve" id="CVE-2021-35939" title="CVE-2021-35939" />
			<reference href="https://bdu.fstec.ru/vul/2024-04926" type="self" id="BDU:2024-04926" title="BDU:2024-04926" />
			<reference href="https://bdu.fstec.ru/vul/2021-03555" type="self" id="BDU:2021-03555" title="BDU:2021-03555" />
			<reference href="https://bdu.fstec.ru/vul/2021-03569" type="self" id="BDU:2021-03569" title="BDU:2021-03569" />
			<reference href="https://bdu.fstec.ru/vul/2021-03558" type="self" id="BDU:2021-03558" title="BDU:2021-03558" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rpm" epoch="0" version="4.18.2" release="1.el7.3" arch="x86_64" src="">
					<filename>rpm-0:4.18.2-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240410-22</id>
		<issued date="2024-04-10" />
		<updated date="2024-04-10" />
		<title>Уязвимость python3-templated-dictionary </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в python3-templated-dictionary</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-templated-dictionary-cve-2023-6395/</description>
               <solution>
                    Запретить использование в ОС пакета python3-templated-dictionary
                или
                    Установить обновление для пакета(ов) python3-templated-dictionary
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-templated-dictionary-cve-2023-6395/" type="self" id="ROS-20240410-22" title="ROS-20240410-22" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6395" type="cve" id="CVE-2023-6395" title="CVE-2023-6395" />
			<reference href="https://bdu.fstec.ru/vul/2024-00736" type="self" id="BDU:2024-00736" title="BDU:2024-00736" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-templated-dictionary" epoch="0" version="1.4" release="1.el7" arch="noarch" src="">
					<filename>python3-templated-dictionary-0:1.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240410-23</id>
		<issued date="2024-04-10" />
		<updated date="2024-04-10" />
		<title>Уязвимость opencryptoki </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в opencryptoki</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opencryptoki-cve-2024-0914/</description>
               <solution>
                    Запретить использование в ОС пакета opencryptoki
                или
                    Установить обновление для пакета(ов) opencryptoki
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opencryptoki-cve-2024-0914/" type="self" id="ROS-20240410-23" title="ROS-20240410-23" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0914" type="cve" id="CVE-2024-0914" title="CVE-2024-0914" />
			<reference href="https://bdu.fstec.ru/vul/2024-02839" type="self" id="BDU:2024-02839" title="BDU:2024-02839" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="opencryptoki" epoch="0" version="3.22.0" release="1.el7" arch="x86_64" src="">
					<filename>opencryptoki-0:3.22.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240411-01</id>
		<issued date="2024-04-11" />
		<updated date="2024-04-11" />
		<title>Уязвимость subversion </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в subversion</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-subversion-cve-2020-17525/</description>
               <solution>
                    Запретить использование в ОС пакета subversion
                или
                    Установить обновление для пакета(ов) subversion
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-subversion-cve-2020-17525/" type="self" id="ROS-20240411-01" title="ROS-20240411-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17525" type="cve" id="CVE-2020-17525" title="CVE-2020-17525" />
			<reference href="https://bdu.fstec.ru/vul/2022-00306" type="self" id="BDU:2022-00306" title="BDU:2022-00306" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="subversion" epoch="0" version="1.14.2" release="1.el7" arch="x86_64" src="">
					<filename>subversion-0:1.14.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240411-02</id>
		<issued date="2024-04-11" />
		<updated date="2024-04-11" />
		<title>Уязвимость etcd </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в etcd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-etcd-cve-2021-28235/</description>
               <solution>
                    Запретить использование в ОС пакета etcd
                или
                    Установить обновление для пакета(ов) etcd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-etcd-cve-2021-28235/" type="self" id="ROS-20240411-02" title="ROS-20240411-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28235" type="cve" id="CVE-2021-28235" title="CVE-2021-28235" />
			<reference href="https://bdu.fstec.ru/vul/2024-02894" type="self" id="BDU:2024-02894" title="BDU:2024-02894" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="etcd" epoch="0" version="3.5.12" release="4.el7" arch="x86_64" src="">
					<filename>etcd-0:3.5.12-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240411-03</id>
		<issued date="2024-04-11" />
		<updated date="2024-04-11" />
		<title>Уязвимость libmongocrypt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libmongocrypt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libmongocrypt-cve-2023-0437/</description>
               <solution>
                    Запретить использование в ОС пакета libmongocrypt
                или
                    Установить обновление для пакета(ов) libmongocrypt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libmongocrypt-cve-2023-0437/" type="self" id="ROS-20240411-03" title="ROS-20240411-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0437" type="cve" id="CVE-2023-0437" title="CVE-2023-0437" />
			<reference href="https://bdu.fstec.ru/vul/2024-02893" type="self" id="BDU:2024-02893" title="BDU:2024-02893" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libmongocrypt" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="">
					<filename>libmongocrypt-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240411-09</id>
		<issued date="2024-04-11" />
		<updated date="2024-12-23" />
		<title>Уязвимость python3-sphinxcontrib-serializinghtml </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-sphinxcontrib-serializinghtml</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-sphinxcontrib-cve-2023-04372124/</description>
               <solution>
                    Запретить использование в ОС пакета python3-sphinxcontrib-serializinghtml
                или
                    Установить обновление для пакета(ов) python3-sphinxcontrib-serializinghtml
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-sphinxcontrib-cve-2023-04372124/" type="self" id="ROS-20240411-09" title="ROS-20240411-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0437" type="cve" id="CVE-2023-0437" title="CVE-2023-0437" />
			<reference href="https://bdu.fstec.ru/vul/2024-02893" type="self" id="BDU:2024-02893" title="BDU:2024-02893" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-sphinxcontrib-serializinghtml" epoch="0" version="1.1.5" release="1.el7" arch="noarch" src="">
					<filename>python3-sphinxcontrib-serializinghtml-0:1.1.5-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240411-10</id>
		<issued date="2024-04-11" />
		<updated date="2024-12-23" />
		<title>Уязвимость python3-sphinxcontrib-htmlhelp </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-sphinxcontrib-htmlhelp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-sphinxcontrib-htmlhelp-cve-2023-043721245780/</description>
               <solution>
                    Запретить использование в ОС пакета python3-sphinxcontrib-htmlhelp
                или
                    Установить обновление для пакета(ов) python3-sphinxcontrib-htmlhelp
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-sphinxcontrib-htmlhelp-cve-2023-043721245780/" type="self" id="ROS-20240411-10" title="ROS-20240411-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0437" type="cve" id="CVE-2023-0437" title="CVE-2023-0437" />
			<reference href="https://bdu.fstec.ru/vul/2024-02893" type="self" id="BDU:2024-02893" title="BDU:2024-02893" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-sphinxcontrib-htmlhelp" epoch="0" version="2.0.0" release="1.el7" arch="noarch" src="">
					<filename>python3-sphinxcontrib-htmlhelp-0:2.0.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240411-11</id>
		<issued date="2024-04-11" />
		<updated date="2024-12-23" />
		<title>Уязвимость python3-sphinx </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-sphinx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-sphinx-cve-2023-0437212457808066/</description>
               <solution>
                    Запретить использование в ОС пакета python3-sphinx
                или
                    Установить обновление для пакета(ов) python3-sphinx
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-sphinx-cve-2023-0437212457808066/" type="self" id="ROS-20240411-11" title="ROS-20240411-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0437" type="cve" id="CVE-2023-0437" title="CVE-2023-0437" />
			<reference href="https://bdu.fstec.ru/vul/2024-02893" type="self" id="BDU:2024-02893" title="BDU:2024-02893" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-sphinx" epoch="1" version="5.0.2" release="2.el7" arch="noarch" src="">
					<filename>python3-sphinx-1:5.0.2-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240411-12</id>
		<issued date="2024-04-11" />
		<updated date="2024-12-23" />
		<title>Уязвимость mongo-c-driver </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в mongo-c-driver</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongo-c-driver-cve-2023-04372124578080662258/</description>
               <solution>
                    Запретить использование в ОС пакета mongo-c-driver
                или
                    Установить обновление для пакета(ов) mongo-c-driver
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongo-c-driver-cve-2023-04372124578080662258/" type="self" id="ROS-20240411-12" title="ROS-20240411-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0437" type="cve" id="CVE-2023-0437" title="CVE-2023-0437" />
			<reference href="https://bdu.fstec.ru/vul/2024-02893" type="self" id="BDU:2024-02893" title="BDU:2024-02893" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mongo-c-driver" epoch="0" version="1.26.0" release="1.el7" arch="x86_64" src="">
					<filename>mongo-c-driver-0:1.26.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240411-04</id>
		<issued date="2024-04-11" />
		<updated date="2024-04-11" />
		<title>Уязвимость sqlite </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в sqlite</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sqlite-cve-2023-7104/</description>
               <solution>
                    Запретить использование в ОС пакета sqlite
                или
                    Установить обновление для пакета(ов) sqlite
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sqlite-cve-2023-7104/" type="self" id="ROS-20240411-04" title="ROS-20240411-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7104" type="cve" id="CVE-2023-7104" title="CVE-2023-7104" />
			<reference href="https://bdu.fstec.ru/vul/2024-00480" type="self" id="BDU:2024-00480" title="BDU:2024-00480" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="sqlite" epoch="0" version="3.35.3" release="4.el7" arch="x86_64" src="">
					<filename>sqlite-0:3.35.3-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240411-05</id>
		<issued date="2024-04-11" />
		<updated date="2024-04-11" />
		<title>Уязвимость python3-pillow </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-pillow</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-pillow-cve-2023-50447/</description>
               <solution>
                    Запретить использование в ОС пакета python3-pillow
                или
                    Установить обновление для пакета(ов) python3-pillow
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-pillow-cve-2023-50447/" type="self" id="ROS-20240411-05" title="ROS-20240411-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50447" type="cve" id="CVE-2023-50447" title="CVE-2023-50447" />
			<reference href="https://bdu.fstec.ru/vul/2024-00775" type="self" id="BDU:2024-00775" title="BDU:2024-00775" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-pillow" epoch="0" version="9.4.0" release="3.el7" arch="x86_64" src="">
					<filename>python3-pillow-0:9.4.0-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240411-06</id>
		<issued date="2024-04-11" />
		<updated date="2024-04-11" />
		<title>Уязвимость openvswitch </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в openvswitch</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openvswitch-cve-2024-22563/</description>
               <solution>
                    Запретить использование в ОС пакета openvswitch
                или
                    Установить обновление для пакета(ов) openvswitch
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openvswitch-cve-2024-22563/" type="self" id="ROS-20240411-06" title="ROS-20240411-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22563" type="cve" id="CVE-2024-22563" title="CVE-2024-22563" />
			<reference href="https://bdu.fstec.ru/vul/2024-02908" type="self" id="BDU:2024-02908" title="BDU:2024-02908" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openvswitch" epoch="1" version="2.16.0" release="4.el7" arch="x86_64" src="">
					<filename>openvswitch-1:2.16.0-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240411-07</id>
		<issued date="2024-04-11" />
		<updated date="2024-04-11" />
		<title>Множественные уязвимости shim </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в shim-x64</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-shim-11-04-24/</description>
               <solution>
                    Запретить использование в ОС пакета shim
                или
                    Установить обновление для пакета(ов) shim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-shim-11-04-24/" type="self" id="ROS-20240411-07" title="ROS-20240411-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40546" type="cve" id="CVE-2023-40546" title="CVE-2023-40546" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40547" type="cve" id="CVE-2023-40547" title="CVE-2023-40547" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40548" type="cve" id="CVE-2023-40548" title="CVE-2023-40548" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40549" type="cve" id="CVE-2023-40549" title="CVE-2023-40549" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40550" type="cve" id="CVE-2023-40550" title="CVE-2023-40550" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40551" type="cve" id="CVE-2023-40551" title="CVE-2023-40551" />
			<reference href="https://bdu.fstec.ru/vul/2024-02895" type="self" id="BDU:2024-02895" title="BDU:2024-02895" />
			<reference href="https://bdu.fstec.ru/vul/2024-00725" type="self" id="BDU:2024-00725" title="BDU:2024-00725" />
			<reference href="https://bdu.fstec.ru/vul/2024-02896" type="self" id="BDU:2024-02896" title="BDU:2024-02896" />
			<reference href="https://bdu.fstec.ru/vul/2024-02897" type="self" id="BDU:2024-02897" title="BDU:2024-02897" />
			<reference href="https://bdu.fstec.ru/vul/2024-02898" type="self" id="BDU:2024-02898" title="BDU:2024-02898" />
			<reference href="https://bdu.fstec.ru/vul/2024-02899" type="self" id="BDU:2024-02899" title="BDU:2024-02899" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="shim-x64" epoch="0" version="15.8" release="1.3" arch="x86_64" src="">
					<filename>shim-x64-0:15.8-1.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240411-08</id>
		<issued date="2024-04-11" />
		<updated date="2024-10-16" />
		<title>Множественные уязвимости jenkins</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в jenkins</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-jenkins-11-04-24/</description>
               <solution>
                    Запретить использование в ОС пакета jenkins
                или
                    Установить обновление для пакета(ов) jenkins
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-jenkins-11-04-24/" type="self" id="ROS-20240411-08" title="ROS-20240411-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23899" type="cve" id="CVE-2024-23899" title="CVE-2024-23899" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23900" type="cve" id="CVE-2024-23900" title="CVE-2024-23900" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23901" type="cve" id="CVE-2024-23901" title="CVE-2024-23901" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23902" type="cve" id="CVE-2024-23902" title="CVE-2024-23902" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23903" type="cve" id="CVE-2024-23903" title="CVE-2024-23903" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23904" type="cve" id="CVE-2024-23904" title="CVE-2024-23904" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23905" type="cve" id="CVE-2024-23905" title="CVE-2024-23905" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23898" type="cve" id="CVE-2024-23898" title="CVE-2024-23898" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23897" type="cve" id="CVE-2024-23897" title="CVE-2024-23897" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43498" type="cve" id="CVE-2023-43498" title="CVE-2023-43498" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43497" type="cve" id="CVE-2023-43497" title="CVE-2023-43497" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43496" type="cve" id="CVE-2023-43496" title="CVE-2023-43496" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43495" type="cve" id="CVE-2023-43495" title="CVE-2023-43495" />
			<reference href="https://bdu.fstec.ru/vul/2024-00899" type="self" id="BDU:2024-00899" title="BDU:2024-00899" />
			<reference href="https://bdu.fstec.ru/vul/2024-02889" type="self" id="BDU:2024-02889" title="BDU:2024-02889" />
			<reference href="https://bdu.fstec.ru/vul/2024-00897" type="self" id="BDU:2024-00897" title="BDU:2024-00897" />
			<reference href="https://bdu.fstec.ru/vul/2024-00894" type="self" id="BDU:2024-00894" title="BDU:2024-00894" />
			<reference href="https://bdu.fstec.ru/vul/2024-00900" type="self" id="BDU:2024-00900" title="BDU:2024-00900" />
			<reference href="https://bdu.fstec.ru/vul/2024-02890" type="self" id="BDU:2024-02890" title="BDU:2024-02890" />
			<reference href="https://bdu.fstec.ru/vul/2024-02891" type="self" id="BDU:2024-02891" title="BDU:2024-02891" />
			<reference href="https://bdu.fstec.ru/vul/2024-00751" type="self" id="BDU:2024-00751" title="BDU:2024-00751" />
			<reference href="https://bdu.fstec.ru/vul/2024-00750" type="self" id="BDU:2024-00750" title="BDU:2024-00750" />
			<reference href="https://bdu.fstec.ru/vul/2024-02892" type="self" id="BDU:2024-02892" title="BDU:2024-02892" />
			<reference href="https://bdu.fstec.ru/vul/2024-02901" type="self" id="BDU:2024-02901" title="BDU:2024-02901" />
			<reference href="https://bdu.fstec.ru/vul/2023-06018" type="self" id="BDU:2023-06018" title="BDU:2023-06018" />
			<reference href="https://bdu.fstec.ru/vul/2024-02900" type="self" id="BDU:2024-02900" title="BDU:2024-02900" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jenkins" epoch="0" version="2.426.3" release="1.el7" arch="noarch" src="">
					<filename>jenkins-0:2.426.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240412-01</id>
		<issued date="2024-04-12" />
		<updated date="2024-04-12" />
		<title>Множественные уязвимости memcached </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в memcached</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-memcached-cve-2021-37519-cve-2023-46853-cve-2023-46852/</description>
               <solution>
                    Запретить использование в ОС пакета memcached
                или
                    Установить обновление для пакета(ов) memcached
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-memcached-cve-2021-37519-cve-2023-46853-cve-2023-46852/" type="self" id="ROS-20240412-01" title="ROS-20240412-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37519" type="cve" id="CVE-2021-37519" title="CVE-2021-37519" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46853" type="cve" id="CVE-2023-46853" title="CVE-2023-46853" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46852" type="cve" id="CVE-2023-46852" title="CVE-2023-46852" />
			<reference href="https://bdu.fstec.ru/vul/2023-02665" type="self" id="BDU:2023-02665" title="BDU:2023-02665" />
			<reference href="https://bdu.fstec.ru/vul/2023-08093" type="self" id="BDU:2023-08093" title="BDU:2023-08093" />
			<reference href="https://bdu.fstec.ru/vul/2023-08094" type="self" id="BDU:2023-08094" title="BDU:2023-08094" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="memcached" epoch="0" version="1.6.23" release="1.el7" arch="x86_64" src="">
					<filename>memcached-0:1.6.23-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240412-02</id>
		<issued date="2024-04-12" />
		<updated date="2024-04-12" />
		<title>Уязвимость golang-x-crypto-devel </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang-x-crypto-devel</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-x-crypto-devel-cve-2023-48795/</description>
               <solution>
                    Запретить использование в ОС пакета golang-x-crypto-devel
                или
                    Установить обновление для пакета(ов) golang-x-crypto-devel
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-x-crypto-devel-cve-2023-48795/" type="self" id="ROS-20240412-02" title="ROS-20240412-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48795" type="cve" id="CVE-2023-48795" title="CVE-2023-48795" />
			<reference href="https://bdu.fstec.ru/vul/2023-08853" type="self" id="BDU:2023-08853" title="BDU:2023-08853" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang-x-crypto-devel" epoch="0" version="0.17.0" release="1.el7" arch="noarch" src="">
					<filename>golang-x-crypto-devel-0:0.17.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240412-03</id>
		<issued date="2024-04-12" />
		<updated date="2024-04-12" />
		<title>Уязвимость atril </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в atril</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-atril-cve-2023-52076/</description>
               <solution>
                    Запретить использование в ОС пакета atril
                или
                    Установить обновление для пакета(ов) atril
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-atril-cve-2023-52076/" type="self" id="ROS-20240412-03" title="ROS-20240412-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52076" type="cve" id="CVE-2023-52076" title="CVE-2023-52076" />
			<reference href="https://bdu.fstec.ru/vul/2024-05041" type="self" id="BDU:2024-05041" title="BDU:2024-05041" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="atril" epoch="1" version="1.26.0" release="13.el7" arch="x86_64" src="">
					<filename>atril-1:1.26.0-13.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240412-04</id>
		<issued date="2024-04-12" />
		<updated date="2024-04-12" />
		<title>Множественные уязвимости salt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в salt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-salt-cve-2023-34049-cve-2023-43804-cve-2023-41040/</description>
               <solution>
                    Запретить использование в ОС пакета Salt
                или
                    Установить обновление для пакета(ов) Salt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-salt-cve-2023-34049-cve-2023-43804-cve-2023-41040/" type="self" id="ROS-20240412-04" title="ROS-20240412-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34049" type="cve" id="CVE-2023-34049" title="CVE-2023-34049" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43804" type="cve" id="CVE-2023-43804" title="CVE-2023-43804" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41040" type="cve" id="CVE-2023-41040" title="CVE-2023-41040" />
			<reference href="https://bdu.fstec.ru/vul/2023-08730" type="self" id="BDU:2023-08730" title="BDU:2023-08730" />
			<reference href="https://bdu.fstec.ru/vul/2023-05476" type="self" id="BDU:2023-05476" title="BDU:2023-05476" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="salt" epoch="0" version="3006.6" release="1.el7" arch="noarch" src="">
					<filename>salt-0:3006.6-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240412-05</id>
		<issued date="2024-04-12" />
		<updated date="2024-04-12" />
		<title>Уязвимость gpac </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gpac</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gpac-cve-2024-22749/</description>
               <solution>
                    Запретить использование в ОС пакета gpac
                или
                    Установить обновление для пакета(ов) gpac
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gpac-cve-2024-22749/" type="self" id="ROS-20240412-05" title="ROS-20240412-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22749" type="cve" id="CVE-2024-22749" title="CVE-2024-22749" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gpac" epoch="0" version="2.3.0" release="2.20240126gitf30e0d1.el7" arch="x86_64" src="">
					<filename>gpac-0:2.3.0-2.20240126gitf30e0d1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240412-06</id>
		<issued date="2024-04-12" />
		<updated date="2024-04-12" />
		<title>Множественные уязвимости etcd </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в etcd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-etcd-cve-2021-3711-cve-2019-9893-cve-2021-36159-cve-2022-27191/</description>
               <solution>
                    Запретить использование в ОС пакета etcd
                или
                    Установить обновление для пакета(ов) etcd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-etcd-cve-2021-3711-cve-2019-9893-cve-2021-36159-cve-2022-27191/" type="self" id="ROS-20240412-06" title="ROS-20240412-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711" type="cve" id="CVE-2021-3711" title="CVE-2021-3711" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893" type="cve" id="CVE-2019-9893" title="CVE-2019-9893" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36159" type="cve" id="CVE-2021-36159" title="CVE-2021-36159" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27191" type="cve" id="CVE-2022-27191" title="CVE-2022-27191" />
			<reference href="https://bdu.fstec.ru/vul/2021-04570" type="self" id="BDU:2021-04570" title="BDU:2021-04570" />
			<reference href="https://bdu.fstec.ru/vul/2020-01597" type="self" id="BDU:2020-01597" title="BDU:2020-01597" />
			<reference href="https://bdu.fstec.ru/vul/2023-05840" type="self" id="BDU:2023-05840" title="BDU:2023-05840" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="etcd" epoch="0" version="3.5.12" release="4.el7" arch="x86_64" src="">
					<filename>etcd-0:3.5.12-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240412-07</id>
		<issued date="2024-04-12" />
		<updated date="2024-04-12" />
		<title>Уязвимость libtiff </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libtiff</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libtiff-cve-2023-52356/</description>
               <solution>
                    Запретить использование в ОС пакета libtiff
                или
                    Установить обновление для пакета(ов) libtiff
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libtiff-cve-2023-52356/" type="self" id="ROS-20240412-07" title="ROS-20240412-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52356" type="cve" id="CVE-2023-52356" title="CVE-2023-52356" />
			<reference href="https://bdu.fstec.ru/vul/2024-00967" type="self" id="BDU:2024-00967" title="BDU:2024-00967" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libtiff" epoch="0" version="4.5.1" release="7.el7" arch="x86_64" src="">
					<filename>libtiff-0:4.5.1-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240415-01</id>
		<issued date="2024-04-15" />
		<updated date="2024-04-15" />
		<title>Уязвимость jbig2dec </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в jbig2dec</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jbig2dec-cve-2023-46361/</description>
               <solution>
                    Запретить использование в ОС пакета jbig2dec
                или
                    Установить обновление для пакета(ов) jbig2dec
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jbig2dec-cve-2023-46361/" type="self" id="ROS-20240415-01" title="ROS-20240415-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46361" type="cve" id="CVE-2023-46361" title="CVE-2023-46361" />
			<reference href="https://bdu.fstec.ru/vul/2024-02970" type="self" id="BDU:2024-02970" title="BDU:2024-02970" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jbig2dec" epoch="0" version="0.19" release="3.el7" arch="x86_64" src="">
					<filename>jbig2dec-0:0.19-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240415-02</id>
		<issued date="2024-04-15" />
		<updated date="2024-04-15" />
		<title>Уязвимость libvirt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libvirt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libvirt-cve-2024-1441/</description>
               <solution>
                    Запретить использование в ОС пакета libvirt
                или
                    Установить обновление для пакета(ов) libvirt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libvirt-cve-2024-1441/" type="self" id="ROS-20240415-02" title="ROS-20240415-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1441" type="cve" id="CVE-2024-1441" title="CVE-2024-1441" />
			<reference href="https://bdu.fstec.ru/vul/2024-02834" type="self" id="BDU:2024-02834" title="BDU:2024-02834" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libvirt" epoch="0" version="7.6.0" release="4.el7" arch="x86_64" src="">
					<filename>libvirt-0:7.6.0-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240415-03</id>
		<issued date="2024-04-15" />
		<updated date="2024-04-15" />
		<title>Уязвимость apr </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в apr</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apr-cve-2022-25147/</description>
               <solution>
                    Запретить использование в ОС пакета APR
                или
                    Установить обновление для пакета(ов) apr
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apr-cve-2022-25147/" type="self" id="ROS-20240415-03" title="ROS-20240415-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25147" type="cve" id="CVE-2022-25147" title="CVE-2022-25147" />
			<reference href="https://bdu.fstec.ru/vul/2024-02969" type="self" id="BDU:2024-02969" title="BDU:2024-02969" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="apr" epoch="0" version="1.7.3" release="1.el7" arch="x86_64" src="">
					<filename>apr-0:1.7.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240415-04</id>
		<issued date="2024-04-15" />
		<updated date="2024-04-15" />
		<title>Множественные уязвимости wireshark </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в wireshark</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-wireshark-cve-2021-22173-cve-2021-22174/</description>
               <solution>
                    Запретить использование в ОС пакета Wireshark
                или
                    Установить обновление для пакета(ов) Wireshark
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-wireshark-cve-2021-22173-cve-2021-22174/" type="self" id="ROS-20240415-04" title="ROS-20240415-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22173" type="cve" id="CVE-2021-22173" title="CVE-2021-22173" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22174" type="cve" id="CVE-2021-22174" title="CVE-2021-22174" />
			<reference href="https://bdu.fstec.ru/vul/2024-02971" type="self" id="BDU:2024-02971" title="BDU:2024-02971" />
			<reference href="https://bdu.fstec.ru/vul/2024-02972" type="self" id="BDU:2024-02972" title="BDU:2024-02972" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="wireshark" epoch="1" version="3.6.0" release="1.el7" arch="x86_64" src="">
					<filename>wireshark-1:3.6.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240418-01</id>
		<issued date="2024-04-18" />
		<updated date="2024-04-18" />
		<title>Уязвимость unbound </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в unbound</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-unbound-cve-2024-1931/</description>
               <solution>
                    Запретить использование в ОС пакета unbound
                или
                    Установить обновление для пакета(ов) unbound
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-unbound-cve-2024-1931/" type="self" id="ROS-20240418-01" title="ROS-20240418-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1931" type="cve" id="CVE-2024-1931" title="CVE-2024-1931" />
			<reference href="https://bdu.fstec.ru/vul/2024-01923" type="self" id="BDU:2024-01923" title="BDU:2024-01923" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="unbound" epoch="0" version="1.19.2" release="1.el7" arch="x86_64" src="">
					<filename>unbound-0:1.19.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240418-02</id>
		<issued date="2024-04-18" />
		<updated date="2024-04-18" />
		<title>Уязвимость dotnet </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в dotnet</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet-cve-2024-0057/</description>
               <solution>
                    Запретить использование в ОС пакета dotnet
                или
                    Установить обновление для пакета(ов) dotnet
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet-cve-2024-0057/" type="self" id="ROS-20240418-02" title="ROS-20240418-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0057" type="cve" id="CVE-2024-0057" title="CVE-2024-0057" />
			<reference href="https://bdu.fstec.ru/vul/2024-00402" type="self" id="BDU:2024-00402" title="BDU:2024-00402" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dotnet" epoch="0" version="8.0.101" release="1.el7" arch="x86_64" src="">
					<filename>dotnet-0:8.0.101-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240418-03</id>
		<issued date="2024-04-18" />
		<updated date="2024-04-18" />
		<title>Уязвимость grafana </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в grafana</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grafana-cve-2023-6152/</description>
               <solution>
                    Запретить использование в ОС пакета grafana
                или
                    Установить обновление для пакета(ов) grafana
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grafana-cve-2023-6152/" type="self" id="ROS-20240418-03" title="ROS-20240418-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6152" type="cve" id="CVE-2023-6152" title="CVE-2023-6152" />
			<reference href="https://bdu.fstec.ru/vul/2024-02816" type="self" id="BDU:2024-02816" title="BDU:2024-02816" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="grafana" epoch="0" version="10.3.3" release="1.1.el7" arch="x86_64" src="">
					<filename>grafana-0:10.3.3-1.1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240418-04</id>
		<issued date="2024-04-18" />
		<updated date="2024-04-18" />
		<title>Уязвимость exfatprogs </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в exfatprogs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-exfatprogs-cve-2023-45897/</description>
               <solution>
                    Запретить использование в ОС пакета exfatprogs
                или
                    Установить обновление для пакета(ов) exfatprogs
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-exfatprogs-cve-2023-45897/" type="self" id="ROS-20240418-04" title="ROS-20240418-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45897" type="cve" id="CVE-2023-45897" title="CVE-2023-45897" />
			<reference href="https://bdu.fstec.ru/vul/2024-03156" type="self" id="BDU:2024-03156" title="BDU:2024-03156" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="exfatprogs" epoch="0" version="1.2.2" release="2.el7" arch="x86_64" src="">
					<filename>exfatprogs-0:1.2.2-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240418-05</id>
		<issued date="2024-04-18" />
		<updated date="2024-04-18" />
		<title>Множественные уязвимости xreader </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в xreader</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-xreader-cve-2023-44452-cve-2023-44451/</description>
               <solution>
                    Запретить использование в ОС пакета Xreader
                или
                    Установить обновление для пакета(ов) Xreader
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-xreader-cve-2023-44452-cve-2023-44451/" type="self" id="ROS-20240418-05" title="ROS-20240418-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44452" type="cve" id="CVE-2023-44452" title="CVE-2023-44452" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44451" type="cve" id="CVE-2023-44451" title="CVE-2023-44451" />
			<reference href="https://bdu.fstec.ru/vul/2023-09145" type="self" id="BDU:2023-09145" title="BDU:2023-09145" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="xreader" epoch="0" version="3.8.5" release="1.el7" arch="x86_64" src="">
					<filename>xreader-0:3.8.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240418-06</id>
		<issued date="2024-04-18" />
		<updated date="2024-04-18" />
		<title>Множественные уязвимости buildah</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в buildah</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-buildah-18-04-24/</description>
               <solution>
                    Запретить использование в ОС пакета buildah
                или
                    Установить обновление для пакета(ов) buildah
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-buildah-18-04-24/" type="self" id="ROS-20240418-06" title="ROS-20240418-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41724" type="cve" id="CVE-2022-41724" title="CVE-2022-41724" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25173" type="cve" id="CVE-2023-25173" title="CVE-2023-25173" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41723" type="cve" id="CVE-2022-41723" title="CVE-2022-41723" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41725" type="cve" id="CVE-2022-41725" title="CVE-2022-41725" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24538" type="cve" id="CVE-2023-24538" title="CVE-2023-24538" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24536" type="cve" id="CVE-2023-24536" title="CVE-2023-24536" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24534" type="cve" id="CVE-2023-24534" title="CVE-2023-24534" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24539" type="cve" id="CVE-2023-24539" title="CVE-2023-24539" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24540" type="cve" id="CVE-2023-24540" title="CVE-2023-24540" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29400" type="cve" id="CVE-2023-29400" title="CVE-2023-29400" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29406" type="cve" id="CVE-2023-29406" title="CVE-2023-29406" />
			<reference href="https://bdu.fstec.ru/vul/2024-03152" type="self" id="BDU:2024-03152" title="BDU:2024-03152" />
			<reference href="https://bdu.fstec.ru/vul/2023-01488" type="self" id="BDU:2023-01488" title="BDU:2023-01488" />
			<reference href="https://bdu.fstec.ru/vul/2023-07322" type="self" id="BDU:2023-07322" title="BDU:2023-07322" />
			<reference href="https://bdu.fstec.ru/vul/2023-01943" type="self" id="BDU:2023-01943" title="BDU:2023-01943" />
			<reference href="https://bdu.fstec.ru/vul/2024-01979" type="self" id="BDU:2024-01979" title="BDU:2024-01979" />
			<reference href="https://bdu.fstec.ru/vul/2024-03153" type="self" id="BDU:2024-03153" title="BDU:2024-03153" />
			<reference href="https://bdu.fstec.ru/vul/2024-03154" type="self" id="BDU:2024-03154" title="BDU:2024-03154" />
			<reference href="https://bdu.fstec.ru/vul/2023-03470" type="self" id="BDU:2023-03470" title="BDU:2023-03470" />
			<reference href="https://bdu.fstec.ru/vul/2023-03471" type="self" id="BDU:2023-03471" title="BDU:2023-03471" />
			<reference href="https://bdu.fstec.ru/vul/2023-03472" type="self" id="BDU:2023-03472" title="BDU:2023-03472" />
			<reference href="https://bdu.fstec.ru/vul/2024-03155" type="self" id="BDU:2024-03155" title="BDU:2024-03155" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="buildah" epoch="0" version="1.35.0" release="1.el7" arch="x86_64" src="">
					<filename>buildah-0:1.35.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240418-07</id>
		<issued date="2024-04-18" />
		<updated date="2024-04-18" />
		<title>Множественные уязвимости ядра ОС</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-yadra-os-18-04-24/</description>
               <solution>Установить обновление для пакета(ов) ядра ОС</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-yadra-os-18-04-24/" type="self" id="ROS-20240418-07" title="ROS-20240418-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46920" type="cve" id="CVE-2021-46920" title="CVE-2021-46920" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46919" type="cve" id="CVE-2021-46919" title="CVE-2021-46919" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46918" type="cve" id="CVE-2021-46918" title="CVE-2021-46918" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46917" type="cve" id="CVE-2021-46917" title="CVE-2021-46917" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46916" type="cve" id="CVE-2021-46916" title="CVE-2021-46916" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46915" type="cve" id="CVE-2021-46915" title="CVE-2021-46915" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46914" type="cve" id="CVE-2021-46914" title="CVE-2021-46914" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46913" type="cve" id="CVE-2021-46913" title="CVE-2021-46913" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46912" type="cve" id="CVE-2021-46912" title="CVE-2021-46912" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46911" type="cve" id="CVE-2021-46911" title="CVE-2021-46911" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46910" type="cve" id="CVE-2021-46910" title="CVE-2021-46910" />
			<reference href="https://bdu.fstec.ru/vul/2024-03141" type="self" id="BDU:2024-03141" title="BDU:2024-03141" />
			<reference href="https://bdu.fstec.ru/vul/2024-03142" type="self" id="BDU:2024-03142" title="BDU:2024-03142" />
			<reference href="https://bdu.fstec.ru/vul/2024-03143" type="self" id="BDU:2024-03143" title="BDU:2024-03143" />
			<reference href="https://bdu.fstec.ru/vul/2024-03144" type="self" id="BDU:2024-03144" title="BDU:2024-03144" />
			<reference href="https://bdu.fstec.ru/vul/2024-03145" type="self" id="BDU:2024-03145" title="BDU:2024-03145" />
			<reference href="https://bdu.fstec.ru/vul/2024-03146" type="self" id="BDU:2024-03146" title="BDU:2024-03146" />
			<reference href="https://bdu.fstec.ru/vul/2024-03147" type="self" id="BDU:2024-03147" title="BDU:2024-03147" />
			<reference href="https://bdu.fstec.ru/vul/2024-03148" type="self" id="BDU:2024-03148" title="BDU:2024-03148" />
			<reference href="https://bdu.fstec.ru/vul/2024-03149" type="self" id="BDU:2024-03149" title="BDU:2024-03149" />
			<reference href="https://bdu.fstec.ru/vul/2024-03150" type="self" id="BDU:2024-03150" title="BDU:2024-03150" />
			<reference href="https://bdu.fstec.ru/vul/2024-03151" type="self" id="BDU:2024-03151" title="BDU:2024-03151" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="5.15.10" release="1.el7" arch="x86_64" src="">
					<filename>kernel-lt-0:5.15.10-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240418-08</id>
		<issued date="2024-04-18" />
		<updated date="2024-10-16" />
		<title>Множественные уязвимости opensearch-dashboards </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в opensearch-dashboards</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-opensearch-dashboards-cve-2023-52079-cve-2023-46234-cve-2020-8203/</description>
               <solution>
                    Запретить использование в ОС пакета opensearch-dashboards
                или
                    Установить обновление для пакета(ов) opensearch-dashboards
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-opensearch-dashboards-cve-2023-52079-cve-2023-46234-cve-2020-8203/" type="self" id="ROS-20240418-08" title="ROS-20240418-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52079" type="cve" id="CVE-2023-52079" title="CVE-2023-52079" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46234" type="cve" id="CVE-2023-46234" title="CVE-2023-46234" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8203" type="cve" id="CVE-2020-8203" title="CVE-2020-8203" />
			<reference href="https://bdu.fstec.ru/vul/2024-03157" type="self" id="BDU:2024-03157" title="BDU:2024-03157" />
			<reference href="https://bdu.fstec.ru/vul/2024-03158" type="self" id="BDU:2024-03158" title="BDU:2024-03158" />
			<reference href="https://bdu.fstec.ru/vul/2021-02443" type="self" id="BDU:2021-02443" title="BDU:2021-02443" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="opensearch-dashboards" epoch="0" version="2.11.1" release="2.el7" arch="x86_64" src="">
					<filename>opensearch-dashboards-0:2.11.1-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240422-01</id>
		<issued date="2024-04-22" />
		<updated date="2024-04-22" />
		<title>Уязвимость opensc </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в opensc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opensc-cve-2024-1454/</description>
               <solution>
                    Запретить использование в ОС пакета OpenSC
                или
                    Установить обновление для пакета(ов) OpenSC
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opensc-cve-2024-1454/" type="self" id="ROS-20240422-01" title="ROS-20240422-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1454" type="cve" id="CVE-2024-1454" title="CVE-2024-1454" />
			<reference href="https://bdu.fstec.ru/vul/2024-03243" type="self" id="BDU:2024-03243" title="BDU:2024-03243" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="opensc" epoch="0" version="0.24.0" release="2.el7" arch="x86_64" src="">
					<filename>opensc-0:0.24.0-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240422-02</id>
		<issued date="2024-04-22" />
		<updated date="2024-04-22" />
		<title>Уязвимость python3-cryptography </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-cryptography</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cryptography-cve-2024-26130/</description>
               <solution>
                    Запретить использование в ОС пакета cryptography
                или
                    Установить обновление для пакета(ов) cryptography
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cryptography-cve-2024-26130/" type="self" id="ROS-20240422-02" title="ROS-20240422-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26130" type="cve" id="CVE-2024-26130" title="CVE-2024-26130" />
			<reference href="https://bdu.fstec.ru/vul/2024-03237" type="self" id="BDU:2024-03237" title="BDU:2024-03237" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-cryptography" epoch="0" version="39.0.2" release="4.el7" arch="x86_64" src="">
					<filename>python3-cryptography-0:39.0.2-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240422-03</id>
		<issued date="2024-04-22" />
		<updated date="2024-04-22" />
		<title>Уязвимость Jetty </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в jetty</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jetty-cve-2024-22201/</description>
               <solution>
                    Запретить использование в ОС пакета Jetty
                или
                    Установить обновление для пакета(ов) Jetty
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jetty-cve-2024-22201/" type="self" id="ROS-20240422-03" title="ROS-20240422-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22201" type="cve" id="CVE-2024-22201" title="CVE-2024-22201" />
			<reference href="https://bdu.fstec.ru/vul/2024-03239" type="self" id="BDU:2024-03239" title="BDU:2024-03239" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jetty" epoch="0" version="9.4.54" release="1.el7" arch="noarch" src="">
					<filename>jetty-0:9.4.54-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240422-04</id>
		<issued date="2024-04-22" />
		<updated date="2024-04-22" />
		<title>Уязвимость libheif </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libheif</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libheif-cve-2024-25269/</description>
               <solution>
                    Запретить использование в ОС пакета Libheif
                или
                    Установить обновление для пакета(ов) Libheif
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libheif-cve-2024-25269/" type="self" id="ROS-20240422-04" title="ROS-20240422-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25269" type="cve" id="CVE-2024-25269" title="CVE-2024-25269" />
			<reference href="https://bdu.fstec.ru/vul/2024-03241" type="self" id="BDU:2024-03241" title="BDU:2024-03241" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libheif" epoch="0" version="1.16.1" release="4.el7" arch="x86_64" src="">
					<filename>libheif-0:1.16.1-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240422-05</id>
		<issued date="2024-04-22" />
		<updated date="2024-04-22" />
		<title>Множественные уязвимости golang </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-golang-cve-2024-24785-cve-2024-24783-cve-2023-45288-cve-2023-45289-cve-20/</description>
               <solution>
                    Запретить использование в ОС пакета golang
                или
                    Установить обновление для пакета(ов) golang
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-golang-cve-2024-24785-cve-2024-24783-cve-2023-45288-cve-2023-45289-cve-20/" type="self" id="ROS-20240422-05" title="ROS-20240422-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24785" type="cve" id="CVE-2024-24785" title="CVE-2024-24785" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24783" type="cve" id="CVE-2024-24783" title="CVE-2024-24783" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45288" type="cve" id="CVE-2023-45288" title="CVE-2023-45288" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45289" type="cve" id="CVE-2023-45289" title="CVE-2023-45289" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45290" type="cve" id="CVE-2023-45290" title="CVE-2023-45290" />
			<reference href="https://bdu.fstec.ru/vul/2024-03248" type="self" id="BDU:2024-03248" title="BDU:2024-03248" />
			<reference href="https://bdu.fstec.ru/vul/2024-02048" type="self" id="BDU:2024-02048" title="BDU:2024-02048" />
			<reference href="https://bdu.fstec.ru/vul/2024-02688" type="self" id="BDU:2024-02688" title="BDU:2024-02688" />
			<reference href="https://bdu.fstec.ru/vul/2024-02034" type="self" id="BDU:2024-02034" title="BDU:2024-02034" />
			<reference href="https://bdu.fstec.ru/vul/2024-02047" type="self" id="BDU:2024-02047" title="BDU:2024-02047" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.21.8" release="1.el7" arch="x86_64" src="">
					<filename>golang-0:1.21.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240422-06</id>
		<issued date="2024-04-22" />
		<updated date="2024-04-22" />
		<title>Уязвимость libde265 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libde265</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libde265-cve-2023-51792/</description>
               <solution>
                    Запретить использование в ОС пакета Libde265
                или
                    Установить обновление для пакета(ов) Libde265
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libde265-cve-2023-51792/" type="self" id="ROS-20240422-06" title="ROS-20240422-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51792" type="cve" id="CVE-2023-51792" title="CVE-2023-51792" />
			<reference href="https://bdu.fstec.ru/vul/2024-03240" type="self" id="BDU:2024-03240" title="BDU:2024-03240" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libde265" epoch="0" version="1.0.14" release="1.el7" arch="x86_64" src="">
					<filename>libde265-0:1.0.14-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240422-07</id>
		<issued date="2024-04-22" />
		<updated date="2024-04-22" />
		<title>Уязвимость iperf3 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в iperf3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-iperf3-cve-2023-7250/</description>
               <solution>
                    Запретить использование в ОС пакета Iperf3
                или
                    Установить обновление для пакета(ов) Iperf3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-iperf3-cve-2023-7250/" type="self" id="ROS-20240422-07" title="ROS-20240422-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7250" type="cve" id="CVE-2023-7250" title="CVE-2023-7250" />
			<reference href="https://bdu.fstec.ru/vul/2024-03238" type="self" id="BDU:2024-03238" title="BDU:2024-03238" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="iperf3" epoch="0" version="3.14" release="2.el7" arch="x86_64" src="">
					<filename>iperf3-0:3.14-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240422-08</id>
		<issued date="2024-04-22" />
		<updated date="2024-04-22" />
		<title>Уязвимость openvswitch </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в openvswitch</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openvswitch-cve-2023-3966/</description>
               <solution>
                    Запретить использование в ОС пакета openvswitch
                или
                    Установить обновление для пакета(ов) openvswitch
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openvswitch-cve-2023-3966/" type="self" id="ROS-20240422-08" title="ROS-20240422-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3966" type="cve" id="CVE-2023-3966" title="CVE-2023-3966" />
			<reference href="https://bdu.fstec.ru/vul/2024-01316" type="self" id="BDU:2024-01316" title="BDU:2024-01316" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openvswitch" epoch="1" version="3.1.1" release="2.el7" arch="x86_64" src="">
					<filename>openvswitch-1:3.1.1-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240422-09</id>
		<issued date="2024-04-22" />
		<updated date="2024-04-22" />
		<title>Уязвимость tomcat </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2024-23672/</description>
               <solution>
                    Запретить использование в ОС пакета tomcat
                или
                    Установить обновление для пакета(ов) tomcat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2024-23672/" type="self" id="ROS-20240422-09" title="ROS-20240422-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23672" type="cve" id="CVE-2024-23672" title="CVE-2024-23672" />
			<reference href="https://bdu.fstec.ru/vul/2024-02604" type="self" id="BDU:2024-02604" title="BDU:2024-02604" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat" epoch="1" version="9.0.86" release="1.el7" arch="noarch" src="">
					<filename>tomcat-1:9.0.86-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240423-01</id>
		<issued date="2024-04-23" />
		<updated date="2024-04-23" />
		<title>Множественные уязвимости varnish </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в varnish</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-varnish-cve-2024-30156-cve-2023-43622-cve-2022-45060-cve-2023-44487/</description>
               <solution>
                    Запретить использование в ОС пакета Varnish
                    Отключение поддержки уязвимых протоколов
                или
                    Установить обновление для пакета(ов) Varnish
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-varnish-cve-2024-30156-cve-2023-43622-cve-2022-45060-cve-2023-44487/" type="self" id="ROS-20240423-01" title="ROS-20240423-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30156" type="cve" id="CVE-2024-30156" title="CVE-2024-30156" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43622" type="cve" id="CVE-2023-43622" title="CVE-2023-43622" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45060" type="cve" id="CVE-2022-45060" title="CVE-2022-45060" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487" type="cve" id="CVE-2023-44487" title="CVE-2023-44487" />
			<reference href="https://bdu.fstec.ru/vul/2024-03246" type="self" id="BDU:2024-03246" title="BDU:2024-03246" />
			<reference href="https://bdu.fstec.ru/vul/2023-07171" type="self" id="BDU:2023-07171" title="BDU:2023-07171" />
			<reference href="https://bdu.fstec.ru/vul/2024-03247" type="self" id="BDU:2024-03247" title="BDU:2024-03247" />
			<reference href="https://bdu.fstec.ru/vul/2023-06559" type="self" id="BDU:2023-06559" title="BDU:2023-06559" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="varnish" epoch="0" version="7.5.0" release="2.el7" arch="x86_64" src="">
					<filename>varnish-0:7.5.0-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240423-02</id>
		<issued date="2024-04-23" />
		<updated date="2024-04-23" />
		<title>Множественные уязвимости libvirt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libvirt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libvirt-cve-2024-2496-cve-2024-2494/</description>
               <solution>
                    Запретить использование в ОС пакета libvirt
                или
                    Установить обновление для пакета(ов) libvirt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libvirt-cve-2024-2496-cve-2024-2494/" type="self" id="ROS-20240423-02" title="ROS-20240423-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2494" type="cve" id="CVE-2024-2494" title="CVE-2024-2494" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2496" type="cve" id="CVE-2024-2496" title="CVE-2024-2496" />
			<reference href="https://bdu.fstec.ru/vul/2024-02380" type="self" id="BDU:2024-02380" title="BDU:2024-02380" />
			<reference href="https://bdu.fstec.ru/vul/2024-03249" type="self" id="BDU:2024-03249" title="BDU:2024-03249" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libvirt" epoch="0" version="7.6.0" release="6.el7" arch="x86_64" src="">
					<filename>libvirt-0:7.6.0-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240423-03</id>
		<issued date="2024-04-23" />
		<updated date="2024-04-23" />
		<title>Множественные уязвимости krb5-server </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в krb5-server</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-krb5-server-cve-2024-26458-cve-2024-26461-cve-2024-26462/</description>
               <solution>
                    Запретить использование в ОС пакета krb5-server
                или
                    Установить обновление для пакета(ов) krb5-server
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-krb5-server-cve-2024-26458-cve-2024-26461-cve-2024-26462/" type="self" id="ROS-20240423-03" title="ROS-20240423-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458" type="cve" id="CVE-2024-26458" title="CVE-2024-26458" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461" type="cve" id="CVE-2024-26461" title="CVE-2024-26461" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26462" type="cve" id="CVE-2024-26462" title="CVE-2024-26462" />
			<reference href="https://bdu.fstec.ru/vul/2024-02699" type="self" id="BDU:2024-02699" title="BDU:2024-02699" />
			<reference href="https://bdu.fstec.ru/vul/2024-02520" type="self" id="BDU:2024-02520" title="BDU:2024-02520" />
			<reference href="https://bdu.fstec.ru/vul/2024-01687" type="self" id="BDU:2024-01687" title="BDU:2024-01687" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="krb5-server" epoch="0" version="1.20.1" release="3.el7" arch="x86_64" src="">
					<filename>krb5-server-0:1.20.1-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240423-04</id>
		<issued date="2024-04-23" />
		<updated date="2024-04-23" />
		<title>Уязвимость libreswan </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libreswan</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libreswan-cve-2024-2357/</description>
               <solution>
                    Запретить использование в ОС пакета Libreswan
                или
                    Установить обновление для пакета(ов) Libreswan
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libreswan-cve-2024-2357/" type="self" id="ROS-20240423-04" title="ROS-20240423-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2357" type="cve" id="CVE-2024-2357" title="CVE-2024-2357" />
			<reference href="https://bdu.fstec.ru/vul/2024-03242" type="self" id="BDU:2024-03242" title="BDU:2024-03242" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libreswan" epoch="0" version="4.14" release="1.el7" arch="x86_64" src="">
					<filename>libreswan-0:4.14-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240423-12</id>
		<issued date="2024-04-23" />
		<updated date="2024-12-23" />
		<title>Уязвимость xl2tpd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в xl2tpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-xl2tpd-cve-2024-23577027/</description>
               <solution>
                    Запретить использование в ОС пакета xl2tpd
                или
                    Установить обновление для пакета(ов) xl2tpd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-xl2tpd-cve-2024-23577027/" type="self" id="ROS-20240423-12" title="ROS-20240423-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2357" type="cve" id="CVE-2024-2357" title="CVE-2024-2357" />
			<reference href="https://bdu.fstec.ru/vul/2024-03242" type="self" id="BDU:2024-03242" title="BDU:2024-03242" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="xl2tpd" epoch="0" version="1.3.18" release="2.el7" arch="x86_64" src="">
					<filename>xl2tpd-0:1.3.18-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240423-05</id>
		<issued date="2024-04-23" />
		<updated date="2024-04-23" />
		<title>Уязвимость ipa-server </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в ipa-server</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ipa-server-cve-2024-1481/</description>
               <solution>
                    Запретить использование в ОС пакета FreeIPA
                или
                    Установить обновление для пакета(ов) FreeIPA
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ipa-server-cve-2024-1481/" type="self" id="ROS-20240423-05" title="ROS-20240423-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024–1481" type="cve" id="CVE-2024–1481" title="CVE-2024–1481" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ipa-server" epoch="0" version="4.10.3" release="4.el7" arch="x86_64" src="">
					<filename>ipa-server-0:4.10.3-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240423-06</id>
		<issued date="2024-04-23" />
		<updated date="2024-04-23" />
		<title>Множественные уязвимости consul</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в consul</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-consul-23-04-24/</description>
               <solution>
                    Запретить использование в ОС пакета consul
                или
                    Установить обновление для пакета(ов) consul
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-consul-23-04-24/" type="self" id="ROS-20240423-06" title="ROS-20240423-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23323" type="cve" id="CVE-2024-23323" title="CVE-2024-23323" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23324" type="cve" id="CVE-2024-23324" title="CVE-2024-23324" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23325" type="cve" id="CVE-2024-23325" title="CVE-2024-23325" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23322" type="cve" id="CVE-2024-23322" title="CVE-2024-23322" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23327" type="cve" id="CVE-2024-23327" title="CVE-2024-23327" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487" type="cve" id="CVE-2023-44487" title="CVE-2023-44487" />
			<reference href="https://bdu.fstec.ru/vul/2024-03236" type="self" id="BDU:2024-03236" title="BDU:2024-03236" />
			<reference href="https://bdu.fstec.ru/vul/2024-02904" type="self" id="BDU:2024-02904" title="BDU:2024-02904" />
			<reference href="https://bdu.fstec.ru/vul/2024-02906" type="self" id="BDU:2024-02906" title="BDU:2024-02906" />
			<reference href="https://bdu.fstec.ru/vul/2024-02905" type="self" id="BDU:2024-02905" title="BDU:2024-02905" />
			<reference href="https://bdu.fstec.ru/vul/2024-02907" type="self" id="BDU:2024-02907" title="BDU:2024-02907" />
			<reference href="https://bdu.fstec.ru/vul/2023-06559" type="self" id="BDU:2023-06559" title="BDU:2023-06559" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="consul" epoch="0" version="1.17.3" release="1.el7" arch="x86_64" src="">
					<filename>consul-0:1.17.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240423-07</id>
		<issued date="2024-04-23" />
		<updated date="2024-04-23" />
		<title>Множественные уязвимости python3-aiohttp </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-aiohttp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-aiohttp-cve-2024-23829-cve-2024-23334/</description>
               <solution>
                    Запретить использование в ОС пакета python3-aiohttp
                или
                    Установить обновление для пакета(ов) python3-aiohttp
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-aiohttp-cve-2024-23829-cve-2024-23334/" type="self" id="ROS-20240423-07" title="ROS-20240423-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23829" type="cve" id="CVE-2024-23829" title="CVE-2024-23829" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23334" type="cve" id="CVE-2024-23334" title="CVE-2024-23334" />
			<reference href="https://bdu.fstec.ru/vul/2024-00996" type="self" id="BDU:2024-00996" title="BDU:2024-00996" />
			<reference href="https://bdu.fstec.ru/vul/2024-00995" type="self" id="BDU:2024-00995" title="BDU:2024-00995" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-aiohttp" epoch="0" version="3.9.3" release="1.el7" arch="x86_64" src="">
					<filename>python3-aiohttp-0:3.9.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240423-08</id>
		<issued date="2024-04-23" />
		<updated date="2024-04-23" />
		<title>Уязвимость openvswitch </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openvswitch</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openvswitch-cve-2023-5366/</description>
               <solution>
                    Запретить использование в ОС пакета Open vSwitch
                или
                    Установить обновление для пакета(ов) Open vSwitch
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openvswitch-cve-2023-5366/" type="self" id="ROS-20240423-08" title="ROS-20240423-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5366" type="cve" id="CVE-2023-5366" title="CVE-2023-5366" />
			<reference href="https://bdu.fstec.ru/vul/2024-03244" type="self" id="BDU:2024-03244" title="BDU:2024-03244" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openvswitch" epoch="1" version="3.1.1" release="2.el7" arch="x86_64" src="">
					<filename>openvswitch-1:3.1.1-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240423-09</id>
		<issued date="2024-04-23" />
		<updated date="2025-10-09" />
		<title>Уязвимость qemu </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в qemu-common</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qemu-cve-2024-24474/</description>
               <solution>
                    Запретить использование в ОС пакета qemu-common
                или
                    Установить обновление для пакета(ов) qemu-common
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qemu-cve-2024-24474/" type="self" id="ROS-20240423-09" title="ROS-20240423-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24474" type="cve" id="CVE-2024-24474" title="CVE-2024-24474" />
			<reference href="https://bdu.fstec.ru/vul/2024-03245" type="self" id="BDU:2024-03245" title="BDU:2024-03245" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="qemu-common" epoch="15" version="7.2.7" release="0.15.el7" arch="x86_64" src="">
					<filename>qemu-common-15:7.2.7-0.15.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240423-10</id>
		<issued date="2024-04-23" />
		<updated date="2024-04-23" />
		<title>Множественные уязвимости unbound </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в unbound</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-unbound-cve-2022-30698-cve-2022-30699/</description>
               <solution>
                    Запретить использование в ОС пакета unbound
                или
                    Установить обновление для пакета(ов) unbound
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-unbound-cve-2022-30698-cve-2022-30699/" type="self" id="ROS-20240423-10" title="ROS-20240423-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30698" type="cve" id="CVE-2022-30698" title="CVE-2022-30698" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30699" type="cve" id="CVE-2022-30699" title="CVE-2022-30699" />
			<reference href="https://bdu.fstec.ru/vul/2022-06188" type="self" id="BDU:2022-06188" title="BDU:2022-06188" />
			<reference href="https://bdu.fstec.ru/vul/2023-03845" type="self" id="BDU:2023-03845" title="BDU:2023-03845" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="unbound" epoch="0" version="1.19.2" release="1.el7" arch="x86_64" src="">
					<filename>unbound-0:1.19.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240423-11</id>
		<issued date="2024-04-23" />
		<updated date="2024-04-23" />
		<title>Уязвимость libvirt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libvirt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libvirt-cve-2020-25637/</description>
               <solution>
                    Запретить использование в ОС пакета libvirt
                или
                    Установить обновление для пакета(ов) libvirt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libvirt-cve-2020-25637/" type="self" id="ROS-20240423-11" title="ROS-20240423-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25637" type="cve" id="CVE-2020-25637" title="CVE-2020-25637" />
			<reference href="https://bdu.fstec.ru/vul/2021-03736" type="self" id="BDU:2021-03736" title="BDU:2021-03736" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libvirt" epoch="0" version="7.6.0" release="1.el7" arch="x86_64" src="">
					<filename>libvirt-0:7.6.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240425-01</id>
		<issued date="2024-04-25" />
		<updated date="2024-04-25" />
		<title>Уязвимость httpd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в httpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-httpd-cve-2024-27316/</description>
               <solution>
                    Запретить использование в ОС пакета httpd
                или
                    Установить обновление для пакета(ов) httpd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-httpd-cve-2024-27316/" type="self" id="ROS-20240425-01" title="ROS-20240425-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27316" type="cve" id="CVE-2024-27316" title="CVE-2024-27316" />
			<reference href="https://bdu.fstec.ru/vul/2024-02653" type="self" id="BDU:2024-02653" title="BDU:2024-02653" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="httpd" epoch="0" version="2.4.58" release="1.el7" arch="x86_64" src="">
					<filename>httpd-0:2.4.58-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240425-02</id>
		<issued date="2024-04-25" />
		<updated date="2024-04-25" />
		<title>Уязвимость tar </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в tar</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tar-cve-2023-39804/</description>
               <solution>
                    Запретить использование в ОС пакета GNU Tar
                или
                    Установить обновление для пакета(ов) GNU Tar
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tar-cve-2023-39804/" type="self" id="ROS-20240425-02" title="ROS-20240425-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39804" type="cve" id="CVE-2023-39804" title="CVE-2023-39804" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tar" epoch="2" version="1.30" release="7.el7" arch="x86_64" src="">
					<filename>tar-2:1.30-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240425-03</id>
		<issued date="2024-04-25" />
		<updated date="2024-04-25" />
		<title>Уязвимость nodejs </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nodejs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-cve-2024-27983/</description>
               <solution>
                    Запретить использование в ОС пакета nodejs
                или
                    Установить обновление для пакета(ов) nodejs
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-cve-2024-27983/" type="self" id="ROS-20240425-03" title="ROS-20240425-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27983" type="cve" id="CVE-2024-27983" title="CVE-2024-27983" />
			<reference href="https://bdu.fstec.ru/vul/2024-02689" type="self" id="BDU:2024-02689" title="BDU:2024-02689" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs" epoch="1" version="18.20.1" release="1.el7" arch="x86_64" src="">
					<filename>nodejs-1:18.20.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240425-04</id>
		<issued date="2024-04-25" />
		<updated date="2024-04-25" />
		<title>Множественные уязвимости podman </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в podman</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-podman-cve-2023-48795-cve-2024-1753/</description>
               <solution>
                    Запретить использование в ОС пакета podman
                или
                    Установить обновление для пакета(ов) podman
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-podman-cve-2023-48795-cve-2024-1753/" type="self" id="ROS-20240425-04" title="ROS-20240425-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48795" type="cve" id="CVE-2023-48795" title="CVE-2023-48795" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1753" type="cve" id="CVE-2024-1753" title="CVE-2024-1753" />
			<reference href="https://bdu.fstec.ru/vul/2023-08853" type="self" id="BDU:2023-08853" title="BDU:2023-08853" />
			<reference href="https://bdu.fstec.ru/vul/2024-02163" type="self" id="BDU:2024-02163" title="BDU:2024-02163" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="podman" epoch="0" version="4.9.4" release="1.el7" arch="x86_64" src="">
					<filename>podman-0:4.9.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240425-05</id>
		<issued date="2024-04-25" />
		<updated date="2024-04-25" />
		<title>Множественные уязвимости systemd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в systemd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-systemd-cve-2022-3821-cve-2023-7008-cve-2023-26604-cve-2022-4415/</description>
               <solution>Установить обновление для пакета(ов) systemd</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-systemd-cve-2022-3821-cve-2023-7008-cve-2023-26604-cve-2022-4415/" type="self" id="ROS-20240425-05" title="ROS-20240425-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3821" type="cve" id="CVE-2022-3821" title="CVE-2022-3821" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7008" type="cve" id="CVE-2023-7008" title="CVE-2023-7008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26604" type="cve" id="CVE-2023-26604" title="CVE-2023-26604" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4415" type="cve" id="CVE-2022-4415" title="CVE-2022-4415" />
			<reference href="https://bdu.fstec.ru/vul/2024-00853" type="self" id="BDU:2024-00853" title="BDU:2024-00853" />
			<reference href="https://bdu.fstec.ru/vul/2023-03862" type="self" id="BDU:2023-03862" title="BDU:2023-03862" />
			<reference href="https://bdu.fstec.ru/vul/2023-07591" type="self" id="BDU:2023-07591" title="BDU:2023-07591" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="systemd" epoch="0" version="249.17" release="1.el7" arch="x86_64" src="">
					<filename>systemd-0:249.17-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240425-06</id>
		<issued date="2024-04-25" />
		<updated date="2024-04-25" />
		<title>Уязвимость util-linux </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в util-linux</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-util-linux-cve-2024-28085/</description>
               <solution>
                    Запретить использование в ОС пакета util-linux
                или
                    Установить обновление для пакета(ов) util-linux
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-util-linux-cve-2024-28085/" type="self" id="ROS-20240425-06" title="ROS-20240425-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28085" type="cve" id="CVE-2024-28085" title="CVE-2024-28085" />
			<reference href="https://bdu.fstec.ru/vul/2024-02517" type="self" id="BDU:2024-02517" title="BDU:2024-02517" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="util-linux" epoch="0" version="2.37.3" release="2.el7" arch="x86_64" src="">
					<filename>util-linux-0:2.37.3-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240425-07</id>
		<issued date="2024-04-25" />
		<updated date="2024-04-25" />
		<title>Уязвимость git </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в git</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-git-cve-2024-28085/</description>
               <solution>
                    Запретить использование в ОС пакета git
                или
                    Установить обновление для пакета(ов) git
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-git-cve-2024-28085/" type="self" id="ROS-20240425-07" title="ROS-20240425-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28085" type="cve" id="CVE-2024-28085" title="CVE-2024-28085" />
			<reference href="https://bdu.fstec.ru/vul/2022-04385" type="self" id="BDU:2022-04385" title="BDU:2022-04385" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="git" epoch="0" version="2.44.0" release="1.el7" arch="x86_64" src="">
					<filename>git-0:2.44.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240425-08</id>
		<issued date="2024-04-25" />
		<updated date="2024-04-25" />
		<title>Уязвимость OpenSearch </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в opensearch</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opensearch-cve-2023-5072/</description>
               <solution>
                    Запретить использование в ОС пакета OpenSearch
                или
                    Установить обновление для пакета(ов) OpenSearch
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opensearch-cve-2023-5072/" type="self" id="ROS-20240425-08" title="ROS-20240425-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5072" type="cve" id="CVE-2023-5072" title="CVE-2023-5072" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="opensearch" epoch="0" version="2.11.1" release="1.el7" arch="x86_64" src="">
					<filename>opensearch-0:2.11.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240426-01</id>
		<issued date="2024-04-26" />
		<updated date="2024-04-26" />
		<title>Уязвимость pesign </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в pesign</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pesign-cve-2022-3560/</description>
               <solution>
                    Запретить использование в ОС пакета pesign
                или
                    Установить обновление для пакета(ов) pesign
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pesign-cve-2022-3560/" type="self" id="ROS-20240426-01" title="ROS-20240426-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3560" type="cve" id="CVE-2022-3560" title="CVE-2022-3560" />
			<reference href="https://bdu.fstec.ru/vul/2023-00640" type="self" id="BDU:2023-00640" title="BDU:2023-00640" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pesign" epoch="0" version="116" release="1.el7" arch="x86_64" src="">
					<filename>pesign-0:116-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240426-03</id>
		<issued date="2024-04-26" />
		<updated date="2024-12-23" />
		<title>Уязвимость efivar </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в efivar</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-efivar-cve-2022-35604529/</description>
               <solution>
                    Запретить использование в ОС пакета efivar
                или
                    Установить обновление для пакета(ов) efivar
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-efivar-cve-2022-35604529/" type="self" id="ROS-20240426-03" title="ROS-20240426-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3560" type="cve" id="CVE-2022-3560" title="CVE-2022-3560" />
			<reference href="https://bdu.fstec.ru/vul/2023-00640" type="self" id="BDU:2023-00640" title="BDU:2023-00640" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="efivar" epoch="0" version="39" release="1.el7" arch="x86_64" src="">
					<filename>efivar-0:39-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240426-02</id>
		<issued date="2024-04-26" />
		<updated date="2024-04-26" />
		<title>Уязвимость dotnet </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dotnet</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet-cve-2024-21386/</description>
               <solution>
                    Запретить использование в ОС пакета dotnet
                или
                    Установить обновление для пакета(ов) dotnet
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet-cve-2024-21386/" type="self" id="ROS-20240426-02" title="ROS-20240426-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21386" type="cve" id="CVE-2024-21386" title="CVE-2024-21386" />
			<reference href="https://bdu.fstec.ru/vul/2024-01701" type="self" id="BDU:2024-01701" title="BDU:2024-01701" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dotnet" epoch="0" version="6.0.127" release="1.el7" arch="x86_64" src="">
					<filename>dotnet-0:6.0.127-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240503-01</id>
		<issued date="2024-05-03" />
		<updated date="2024-05-03" />
		<title>Множественные уязвимости chromium</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-03-05-2024/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-03-05-2024/" type="self" id="ROS-20240503-01" title="ROS-20240503-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3837" type="cve" id="CVE-2024-3837" title="CVE-2024-3837" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3838" type="cve" id="CVE-2024-3838" title="CVE-2024-3838" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3839" type="cve" id="CVE-2024-3839" title="CVE-2024-3839" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3834" type="cve" id="CVE-2024-3834" title="CVE-2024-3834" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3159" type="cve" id="CVE-2024-3159" title="CVE-2024-3159" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3158" type="cve" id="CVE-2024-3158" title="CVE-2024-3158" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3156" type="cve" id="CVE-2024-3156" title="CVE-2024-3156" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2628" type="cve" id="CVE-2024-2628" title="CVE-2024-2628" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2631" type="cve" id="CVE-2024-2631" title="CVE-2024-2631" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2630" type="cve" id="CVE-2024-2630" title="CVE-2024-2630" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2629" type="cve" id="CVE-2024-2629" title="CVE-2024-2629" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2627" type="cve" id="CVE-2024-2627" title="CVE-2024-2627" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2626" type="cve" id="CVE-2024-2626" title="CVE-2024-2626" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2625" type="cve" id="CVE-2024-2625" title="CVE-2024-2625" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1284" type="cve" id="CVE-2024-1284" title="CVE-2024-1284" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1283" type="cve" id="CVE-2024-1283" title="CVE-2024-1283" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2176" type="cve" id="CVE-2024-2176" title="CVE-2024-2176" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2173" type="cve" id="CVE-2024-2173" title="CVE-2024-2173" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0804" type="cve" id="CVE-2024-0804" title="CVE-2024-0804" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0805" type="cve" id="CVE-2024-0805" title="CVE-2024-0805" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0806" type="cve" id="CVE-2024-0806" title="CVE-2024-0806" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0807" type="cve" id="CVE-2024-0807" title="CVE-2024-0807" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0808" type="cve" id="CVE-2024-0808" title="CVE-2024-0808" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0809" type="cve" id="CVE-2024-0809" title="CVE-2024-0809" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0810" type="cve" id="CVE-2024-0810" title="CVE-2024-0810" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0811" type="cve" id="CVE-2024-0811" title="CVE-2024-0811" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0812" type="cve" id="CVE-2024-0812" title="CVE-2024-0812" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0813" type="cve" id="CVE-2024-0813" title="CVE-2024-0813" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0814" type="cve" id="CVE-2024-0814" title="CVE-2024-0814" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1059" type="cve" id="CVE-2024-1059" title="CVE-2024-1059" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1060" type="cve" id="CVE-2024-1060" title="CVE-2024-1060" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1077" type="cve" id="CVE-2024-1077" title="CVE-2024-1077" />
			<reference href="https://bdu.fstec.ru/vul/2024-03274" type="self" id="BDU:2024-03274" title="BDU:2024-03274" />
			<reference href="https://bdu.fstec.ru/vul/2024-03279" type="self" id="BDU:2024-03279" title="BDU:2024-03279" />
			<reference href="https://bdu.fstec.ru/vul/2024-03280" type="self" id="BDU:2024-03280" title="BDU:2024-03280" />
			<reference href="https://bdu.fstec.ru/vul/2024-03278" type="self" id="BDU:2024-03278" title="BDU:2024-03278" />
			<reference href="https://bdu.fstec.ru/vul/2024-03508" type="self" id="BDU:2024-03508" title="BDU:2024-03508" />
			<reference href="https://bdu.fstec.ru/vul/2024-03505" type="self" id="BDU:2024-03505" title="BDU:2024-03505" />
			<reference href="https://bdu.fstec.ru/vul/2024-03506" type="self" id="BDU:2024-03506" title="BDU:2024-03506" />
			<reference href="https://bdu.fstec.ru/vul/2024-02706" type="self" id="BDU:2024-02706" title="BDU:2024-02706" />
			<reference href="https://bdu.fstec.ru/vul/2024-02711" type="self" id="BDU:2024-02711" title="BDU:2024-02711" />
			<reference href="https://bdu.fstec.ru/vul/2024-02707" type="self" id="BDU:2024-02707" title="BDU:2024-02707" />
			<reference href="https://bdu.fstec.ru/vul/2024-02709" type="self" id="BDU:2024-02709" title="BDU:2024-02709" />
			<reference href="https://bdu.fstec.ru/vul/2024-02712" type="self" id="BDU:2024-02712" title="BDU:2024-02712" />
			<reference href="https://bdu.fstec.ru/vul/2024-02710" type="self" id="BDU:2024-02710" title="BDU:2024-02710" />
			<reference href="https://bdu.fstec.ru/vul/2024-03509" type="self" id="BDU:2024-03509" title="BDU:2024-03509" />
			<reference href="https://bdu.fstec.ru/vul/2024-01233" type="self" id="BDU:2024-01233" title="BDU:2024-01233" />
			<reference href="https://bdu.fstec.ru/vul/2024-01134" type="self" id="BDU:2024-01134" title="BDU:2024-01134" />
			<reference href="https://bdu.fstec.ru/vul/2024-01998" type="self" id="BDU:2024-01998" title="BDU:2024-01998" />
			<reference href="https://bdu.fstec.ru/vul/2024-01999" type="self" id="BDU:2024-01999" title="BDU:2024-01999" />
			<reference href="https://bdu.fstec.ru/vul/2024-00838" type="self" id="BDU:2024-00838" title="BDU:2024-00838" />
			<reference href="https://bdu.fstec.ru/vul/2024-00839" type="self" id="BDU:2024-00839" title="BDU:2024-00839" />
			<reference href="https://bdu.fstec.ru/vul/2024-00849" type="self" id="BDU:2024-00849" title="BDU:2024-00849" />
			<reference href="https://bdu.fstec.ru/vul/2024-00845" type="self" id="BDU:2024-00845" title="BDU:2024-00845" />
			<reference href="https://bdu.fstec.ru/vul/2024-00841" type="self" id="BDU:2024-00841" title="BDU:2024-00841" />
			<reference href="https://bdu.fstec.ru/vul/2024-00842" type="self" id="BDU:2024-00842" title="BDU:2024-00842" />
			<reference href="https://bdu.fstec.ru/vul/2024-00840" type="self" id="BDU:2024-00840" title="BDU:2024-00840" />
			<reference href="https://bdu.fstec.ru/vul/2024-00847" type="self" id="BDU:2024-00847" title="BDU:2024-00847" />
			<reference href="https://bdu.fstec.ru/vul/2024-00846" type="self" id="BDU:2024-00846" title="BDU:2024-00846" />
			<reference href="https://bdu.fstec.ru/vul/2024-00843" type="self" id="BDU:2024-00843" title="BDU:2024-00843" />
			<reference href="https://bdu.fstec.ru/vul/2024-00844" type="self" id="BDU:2024-00844" title="BDU:2024-00844" />
			<reference href="https://bdu.fstec.ru/vul/2024-01012" type="self" id="BDU:2024-01012" title="BDU:2024-01012" />
			<reference href="https://bdu.fstec.ru/vul/2024-01010" type="self" id="BDU:2024-01010" title="BDU:2024-01010" />
			<reference href="https://bdu.fstec.ru/vul/2024-01011" type="self" id="BDU:2024-01011" title="BDU:2024-01011" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="124.0.6367.78" release="1.el7" arch="x86_64" src="">
					<filename>chromium-0:124.0.6367.78-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240503-02</id>
		<issued date="2024-05-03" />
		<updated date="2024-05-03" />
		<title>Уязвимость nginx </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nginx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nginx-cve-2023-44487/</description>
               <solution>
                    Запретить использование в ОС пакета nginx
                или
                    Установить обновление для пакета(ов) nginx
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nginx-cve-2023-44487/" type="self" id="ROS-20240503-02" title="ROS-20240503-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487" type="cve" id="CVE-2023-44487" title="CVE-2023-44487" />
			<reference href="https://bdu.fstec.ru/vul/2023-06559" type="self" id="BDU:2023-06559" title="BDU:2023-06559" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nginx" epoch="1" version="1.25.4" release="1.el7.3" arch="x86_64" src="">
					<filename>nginx-1:1.25.4-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240503-03</id>
		<issued date="2024-05-03" />
		<updated date="2024-05-03" />
		<title>Уязвимость containerd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в containerd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-containerd-cve-2022-23648/</description>
               <solution>
                    Запретить использование в ОС пакета containerd
                или
                    Установить обновление для пакета(ов) containerd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-containerd-cve-2022-23648/" type="self" id="ROS-20240503-03" title="ROS-20240503-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23648" type="cve" id="CVE-2022-23648" title="CVE-2022-23648" />
			<reference href="https://bdu.fstec.ru/vul/2022-01715" type="self" id="BDU:2022-01715" title="BDU:2022-01715" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="containerd" epoch="0" version="1.5.18" release="1.el7" arch="x86_64" src="">
					<filename>containerd-0:1.5.18-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240503-04</id>
		<issued date="2024-05-03" />
		<updated date="2024-05-03" />
		<title>Множественные уязвимости mbedtls </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в mbedtls</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mbedtls-cve-2024-28960-cve-2024-23775/</description>
               <solution>
                    Запретить использование в ОС пакета mbedtls
                или
                    Установить обновление для пакета(ов) mbedtls
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mbedtls-cve-2024-28960-cve-2024-23775/" type="self" id="ROS-20240503-04" title="ROS-20240503-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28960" type="cve" id="CVE-2024-28960" title="CVE-2024-28960" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23775" type="cve" id="CVE-2024-23775" title="CVE-2024-23775" />
			<reference href="https://bdu.fstec.ru/vul/2024-02490" type="self" id="BDU:2024-02490" title="BDU:2024-02490" />
			<reference href="https://bdu.fstec.ru/vul/2024-01341" type="self" id="BDU:2024-01341" title="BDU:2024-01341" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mbedtls" epoch="0" version="2.28.8" release="1.el7" arch="x86_64" src="">
					<filename>mbedtls-0:2.28.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240503-13</id>
		<issued date="2024-05-03" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости dislocker </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dislocker</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-dislocker-cve-2024-28960-cve-2024-237755299/</description>
               <solution>
                    Запретить использование в ОС пакета dislocker
                или
                    Установить обновление для пакета(ов) dislocker
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-dislocker-cve-2024-28960-cve-2024-237755299/" type="self" id="ROS-20240503-13" title="ROS-20240503-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28960" type="cve" id="CVE-2024-28960" title="CVE-2024-28960" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23775" type="cve" id="CVE-2024-23775" title="CVE-2024-23775" />
			<reference href="https://bdu.fstec.ru/vul/2024-02490" type="self" id="BDU:2024-02490" title="BDU:2024-02490" />
			<reference href="https://bdu.fstec.ru/vul/2024-01341" type="self" id="BDU:2024-01341" title="BDU:2024-01341" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dislocker" epoch="0" version="0.7.3" release="2.el7" arch="x86_64" src="">
					<filename>dislocker-0:0.7.3-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240503-14</id>
		<issued date="2024-05-03" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости obs-studio </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в obs-studio</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-obs-studio-cve-2024-28960-cve-2024-2377552999212/</description>
               <solution>
                    Запретить использование в ОС пакета obs-studio
                или
                    Установить обновление для пакета(ов) obs-studio
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-obs-studio-cve-2024-28960-cve-2024-2377552999212/" type="self" id="ROS-20240503-14" title="ROS-20240503-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28960" type="cve" id="CVE-2024-28960" title="CVE-2024-28960" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23775" type="cve" id="CVE-2024-23775" title="CVE-2024-23775" />
			<reference href="https://bdu.fstec.ru/vul/2024-02490" type="self" id="BDU:2024-02490" title="BDU:2024-02490" />
			<reference href="https://bdu.fstec.ru/vul/2024-01341" type="self" id="BDU:2024-01341" title="BDU:2024-01341" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="obs-studio" epoch="0" version="26.1.2" release="6.el7" arch="x86_64" src="">
					<filename>obs-studio-0:26.1.2-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240503-15</id>
		<issued date="2024-05-03" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости lighttpd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в lighttpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-lighttpd-cve-2024-28960-cve-2024-237752149/</description>
               <solution>
                    Запретить использование в ОС пакета lighttpd
                или
                    Установить обновление для пакета(ов) lighttpd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-lighttpd-cve-2024-28960-cve-2024-237752149/" type="self" id="ROS-20240503-15" title="ROS-20240503-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28960" type="cve" id="CVE-2024-28960" title="CVE-2024-28960" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23775" type="cve" id="CVE-2024-23775" title="CVE-2024-23775" />
			<reference href="https://bdu.fstec.ru/vul/2024-02490" type="self" id="BDU:2024-02490" title="BDU:2024-02490" />
			<reference href="https://bdu.fstec.ru/vul/2024-01341" type="self" id="BDU:2024-01341" title="BDU:2024-01341" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="lighttpd" epoch="0" version="1.4.74" release="2.el7" arch="x86_64" src="">
					<filename>lighttpd-0:1.4.74-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240503-16</id>
		<issued date="2024-05-03" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости julia </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в julia</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-julia-cve-2024-28960-cve-2024-237753113/</description>
               <solution>
                    Запретить использование в ОС пакета julia
                или
                    Установить обновление для пакета(ов) julia
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-julia-cve-2024-28960-cve-2024-237753113/" type="self" id="ROS-20240503-16" title="ROS-20240503-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28960" type="cve" id="CVE-2024-28960" title="CVE-2024-28960" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23775" type="cve" id="CVE-2024-23775" title="CVE-2024-23775" />
			<reference href="https://bdu.fstec.ru/vul/2024-02490" type="self" id="BDU:2024-02490" title="BDU:2024-02490" />
			<reference href="https://bdu.fstec.ru/vul/2024-01341" type="self" id="BDU:2024-01341" title="BDU:2024-01341" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="julia" epoch="0" version="1.9.2" release="3.el7" arch="x86_64" src="">
					<filename>julia-0:1.9.2-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240503-17</id>
		<issued date="2024-05-03" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости bctoolbox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в bctoolbox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-bctoolbox-cve-2024-28960-cve-2024-237756685/</description>
               <solution>
                    Запретить использование в ОС пакета bctoolbox
                или
                    Установить обновление для пакета(ов) bctoolbox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-bctoolbox-cve-2024-28960-cve-2024-237756685/" type="self" id="ROS-20240503-17" title="ROS-20240503-17" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28960" type="cve" id="CVE-2024-28960" title="CVE-2024-28960" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23775" type="cve" id="CVE-2024-23775" title="CVE-2024-23775" />
			<reference href="https://bdu.fstec.ru/vul/2024-02490" type="self" id="BDU:2024-02490" title="BDU:2024-02490" />
			<reference href="https://bdu.fstec.ru/vul/2024-01341" type="self" id="BDU:2024-01341" title="BDU:2024-01341" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="bctoolbox" epoch="0" version="5.1.10" release="2.el7" arch="x86_64" src="">
					<filename>bctoolbox-0:5.1.10-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240503-05</id>
		<issued date="2024-05-03" />
		<updated date="2024-05-06" />
		<title>Уязвимость codium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в codium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-codium-cve-2024-26165/</description>
               <solution>
                    Запретить использование в ОС пакета codium
                или
                    Установить обновление для пакета(ов) codium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-codium-cve-2024-26165/" type="self" id="ROS-20240503-05" title="ROS-20240503-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26165" type="cve" id="CVE-2024-26165" title="CVE-2024-26165" />
			<reference href="https://bdu.fstec.ru/vul/2024-02058" type="self" id="BDU:2024-02058" title="BDU:2024-02058" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="codium" epoch="0" version="1.87.2.24072" release="1.el7" arch="x86_64" src="">
					<filename>codium-0:1.87.2.24072-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240503-06</id>
		<issued date="2024-05-03" />
		<updated date="2024-05-03" />
		<title>Уязвимость glpi </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2024-27104/</description>
               <solution>
                    Запретить использование в ОС пакета GLPI
                или
                    Установить обновление для пакета(ов) GLPI
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2024-27104/" type="self" id="ROS-20240503-06" title="ROS-20240503-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27104" type="cve" id="CVE-2024-27104" title="CVE-2024-27104" />
			<reference href="https://bdu.fstec.ru/vul/2024-03510" type="self" id="BDU:2024-03510" title="BDU:2024-03510" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi" epoch="0" version="10.0.13" release="1.el7" arch="noarch" src="">
					<filename>glpi-0:10.0.13-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240503-07</id>
		<issued date="2024-05-03" />
		<updated date="2024-05-03" />
		<title>Уязвимость dotnet </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dotnet</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet-cve-2024-21404/</description>
               <solution>
                    Запретить использование в ОС пакета dotnet
                или
                    Установить обновление для пакета(ов) dotnet
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet-cve-2024-21404/" type="self" id="ROS-20240503-07" title="ROS-20240503-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21404" type="cve" id="CVE-2024-21404" title="CVE-2024-21404" />
			<reference href="https://bdu.fstec.ru/vul/2024-01702" type="self" id="BDU:2024-01702" title="BDU:2024-01702" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dotnet" epoch="0" version="8.0.104" release="1.el7" arch="x86_64" src="">
					<filename>dotnet-0:8.0.104-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240503-08</id>
		<issued date="2024-05-03" />
		<updated date="2024-05-03" />
		<title>Уязвимость putty </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в putty</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-putty-cve-2024-31497/</description>
               <solution>
                    Запретить использование в ОС пакета putty
                или
                    Установить обновление для пакета(ов) putty
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-putty-cve-2024-31497/" type="self" id="ROS-20240503-08" title="ROS-20240503-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31497" type="cve" id="CVE-2024-31497" title="CVE-2024-31497" />
			<reference href="https://bdu.fstec.ru/vul/2024-02912" type="self" id="BDU:2024-02912" title="BDU:2024-02912" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="putty" epoch="0" version="0.81" release="1.el7" arch="x86_64" src="">
					<filename>putty-0:0.81-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240503-09</id>
		<issued date="2024-05-03" />
		<updated date="2024-05-03" />
		<title>Уязвимость docker-ce </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в docker-ce</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-docker-ce-cve-2024-32473/</description>
               <solution>
                    Запретить использование в ОС пакета docker-ce
                или
                    Установить обновление для пакета(ов) docker-ce
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-docker-ce-cve-2024-32473/" type="self" id="ROS-20240503-09" title="ROS-20240503-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32473" type="cve" id="CVE-2024-32473" title="CVE-2024-32473" />
			<reference href="https://bdu.fstec.ru/vul/2024-03268" type="self" id="BDU:2024-03268" title="BDU:2024-03268" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="docker-ce" epoch="4" version="24.0.9" release="2.el7" arch="x86_64" src="">
					<filename>docker-ce-4:24.0.9-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240503-10</id>
		<issued date="2024-05-03" />
		<updated date="2024-05-03" />
		<title>Уязвимость glibc </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в glibc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glibc-cve-2024-2961/</description>
               <solution>
                    Запретить использование в ОС пакета glibc
                или
                    Установить обновление для пакета(ов) glibc
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glibc-cve-2024-2961/" type="self" id="ROS-20240503-10" title="ROS-20240503-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961" type="cve" id="CVE-2024-2961" title="CVE-2024-2961" />
			<reference href="https://bdu.fstec.ru/vul/2024-03171" type="self" id="BDU:2024-03171" title="BDU:2024-03171" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glibc" epoch="0" version="2.28" release="10.el7" arch="x86_64" src="">
					<filename>glibc-0:2.28-10.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240503-11</id>
		<issued date="2024-05-03" />
		<updated date="2024-05-03" />
		<title>Уязвимость openssl3 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openssl3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2023-6237/</description>
               <solution>
                    Запретить использование в ОС пакета openssl3
                или
                    Установить обновление для пакета(ов) openssl3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2023-6237/" type="self" id="ROS-20240503-11" title="ROS-20240503-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6237" type="cve" id="CVE-2023-6237" title="CVE-2023-6237" />
			<reference href="https://bdu.fstec.ru/vul/2024-01137" type="self" id="BDU:2024-01137" title="BDU:2024-01137" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl3" epoch="0" version="3.2.1" release="2.el7" arch="x86_64" src="">
					<filename>openssl3-0:3.2.1-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240503-12</id>
		<issued date="2024-05-03" />
		<updated date="2024-05-03" />
		<title>Уязвимость openfire </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в openfire</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openfire-cve-2023-32315/</description>
               <solution>
                    Запретить использование в ОС пакета openfire
                или
                    Установить обновление для пакета(ов) openfire
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openfire-cve-2023-32315/" type="self" id="ROS-20240503-12" title="ROS-20240503-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32315" type="cve" id="CVE-2023-32315" title="CVE-2023-32315" />
			<reference href="https://bdu.fstec.ru/vul/2023-04877" type="self" id="BDU:2023-04877" title="BDU:2023-04877" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openfire" epoch="0" version="4.7.5" release="1.el7" arch="x86_64" src="">
					<filename>openfire-0:4.7.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240506-01</id>
		<issued date="2024-05-06" />
		<updated date="2024-05-06" />
		<title>Уязвимость expat </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в expat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-expat-cve-2024-28757/</description>
               <solution>
                    Запретить использование в ОС пакета expat
                или
                    Установить обновление для пакета(ов) expat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-expat-cve-2024-28757/" type="self" id="ROS-20240506-01" title="ROS-20240506-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28757" type="cve" id="CVE-2024-28757" title="CVE-2024-28757" />
			<reference href="https://bdu.fstec.ru/vul/2024-01976" type="self" id="BDU:2024-01976" title="BDU:2024-01976" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="expat" epoch="0" version="2.6.2" release="1.el7" arch="x86_64" src="">
					<filename>expat-0:2.6.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240506-02</id>
		<issued date="2024-05-06" />
		<updated date="2024-05-06" />
		<title>Множественные уязвимости glib2</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в glib2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-glib2-06-05-24/</description>
               <solution>
                    Запретить использование в ОС пакета glib2
                или
                    Установить обновление для пакета(ов) glib2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-glib2-06-05-24/" type="self" id="ROS-20240506-02" title="ROS-20240506-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32643" type="cve" id="CVE-2023-32643" title="CVE-2023-32643" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32665" type="cve" id="CVE-2023-32665" title="CVE-2023-32665" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29499" type="cve" id="CVE-2023-29499" title="CVE-2023-29499" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32611" type="cve" id="CVE-2023-32611" title="CVE-2023-32611" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27218" type="cve" id="CVE-2021-27218" title="CVE-2021-27218" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27219" type="cve" id="CVE-2021-27219" title="CVE-2021-27219" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32636" type="cve" id="CVE-2023-32636" title="CVE-2023-32636" />
			<reference href="https://bdu.fstec.ru/vul/2024-03777" type="self" id="BDU:2024-03777" title="BDU:2024-03777" />
			<reference href="https://bdu.fstec.ru/vul/2023-07655" type="self" id="BDU:2023-07655" title="BDU:2023-07655" />
			<reference href="https://bdu.fstec.ru/vul/2023-07646" type="self" id="BDU:2023-07646" title="BDU:2023-07646" />
			<reference href="https://bdu.fstec.ru/vul/2023-07650" type="self" id="BDU:2023-07650" title="BDU:2023-07650" />
			<reference href="https://bdu.fstec.ru/vul/2021-00816" type="self" id="BDU:2021-00816" title="BDU:2021-00816" />
			<reference href="https://bdu.fstec.ru/vul/2021-00680" type="self" id="BDU:2021-00680" title="BDU:2021-00680" />
			<reference href="https://bdu.fstec.ru/vul/2024-03776" type="self" id="BDU:2024-03776" title="BDU:2024-03776" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glib2" epoch="0" version="2.65.3" release="3.el7" arch="x86_64" src="">
					<filename>glib2-0:2.65.3-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240507-01</id>
		<issued date="2024-05-07" />
		<updated date="2024-05-07" />
		<title>Уязвимость unrar </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в unrar</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-unrar-cve-2024-33899/</description>
               <solution>
                    Запретить использование в ОС пакета unrar
                или
                    Установить обновление для пакета(ов) unrar
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-unrar-cve-2024-33899/" type="self" id="ROS-20240507-01" title="ROS-20240507-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33899" type="cve" id="CVE-2024-33899" title="CVE-2024-33899" />
			<reference href="https://bdu.fstec.ru/vul/2024-03525" type="self" id="BDU:2024-03525" title="BDU:2024-03525" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="unrar" epoch="0" version="7.0.7" release="2.el7" arch="x86_64" src="">
					<filename>unrar-0:7.0.7-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240503-18</id>
		<issued date="2024-05-07" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости maven </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в maven</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-maven-cve-2022-29599-cve-2021-26291/</description>
               <solution>
                    Запретить использование в ОС пакета maven
                или
                    Установить обновление для пакета(ов) maven
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-maven-cve-2022-29599-cve-2021-26291/" type="self" id="ROS-20240503-18" title="ROS-20240503-18" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29599" type="cve" id="CVE-2022-29599" title="CVE-2022-29599" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26291" type="cve" id="CVE-2021-26291" title="CVE-2021-26291" />
			<reference href="https://bdu.fstec.ru/vul/2024-03775" type="self" id="BDU:2024-03775" title="BDU:2024-03775" />
			<reference href="https://bdu.fstec.ru/vul/2023-05216" type="self" id="BDU:2023-05216" title="BDU:2023-05216" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="maven" epoch="1" version="3.9.6" release="1.el7" arch="noarch" src="">
					<filename>maven-1:3.9.6-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240503-19</id>
		<issued date="2024-05-07" />
		<updated date="2024-12-23" />
		<title>Уязвимость maven-shared-utils </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в maven-shared-utils</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimosti-maven-cve-2022-29599/</description>
               <solution>
                    Запретить использование в ОС пакета maven-shared-utils
                или
                    Установить обновление для пакета(ов) maven-shared-utils
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimosti-maven-cve-2022-29599/" type="self" id="ROS-20240503-19" title="ROS-20240503-19" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29599" type="cve" id="CVE-2022-29599" title="CVE-2022-29599" />
			<reference href="https://bdu.fstec.ru/vul/2024-03775" type="self" id="BDU:2024-03775" title="BDU:2024-03775" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="maven-shared-utils" epoch="0" version="3.4.2" release="1.el7" arch="noarch" src="">
					<filename>maven-shared-utils-0:3.4.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240507-03</id>
		<issued date="2024-05-07" />
		<updated date="2024-05-07" />
		<title>Уязвимость guava </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в guava</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-guava-cve-2023-2976/</description>
               <solution>
                    Запретить использование в ОС пакета guava
                или
                    Установить обновление для пакета(ов) guava
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-guava-cve-2023-2976/" type="self" id="ROS-20240507-03" title="ROS-20240507-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2976" type="cve" id="CVE-2023-2976" title="CVE-2023-2976" />
			<reference href="https://bdu.fstec.ru/vul/2023-04974" type="self" id="BDU:2023-04974" title="BDU:2023-04974" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="guava" epoch="0" version="32.1.2" release="2.el7" arch="noarch" src="">
					<filename>guava-0:32.1.2-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240507-04</id>
		<issued date="2024-05-07" />
		<updated date="2024-05-07" />
		<title>Уязвимость nodejs-nodemon </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nodejs-nodemon</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-nodemon-cve-2014-1936/</description>
               <solution>
                    Запретить использование в ОС пакета nodejs-nodemon
                или
                    Установить обновление для пакета(ов) nodejs-nodemon
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-nodemon-cve-2014-1936/" type="self" id="ROS-20240507-04" title="ROS-20240507-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1936" type="cve" id="CVE-2014-1936" title="CVE-2014-1936" />
			<reference href="https://bdu.fstec.ru/vul/2024-03774" type="self" id="BDU:2024-03774" title="BDU:2024-03774" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs-nodemon" epoch="0" version="2.0.20" release="1.el7" arch="noarch" src="">
					<filename>nodejs-nodemon-0:2.0.20-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240507-05</id>
		<issued date="2024-05-07" />
		<updated date="2024-05-07" />
		<title>Уязвимость nodejs-minimist </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в nodejs-minimist</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-minimist-cve-2021-44906/</description>
               <solution>
                    Запретить использование в ОС пакета nodejs-minimist
                или
                    Установить обновление для пакета(ов) nodejs-minimist
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-minimist-cve-2021-44906/" type="self" id="ROS-20240507-05" title="ROS-20240507-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44906" type="cve" id="CVE-2021-44906" title="CVE-2021-44906" />
			<reference href="https://bdu.fstec.ru/vul/2024-01534" type="self" id="BDU:2024-01534" title="BDU:2024-01534" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs-minimist" epoch="0" version="1.2.6" release="1.el7" arch="noarch" src="">
					<filename>nodejs-minimist-0:1.2.6-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240507-06</id>
		<issued date="2024-05-07" />
		<updated date="2024-05-07" />
		<title>Уязвимость flatpak </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в flatpak</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-flatpak-cve-2024-32462/</description>
               <solution>
                    Запретить использование в ОС пакета flatpak
                или
                    Установить обновление для пакета(ов) flatpak
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-flatpak-cve-2024-32462/" type="self" id="ROS-20240507-06" title="ROS-20240507-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32462" type="cve" id="CVE-2024-32462" title="CVE-2024-32462" />
			<reference href="https://bdu.fstec.ru/vul/2024-03113" type="self" id="BDU:2024-03113" title="BDU:2024-03113" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="flatpak" epoch="0" version="1.10.9" release="1.el7" arch="x86_64" src="">
					<filename>flatpak-0:1.10.9-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240507-07</id>
		<issued date="2024-05-07" />
		<updated date="2024-05-07" />
		<title>Множественные уязвимости xorg-x11-server-common </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в xorg-x11-server-common</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-xorg-x11-server-common-cve-2024-31080-cve-2024-31082-cve-2024-31081-cve-2/</description>
               <solution>
                    Запретить использование в ОС пакета xorg-x11-server-common
                или
                    Установить обновление для пакета(ов) xorg-x11-server-common
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-xorg-x11-server-common-cve-2024-31080-cve-2024-31082-cve-2024-31081-cve-2/" type="self" id="ROS-20240507-07" title="ROS-20240507-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080" type="cve" id="CVE-2024-31080" title="CVE-2024-31080" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31082" type="cve" id="CVE-2024-31082" title="CVE-2024-31082" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081" type="cve" id="CVE-2024-31081" title="CVE-2024-31081" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083" type="cve" id="CVE-2024-31083" title="CVE-2024-31083" />
			<reference href="https://bdu.fstec.ru/vul/2024-03132" type="self" id="BDU:2024-03132" title="BDU:2024-03132" />
			<reference href="https://bdu.fstec.ru/vul/2024-03109" type="self" id="BDU:2024-03109" title="BDU:2024-03109" />
			<reference href="https://bdu.fstec.ru/vul/2024-03104" type="self" id="BDU:2024-03104" title="BDU:2024-03104" />
			<reference href="https://bdu.fstec.ru/vul/2024-03130" type="self" id="BDU:2024-03130" title="BDU:2024-03130" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="xorg-x11-server-common" epoch="0" version="1.20.14" release="11.el7.3" arch="x86_64" src="">
					<filename>xorg-x11-server-common-0:1.20.14-11.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240507-08</id>
		<issued date="2024-05-07" />
		<updated date="2024-05-07" />
		<title>Уязвимость nghttp2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nghttp2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nghttp2-cve-2024-28182/</description>
               <solution>
                    Запретить использование в ОС пакета nghttp2
                или
                    Установить обновление для пакета(ов) nghttp2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nghttp2-cve-2024-28182/" type="self" id="ROS-20240507-08" title="ROS-20240507-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28182" type="cve" id="CVE-2024-28182" title="CVE-2024-28182" />
			<reference href="https://bdu.fstec.ru/vul/2024-02691" type="self" id="BDU:2024-02691" title="BDU:2024-02691" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nghttp2" epoch="0" version="1.51.0" release="3.el7" arch="x86_64" src="">
					<filename>nghttp2-0:1.51.0-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240507-09</id>
		<issued date="2024-05-07" />
		<updated date="2024-05-08" />
		<title>Множественные уязвимости chromium</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-07-05-24/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-07-05-24/" type="self" id="ROS-20240507-09" title="ROS-20240507-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3914" type="cve" id="CVE-2024-3914" title="CVE-2024-3914" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3847" type="cve" id="CVE-2024-3847" title="CVE-2024-3847" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3846" type="cve" id="CVE-2024-3846" title="CVE-2024-3846" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3845" type="cve" id="CVE-2024-3845" title="CVE-2024-3845" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3844" type="cve" id="CVE-2024-3844" title="CVE-2024-3844" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3843" type="cve" id="CVE-2024-3843" title="CVE-2024-3843" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3841" type="cve" id="CVE-2024-3841" title="CVE-2024-3841" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3840" type="cve" id="CVE-2024-3840" title="CVE-2024-3840" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3833" type="cve" id="CVE-2024-3833" title="CVE-2024-3833" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3832" type="cve" id="CVE-2024-3832" title="CVE-2024-3832" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3516" type="cve" id="CVE-2024-3516" title="CVE-2024-3516" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3515" type="cve" id="CVE-2024-3515" title="CVE-2024-3515" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3157" type="cve" id="CVE-2024-3157" title="CVE-2024-3157" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2887" type="cve" id="CVE-2024-2887" title="CVE-2024-2887" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2886" type="cve" id="CVE-2024-2886" title="CVE-2024-2886" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2885" type="cve" id="CVE-2024-2885" title="CVE-2024-2885" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2883" type="cve" id="CVE-2024-2883" title="CVE-2024-2883" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2400" type="cve" id="CVE-2024-2400" title="CVE-2024-2400" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2174" type="cve" id="CVE-2024-2174" title="CVE-2024-2174" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1939" type="cve" id="CVE-2024-1939" title="CVE-2024-1939" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1938" type="cve" id="CVE-2024-1938" title="CVE-2024-1938" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1676" type="cve" id="CVE-2024-1676" title="CVE-2024-1676" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1675" type="cve" id="CVE-2024-1675" title="CVE-2024-1675" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1674" type="cve" id="CVE-2024-1674" title="CVE-2024-1674" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1673" type="cve" id="CVE-2024-1673" title="CVE-2024-1673" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1672" type="cve" id="CVE-2024-1672" title="CVE-2024-1672" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1671" type="cve" id="CVE-2024-1671" title="CVE-2024-1671" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1670" type="cve" id="CVE-2024-1670" title="CVE-2024-1670" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1669" type="cve" id="CVE-2024-1669" title="CVE-2024-1669" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4060" type="cve" id="CVE-2024-4060" title="CVE-2024-4060" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4059" type="cve" id="CVE-2024-4059" title="CVE-2024-4059" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4058" type="cve" id="CVE-2024-4058" title="CVE-2024-4058" />
			<reference href="https://bdu.fstec.ru/vul/2024-03460" type="self" id="BDU:2024-03460" title="BDU:2024-03460" />
			<reference href="https://bdu.fstec.ru/vul/2024-03269" type="self" id="BDU:2024-03269" title="BDU:2024-03269" />
			<reference href="https://bdu.fstec.ru/vul/2024-03273" type="self" id="BDU:2024-03273" title="BDU:2024-03273" />
			<reference href="https://bdu.fstec.ru/vul/2024-03276" type="self" id="BDU:2024-03276" title="BDU:2024-03276" />
			<reference href="https://bdu.fstec.ru/vul/2024-03271" type="self" id="BDU:2024-03271" title="BDU:2024-03271" />
			<reference href="https://bdu.fstec.ru/vul/2024-03272" type="self" id="BDU:2024-03272" title="BDU:2024-03272" />
			<reference href="https://bdu.fstec.ru/vul/2024-03270" type="self" id="BDU:2024-03270" title="BDU:2024-03270" />
			<reference href="https://bdu.fstec.ru/vul/2024-03277" type="self" id="BDU:2024-03277" title="BDU:2024-03277" />
			<reference href="https://bdu.fstec.ru/vul/2024-03281" type="self" id="BDU:2024-03281" title="BDU:2024-03281" />
			<reference href="https://bdu.fstec.ru/vul/2024-03275" type="self" id="BDU:2024-03275" title="BDU:2024-03275" />
			<reference href="https://bdu.fstec.ru/vul/2024-03189" type="self" id="BDU:2024-03189" title="BDU:2024-03189" />
			<reference href="https://bdu.fstec.ru/vul/2024-03188" type="self" id="BDU:2024-03188" title="BDU:2024-03188" />
			<reference href="https://bdu.fstec.ru/vul/2024-03187" type="self" id="BDU:2024-03187" title="BDU:2024-03187" />
			<reference href="https://bdu.fstec.ru/vul/2024-02532" type="self" id="BDU:2024-02532" title="BDU:2024-02532" />
			<reference href="https://bdu.fstec.ru/vul/2024-02396" type="self" id="BDU:2024-02396" title="BDU:2024-02396" />
			<reference href="https://bdu.fstec.ru/vul/2024-02395" type="self" id="BDU:2024-02395" title="BDU:2024-02395" />
			<reference href="https://bdu.fstec.ru/vul/2024-02394" type="self" id="BDU:2024-02394" title="BDU:2024-02394" />
			<reference href="https://bdu.fstec.ru/vul/2024-02213" type="self" id="BDU:2024-02213" title="BDU:2024-02213" />
			<reference href="https://bdu.fstec.ru/vul/2024-02065" type="self" id="BDU:2024-02065" title="BDU:2024-02065" />
			<reference href="https://bdu.fstec.ru/vul/2024-01686" type="self" id="BDU:2024-01686" title="BDU:2024-01686" />
			<reference href="https://bdu.fstec.ru/vul/2024-01685" type="self" id="BDU:2024-01685" title="BDU:2024-01685" />
			<reference href="https://bdu.fstec.ru/vul/2024-01600" type="self" id="BDU:2024-01600" title="BDU:2024-01600" />
			<reference href="https://bdu.fstec.ru/vul/2024-01583" type="self" id="BDU:2024-01583" title="BDU:2024-01583" />
			<reference href="https://bdu.fstec.ru/vul/2024-01585" type="self" id="BDU:2024-01585" title="BDU:2024-01585" />
			<reference href="https://bdu.fstec.ru/vul/2024-01580" type="self" id="BDU:2024-01580" title="BDU:2024-01580" />
			<reference href="https://bdu.fstec.ru/vul/2024-01584" type="self" id="BDU:2024-01584" title="BDU:2024-01584" />
			<reference href="https://bdu.fstec.ru/vul/2024-01614" type="self" id="BDU:2024-01614" title="BDU:2024-01614" />
			<reference href="https://bdu.fstec.ru/vul/2024-01615" type="self" id="BDU:2024-01615" title="BDU:2024-01615" />
			<reference href="https://bdu.fstec.ru/vul/2024-01598" type="self" id="BDU:2024-01598" title="BDU:2024-01598" />
			<reference href="https://bdu.fstec.ru/vul/2024-03377" type="self" id="BDU:2024-03377" title="BDU:2024-03377" />
			<reference href="https://bdu.fstec.ru/vul/2024-03378" type="self" id="BDU:2024-03378" title="BDU:2024-03378" />
			<reference href="https://bdu.fstec.ru/vul/2024-03379" type="self" id="BDU:2024-03379" title="BDU:2024-03379" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="124.0.6367.78" release="1.el7" arch="x86_64" src="">
					<filename>chromium-0:124.0.6367.78-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240508-01</id>
		<issued date="2024-05-08" />
		<updated date="2024-05-08" />
		<title>Множественные уязвимости rubygem-rack </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в rubygem-rack</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rubygem-rack-cve-2024-25126-cve-2024-26141-cve-2024-26146/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-rack
                или
                    Установить обновление для пакета(ов) rubygem-rack
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rubygem-rack-cve-2024-25126-cve-2024-26141-cve-2024-26146/" type="self" id="ROS-20240508-01" title="ROS-20240508-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25126" type="cve" id="CVE-2024-25126" title="CVE-2024-25126" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26141" type="cve" id="CVE-2024-26141" title="CVE-2024-26141" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26146" type="cve" id="CVE-2024-26146" title="CVE-2024-26146" />
			<reference href="https://bdu.fstec.ru/vul/2024-01715" type="self" id="BDU:2024-01715" title="BDU:2024-01715" />
			<reference href="https://bdu.fstec.ru/vul/2024-01714" type="self" id="BDU:2024-01714" title="BDU:2024-01714" />
			<reference href="https://bdu.fstec.ru/vul/2024-01716" type="self" id="BDU:2024-01716" title="BDU:2024-01716" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-rack" epoch="0" version="2.2.8.1" release="1.el7" arch="noarch" src="">
					<filename>rubygem-rack-0:2.2.8.1-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240514-01</id>
		<issued date="2024-05-14" />
		<updated date="2024-05-14" />
		<title>Множественные уязвимости mediawiki </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mediawiki</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mediawiki-cve-2024-34507-cve-2024-34506/</description>
               <solution>
                    Запретить использование в ОС пакета mediawiki
                или
                    Установить обновление для пакета(ов) mediawiki
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mediawiki-cve-2024-34507-cve-2024-34506/" type="self" id="ROS-20240514-01" title="ROS-20240514-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34507" type="cve" id="CVE-2024-34507" title="CVE-2024-34507" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34506" type="cve" id="CVE-2024-34506" title="CVE-2024-34506" />
			<reference href="https://bdu.fstec.ru/vul/2024-03487" type="self" id="BDU:2024-03487" title="BDU:2024-03487" />
			<reference href="https://bdu.fstec.ru/vul/2024-03488" type="self" id="BDU:2024-03488" title="BDU:2024-03488" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mediawiki" epoch="0" version="1.40.3" release="3.el7" arch="noarch" src="">
					<filename>mediawiki-0:1.40.3-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240514-06</id>
		<issued date="2024-05-14" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости php-cssjanus </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в php-cssjanus</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-cssjanus-cve-2024-34507-cve-2024-34506803/</description>
               <solution>
                    Запретить использование в ОС пакета php-cssjanus
                или
                    Установить обновление для пакета(ов) php-cssjanus
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-cssjanus-cve-2024-34507-cve-2024-34506803/" type="self" id="ROS-20240514-06" title="ROS-20240514-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34507" type="cve" id="CVE-2024-34507" title="CVE-2024-34507" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34506" type="cve" id="CVE-2024-34506" title="CVE-2024-34506" />
			<reference href="https://bdu.fstec.ru/vul/2024-03487" type="self" id="BDU:2024-03487" title="BDU:2024-03487" />
			<reference href="https://bdu.fstec.ru/vul/2024-03488" type="self" id="BDU:2024-03488" title="BDU:2024-03488" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php-cssjanus" epoch="0" version="2.1.1" release="1.el7" arch="noarch" src="">
					<filename>php-cssjanus-0:2.1.1-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240514-07</id>
		<issued date="2024-05-14" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости php-oojs-oojs-ui </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в php-oojs-oojs-ui</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-oojs-oojs-ui-cve-2024-34507-cve-2024-345065138/</description>
               <solution>
                    Запретить использование в ОС пакета php-oojs-oojs-ui
                или
                    Установить обновление для пакета(ов) php-oojs-oojs-ui
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-oojs-oojs-ui-cve-2024-34507-cve-2024-345065138/" type="self" id="ROS-20240514-07" title="ROS-20240514-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34507" type="cve" id="CVE-2024-34507" title="CVE-2024-34507" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34506" type="cve" id="CVE-2024-34506" title="CVE-2024-34506" />
			<reference href="https://bdu.fstec.ru/vul/2024-03487" type="self" id="BDU:2024-03487" title="BDU:2024-03487" />
			<reference href="https://bdu.fstec.ru/vul/2024-03488" type="self" id="BDU:2024-03488" title="BDU:2024-03488" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php-oojs-oojs-ui" epoch="0" version="0.46.3" release="1.el7" arch="noarch" src="">
					<filename>php-oojs-oojs-ui-0:0.46.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240514-08</id>
		<issued date="2024-05-14" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости php-PsrLog </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в php-PsrLog</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-PsrLog-cve-2024-34507-cve-2024-345061458/</description>
               <solution>
                    Запретить использование в ОС пакета php-PsrLog
                или
                    Установить обновление для пакета(ов) php-PsrLog
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-PsrLog-cve-2024-34507-cve-2024-345061458/" type="self" id="ROS-20240514-08" title="ROS-20240514-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34507" type="cve" id="CVE-2024-34507" title="CVE-2024-34507" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34506" type="cve" id="CVE-2024-34506" title="CVE-2024-34506" />
			<reference href="https://bdu.fstec.ru/vul/2024-03487" type="self" id="BDU:2024-03487" title="BDU:2024-03487" />
			<reference href="https://bdu.fstec.ru/vul/2024-03488" type="self" id="BDU:2024-03488" title="BDU:2024-03488" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php-PsrLog" epoch="0" version="1.1.4" release="1.el7" arch="noarch" src="">
					<filename>php-PsrLog-0:1.1.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240514-09</id>
		<issued date="2024-05-14" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости php-wikimedia-assert </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в php-wikimedia-assert</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-wikimedia-assert-cve-2024-34507-cve-2024-345066231/</description>
               <solution>
                    Запретить использование в ОС пакета php-wikimedia-assert
                или
                    Установить обновление для пакета(ов) php-wikimedia-assert
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-wikimedia-assert-cve-2024-34507-cve-2024-345066231/" type="self" id="ROS-20240514-09" title="ROS-20240514-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34507" type="cve" id="CVE-2024-34507" title="CVE-2024-34507" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34506" type="cve" id="CVE-2024-34506" title="CVE-2024-34506" />
			<reference href="https://bdu.fstec.ru/vul/2024-03487" type="self" id="BDU:2024-03487" title="BDU:2024-03487" />
			<reference href="https://bdu.fstec.ru/vul/2024-03488" type="self" id="BDU:2024-03488" title="BDU:2024-03488" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php-wikimedia-assert" epoch="0" version="0.5.1" release="1.el7" arch="noarch" src="">
					<filename>php-wikimedia-assert-0:0.5.1-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240514-10</id>
		<issued date="2024-05-14" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости php-wikimedia-cdb </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в php-wikimedia-cdb</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-wikimedia-cdb-cve-2024-34507-cve-2024-345068207/</description>
               <solution>
                    Запретить использование в ОС пакета php-wikimedia-cdb
                или
                    Установить обновление для пакета(ов) php-wikimedia-cdb
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-wikimedia-cdb-cve-2024-34507-cve-2024-345068207/" type="self" id="ROS-20240514-10" title="ROS-20240514-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34507" type="cve" id="CVE-2024-34507" title="CVE-2024-34507" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34506" type="cve" id="CVE-2024-34506" title="CVE-2024-34506" />
			<reference href="https://bdu.fstec.ru/vul/2024-03487" type="self" id="BDU:2024-03487" title="BDU:2024-03487" />
			<reference href="https://bdu.fstec.ru/vul/2024-03488" type="self" id="BDU:2024-03488" title="BDU:2024-03488" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php-wikimedia-cdb" epoch="0" version="2.0.0" release="1.el7" arch="noarch" src="">
					<filename>php-wikimedia-cdb-0:2.0.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240514-11</id>
		<issued date="2024-05-14" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости php-wikimedia-ip-set </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в php-wikimedia-ip-set</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-wikimedia-ip-set-cve-2024-34507-cve-2024-345063726/</description>
               <solution>
                    Запретить использование в ОС пакета php-wikimedia-ip-set
                или
                    Установить обновление для пакета(ов) php-wikimedia-ip-set
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-wikimedia-ip-set-cve-2024-34507-cve-2024-345063726/" type="self" id="ROS-20240514-11" title="ROS-20240514-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34507" type="cve" id="CVE-2024-34507" title="CVE-2024-34507" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34506" type="cve" id="CVE-2024-34506" title="CVE-2024-34506" />
			<reference href="https://bdu.fstec.ru/vul/2024-03487" type="self" id="BDU:2024-03487" title="BDU:2024-03487" />
			<reference href="https://bdu.fstec.ru/vul/2024-03488" type="self" id="BDU:2024-03488" title="BDU:2024-03488" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php-wikimedia-ip-set" epoch="0" version="3.1.0" release="1.el7" arch="noarch" src="">
					<filename>php-wikimedia-ip-set-0:3.1.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240514-12</id>
		<issued date="2024-05-14" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости php-wikimedia-utfnormal </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в php-wikimedia-utfnormal</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-wikimedia-utfnormal-cve-2024-34507-cve-2024-345064609/</description>
               <solution>
                    Запретить использование в ОС пакета php-wikimedia-utfnormal
                или
                    Установить обновление для пакета(ов) php-wikimedia-utfnormal
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-wikimedia-utfnormal-cve-2024-34507-cve-2024-345064609/" type="self" id="ROS-20240514-12" title="ROS-20240514-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34507" type="cve" id="CVE-2024-34507" title="CVE-2024-34507" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34506" type="cve" id="CVE-2024-34506" title="CVE-2024-34506" />
			<reference href="https://bdu.fstec.ru/vul/2024-03487" type="self" id="BDU:2024-03487" title="BDU:2024-03487" />
			<reference href="https://bdu.fstec.ru/vul/2024-03488" type="self" id="BDU:2024-03488" title="BDU:2024-03488" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php-wikimedia-utfnormal" epoch="0" version="3.0.2" release="1.el7" arch="noarch" src="">
					<filename>php-wikimedia-utfnormal-0:3.0.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240514-13</id>
		<issued date="2024-05-14" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости php-zordius-lightncandy </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в php-zordius-lightncandy</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-zordius-lightncandy-cve-2024-34507-cve-2024-345062958/</description>
               <solution>
                    Запретить использование в ОС пакета php-zordius-lightncandy
                или
                    Установить обновление для пакета(ов) php-zordius-lightncandy
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-zordius-lightncandy-cve-2024-34507-cve-2024-345062958/" type="self" id="ROS-20240514-13" title="ROS-20240514-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34507" type="cve" id="CVE-2024-34507" title="CVE-2024-34507" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34506" type="cve" id="CVE-2024-34506" title="CVE-2024-34506" />
			<reference href="https://bdu.fstec.ru/vul/2024-03487" type="self" id="BDU:2024-03487" title="BDU:2024-03487" />
			<reference href="https://bdu.fstec.ru/vul/2024-03488" type="self" id="BDU:2024-03488" title="BDU:2024-03488" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php-zordius-lightncandy" epoch="0" version="1.2.6" release="1.el7" arch="noarch" src="">
					<filename>php-zordius-lightncandy-0:1.2.6-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240514-14</id>
		<issued date="2024-05-14" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости php-pear-Mail </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в php-pear-Mail</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-pear-Mail-cve-2024-34507-cve-2024-34506758/</description>
               <solution>
                    Запретить использование в ОС пакета php-pear-Mail
                или
                    Установить обновление для пакета(ов) php-pear-Mail
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-pear-Mail-cve-2024-34507-cve-2024-34506758/" type="self" id="ROS-20240514-14" title="ROS-20240514-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34507" type="cve" id="CVE-2024-34507" title="CVE-2024-34507" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34506" type="cve" id="CVE-2024-34506" title="CVE-2024-34506" />
			<reference href="https://bdu.fstec.ru/vul/2024-03487" type="self" id="BDU:2024-03487" title="BDU:2024-03487" />
			<reference href="https://bdu.fstec.ru/vul/2024-03488" type="self" id="BDU:2024-03488" title="BDU:2024-03488" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php-pear-Mail" epoch="0" version="1.5.1" release="1.el7" arch="noarch" src="">
					<filename>php-pear-Mail-0:1.5.1-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240514-15</id>
		<issued date="2024-05-14" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости php-pear-Mail-Mime </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в php-pear-Mail-Mime</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-pear-Mail-Mime-cve-2024-34507-cve-2024-345067095/</description>
               <solution>
                    Запретить использование в ОС пакета php-pear-Mail-Mime
                или
                    Установить обновление для пакета(ов) php-pear-Mail-Mime
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-pear-Mail-Mime-cve-2024-34507-cve-2024-345067095/" type="self" id="ROS-20240514-15" title="ROS-20240514-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34507" type="cve" id="CVE-2024-34507" title="CVE-2024-34507" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34506" type="cve" id="CVE-2024-34506" title="CVE-2024-34506" />
			<reference href="https://bdu.fstec.ru/vul/2024-03487" type="self" id="BDU:2024-03487" title="BDU:2024-03487" />
			<reference href="https://bdu.fstec.ru/vul/2024-03488" type="self" id="BDU:2024-03488" title="BDU:2024-03488" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php-pear-Mail-Mime" epoch="0" version="1.10.12" release="1.el7" arch="noarch" src="">
					<filename>php-pear-Mail-Mime-0:1.10.12-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240514-16</id>
		<issued date="2024-05-14" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости php-pear-Net-SMTP </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в php-pear-Net-SMTP</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-pear-Net-SMTP-cve-2024-34507-cve-2024-345065063/</description>
               <solution>
                    Запретить использование в ОС пакета php-pear-Net-SMTP
                или
                    Установить обновление для пакета(ов) php-pear-Net-SMTP
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-pear-Net-SMTP-cve-2024-34507-cve-2024-345065063/" type="self" id="ROS-20240514-16" title="ROS-20240514-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34507" type="cve" id="CVE-2024-34507" title="CVE-2024-34507" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34506" type="cve" id="CVE-2024-34506" title="CVE-2024-34506" />
			<reference href="https://bdu.fstec.ru/vul/2024-03487" type="self" id="BDU:2024-03487" title="BDU:2024-03487" />
			<reference href="https://bdu.fstec.ru/vul/2024-03488" type="self" id="BDU:2024-03488" title="BDU:2024-03488" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php-pear-Net-SMTP" epoch="0" version="1.12.0" release="1.el7" arch="noarch" src="">
					<filename>php-pear-Net-SMTP-0:1.12.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240514-02</id>
		<issued date="2024-05-14" />
		<updated date="2024-05-14" />
		<title>Уязвимость snakeyaml </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в snakeyaml</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-snakeyaml-cve-2021-26291/</description>
               <solution>
                    Запретить использование в ОС пакета snakeyaml
                или
                    Установить обновление для пакета(ов) snakeyaml
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-snakeyaml-cve-2021-26291/" type="self" id="ROS-20240514-02" title="ROS-20240514-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26291" type="cve" id="CVE-2021-26291" title="CVE-2021-26291" />
			<reference href="https://bdu.fstec.ru/vul/2023-05216" type="self" id="BDU:2023-05216" title="BDU:2023-05216" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="snakeyaml" epoch="0" version="2.2" release="1.el7" arch="noarch" src="">
					<filename>snakeyaml-0:2.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240514-03</id>
		<issued date="2024-05-14" />
		<updated date="2024-05-14" />
		<title>Уязвимость snakeyaml </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в snakeyaml</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-snakeyaml-cve-2022-1471/</description>
               <solution>
                    Запретить использование в ОС пакета snakeyaml
                или
                    Установить обновление для пакета(ов) snakeyaml
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-snakeyaml-cve-2022-1471/" type="self" id="ROS-20240514-03" title="ROS-20240514-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1471" type="cve" id="CVE-2022-1471" title="CVE-2022-1471" />
			<reference href="https://bdu.fstec.ru/vul/2023-00013" type="self" id="BDU:2023-00013" title="BDU:2023-00013" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="snakeyaml" epoch="0" version="2.2" release="1.el7" arch="noarch" src="">
					<filename>snakeyaml-0:2.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240514-04</id>
		<issued date="2024-05-14" />
		<updated date="2024-05-14" />
		<title>Множественные уязвимости netty </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в netty</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-netty-cve-2022-41915-cve-2022-41881-cve-2023-34462-cve-2024-29025/</description>
               <solution>
                    Запретить использование в ОС пакета netty
                или
                    Установить обновление для пакета(ов) netty
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-netty-cve-2022-41915-cve-2022-41881-cve-2023-34462-cve-2024-29025/" type="self" id="ROS-20240514-04" title="ROS-20240514-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41915" type="cve" id="CVE-2022-41915" title="CVE-2022-41915" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41881" type="cve" id="CVE-2022-41881" title="CVE-2022-41881" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34462" type="cve" id="CVE-2023-34462" title="CVE-2023-34462" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29025" type="cve" id="CVE-2024-29025" title="CVE-2024-29025" />
			<reference href="https://bdu.fstec.ru/vul/2024-00183" type="self" id="BDU:2024-00183" title="BDU:2024-00183" />
			<reference href="https://bdu.fstec.ru/vul/2023-05619" type="self" id="BDU:2023-05619" title="BDU:2023-05619" />
			<reference href="https://bdu.fstec.ru/vul/2023-05355" type="self" id="BDU:2023-05355" title="BDU:2023-05355" />
			<reference href="https://bdu.fstec.ru/vul/2024-02650" type="self" id="BDU:2024-02650" title="BDU:2024-02650" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="netty" epoch="0" version="4.1.108" release="1.el7" arch="x86_64" src="">
					<filename>netty-0:4.1.108-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240514-05</id>
		<issued date="2024-05-14" />
		<updated date="2024-05-14" />
		<title>Уязвимость snakeyaml </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в snakeyaml</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-snakeyaml-cve-2022-41854/</description>
               <solution>
                    Запретить использование в ОС пакета snakeyaml
                или
                    Установить обновление для пакета(ов) snakeyaml
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-snakeyaml-cve-2022-41854/" type="self" id="ROS-20240514-05" title="ROS-20240514-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41854" type="cve" id="CVE-2022-41854" title="CVE-2022-41854" />
			<reference href="https://bdu.fstec.ru/vul/2023-05611" type="self" id="BDU:2023-05611" title="BDU:2023-05611" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="snakeyaml" epoch="0" version="2.2" release="1.el7" arch="noarch" src="">
					<filename>snakeyaml-0:2.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240516-01</id>
		<issued date="2024-05-16" />
		<updated date="2024-05-16" />
		<title>Уязвимость less </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в less</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-less-cve-2024-32487/</description>
               <solution>
                    Запретить использование в ОС пакета Less
                или
                    Установить обновление для пакета(ов) Less
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-less-cve-2024-32487/" type="self" id="ROS-20240516-01" title="ROS-20240516-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32487" type="cve" id="CVE-2024-32487" title="CVE-2024-32487" />
			<reference href="https://bdu.fstec.ru/vul/2024-03717" type="self" id="BDU:2024-03717" title="BDU:2024-03717" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="less" epoch="0" version="608" release="2.el7" arch="x86_64" src="">
					<filename>less-0:608-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240521-01</id>
		<issued date="2024-05-21" />
		<updated date="2024-05-21" />
		<title>Множественные уязвимости mutt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mutt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mutt-cve-2023-4874-cve-2023-4875/</description>
               <solution>
                    Запретить использование в ОС пакета mutt
                или
                    Установить обновление для пакета(ов) mutt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mutt-cve-2023-4874-cve-2023-4875/" type="self" id="ROS-20240521-01" title="ROS-20240521-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4874" type="cve" id="CVE-2023-4874" title="CVE-2023-4874" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4875" type="cve" id="CVE-2023-4875" title="CVE-2023-4875" />
			<reference href="https://bdu.fstec.ru/vul/2023-05784" type="self" id="BDU:2023-05784" title="BDU:2023-05784" />
			<reference href="https://bdu.fstec.ru/vul/2023-05450" type="self" id="BDU:2023-05450" title="BDU:2023-05450" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mutt" epoch="5" version="2.2.9" release="2.el7" arch="x86_64" src="">
					<filename>mutt-5:2.2.9-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240521-02</id>
		<issued date="2024-05-21" />
		<updated date="2024-05-21" />
		<title>Уязвимость squid </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в squid</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-squid-cve-2023-46847/</description>
               <solution>
                    Запретить использование в ОС пакета squid
                или
                    Установить обновление для пакета(ов) squid
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-squid-cve-2023-46847/" type="self" id="ROS-20240521-02" title="ROS-20240521-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46847" type="cve" id="CVE-2023-46847" title="CVE-2023-46847" />
			<reference href="https://bdu.fstec.ru/vul/2023-07920" type="self" id="BDU:2023-07920" title="BDU:2023-07920" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="squid" epoch="7" version="6.5" release="1.el7" arch="x86_64" src="">
					<filename>squid-7:6.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240521-03</id>
		<issued date="2024-05-21" />
		<updated date="2024-05-21" />
		<title>Уязвимость python3-bottle </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в python3-bottle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-bottle-cve-2022-31799/</description>
               <solution>
                    Запретить использование в ОС пакета python3-bottle
                или
                    Установить обновление для пакета(ов) python3-bottle
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-bottle-cve-2022-31799/" type="self" id="ROS-20240521-03" title="ROS-20240521-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31799" type="cve" id="CVE-2022-31799" title="CVE-2022-31799" />
			<reference href="https://bdu.fstec.ru/vul/2024-04113" type="self" id="BDU:2024-04113" title="BDU:2024-04113" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-bottle" epoch="0" version="0.12.21" release="1.el7" arch="noarch" src="">
					<filename>python3-bottle-0:0.12.21-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240521-04</id>
		<issued date="2024-05-21" />
		<updated date="2024-05-21" />
		<title>Уязвимость libyang </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libyang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libyang-cve-2023-26916/</description>
               <solution>
                    Запретить использование в ОС пакета libyang
                или
                    Установить обновление для пакета(ов) libyang
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libyang-cve-2023-26916/" type="self" id="ROS-20240521-04" title="ROS-20240521-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26916" type="cve" id="CVE-2023-26916" title="CVE-2023-26916" />
			<reference href="https://bdu.fstec.ru/vul/2024-04107" type="self" id="BDU:2024-04107" title="BDU:2024-04107" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libyang" epoch="0" version="2.0.231" release="1.el7" arch="x86_64" src="">
					<filename>libyang-0:2.0.231-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240521-05</id>
		<issued date="2024-05-21" />
		<updated date="2024-05-22" />
		<title>Множественные уязвимости java-1.8.0-openjdk</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в java-1.8.0-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-1-8-0-openjdk/</description>
               <solution>
                    Запретить использование в ОС пакета java-1.8.0-openjdk
                или
                    Установить обновление для пакета(ов) java-1.8.0-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-1-8-0-openjdk/" type="self" id="ROS-20240521-05" title="ROS-20240521-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21830" type="cve" id="CVE-2023-21830" title="CVE-2023-21830" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835" type="cve" id="CVE-2023-21835" title="CVE-2023-21835" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930" type="cve" id="CVE-2023-21930" title="CVE-2023-21930" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939" type="cve" id="CVE-2023-21939" title="CVE-2023-21939" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954" type="cve" id="CVE-2023-21954" title="CVE-2023-21954" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967" type="cve" id="CVE-2023-21967" title="CVE-2023-21967" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041" type="cve" id="CVE-2023-22041" title="CVE-2023-22041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22043" type="cve" id="CVE-2023-22043" title="CVE-2023-22043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540" type="cve" id="CVE-2022-21540" title="CVE-2022-21540" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541" type="cve" id="CVE-2022-21541" title="CVE-2022-21541" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169" type="cve" id="CVE-2022-34169" title="CVE-2022-34169" />
			<reference href="https://bdu.fstec.ru/vul/2023-05214" type="self" id="BDU:2023-05214" title="BDU:2023-05214" />
			<reference href="https://bdu.fstec.ru/vul/2023-00510" type="self" id="BDU:2023-00510" title="BDU:2023-00510" />
			<reference href="https://bdu.fstec.ru/vul/2023-02179" type="self" id="BDU:2023-02179" title="BDU:2023-02179" />
			<reference href="https://bdu.fstec.ru/vul/2023-02497" type="self" id="BDU:2023-02497" title="BDU:2023-02497" />
			<reference href="https://bdu.fstec.ru/vul/2023-02501" type="self" id="BDU:2023-02501" title="BDU:2023-02501" />
			<reference href="https://bdu.fstec.ru/vul/2023-02504" type="self" id="BDU:2023-02504" title="BDU:2023-02504" />
			<reference href="https://bdu.fstec.ru/vul/2023-04348" type="self" id="BDU:2023-04348" title="BDU:2023-04348" />
			<reference href="https://bdu.fstec.ru/vul/2023-04260" type="self" id="BDU:2023-04260" title="BDU:2023-04260" />
			<reference href="https://bdu.fstec.ru/vul/2022-05104" type="self" id="BDU:2022-05104" title="BDU:2022-05104" />
			<reference href="https://bdu.fstec.ru/vul/2022-05103" type="self" id="BDU:2022-05103" title="BDU:2022-05103" />
			<reference href="https://bdu.fstec.ru/vul/2022-04788" type="self" id="BDU:2022-04788" title="BDU:2022-04788" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-1.8.0-openjdk" epoch="1" version="1.8.0.402.b06" release="1.el7" arch="x86_64" src="">
					<filename>java-1.8.0-openjdk-1:1.8.0.402.b06-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240521-09</id>
		<issued date="2024-05-21" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости java-11-openjdk</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в java-11-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-11/</description>
               <solution>
                    Запретить использование в ОС пакета java-11-openjdk
                или
                    Установить обновление для пакета(ов) java-11-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-11/" type="self" id="ROS-20240521-09" title="ROS-20240521-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21830" type="cve" id="CVE-2023-21830" title="CVE-2023-21830" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835" type="cve" id="CVE-2023-21835" title="CVE-2023-21835" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930" type="cve" id="CVE-2023-21930" title="CVE-2023-21930" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939" type="cve" id="CVE-2023-21939" title="CVE-2023-21939" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954" type="cve" id="CVE-2023-21954" title="CVE-2023-21954" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967" type="cve" id="CVE-2023-21967" title="CVE-2023-21967" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041" type="cve" id="CVE-2023-22041" title="CVE-2023-22041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22043" type="cve" id="CVE-2023-22043" title="CVE-2023-22043" />
			<reference href="https://bdu.fstec.ru/vul/2023-05214" type="self" id="BDU:2023-05214" title="BDU:2023-05214" />
			<reference href="https://bdu.fstec.ru/vul/2023-00510" type="self" id="BDU:2023-00510" title="BDU:2023-00510" />
			<reference href="https://bdu.fstec.ru/vul/2023-02179" type="self" id="BDU:2023-02179" title="BDU:2023-02179" />
			<reference href="https://bdu.fstec.ru/vul/2023-02497" type="self" id="BDU:2023-02497" title="BDU:2023-02497" />
			<reference href="https://bdu.fstec.ru/vul/2023-02501" type="self" id="BDU:2023-02501" title="BDU:2023-02501" />
			<reference href="https://bdu.fstec.ru/vul/2023-02504" type="self" id="BDU:2023-02504" title="BDU:2023-02504" />
			<reference href="https://bdu.fstec.ru/vul/2023-04348" type="self" id="BDU:2023-04348" title="BDU:2023-04348" />
			<reference href="https://bdu.fstec.ru/vul/2023-04260" type="self" id="BDU:2023-04260" title="BDU:2023-04260" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-11-openjdk" epoch="1" version="11.0.22.0.7" release="1.el7" arch="x86_64" src="">
					<filename>java-11-openjdk-1:11.0.22.0.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240521-10</id>
		<issued date="2024-05-21" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости java-17-openjdk</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в java-17-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-118436/</description>
               <solution>
                    Запретить использование в ОС пакета java-17-openjdk
                или
                    Установить обновление для пакета(ов) java-17-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-118436/" type="self" id="ROS-20240521-10" title="ROS-20240521-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21830" type="cve" id="CVE-2023-21830" title="CVE-2023-21830" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835" type="cve" id="CVE-2023-21835" title="CVE-2023-21835" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930" type="cve" id="CVE-2023-21930" title="CVE-2023-21930" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939" type="cve" id="CVE-2023-21939" title="CVE-2023-21939" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954" type="cve" id="CVE-2023-21954" title="CVE-2023-21954" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967" type="cve" id="CVE-2023-21967" title="CVE-2023-21967" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041" type="cve" id="CVE-2023-22041" title="CVE-2023-22041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22043" type="cve" id="CVE-2023-22043" title="CVE-2023-22043" />
			<reference href="https://bdu.fstec.ru/vul/2023-05214" type="self" id="BDU:2023-05214" title="BDU:2023-05214" />
			<reference href="https://bdu.fstec.ru/vul/2023-00510" type="self" id="BDU:2023-00510" title="BDU:2023-00510" />
			<reference href="https://bdu.fstec.ru/vul/2023-02179" type="self" id="BDU:2023-02179" title="BDU:2023-02179" />
			<reference href="https://bdu.fstec.ru/vul/2023-02497" type="self" id="BDU:2023-02497" title="BDU:2023-02497" />
			<reference href="https://bdu.fstec.ru/vul/2023-02501" type="self" id="BDU:2023-02501" title="BDU:2023-02501" />
			<reference href="https://bdu.fstec.ru/vul/2023-02504" type="self" id="BDU:2023-02504" title="BDU:2023-02504" />
			<reference href="https://bdu.fstec.ru/vul/2023-04348" type="self" id="BDU:2023-04348" title="BDU:2023-04348" />
			<reference href="https://bdu.fstec.ru/vul/2023-04260" type="self" id="BDU:2023-04260" title="BDU:2023-04260" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-17-openjdk" epoch="1" version="17.0.10.0.7" release="1.el7" arch="x86_64" src="">
					<filename>java-17-openjdk-1:17.0.10.0.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240521-11</id>
		<issued date="2024-05-21" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости java-21-openjdk</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в java-21-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-1184365962/</description>
               <solution>
                    Запретить использование в ОС пакета java-21-openjdk
                или
                    Установить обновление для пакета(ов) java-21-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-1184365962/" type="self" id="ROS-20240521-11" title="ROS-20240521-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21830" type="cve" id="CVE-2023-21830" title="CVE-2023-21830" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835" type="cve" id="CVE-2023-21835" title="CVE-2023-21835" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930" type="cve" id="CVE-2023-21930" title="CVE-2023-21930" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939" type="cve" id="CVE-2023-21939" title="CVE-2023-21939" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954" type="cve" id="CVE-2023-21954" title="CVE-2023-21954" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967" type="cve" id="CVE-2023-21967" title="CVE-2023-21967" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041" type="cve" id="CVE-2023-22041" title="CVE-2023-22041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22043" type="cve" id="CVE-2023-22043" title="CVE-2023-22043" />
			<reference href="https://bdu.fstec.ru/vul/2023-05214" type="self" id="BDU:2023-05214" title="BDU:2023-05214" />
			<reference href="https://bdu.fstec.ru/vul/2023-00510" type="self" id="BDU:2023-00510" title="BDU:2023-00510" />
			<reference href="https://bdu.fstec.ru/vul/2023-02179" type="self" id="BDU:2023-02179" title="BDU:2023-02179" />
			<reference href="https://bdu.fstec.ru/vul/2023-02497" type="self" id="BDU:2023-02497" title="BDU:2023-02497" />
			<reference href="https://bdu.fstec.ru/vul/2023-02501" type="self" id="BDU:2023-02501" title="BDU:2023-02501" />
			<reference href="https://bdu.fstec.ru/vul/2023-02504" type="self" id="BDU:2023-02504" title="BDU:2023-02504" />
			<reference href="https://bdu.fstec.ru/vul/2023-04348" type="self" id="BDU:2023-04348" title="BDU:2023-04348" />
			<reference href="https://bdu.fstec.ru/vul/2023-04260" type="self" id="BDU:2023-04260" title="BDU:2023-04260" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-21-openjdk" epoch="1" version="21.0.2.0.13" release="1.el7" arch="x86_64" src="">
					<filename>java-21-openjdk-1:21.0.2.0.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240521-06</id>
		<issued date="2024-05-21" />
		<updated date="2024-05-21" />
		<title>Уязвимость python3-m2crypto </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-m2crypto</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-m2crypto-cve-2023-50781/</description>
               <solution>
                    Запретить использование в ОС пакета python3-m2crypto
                или
                    Установить обновление для пакета(ов) python3-m2crypto
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-m2crypto-cve-2023-50781/" type="self" id="ROS-20240521-06" title="ROS-20240521-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50781" type="cve" id="CVE-2023-50781" title="CVE-2023-50781" />
			<reference href="https://bdu.fstec.ru/vul/2024-04114" type="self" id="BDU:2024-04114" title="BDU:2024-04114" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-m2crypto" epoch="0" version="0.41.0" release="2.el7" arch="x86_64" src="">
					<filename>python3-m2crypto-0:0.41.0-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240521-07</id>
		<issued date="2024-05-21" />
		<updated date="2024-05-21" />
		<title>Уязвимость python3-cryptography </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-cryptography</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cryptography-cve-2023-50782/</description>
               <solution>
                    Запретить использование в ОС пакета python3-cryptography
                или
                    Установить обновление для пакета(ов) python3-cryptography
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cryptography-cve-2023-50782/" type="self" id="ROS-20240521-07" title="ROS-20240521-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50782" type="cve" id="CVE-2023-50782" title="CVE-2023-50782" />
			<reference href="https://bdu.fstec.ru/vul/2024-04115" type="self" id="BDU:2024-04115" title="BDU:2024-04115" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-cryptography" epoch="0" version="39.0.2" release="4.el7" arch="x86_64" src="">
					<filename>python3-cryptography-0:39.0.2-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240521-08</id>
		<issued date="2024-05-21" />
		<updated date="2024-05-21" />
		<title>Множественные уязвимости grafana </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в grafana</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-grafana-cve-2024-1442-cve-2024-1313/</description>
               <solution>
                    Запретить использование в ОС пакета grafana
                или
                    Установить обновление для пакета(ов) grafana
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-grafana-cve-2024-1442-cve-2024-1313/" type="self" id="ROS-20240521-08" title="ROS-20240521-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1442" type="cve" id="CVE-2024-1442" title="CVE-2024-1442" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1313" type="cve" id="CVE-2024-1313" title="CVE-2024-1313" />
			<reference href="https://bdu.fstec.ru/vul/2024-01927" type="self" id="BDU:2024-01927" title="BDU:2024-01927" />
			<reference href="https://bdu.fstec.ru/vul/2024-04116" type="self" id="BDU:2024-04116" title="BDU:2024-04116" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="grafana" epoch="0" version="10.3.5" release="1.el7" arch="x86_64" src="">
					<filename>grafana-0:10.3.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240522-01</id>
		<issued date="2024-05-22" />
		<updated date="2024-05-22" />
		<title>Уязвимость cri-o </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в cri-o</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cri-o-cve-2024-3154/</description>
               <solution>
                    Запретить использование в ОС пакета Cri-o
                или
                    Установить обновление для пакета(ов) Cri-o
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cri-o-cve-2024-3154/" type="self" id="ROS-20240522-01" title="ROS-20240522-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3154" type="cve" id="CVE-2024-3154" title="CVE-2024-3154" />
			<reference href="https://bdu.fstec.ru/vul/2024-04112" type="self" id="BDU:2024-04112" title="BDU:2024-04112" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cri-o" epoch="0" version="1.24.1" release="5.el7" arch="x86_64" src="">
					<filename>cri-o-0:1.24.1-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240522-02</id>
		<issued date="2024-05-22" />
		<updated date="2024-05-22" />
		<title>Уязвимость sssd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в sssd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sssd-cve-2023-3758/</description>
               <solution>
                    Запретить использование в ОС пакета SSSD
                или
                    Установить обновление для пакета(ов) SSSD
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sssd-cve-2023-3758/" type="self" id="ROS-20240522-02" title="ROS-20240522-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3758" type="cve" id="CVE-2023-3758" title="CVE-2023-3758" />
			<reference href="https://bdu.fstec.ru/vul/2024-04108" type="self" id="BDU:2024-04108" title="BDU:2024-04108" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="sssd" epoch="0" version="2.8.2" release="3.el7" arch="x86_64" src="">
					<filename>sssd-0:2.8.2-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240522-03</id>
		<issued date="2024-05-22" />
		<updated date="2024-05-22" />
		<title>Уязвимость kubernetes </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kubernetes</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kubernetes-cve-2024-3177/</description>
               <solution>
                    Запретить использование в ОС пакета kubernetes
                или
                    Установить обновление для пакета(ов) kubernetes
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kubernetes-cve-2024-3177/" type="self" id="ROS-20240522-03" title="ROS-20240522-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3177" type="cve" id="CVE-2024-3177" title="CVE-2024-3177" />
			<reference href="https://bdu.fstec.ru/vul/2024-04110" type="self" id="BDU:2024-04110" title="BDU:2024-04110" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kubernetes" epoch="0" version="1.24.17" release="5.el7" arch="x86_64" src="">
					<filename>kubernetes-0:1.24.17-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240522-04</id>
		<issued date="2024-05-22" />
		<updated date="2024-05-22" />
		<title>Уязвимость openssl3 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openssl3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2024-2511/</description>
               <solution>
                    Запретить использование в ОС пакета OpenSSL
                или
                    Установить обновление для пакета(ов) OpenSSL
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2024-2511/" type="self" id="ROS-20240522-04" title="ROS-20240522-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2511" type="cve" id="CVE-2024-2511" title="CVE-2024-2511" />
			<reference href="https://bdu.fstec.ru/vul/2024-04109" type="self" id="BDU:2024-04109" title="BDU:2024-04109" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl3" epoch="0" version="3.2.1" release="2.el7" arch="x86_64" src="">
					<filename>openssl3-0:3.2.1-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240522-05</id>
		<issued date="2024-05-22" />
		<updated date="2024-05-22" />
		<title>Множественные уязвимости java-11-openjdk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-11-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-11-openjdk-cve-2022-21540-cve-2022-21541-cve-2022-34169/</description>
               <solution>
                    Запретить использование в ОС пакета java-11-openjdk
                или
                    Установить обновление для пакета(ов) java-11-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-11-openjdk-cve-2022-21540-cve-2022-21541-cve-2022-34169/" type="self" id="ROS-20240522-05" title="ROS-20240522-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540" type="cve" id="CVE-2022-21540" title="CVE-2022-21540" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541" type="cve" id="CVE-2022-21541" title="CVE-2022-21541" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169" type="cve" id="CVE-2022-34169" title="CVE-2022-34169" />
			<reference href="https://bdu.fstec.ru/vul/2022-05104" type="self" id="BDU:2022-05104" title="BDU:2022-05104" />
			<reference href="https://bdu.fstec.ru/vul/2022-05103" type="self" id="BDU:2022-05103" title="BDU:2022-05103" />
			<reference href="https://bdu.fstec.ru/vul/2022-04788" type="self" id="BDU:2022-04788" title="BDU:2022-04788" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-11-openjdk" epoch="1" version="11.0.17.0.8" release="1.el7" arch="x86_64" src="">
					<filename>java-11-openjdk-1:11.0.17.0.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240522-06</id>
		<issued date="2024-05-22" />
		<updated date="2024-05-22" />
		<title>Уязвимость golang-google-protobuf </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang-google-protobuf</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-google-protobuf-cve-2024-24786/</description>
               <solution>
                    Запретить использование в ОС пакета golang-google-protobuf
                или
                    Установить обновление для пакета(ов) golang-google-protobuf
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-google-protobuf-cve-2024-24786/" type="self" id="ROS-20240522-06" title="ROS-20240522-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24786" type="cve" id="CVE-2024-24786" title="CVE-2024-24786" />
			<reference href="https://bdu.fstec.ru/vul/2024-04111" type="self" id="BDU:2024-04111" title="BDU:2024-04111" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang-google-protobuf" epoch="0" version="1.33.0" release="1.el7" arch="x86_64" src="">
					<filename>golang-google-protobuf-0:1.33.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240522-07</id>
		<issued date="2024-05-22" />
		<updated date="2024-05-22" />
		<title>Уязвимость firebird </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firebird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firebird-cve-2023-41038/</description>
               <solution>
                    Запретить использование в ОС пакета firebird
                или
                    Установить обновление для пакета(ов) firebird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firebird-cve-2023-41038/" type="self" id="ROS-20240522-07" title="ROS-20240522-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41038" type="cve" id="CVE-2023-41038" title="CVE-2023-41038" />
			<reference href="https://bdu.fstec.ru/vul/2024-02303" type="self" id="BDU:2024-02303" title="BDU:2024-02303" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firebird" epoch="0" version="4.0.4.3010" release="1.el7" arch="x86_64" src="">
					<filename>firebird-0:4.0.4.3010-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240424-01</id>
		<issued date="2024-05-24" />
		<updated date="2024-05-24" />
		<title>Множественные уязвимости java-1.8.0-openjdk</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-1.8.0-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-1-8-0-openjdk-24-05-24/</description>
               <solution>
                    Запретить использование в ОС пакета java-1.8.0-openjdk
                или
                    Установить обновление для пакета(ов) java-1.8.0-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-1-8-0-openjdk-24-05-24/" type="self" id="ROS-20240424-01" title="ROS-20240424-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21271" type="cve" id="CVE-2022-21271" title="CVE-2022-21271" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" type="cve" id="CVE-2022-21282" title="CVE-2022-21282" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" type="cve" id="CVE-2022-21293" title="CVE-2022-21293" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" type="cve" id="CVE-2022-21294" title="CVE-2022-21294" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" type="cve" id="CVE-2022-21296" title="CVE-2022-21296" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" type="cve" id="CVE-2022-21299" title="CVE-2022-21299" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" type="cve" id="CVE-2022-21305" title="CVE-2022-21305" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" type="cve" id="CVE-2022-21340" title="CVE-2022-21340" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" type="cve" id="CVE-2022-21341" title="CVE-2022-21341" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21349" type="cve" id="CVE-2022-21349" title="CVE-2022-21349" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" type="cve" id="CVE-2022-21360" title="CVE-2022-21360" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388" type="cve" id="CVE-2021-2388" title="CVE-2021-2388" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369" type="cve" id="CVE-2021-2369" title="CVE-2021-2369" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550" type="cve" id="CVE-2021-35550" title="CVE-2021-35550" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556" type="cve" id="CVE-2021-35556" title="CVE-2021-35556" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559" type="cve" id="CVE-2021-35559" title="CVE-2021-35559" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35560" type="cve" id="CVE-2021-35560" title="CVE-2021-35560" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561" type="cve" id="CVE-2021-35561" title="CVE-2021-35561" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564" type="cve" id="CVE-2021-35564" title="CVE-2021-35564" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565" type="cve" id="CVE-2021-35565" title="CVE-2021-35565" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567" type="cve" id="CVE-2021-35567" title="CVE-2021-35567" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578" type="cve" id="CVE-2021-35578" title="CVE-2021-35578" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586" type="cve" id="CVE-2021-35586" title="CVE-2021-35586" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2163" type="cve" id="CVE-2021-2163" title="CVE-2021-2163" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2161" type="cve" id="CVE-2021-2161" title="CVE-2021-2161" />
			<reference href="https://bdu.fstec.ru/vul/2022-02000" type="self" id="BDU:2022-02000" title="BDU:2022-02000" />
			<reference href="https://bdu.fstec.ru/vul/2023-05157" type="self" id="BDU:2023-05157" title="BDU:2023-05157" />
			<reference href="https://bdu.fstec.ru/vul/2022-01986" type="self" id="BDU:2022-01986" title="BDU:2022-01986" />
			<reference href="https://bdu.fstec.ru/vul/2022-01994" type="self" id="BDU:2022-01994" title="BDU:2022-01994" />
			<reference href="https://bdu.fstec.ru/vul/2022-01985" type="self" id="BDU:2022-01985" title="BDU:2022-01985" />
			<reference href="https://bdu.fstec.ru/vul/2023-05156" type="self" id="BDU:2023-05156" title="BDU:2023-05156" />
			<reference href="https://bdu.fstec.ru/vul/2023-05155" type="self" id="BDU:2023-05155" title="BDU:2023-05155" />
			<reference href="https://bdu.fstec.ru/vul/2023-05162" type="self" id="BDU:2023-05162" title="BDU:2023-05162" />
			<reference href="https://bdu.fstec.ru/vul/2023-05164" type="self" id="BDU:2023-05164" title="BDU:2023-05164" />
			<reference href="https://bdu.fstec.ru/vul/2022-02001" type="self" id="BDU:2022-02001" title="BDU:2022-02001" />
			<reference href="https://bdu.fstec.ru/vul/2022-02005" type="self" id="BDU:2022-02005" title="BDU:2022-02005" />
			<reference href="https://bdu.fstec.ru/vul/2021-04023" type="self" id="BDU:2021-04023" title="BDU:2021-04023" />
			<reference href="https://bdu.fstec.ru/vul/2021-04533" type="self" id="BDU:2021-04533" title="BDU:2021-04533" />
			<reference href="https://bdu.fstec.ru/vul/2023-03673" type="self" id="BDU:2023-03673" title="BDU:2023-03673" />
			<reference href="https://bdu.fstec.ru/vul/2023-03699" type="self" id="BDU:2023-03699" title="BDU:2023-03699" />
			<reference href="https://bdu.fstec.ru/vul/2023-03604" type="self" id="BDU:2023-03604" title="BDU:2023-03604" />
			<reference href="https://bdu.fstec.ru/vul/2022-02655" type="self" id="BDU:2022-02655" title="BDU:2022-02655" />
			<reference href="https://bdu.fstec.ru/vul/2023-03665" type="self" id="BDU:2023-03665" title="BDU:2023-03665" />
			<reference href="https://bdu.fstec.ru/vul/2023-03698" type="self" id="BDU:2023-03698" title="BDU:2023-03698" />
			<reference href="https://bdu.fstec.ru/vul/2023-03697" type="self" id="BDU:2023-03697" title="BDU:2023-03697" />
			<reference href="https://bdu.fstec.ru/vul/2023-04674" type="self" id="BDU:2023-04674" title="BDU:2023-04674" />
			<reference href="https://bdu.fstec.ru/vul/2023-05093" type="self" id="BDU:2023-05093" title="BDU:2023-05093" />
			<reference href="https://bdu.fstec.ru/vul/2023-05094" type="self" id="BDU:2023-05094" title="BDU:2023-05094" />
			<reference href="https://bdu.fstec.ru/vul/2021-02491" type="self" id="BDU:2021-02491" title="BDU:2021-02491" />
			<reference href="https://bdu.fstec.ru/vul/2021-02490" type="self" id="BDU:2021-02490" title="BDU:2021-02490" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-1.8.0-openjdk" epoch="1" version="1.8.0.402.b06" release="1.el7" arch="x86_64" src="">
					<filename>java-1.8.0-openjdk-1:1.8.0.402.b06-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240424-02</id>
		<issued date="2024-05-24" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости java-11-openjdk</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-11-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-11-openjdk-24-05-24/</description>
               <solution>
                    Запретить использование в ОС пакета java-11-openjdk
                или
                    Установить обновление для пакета(ов) java-11-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-11-openjdk-24-05-24/" type="self" id="ROS-20240424-02" title="ROS-20240424-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21271" type="cve" id="CVE-2022-21271" title="CVE-2022-21271" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" type="cve" id="CVE-2022-21282" title="CVE-2022-21282" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" type="cve" id="CVE-2022-21293" title="CVE-2022-21293" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" type="cve" id="CVE-2022-21294" title="CVE-2022-21294" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" type="cve" id="CVE-2022-21296" title="CVE-2022-21296" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" type="cve" id="CVE-2022-21299" title="CVE-2022-21299" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" type="cve" id="CVE-2022-21305" title="CVE-2022-21305" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" type="cve" id="CVE-2022-21340" title="CVE-2022-21340" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" type="cve" id="CVE-2022-21341" title="CVE-2022-21341" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" type="cve" id="CVE-2022-21360" title="CVE-2022-21360" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" type="cve" id="CVE-2022-21291" title="CVE-2022-21291" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388" type="cve" id="CVE-2021-2388" title="CVE-2021-2388" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369" type="cve" id="CVE-2021-2369" title="CVE-2021-2369" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550" type="cve" id="CVE-2021-35550" title="CVE-2021-35550" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556" type="cve" id="CVE-2021-35556" title="CVE-2021-35556" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559" type="cve" id="CVE-2021-35559" title="CVE-2021-35559" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35560" type="cve" id="CVE-2021-35560" title="CVE-2021-35560" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561" type="cve" id="CVE-2021-35561" title="CVE-2021-35561" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564" type="cve" id="CVE-2021-35564" title="CVE-2021-35564" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565" type="cve" id="CVE-2021-35565" title="CVE-2021-35565" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567" type="cve" id="CVE-2021-35567" title="CVE-2021-35567" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578" type="cve" id="CVE-2021-35578" title="CVE-2021-35578" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586" type="cve" id="CVE-2021-35586" title="CVE-2021-35586" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2163" type="cve" id="CVE-2021-2163" title="CVE-2021-2163" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2161" type="cve" id="CVE-2021-2161" title="CVE-2021-2161" />
			<reference href="https://bdu.fstec.ru/vul/2022-02000" type="self" id="BDU:2022-02000" title="BDU:2022-02000" />
			<reference href="https://bdu.fstec.ru/vul/2023-05157" type="self" id="BDU:2023-05157" title="BDU:2023-05157" />
			<reference href="https://bdu.fstec.ru/vul/2022-01986" type="self" id="BDU:2022-01986" title="BDU:2022-01986" />
			<reference href="https://bdu.fstec.ru/vul/2022-01994" type="self" id="BDU:2022-01994" title="BDU:2022-01994" />
			<reference href="https://bdu.fstec.ru/vul/2022-01985" type="self" id="BDU:2022-01985" title="BDU:2022-01985" />
			<reference href="https://bdu.fstec.ru/vul/2023-05156" type="self" id="BDU:2023-05156" title="BDU:2023-05156" />
			<reference href="https://bdu.fstec.ru/vul/2023-05155" type="self" id="BDU:2023-05155" title="BDU:2023-05155" />
			<reference href="https://bdu.fstec.ru/vul/2023-05162" type="self" id="BDU:2023-05162" title="BDU:2023-05162" />
			<reference href="https://bdu.fstec.ru/vul/2023-05164" type="self" id="BDU:2023-05164" title="BDU:2023-05164" />
			<reference href="https://bdu.fstec.ru/vul/2022-02005" type="self" id="BDU:2022-02005" title="BDU:2022-02005" />
			<reference href="https://bdu.fstec.ru/vul/2023-05158" type="self" id="BDU:2023-05158" title="BDU:2023-05158" />
			<reference href="https://bdu.fstec.ru/vul/2021-04023" type="self" id="BDU:2021-04023" title="BDU:2021-04023" />
			<reference href="https://bdu.fstec.ru/vul/2021-04533" type="self" id="BDU:2021-04533" title="BDU:2021-04533" />
			<reference href="https://bdu.fstec.ru/vul/2023-03673" type="self" id="BDU:2023-03673" title="BDU:2023-03673" />
			<reference href="https://bdu.fstec.ru/vul/2023-03699" type="self" id="BDU:2023-03699" title="BDU:2023-03699" />
			<reference href="https://bdu.fstec.ru/vul/2023-03604" type="self" id="BDU:2023-03604" title="BDU:2023-03604" />
			<reference href="https://bdu.fstec.ru/vul/2022-02655" type="self" id="BDU:2022-02655" title="BDU:2022-02655" />
			<reference href="https://bdu.fstec.ru/vul/2023-03665" type="self" id="BDU:2023-03665" title="BDU:2023-03665" />
			<reference href="https://bdu.fstec.ru/vul/2023-03698" type="self" id="BDU:2023-03698" title="BDU:2023-03698" />
			<reference href="https://bdu.fstec.ru/vul/2023-03697" type="self" id="BDU:2023-03697" title="BDU:2023-03697" />
			<reference href="https://bdu.fstec.ru/vul/2023-04674" type="self" id="BDU:2023-04674" title="BDU:2023-04674" />
			<reference href="https://bdu.fstec.ru/vul/2023-05093" type="self" id="BDU:2023-05093" title="BDU:2023-05093" />
			<reference href="https://bdu.fstec.ru/vul/2023-05094" type="self" id="BDU:2023-05094" title="BDU:2023-05094" />
			<reference href="https://bdu.fstec.ru/vul/2021-02491" type="self" id="BDU:2021-02491" title="BDU:2021-02491" />
			<reference href="https://bdu.fstec.ru/vul/2021-02490" type="self" id="BDU:2021-02490" title="BDU:2021-02490" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-11-openjdk" epoch="1" version="11.0.17.0.8" release="1.el7" arch="x86_64" src="">
					<filename>java-11-openjdk-1:11.0.17.0.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240424-03</id>
		<issued date="2024-05-24" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости java-17-openjdk</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в java-17-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-17-openjdk-24-05-24/</description>
               <solution>
                    Запретить использование в ОС пакета java-17-openjdk
                или
                    Установить обновление для пакета(ов) java-17-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-17-openjdk-24-05-24/" type="self" id="ROS-20240424-03" title="ROS-20240424-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" type="cve" id="CVE-2022-21282" title="CVE-2022-21282" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" type="cve" id="CVE-2022-21293" title="CVE-2022-21293" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" type="cve" id="CVE-2022-21294" title="CVE-2022-21294" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" type="cve" id="CVE-2022-21296" title="CVE-2022-21296" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" type="cve" id="CVE-2022-21299" title="CVE-2022-21299" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" type="cve" id="CVE-2022-21305" title="CVE-2022-21305" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" type="cve" id="CVE-2022-21340" title="CVE-2022-21340" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" type="cve" id="CVE-2022-21341" title="CVE-2022-21341" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" type="cve" id="CVE-2022-21360" title="CVE-2022-21360" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" type="cve" id="CVE-2022-21291" title="CVE-2022-21291" />
			<reference href="https://bdu.fstec.ru/vul/2023-05157" type="self" id="BDU:2023-05157" title="BDU:2023-05157" />
			<reference href="https://bdu.fstec.ru/vul/2022-01986" type="self" id="BDU:2022-01986" title="BDU:2022-01986" />
			<reference href="https://bdu.fstec.ru/vul/2022-01994" type="self" id="BDU:2022-01994" title="BDU:2022-01994" />
			<reference href="https://bdu.fstec.ru/vul/2022-01985" type="self" id="BDU:2022-01985" title="BDU:2022-01985" />
			<reference href="https://bdu.fstec.ru/vul/2023-05156" type="self" id="BDU:2023-05156" title="BDU:2023-05156" />
			<reference href="https://bdu.fstec.ru/vul/2023-05155" type="self" id="BDU:2023-05155" title="BDU:2023-05155" />
			<reference href="https://bdu.fstec.ru/vul/2023-05162" type="self" id="BDU:2023-05162" title="BDU:2023-05162" />
			<reference href="https://bdu.fstec.ru/vul/2023-05164" type="self" id="BDU:2023-05164" title="BDU:2023-05164" />
			<reference href="https://bdu.fstec.ru/vul/2022-02005" type="self" id="BDU:2022-02005" title="BDU:2022-02005" />
			<reference href="https://bdu.fstec.ru/vul/2023-05158" type="self" id="BDU:2023-05158" title="BDU:2023-05158" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-17-openjdk" epoch="1" version="17.0.10.0.7" release="1.el7" arch="x86_64" src="">
					<filename>java-17-openjdk-1:17.0.10.0.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240524-02</id>
		<issued date="2024-05-24" />
		<updated date="2024-05-24" />
		<title>Множественные уязвимости python3-reportlab </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в python3-reportlab</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-reportlab-cve-2019-19450-cve-2023-33733/</description>
               <solution>
                    Запретить использование в ОС пакета python3-reportlab
                или
                    Установить обновление для пакета(ов) python3-reportlab
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-reportlab-cve-2019-19450-cve-2023-33733/" type="self" id="ROS-20240524-02" title="ROS-20240524-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19450" type="cve" id="CVE-2019-19450" title="CVE-2019-19450" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33733" type="cve" id="CVE-2023-33733" title="CVE-2023-33733" />
			<reference href="https://bdu.fstec.ru/vul/2023-07027" type="self" id="BDU:2023-07027" title="BDU:2023-07027" />
			<reference href="https://bdu.fstec.ru/vul/2023-03106" type="self" id="BDU:2023-03106" title="BDU:2023-03106" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-reportlab" epoch="0" version="3.6.12" release="1.el7" arch="x86_64" src="">
					<filename>python3-reportlab-0:3.6.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240524-03</id>
		<issued date="2024-05-24" />
		<updated date="2024-05-24" />
		<title>Уязвимость rubygem-sinatra </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в rubygem-sinatra</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-sinatra-cve-2022-45442/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-sinatra
                или
                    Установить обновление для пакета(ов) rubygem-sinatra
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-sinatra-cve-2022-45442/" type="self" id="ROS-20240524-03" title="ROS-20240524-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45442" type="cve" id="CVE-2022-45442" title="CVE-2022-45442" />
			<reference href="https://bdu.fstec.ru/vul/2024-01888" type="self" id="BDU:2024-01888" title="BDU:2024-01888" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-sinatra" epoch="1" version="2.2.4" release="1.el7" arch="noarch" src="">
					<filename>rubygem-sinatra-1:2.2.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240422-10</id>
		<issued date="2024-05-24" />
		<updated date="2024-12-23" />
		<title>Уязвимость jenkins </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в jenkins</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jenkins-cve-2023-48795/</description>
               <solution>
                    Запретить использование в ОС пакета jenkins
                или
                    Установить обновление для пакета(ов) jenkins
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jenkins-cve-2023-48795/" type="self" id="ROS-20240422-10" title="ROS-20240422-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48795" type="cve" id="CVE-2023-48795" title="CVE-2023-48795" />
			<reference href="https://bdu.fstec.ru/vul/2023-08853" type="self" id="BDU:2023-08853" title="BDU:2023-08853" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jenkins" epoch="0" version="2.426.3" release="2.el7" arch="noarch" src="">
					<filename>jenkins-0:2.426.3-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240527-01</id>
		<issued date="2024-05-27" />
		<updated date="2024-05-27" />
		<title>Уязвимость botan2 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в botan2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-botan2-cve-2022-43705/</description>
               <solution>
                    Запретить использование в ОС пакета botan2
                или
                    Установить обновление для пакета(ов) botan2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-botan2-cve-2022-43705/" type="self" id="ROS-20240527-01" title="ROS-20240527-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43705" type="cve" id="CVE-2022-43705" title="CVE-2022-43705" />
			<reference href="https://bdu.fstec.ru/vul/2024-04212" type="self" id="BDU:2024-04212" title="BDU:2024-04212" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="botan2" epoch="0" version="2.19.3" release="1.el7" arch="x86_64" src="">
					<filename>botan2-0:2.19.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240527-02</id>
		<issued date="2024-05-27" />
		<updated date="2024-05-27" />
		<title>Множественные уязвимости mosquitto </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в mosquitto</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mosquitto-cve-2023-0809-cve-2023-3592/</description>
               <solution>
                    Запретить использование в ОС пакета mosquitto
                или
                    Установить обновление для пакета(ов) mosquitto
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mosquitto-cve-2023-0809-cve-2023-3592/" type="self" id="ROS-20240527-02" title="ROS-20240527-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0809" type="cve" id="CVE-2023-0809" title="CVE-2023-0809" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3592" type="cve" id="CVE-2023-3592" title="CVE-2023-3592" />
			<reference href="https://bdu.fstec.ru/vul/2024-04210" type="self" id="BDU:2024-04210" title="BDU:2024-04210" />
			<reference href="https://bdu.fstec.ru/vul/2024-04213" type="self" id="BDU:2024-04213" title="BDU:2024-04213" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mosquitto" epoch="0" version="2.0.16" release="2.el7" arch="x86_64" src="">
					<filename>mosquitto-0:2.0.16-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240527-03</id>
		<issued date="2024-05-27" />
		<updated date="2024-05-27" />
		<title>Уязвимость python3-idna </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-idna</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-idna-cve-2024-3651/</description>
               <solution>
                    Запретить использование в ОС пакета python3-idna
                или
                    Установить обновление для пакета(ов) python3-idna
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-idna-cve-2024-3651/" type="self" id="ROS-20240527-03" title="ROS-20240527-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3651" type="cve" id="CVE-2024-3651" title="CVE-2024-3651" />
			<reference href="https://bdu.fstec.ru/vul/2024-04211" type="self" id="BDU:2024-04211" title="BDU:2024-04211" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-idna" epoch="0" version="3.7" release="1.el7" arch="noarch" src="">
					<filename>python3-idna-0:3.7-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240527-04</id>
		<issued date="2024-05-27" />
		<updated date="2024-05-27" />
		<title>Множественные уязвимости git </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в git</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-git-cve-2024-32020-cve-2024-32004-cve-2024-32021-cve-2024-32465/</description>
               <solution>
                    Запретить использование в ОС пакета Git
                или
                    Установить обновление для пакета(ов) Git
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-git-cve-2024-32020-cve-2024-32004-cve-2024-32021-cve-2024-32465/" type="self" id="ROS-20240527-04" title="ROS-20240527-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32020" type="cve" id="CVE-2024-32020" title="CVE-2024-32020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32004" type="cve" id="CVE-2024-32004" title="CVE-2024-32004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32021" type="cve" id="CVE-2024-32021" title="CVE-2024-32021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32465" type="cve" id="CVE-2024-32465" title="CVE-2024-32465" />
			<reference href="https://bdu.fstec.ru/vul/2024-04214" type="self" id="BDU:2024-04214" title="BDU:2024-04214" />
			<reference href="https://bdu.fstec.ru/vul/2024-04093" type="self" id="BDU:2024-04093" title="BDU:2024-04093" />
			<reference href="https://bdu.fstec.ru/vul/2024-04094" type="self" id="BDU:2024-04094" title="BDU:2024-04094" />
			<reference href="https://bdu.fstec.ru/vul/2024-04042" type="self" id="BDU:2024-04042" title="BDU:2024-04042" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="git" epoch="0" version="2.44.1" release="1.el7" arch="x86_64" src="">
					<filename>git-0:2.44.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240529-01</id>
		<issued date="2024-05-29" />
		<updated date="2024-05-30" />
		<title>Множественные уязвимости java-1.8.0-openjdk</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в java-1.8.0-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-1-8-0-openjdk-29-05-24/</description>
               <solution>
                    Запретить использование в ОС пакета java-1.8.0-openjdk
                или
                    Установить обновление для пакета(ов) java-1.8.0-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-1-8-0-openjdk-29-05-24/" type="self" id="ROS-20240529-01" title="ROS-20240529-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" type="cve" id="CVE-2022-21365" title="CVE-2022-21365" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626" type="cve" id="CVE-2022-21626" title="CVE-2022-21626" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426" type="cve" id="CVE-2022-21426" title="CVE-2022-21426" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434" type="cve" id="CVE-2022-21434" title="CVE-2022-21434" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449" type="cve" id="CVE-2022-21449" title="CVE-2022-21449" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476" type="cve" id="CVE-2022-21476" title="CVE-2022-21476" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496" type="cve" id="CVE-2022-21496" title="CVE-2022-21496" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618" type="cve" id="CVE-2022-21618" title="CVE-2022-21618" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628" type="cve" id="CVE-2022-21628" title="CVE-2022-21628" />
			<reference href="https://bdu.fstec.ru/vul/2022-02011" type="self" id="BDU:2022-02011" title="BDU:2022-02011" />
			<reference href="https://bdu.fstec.ru/vul/2023-05205" type="self" id="BDU:2023-05205" title="BDU:2023-05205" />
			<reference href="https://bdu.fstec.ru/vul/2023-05186" type="self" id="BDU:2023-05186" title="BDU:2023-05186" />
			<reference href="https://bdu.fstec.ru/vul/2022-02839" type="self" id="BDU:2022-02839" title="BDU:2022-02839" />
			<reference href="https://bdu.fstec.ru/vul/2022-02516" type="self" id="BDU:2022-02516" title="BDU:2022-02516" />
			<reference href="https://bdu.fstec.ru/vul/2022-02686" type="self" id="BDU:2022-02686" title="BDU:2022-02686" />
			<reference href="https://bdu.fstec.ru/vul/2022-03794" type="self" id="BDU:2022-03794" title="BDU:2022-03794" />
			<reference href="https://bdu.fstec.ru/vul/2023-05188" type="self" id="BDU:2023-05188" title="BDU:2023-05188" />
			<reference href="https://bdu.fstec.ru/vul/2023-05213" type="self" id="BDU:2023-05213" title="BDU:2023-05213" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-1.8.0-openjdk" epoch="1" version="1.8.0.402.b06" release="2.el7" arch="x86_64" src="">
					<filename>java-1.8.0-openjdk-1:1.8.0.402.b06-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240529-02</id>
		<issued date="2024-05-29" />
		<updated date="2024-05-29" />
		<title>Уязвимость libreoffice </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libreoffice</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libreoffice-cve-2024-3044/</description>
               <solution>
                    Запретить использование в ОС пакета LibreOffice
                или
                    Установить обновление для пакета(ов) LibreOffice
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libreoffice-cve-2024-3044/" type="self" id="ROS-20240529-02" title="ROS-20240529-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3044" type="cve" id="CVE-2024-3044" title="CVE-2024-3044" />
			<reference href="https://bdu.fstec.ru/vul/2024-04136" type="self" id="BDU:2024-04136" title="BDU:2024-04136" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libreoffice" epoch="1" version="7.6.7.2" release="1.el7" arch="x86_64" src="">
					<filename>libreoffice-1:7.6.7.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240529-03</id>
		<issued date="2024-05-29" />
		<updated date="2024-05-29" />
		<title>Уязвимость git </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в git</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-git-cve-2024-32002/</description>
               <solution>
                    Запретить использование в ОС пакета Git
                или
                    Установить обновление для пакета(ов) git
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-git-cve-2024-32002/" type="self" id="ROS-20240529-03" title="ROS-20240529-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32002" type="cve" id="CVE-2024-32002" title="CVE-2024-32002" />
			<reference href="https://bdu.fstec.ru/vul/2024-03872" type="self" id="BDU:2024-03872" title="BDU:2024-03872" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="git" epoch="0" version="2.44.1" release="1.el7" arch="x86_64" src="">
					<filename>git-0:2.44.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240529-04</id>
		<issued date="2024-05-29" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости java-11-openjdk</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в java-11-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-11-openjdk-29-05-244643/</description>
               <solution>
                    Запретить использование в ОС пакета java-11-openjdk
                или
                    Установить обновление для пакета(ов) java-11-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-11-openjdk-29-05-244643/" type="self" id="ROS-20240529-04" title="ROS-20240529-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" type="cve" id="CVE-2022-21365" title="CVE-2022-21365" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426" type="cve" id="CVE-2022-21426" title="CVE-2022-21426" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626" type="cve" id="CVE-2022-21626" title="CVE-2022-21626" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434" type="cve" id="CVE-2022-21434" title="CVE-2022-21434" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449" type="cve" id="CVE-2022-21449" title="CVE-2022-21449" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476" type="cve" id="CVE-2022-21476" title="CVE-2022-21476" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496" type="cve" id="CVE-2022-21496" title="CVE-2022-21496" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618" type="cve" id="CVE-2022-21618" title="CVE-2022-21618" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628" type="cve" id="CVE-2022-21628" title="CVE-2022-21628" />
			<reference href="https://bdu.fstec.ru/vul/2022-02011" type="self" id="BDU:2022-02011" title="BDU:2022-02011" />
			<reference href="https://bdu.fstec.ru/vul/2023-05186" type="self" id="BDU:2023-05186" title="BDU:2023-05186" />
			<reference href="https://bdu.fstec.ru/vul/2023-05205" type="self" id="BDU:2023-05205" title="BDU:2023-05205" />
			<reference href="https://bdu.fstec.ru/vul/2022-02839" type="self" id="BDU:2022-02839" title="BDU:2022-02839" />
			<reference href="https://bdu.fstec.ru/vul/2022-02516" type="self" id="BDU:2022-02516" title="BDU:2022-02516" />
			<reference href="https://bdu.fstec.ru/vul/2022-02686" type="self" id="BDU:2022-02686" title="BDU:2022-02686" />
			<reference href="https://bdu.fstec.ru/vul/2022-03794" type="self" id="BDU:2022-03794" title="BDU:2022-03794" />
			<reference href="https://bdu.fstec.ru/vul/2023-05188" type="self" id="BDU:2023-05188" title="BDU:2023-05188" />
			<reference href="https://bdu.fstec.ru/vul/2023-05213" type="self" id="BDU:2023-05213" title="BDU:2023-05213" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-11-openjdk" epoch="1" version="11.0.17.0.8" release="1.el7" arch="x86_64" src="">
					<filename>java-11-openjdk-1:11.0.17.0.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240529-05</id>
		<issued date="2024-05-29" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости java-17-openjdk</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в java-17-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-17-openjdk-29-05-246708/</description>
               <solution>
                    Запретить использование в ОС пакета java-17-openjdk
                или
                    Установить обновление для пакета(ов) java-17-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-17-openjdk-29-05-246708/" type="self" id="ROS-20240529-05" title="ROS-20240529-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" type="cve" id="CVE-2022-21365" title="CVE-2022-21365" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426" type="cve" id="CVE-2022-21426" title="CVE-2022-21426" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434" type="cve" id="CVE-2022-21434" title="CVE-2022-21434" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449" type="cve" id="CVE-2022-21449" title="CVE-2022-21449" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476" type="cve" id="CVE-2022-21476" title="CVE-2022-21476" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496" type="cve" id="CVE-2022-21496" title="CVE-2022-21496" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21549" type="cve" id="CVE-2022-21549" title="CVE-2022-21549" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618" type="cve" id="CVE-2022-21618" title="CVE-2022-21618" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628" type="cve" id="CVE-2022-21628" title="CVE-2022-21628" />
			<reference href="https://bdu.fstec.ru/vul/2022-02011" type="self" id="BDU:2022-02011" title="BDU:2022-02011" />
			<reference href="https://bdu.fstec.ru/vul/2023-05186" type="self" id="BDU:2023-05186" title="BDU:2023-05186" />
			<reference href="https://bdu.fstec.ru/vul/2022-02839" type="self" id="BDU:2022-02839" title="BDU:2022-02839" />
			<reference href="https://bdu.fstec.ru/vul/2022-02516" type="self" id="BDU:2022-02516" title="BDU:2022-02516" />
			<reference href="https://bdu.fstec.ru/vul/2022-02686" type="self" id="BDU:2022-02686" title="BDU:2022-02686" />
			<reference href="https://bdu.fstec.ru/vul/2022-03794" type="self" id="BDU:2022-03794" title="BDU:2022-03794" />
			<reference href="https://bdu.fstec.ru/vul/2022-05102" type="self" id="BDU:2022-05102" title="BDU:2022-05102" />
			<reference href="https://bdu.fstec.ru/vul/2023-05188" type="self" id="BDU:2023-05188" title="BDU:2023-05188" />
			<reference href="https://bdu.fstec.ru/vul/2023-05213" type="self" id="BDU:2023-05213" title="BDU:2023-05213" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-17-openjdk" epoch="1" version="17.0.10.0.7" release="1.el7" arch="x86_64" src="">
					<filename>java-17-openjdk-1:17.0.10.0.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240603-01</id>
		<issued date="2024-06-03" />
		<updated date="2024-06-03" />
		<title>Уязвимость GIMP </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2023-44444/</description>
               <solution>
                    Запретить использование в ОС пакета gimp
                или
                    Установить обновление для пакета(ов) gimp
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2023-44444/" type="self" id="ROS-20240603-01" title="ROS-20240603-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44444" type="cve" id="CVE-2023-44444" title="CVE-2023-44444" />
			<reference href="https://bdu.fstec.ru/vul/2023-08259" type="self" id="BDU:2023-08259" title="BDU:2023-08259" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gimp" epoch="2" version="2.10.36" release="1.el7" arch="x86_64" src="">
					<filename>gimp-2:2.10.36-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240603-02</id>
		<issued date="2024-06-03" />
		<updated date="2024-06-03" />
		<title>Множественные уязвимости perl-Mojolicious </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в perl-Mojolicious</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-perl-mojolicious-cve-2020-36829-cve-2021-47208/</description>
               <solution>
                    Запретить использование в ОС пакета perl-Mojolicious
                или
                    Установить обновление для пакета(ов) perl-Mojolicious
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-perl-mojolicious-cve-2020-36829-cve-2021-47208/" type="self" id="ROS-20240603-02" title="ROS-20240603-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36829" type="cve" id="CVE-2020-36829" title="CVE-2020-36829" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47208" type="cve" id="CVE-2021-47208" title="CVE-2021-47208" />
			<reference href="https://bdu.fstec.ru/vul/2024-04335" type="self" id="BDU:2024-04335" title="BDU:2024-04335" />
			<reference href="https://bdu.fstec.ru/vul/2024-04336" type="self" id="BDU:2024-04336" title="BDU:2024-04336" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="perl-Mojolicious" epoch="0" version="9.19" release="1.el7" arch="noarch" src="">
					<filename>perl-Mojolicious-0:9.19-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240603-03</id>
		<issued date="2024-06-03" />
		<updated date="2024-06-03" />
		<title>Уязвимость expat </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в expat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-expat-cve-2023-52426/</description>
               <solution>
                    Запретить использование в ОС пакета expat
                или
                    Установить обновление для пакета(ов) expat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-expat-cve-2023-52426/" type="self" id="ROS-20240603-03" title="ROS-20240603-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52426" type="cve" id="CVE-2023-52426" title="CVE-2023-52426" />
			<reference href="https://bdu.fstec.ru/vul/2024-04334" type="self" id="BDU:2024-04334" title="BDU:2024-04334" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="expat" epoch="0" version="2.6.2" release="1.el7" arch="x86_64" src="">
					<filename>expat-0:2.6.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240603-04</id>
		<issued date="2024-06-03" />
		<updated date="2024-06-03" />
		<title>Множественные уязвимости httpd </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в httpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-httpd-cve-2006-20001-cve-2022-36760-cve-2022-37436/</description>
               <solution>
                    Запретить использование в ОС пакета httpd
                или
                    Установить обновление для пакета(ов) httpd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-httpd-cve-2006-20001-cve-2022-36760-cve-2022-37436/" type="self" id="ROS-20240603-04" title="ROS-20240603-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-20001" type="cve" id="CVE-2006-20001" title="CVE-2006-20001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36760" type="cve" id="CVE-2022-36760" title="CVE-2022-36760" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37436" type="cve" id="CVE-2022-37436" title="CVE-2022-37436" />
			<reference href="https://bdu.fstec.ru/vul/2023-01105" type="self" id="BDU:2023-01105" title="BDU:2023-01105" />
			<reference href="https://bdu.fstec.ru/vul/2023-00495" type="self" id="BDU:2023-00495" title="BDU:2023-00495" />
			<reference href="https://bdu.fstec.ru/vul/2023-00496" type="self" id="BDU:2023-00496" title="BDU:2023-00496" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="httpd" epoch="0" version="2.4.56" release="2.el7" arch="x86_64" src="">
					<filename>httpd-0:2.4.56-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240606-01</id>
		<issued date="2024-06-06" />
		<updated date="2025-10-09" />
		<title>Множественные уязвимости qemu </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в qemu-common</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-qemu-cve-2021-3750-cve-2023-2680-cve-2023-3255-cve-2023-3301/</description>
               <solution>
                    Запретить использование в ОС пакета qemu-common
                или
                    Установить обновление для пакета(ов) qemu-common
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-qemu-cve-2021-3750-cve-2023-2680-cve-2023-3255-cve-2023-3301/" type="self" id="ROS-20240606-01" title="ROS-20240606-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3750" type="cve" id="CVE-2021-3750" title="CVE-2021-3750" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2680" type="cve" id="CVE-2023-2680" title="CVE-2023-2680" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3255" type="cve" id="CVE-2023-3255" title="CVE-2023-3255" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3301" type="cve" id="CVE-2023-3301" title="CVE-2023-3301" />
			<reference href="https://bdu.fstec.ru/vul/2024-04421" type="self" id="BDU:2024-04421" title="BDU:2024-04421" />
			<reference href="https://bdu.fstec.ru/vul/2024-04420" type="self" id="BDU:2024-04420" title="BDU:2024-04420" />
			<reference href="https://bdu.fstec.ru/vul/2024-04419" type="self" id="BDU:2024-04419" title="BDU:2024-04419" />
			<reference href="https://bdu.fstec.ru/vul/2024-04418" type="self" id="BDU:2024-04418" title="BDU:2024-04418" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="qemu-common" epoch="15" version="7.2.7" release="1.el7" arch="x86_64" src="">
					<filename>qemu-common-15:7.2.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240606-02</id>
		<issued date="2024-06-06" />
		<updated date="2024-06-06" />
		<title>Уязвимость glib2 </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в glib2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glib2-cve-2024-34397/</description>
               <solution>
                    Запретить использование в ОС пакета glib2
                или
                    Установить обновление для пакета(ов) glib2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glib2-cve-2024-34397/" type="self" id="ROS-20240606-02" title="ROS-20240606-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34397" type="cve" id="CVE-2024-34397" title="CVE-2024-34397" />
			<reference href="https://bdu.fstec.ru/vul/2024-04422" type="self" id="BDU:2024-04422" title="BDU:2024-04422" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glib2" epoch="0" version="2.65.3" release="4.el7" arch="x86_64" src="">
					<filename>glib2-0:2.65.3-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240606-03</id>
		<issued date="2024-06-06" />
		<updated date="2024-06-06" />
		<title>Множественные уязвимости wireshark</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в wireshark</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-wireshark-06-06-24/</description>
               <solution>
                    Запретить использование в ОС пакета Wireshark
                или
                    Установить обновление для пакета(ов) Wireshark
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-wireshark-06-06-24/" type="self" id="ROS-20240606-03" title="ROS-20240606-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4855" type="cve" id="CVE-2024-4855" title="CVE-2024-4855" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2955" type="cve" id="CVE-2024-2955" title="CVE-2024-2955" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24478" type="cve" id="CVE-2024-24478" title="CVE-2024-24478" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24476" type="cve" id="CVE-2024-24476" title="CVE-2024-24476" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24479" type="cve" id="CVE-2024-24479" title="CVE-2024-24479" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4854" type="cve" id="CVE-2024-4854" title="CVE-2024-4854" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4853" type="cve" id="CVE-2024-4853" title="CVE-2024-4853" />
			<reference href="https://bdu.fstec.ru/vul/2024-04417" type="self" id="BDU:2024-04417" title="BDU:2024-04417" />
			<reference href="https://bdu.fstec.ru/vul/2024-02482" type="self" id="BDU:2024-02482" title="BDU:2024-02482" />
			<reference href="https://bdu.fstec.ru/vul/2024-01586" type="self" id="BDU:2024-01586" title="BDU:2024-01586" />
			<reference href="https://bdu.fstec.ru/vul/2024-01599" type="self" id="BDU:2024-01599" title="BDU:2024-01599" />
			<reference href="https://bdu.fstec.ru/vul/2024-01613" type="self" id="BDU:2024-01613" title="BDU:2024-01613" />
			<reference href="https://bdu.fstec.ru/vul/2024-04117" type="self" id="BDU:2024-04117" title="BDU:2024-04117" />
			<reference href="https://bdu.fstec.ru/vul/2024-04416" type="self" id="BDU:2024-04416" title="BDU:2024-04416" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="wireshark" epoch="1" version="4.2.5" release="1.el7" arch="x86_64" src="">
					<filename>wireshark-1:4.2.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240606-04</id>
		<issued date="2024-06-06" />
		<updated date="2024-06-06" />
		<title>Уязвимость erlang </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в erlang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-erlang-cve-2022-37026/</description>
               <solution>
                    Запретить использование в ОС пакета erlang
                или
                    Установить обновление для пакета(ов) erlang
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-erlang-cve-2022-37026/" type="self" id="ROS-20240606-04" title="ROS-20240606-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37026" type="cve" id="CVE-2022-37026" title="CVE-2022-37026" />
			<reference href="https://bdu.fstec.ru/vul/2023-03852" type="self" id="BDU:2023-03852" title="BDU:2023-03852" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="erlang" epoch="0" version="26.2.1" release="2.el7" arch="x86_64" src="">
					<filename>erlang-0:26.2.1-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240606-05</id>
		<issued date="2024-06-06" />
		<updated date="2024-06-06" />
		<title>Уязвимость jtidy </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в jtidy</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jtidy-cve-2023-34623/</description>
               <solution>
                    Запретить использование в ОС пакета jtidy
                или
                    Установить обновление для пакета(ов) jtidy
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jtidy-cve-2023-34623/" type="self" id="ROS-20240606-05" title="ROS-20240606-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34623" type="cve" id="CVE-2023-34623" title="CVE-2023-34623" />
			<reference href="https://bdu.fstec.ru/vul/2024-04425" type="self" id="BDU:2024-04425" title="BDU:2024-04425" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jtidy" epoch="2" version="1.0" release="0.37.20100930svn1125.el7" arch="noarch" src="">
					<filename>jtidy-2:1.0-0.37.20100930svn1125.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240606-06</id>
		<issued date="2024-06-06" />
		<updated date="2024-06-06" />
		<title>Уязвимость yajl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в yajl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-yajl-cve-2023-33460/</description>
               <solution>
                    Запретить использование в ОС пакета yajl
                или
                    Установить обновление для пакета(ов) yajl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-yajl-cve-2023-33460/" type="self" id="ROS-20240606-06" title="ROS-20240606-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33460" type="cve" id="CVE-2023-33460" title="CVE-2023-33460" />
			<reference href="https://bdu.fstec.ru/vul/2023-07652" type="self" id="BDU:2023-07652" title="BDU:2023-07652" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="yajl" epoch="0" version="2.1.0" release="19.el7" arch="x86_64" src="">
					<filename>yajl-0:2.1.0-19.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240606-07</id>
		<issued date="2024-06-06" />
		<updated date="2024-06-06" />
		<title>Уязвимость libmodsecurity </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libmodsecurity</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libmodsecurity-cve-2022-48279/</description>
               <solution>
                    Запретить использование в ОС пакета libmodsecurity
                или
                    Установить обновление для пакета(ов) libmodsecurity
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libmodsecurity-cve-2022-48279/" type="self" id="ROS-20240606-07" title="ROS-20240606-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48279" type="cve" id="CVE-2022-48279" title="CVE-2022-48279" />
			<reference href="https://bdu.fstec.ru/vul/2024-04426" type="self" id="BDU:2024-04426" title="BDU:2024-04426" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libmodsecurity" epoch="0" version="3.0.8" release="1.el7" arch="x86_64" src="">
					<filename>libmodsecurity-0:3.0.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240606-08</id>
		<issued date="2024-06-06" />
		<updated date="2024-06-06" />
		<title>Уязвимость portainer-ce </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в portainer-ce</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-portainer-ce-cve-2024-33661/</description>
               <solution>
                    Запретить использование в ОС пакета portainer-ce
                или
                    Установить обновление для пакета(ов) portainer-ce
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-portainer-ce-cve-2024-33661/" type="self" id="ROS-20240606-08" title="ROS-20240606-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33661" type="cve" id="CVE-2024-33661" title="CVE-2024-33661" />
			<reference href="https://bdu.fstec.ru/vul/2024-04424" type="self" id="BDU:2024-04424" title="BDU:2024-04424" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="portainer-ce" epoch="0" version="2.20.1" release="1.el7" arch="x86_64" src="">
					<filename>portainer-ce-0:2.20.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240606-09</id>
		<issued date="2024-06-06" />
		<updated date="2024-06-06" />
		<title>Уязвимость qt6-qtbase </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в qt6-qtbase</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qt6-qtbase-cve-2023-51714/</description>
               <solution>
                    Запретить использование в ОС пакета qt6
                или
                    Установить обновление для пакета(ов) qt6
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qt6-qtbase-cve-2023-51714/" type="self" id="ROS-20240606-09" title="ROS-20240606-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51714" type="cve" id="CVE-2023-51714" title="CVE-2023-51714" />
			<reference href="https://bdu.fstec.ru/vul/2024-00093" type="self" id="BDU:2024-00093" title="BDU:2024-00093" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="qt6-qtbase" epoch="0" version="6.6.2" release="1.el7" arch="x86_64" src="">
					<filename>qt6-qtbase-0:6.6.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240606-10</id>
		<issued date="2024-06-06" />
		<updated date="2024-06-06" />
		<title>Уязвимость openssl3 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openssl3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2024-4603/</description>
               <solution>
                    Запретить использование в ОС пакета openssl3
                или
                    Установить обновление для пакета(ов) openssl3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2024-4603/" type="self" id="ROS-20240606-10" title="ROS-20240606-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4603" type="cve" id="CVE-2024-4603" title="CVE-2024-4603" />
			<reference href="https://bdu.fstec.ru/vul/2024-04423" type="self" id="BDU:2024-04423" title="BDU:2024-04423" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl3" epoch="0" version="3.2.1" release="3.el7" arch="x86_64" src="">
					<filename>openssl3-0:3.2.1-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240607-01</id>
		<issued date="2024-06-07" />
		<updated date="2024-06-07" />
		<title>Множественные уязвимости frr </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в frr</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-frr-cve-2022-37032-cve-2022-37035/</description>
               <solution>
                    Запретить использование в ОС пакета frr
                или
                    Установить обновление для пакета(ов) frr
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-frr-cve-2022-37032-cve-2022-37035/" type="self" id="ROS-20240607-01" title="ROS-20240607-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37032" type="cve" id="CVE-2022-37032" title="CVE-2022-37032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37035" type="cve" id="CVE-2022-37035" title="CVE-2022-37035" />
			<reference href="https://bdu.fstec.ru/vul/2024-04437" type="self" id="BDU:2024-04437" title="BDU:2024-04437" />
			<reference href="https://bdu.fstec.ru/vul/2022-05134" type="self" id="BDU:2022-05134" title="BDU:2022-05134" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="frr" epoch="0" version="9.1" release="1.el7" arch="x86_64" src="">
					<filename>frr-0:9.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240607-02</id>
		<issued date="2024-06-07" />
		<updated date="2024-06-07" />
		<title>Уязвимость less </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в less</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-less-cve-2022-48624/</description>
               <solution>
                    Запретить использование в ОС пакета less
                или
                    Установить обновление для пакета(ов) less
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-less-cve-2022-48624/" type="self" id="ROS-20240607-02" title="ROS-20240607-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48624" type="cve" id="CVE-2022-48624" title="CVE-2022-48624" />
			<reference href="https://bdu.fstec.ru/vul/2024-04438" type="self" id="BDU:2024-04438" title="BDU:2024-04438" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="less" epoch="0" version="608" release="1.el7" arch="x86_64" src="">
					<filename>less-0:608-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240607-03</id>
		<issued date="2024-06-07" />
		<updated date="2024-06-07" />
		<title>Множественные уязвимости lrzip </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в lrzip</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-lrzip-cve-2022-26291-cve-2022-28044/</description>
               <solution>
                    Запретить использование в ОС пакета lrzip
                или
                    Установить обновление для пакета(ов) lrzip
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-lrzip-cve-2022-26291-cve-2022-28044/" type="self" id="ROS-20240607-03" title="ROS-20240607-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26291" type="cve" id="CVE-2022-26291" title="CVE-2022-26291" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28044" type="cve" id="CVE-2022-28044" title="CVE-2022-28044" />
			<reference href="https://bdu.fstec.ru/vul/2024-04439" type="self" id="BDU:2024-04439" title="BDU:2024-04439" />
			<reference href="https://bdu.fstec.ru/vul/2022-03285" type="self" id="BDU:2022-03285" title="BDU:2022-03285" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="lrzip" epoch="0" version="0.651" release="1.el7" arch="x86_64" src="">
					<filename>lrzip-0:0.651-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240607-04</id>
		<issued date="2024-06-07" />
		<updated date="2024-06-07" />
		<title>Уязвимость libvirt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libvirt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libvirt-cve-2024-4418/</description>
               <solution>
                    Запретить использование в ОС пакета Libvirt
                или
                    Установить обновление для пакета(ов) Libvirt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libvirt-cve-2024-4418/" type="self" id="ROS-20240607-04" title="ROS-20240607-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4418" type="cve" id="CVE-2024-4418" title="CVE-2024-4418" />
			<reference href="https://bdu.fstec.ru/vul/2024-04436" type="self" id="BDU:2024-04436" title="BDU:2024-04436" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libvirt" epoch="0" version="7.6.0" release="7.el7" arch="x86_64" src="">
					<filename>libvirt-0:7.6.0-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240607-05</id>
		<issued date="2024-06-07" />
		<updated date="2024-06-07" />
		<title>Уязвимость postgresql14 </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в postgresql14</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql14-cve-2024-4317/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql14
                или
                    Установить обновление для пакета(ов) postgresql14
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql14-cve-2024-4317/" type="self" id="ROS-20240607-05" title="ROS-20240607-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4317" type="cve" id="CVE-2024-4317" title="CVE-2024-4317" />
			<reference href="https://bdu.fstec.ru/vul/2024-03569" type="self" id="BDU:2024-03569" title="BDU:2024-03569" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql14" epoch="0" version="14.12" release="2.el7" arch="x86_64" src="">
					<filename>postgresql14-0:14.12-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240607-06</id>
		<issued date="2024-06-07" />
		<updated date="2024-12-23" />
		<title>Уязвимость postgresql15 </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в postgresql15</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql15-cve-2024-43174672/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql15
                или
                    Установить обновление для пакета(ов) postgresql15
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql15-cve-2024-43174672/" type="self" id="ROS-20240607-06" title="ROS-20240607-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4317" type="cve" id="CVE-2024-4317" title="CVE-2024-4317" />
			<reference href="https://bdu.fstec.ru/vul/2024-03569" type="self" id="BDU:2024-03569" title="BDU:2024-03569" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql15" epoch="0" version="15.7" release="2.el7" arch="x86_64" src="">
					<filename>postgresql15-0:15.7-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240607-07</id>
		<issued date="2024-06-07" />
		<updated date="2024-12-23" />
		<title>Уязвимость postgresql16 </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в postgresql16</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql16-cve-2024-43172634/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql16
                или
                    Установить обновление для пакета(ов) postgresql16
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql16-cve-2024-43172634/" type="self" id="ROS-20240607-07" title="ROS-20240607-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4317" type="cve" id="CVE-2024-4317" title="CVE-2024-4317" />
			<reference href="https://bdu.fstec.ru/vul/2024-03569" type="self" id="BDU:2024-03569" title="BDU:2024-03569" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql16" epoch="0" version="16.3" release="2.el7" arch="x86_64" src="">
					<filename>postgresql16-0:16.3-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240611-01</id>
		<issued date="2024-06-11" />
		<updated date="2024-06-11" />
		<title>Уязвимость python3-pymongo </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-pymongo</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-pymongo-cve-2024-5629/</description>
               <solution>
                    Запретить использование в ОС пакета PyMongo
                или
                    Установить обновление для пакета(ов) PyMongo
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-pymongo-cve-2024-5629/" type="self" id="ROS-20240611-01" title="ROS-20240611-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5629" type="cve" id="CVE-2024-5629" title="CVE-2024-5629" />
			<reference href="https://bdu.fstec.ru/vul/2024-04925" type="self" id="BDU:2024-04925" title="BDU:2024-04925" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-pymongo" epoch="0" version="4.3.3" release="2.el7" arch="x86_64" src="">
					<filename>python3-pymongo-0:4.3.3-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240611-02</id>
		<issued date="2024-06-11" />
		<updated date="2024-06-11" />
		<title>Множественные уязвимости tpm2-tss </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в tpm2-tss</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-tpm2-tss-cve-2024-29040-cve-2023-22745/</description>
               <solution>
                    Запретить использование в ОС пакета tpm2-tss
                или
                    Установить обновление для пакета(ов) tpm2-tss
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-tpm2-tss-cve-2024-29040-cve-2023-22745/" type="self" id="ROS-20240611-02" title="ROS-20240611-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29040" type="cve" id="CVE-2024-29040" title="CVE-2024-29040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22745" type="cve" id="CVE-2023-22745" title="CVE-2023-22745" />
			<reference href="https://bdu.fstec.ru/vul/2024-04481" type="self" id="BDU:2024-04481" title="BDU:2024-04481" />
			<reference href="https://bdu.fstec.ru/vul/2023-07640" type="self" id="BDU:2023-07640" title="BDU:2023-07640" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tpm2-tss" epoch="0" version="4.1.3" release="1.el7" arch="x86_64" src="">
					<filename>tpm2-tss-0:4.1.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240611-03</id>
		<issued date="2024-06-11" />
		<updated date="2024-06-11" />
		<title>Уязвимость amavisd-new </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в amavisd-new</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-amavisd-new-cve-2024-28054/</description>
               <solution>
                    Запретить использование в ОС пакета Amavis
                или
                    Установить обновление для пакета(ов) Amavis
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-amavisd-new-cve-2024-28054/" type="self" id="ROS-20240611-03" title="ROS-20240611-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28054" type="cve" id="CVE-2024-28054" title="CVE-2024-28054" />
			<reference href="https://bdu.fstec.ru/vul/2024-04924" type="self" id="BDU:2024-04924" title="BDU:2024-04924" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="amavisd-new" epoch="0" version="2.12.3" release="1.el7" arch="noarch" src="">
					<filename>amavisd-new-0:2.12.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240611-04</id>
		<issued date="2024-06-11" />
		<updated date="2024-06-11" />
		<title>Уязвимость python3-PyMySQL </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-PyMySQL</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-pymysql-cve-2024-36039/</description>
               <solution>
                    Запретить использование в ОС пакета python3-PyMySQL
                или
                    Установить обновление для пакета(ов) python3-PyMySQL
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-pymysql-cve-2024-36039/" type="self" id="ROS-20240611-04" title="ROS-20240611-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36039" type="cve" id="CVE-2024-36039" title="CVE-2024-36039" />
			<reference href="https://bdu.fstec.ru/vul/2024-04920" type="self" id="BDU:2024-04920" title="BDU:2024-04920" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-PyMySQL" epoch="0" version="0.10.1" release="13.el7" arch="noarch" src="">
					<filename>python3-PyMySQL-0:0.10.1-13.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240611-05</id>
		<issued date="2024-06-11" />
		<updated date="2024-06-11" />
		<title>Уязвимость zabbix </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в zabbix</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix-cve-2024-22120/</description>
               <solution>
                    Запретить использование в ОС пакета zabbix
                или
                    Установить обновление для пакета(ов) zabbix
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix-cve-2024-22120/" type="self" id="ROS-20240611-05" title="ROS-20240611-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22120" type="cve" id="CVE-2024-22120" title="CVE-2024-22120" />
			<reference href="https://bdu.fstec.ru/vul/2024-03942" type="self" id="BDU:2024-03942" title="BDU:2024-03942" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix" epoch="1" version="6.4.13" release="1.el7" arch="x86_64" src="">
					<filename>zabbix-1:6.4.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240611-06</id>
		<issued date="2024-06-11" />
		<updated date="2024-06-11" />
		<title>Уязвимость iperf3 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в iperf3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-iperf3-cve-2024-26306/</description>
               <solution>
                    Запретить использование в ОС пакета iPerf3
                или
                    Установить обновление для пакета(ов) iPerf3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-iperf3-cve-2024-26306/" type="self" id="ROS-20240611-06" title="ROS-20240611-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26306" type="cve" id="CVE-2024-26306" title="CVE-2024-26306" />
			<reference href="https://bdu.fstec.ru/vul/2024-04484" type="self" id="BDU:2024-04484" title="BDU:2024-04484" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="iperf3" epoch="0" version="3.17.1" release="1.el7" arch="x86_64" src="">
					<filename>iperf3-0:3.17.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240611-07</id>
		<issued date="2024-06-11" />
		<updated date="2024-06-11" />
		<title>Уязвимость dnsmasq </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dnsmasq</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dnsmasq-cve-2023-50387/</description>
               <solution>
                    Запретить использование в ОС пакета dnsmasq
                или
                    Установить обновление для пакета(ов) dnsmasq
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dnsmasq-cve-2023-50387/" type="self" id="ROS-20240611-07" title="ROS-20240611-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387" type="cve" id="CVE-2023-50387" title="CVE-2023-50387" />
			<reference href="https://bdu.fstec.ru/vul/2024-01359" type="self" id="BDU:2024-01359" title="BDU:2024-01359" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dnsmasq" epoch="0" version="2.90" release="1.el7" arch="x86_64" src="">
					<filename>dnsmasq-0:2.90-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240611-08</id>
		<issued date="2024-06-11" />
		<updated date="2024-06-11" />
		<title>Уязвимость ImageMagick </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в ImageMagick</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick-cve-2022-1115/</description>
               <solution>
                    Запретить использование в ОС пакета imagemagick
                или
                    Установить обновление для пакета(ов) imagemagick
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick-cve-2022-1115/" type="self" id="ROS-20240611-08" title="ROS-20240611-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1115" type="cve" id="CVE-2022-1115" title="CVE-2022-1115" />
			<reference href="https://bdu.fstec.ru/vul/2024-04487" type="self" id="BDU:2024-04487" title="BDU:2024-04487" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ImageMagick" epoch="0" version="6.9.12.89" release="1.el7" arch="x86_64" src="">
					<filename>ImageMagick-0:6.9.12.89-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240611-17</id>
		<issued date="2024-06-11" />
		<updated date="2024-12-23" />
		<title>Уязвимость ImageMagick7 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в ImageMagick7</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick-cve-2022-11154370/</description>
               <solution>
                    Запретить использование в ОС пакета imagemagick7
                или
                    Установить обновление для пакета(ов) imagemagick7
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick-cve-2022-11154370/" type="self" id="ROS-20240611-17" title="ROS-20240611-17" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1115" type="cve" id="CVE-2022-1115" title="CVE-2022-1115" />
			<reference href="https://bdu.fstec.ru/vul/2024-04487" type="self" id="BDU:2024-04487" title="BDU:2024-04487" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ImageMagick7" epoch="0" version="7.1.1.11" release="1.el7" arch="x86_64" src="">
					<filename>ImageMagick7-0:7.1.1.11-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240611-09</id>
		<issued date="2024-06-11" />
		<updated date="2024-06-11" />
		<title>Множественные уязвимости bind </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в bind</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-bind-cve-2023-50387-cve-2023-50868-cve-2023-4408-cve-2023-5517-cve-2023-5/</description>
               <solution>
                    Запретить использование в ОС пакета bind
                или
                    Установить обновление для пакета(ов) bind
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-bind-cve-2023-50387-cve-2023-50868-cve-2023-4408-cve-2023-5517-cve-2023-5/" type="self" id="ROS-20240611-09" title="ROS-20240611-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679" type="cve" id="CVE-2023-5679" title="CVE-2023-5679" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517" type="cve" id="CVE-2023-5517" title="CVE-2023-5517" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408" type="cve" id="CVE-2023-4408" title="CVE-2023-4408" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387" type="cve" id="CVE-2023-50387" title="CVE-2023-50387" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868" type="cve" id="CVE-2023-50868" title="CVE-2023-50868" />
			<reference href="https://bdu.fstec.ru/vul/2024-04269" type="self" id="BDU:2024-04269" title="BDU:2024-04269" />
			<reference href="https://bdu.fstec.ru/vul/2024-02902" type="self" id="BDU:2024-02902" title="BDU:2024-02902" />
			<reference href="https://bdu.fstec.ru/vul/2024-02883" type="self" id="BDU:2024-02883" title="BDU:2024-02883" />
			<reference href="https://bdu.fstec.ru/vul/2024-01359" type="self" id="BDU:2024-01359" title="BDU:2024-01359" />
			<reference href="https://bdu.fstec.ru/vul/2024-01462" type="self" id="BDU:2024-01462" title="BDU:2024-01462" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="bind" epoch="32" version="9.18.24" release="5.el7" arch="x86_64" src="">
					<filename>bind-32:9.18.24-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240611-10</id>
		<issued date="2024-06-11" />
		<updated date="2024-06-11" />
		<title>Уязвимость libuv </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libuv</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libuv-cve-2024-24806/</description>
               <solution>
                    Запретить использование в ОС пакета libuv
                или
                    Установить обновление для пакета(ов) libuv
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libuv-cve-2024-24806/" type="self" id="ROS-20240611-10" title="ROS-20240611-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24806" type="cve" id="CVE-2024-24806" title="CVE-2024-24806" />
			<reference href="https://bdu.fstec.ru/vul/2024-02979" type="self" id="BDU:2024-02979" title="BDU:2024-02979" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libuv" epoch="1" version="1.48.0" release="1.el7" arch="x86_64" src="">
					<filename>libuv-1:1.48.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240611-11</id>
		<issued date="2024-06-11" />
		<updated date="2024-06-11" />
		<title>Уязвимость lldpd </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в lldpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-lldpd-cve-2023-41910/</description>
               <solution>
                    Запретить использование в ОС пакета lldpd
                или
                    Установить обновление для пакета(ов) lldpd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-lldpd-cve-2023-41910/" type="self" id="ROS-20240611-11" title="ROS-20240611-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41910" type="cve" id="CVE-2023-41910" title="CVE-2023-41910" />
			<reference href="https://bdu.fstec.ru/vul/2024-04479" type="self" id="BDU:2024-04479" title="BDU:2024-04479" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="lldpd" epoch="0" version="1.0.18" release="1.el7" arch="x86_64" src="">
					<filename>lldpd-0:1.0.18-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240611-12</id>
		<issued date="2024-06-11" />
		<updated date="2024-06-11" />
		<title>Множественные уязвимости bind </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в bind</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-bind-cve-2023-4236-cve-2023-3341/</description>
               <solution>
                    Запретить использование в ОС пакета bind
                или
                    Установить обновление для пакета(ов) bind
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-bind-cve-2023-4236-cve-2023-3341/" type="self" id="ROS-20240611-12" title="ROS-20240611-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4236" type="cve" id="CVE-2023-4236" title="CVE-2023-4236" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3341" type="cve" id="CVE-2023-3341" title="CVE-2023-3341" />
			<reference href="https://bdu.fstec.ru/vul/2023-06007" type="self" id="BDU:2023-06007" title="BDU:2023-06007" />
			<reference href="https://bdu.fstec.ru/vul/2023-06079" type="self" id="BDU:2023-06079" title="BDU:2023-06079" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="bind" epoch="32" version="9.18.24" release="5.el7" arch="x86_64" src="">
					<filename>bind-32:9.18.24-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240611-13</id>
		<issued date="2024-06-11" />
		<updated date="2024-06-11" />
		<title>Уязвимость python3-GitPython </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в python3-GitPython</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-gitpython-cve-2023-40267/</description>
               <solution>
                    Запретить использование в ОС пакета python3-GitPython
                или
                    Установить обновление для пакета(ов) python3-GitPython
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-gitpython-cve-2023-40267/" type="self" id="ROS-20240611-13" title="ROS-20240611-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40267" type="cve" id="CVE-2023-40267" title="CVE-2023-40267" />
			<reference href="https://bdu.fstec.ru/vul/2023-05150" type="self" id="BDU:2023-05150" title="BDU:2023-05150" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-GitPython" epoch="0" version="3.1.35" release="1.el7" arch="noarch" src="">
					<filename>python3-GitPython-0:3.1.35-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240611-14</id>
		<issued date="2024-06-11" />
		<updated date="2025-10-09" />
		<title>Множественные уязвимости qemu </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в qemu-common</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-qemu-cve-2021-3611-cve-2020-14394-cve-2023-2861-cve-2021-3638/</description>
               <solution>
                    Запретить использование в ОС пакета qemu-common
                или
                    Установить обновление для пакета(ов) qemu-common
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-qemu-cve-2021-3611-cve-2020-14394-cve-2023-2861-cve-2021-3638/" type="self" id="ROS-20240611-14" title="ROS-20240611-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3611" type="cve" id="CVE-2021-3611" title="CVE-2021-3611" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14394" type="cve" id="CVE-2020-14394" title="CVE-2020-14394" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2861" type="cve" id="CVE-2023-2861" title="CVE-2023-2861" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3638" type="cve" id="CVE-2021-3638" title="CVE-2021-3638" />
			<reference href="https://bdu.fstec.ru/vul/2022-05645" type="self" id="BDU:2022-05645" title="BDU:2022-05645" />
			<reference href="https://bdu.fstec.ru/vul/2024-04482" type="self" id="BDU:2024-04482" title="BDU:2024-04482" />
			<reference href="https://bdu.fstec.ru/vul/2024-04483" type="self" id="BDU:2024-04483" title="BDU:2024-04483" />
			<reference href="https://bdu.fstec.ru/vul/2021-03673" type="self" id="BDU:2021-03673" title="BDU:2021-03673" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="qemu-common" epoch="15" version="7.2.7" release="1.el7" arch="x86_64" src="">
					<filename>qemu-common-15:7.2.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240611-15</id>
		<issued date="2024-06-11" />
		<updated date="2024-06-11" />
		<title>Множественные уязвимости golang </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-golang-cve-2024-24789-cve-2024-24790/</description>
               <solution>
                    Запретить использование в ОС пакета golang
                или
                    Установить обновление для пакета(ов) golang
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-golang-cve-2024-24789-cve-2024-24790/" type="self" id="ROS-20240611-15" title="ROS-20240611-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24789" type="cve" id="CVE-2024-24789" title="CVE-2024-24789" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24790" type="cve" id="CVE-2024-24790" title="CVE-2024-24790" />
			<reference href="https://bdu.fstec.ru/vul/2024-04485" type="self" id="BDU:2024-04485" title="BDU:2024-04485" />
			<reference href="https://bdu.fstec.ru/vul/2024-04486" type="self" id="BDU:2024-04486" title="BDU:2024-04486" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.21.8" release="2.el7" arch="x86_64" src="">
					<filename>golang-0:1.21.8-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240611-16</id>
		<issued date="2024-06-11" />
		<updated date="2024-06-11" />
		<title>Уязвимость python3-GitPython </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в python3-GitPython</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-gitpython-cve-2022-24439/</description>
               <solution>
                    Запретить использование в ОС пакета gitpython
                или
                    Установить обновление для пакета(ов) gitpython
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-gitpython-cve-2022-24439/" type="self" id="ROS-20240611-16" title="ROS-20240611-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24439" type="cve" id="CVE-2022-24439" title="CVE-2022-24439" />
			<reference href="https://bdu.fstec.ru/vul/2024-04480" type="self" id="BDU:2024-04480" title="BDU:2024-04480" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-GitPython" epoch="0" version="3.1.35" release="1.el7" arch="noarch" src="">
					<filename>python3-GitPython-0:3.1.35-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240613-01</id>
		<issued date="2024-06-13" />
		<updated date="2024-06-13" />
		<title>Уязвимость ipxe </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в ipxe-roms</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ipxe-cve-2022-4087/</description>
               <solution>
                    Запретить использование в ОС пакета ipxe
                или
                    Установить обновление для пакета(ов) ipxe
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ipxe-cve-2022-4087/" type="self" id="ROS-20240613-01" title="ROS-20240613-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4087" type="cve" id="CVE-2022-4087" title="CVE-2022-4087" />
			<reference href="https://bdu.fstec.ru/vul/2024-04507" type="self" id="BDU:2024-04507" title="BDU:2024-04507" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ipxe-roms" epoch="0" version="20240119" release="1.gitde8a0821.el7" arch="noarch" src="">
					<filename>ipxe-roms-0:20240119-1.gitde8a0821.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240613-02</id>
		<issued date="2024-06-13" />
		<updated date="2024-06-13" />
		<title>Уязвимость ImageMagick </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в ImageMagick</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick-cve-2022-1114/</description>
               <solution>
                    Запретить использование в ОС пакета ImageMagick
                или
                    Установить обновление для пакета(ов) ImageMagick
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick-cve-2022-1114/" type="self" id="ROS-20240613-02" title="ROS-20240613-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1114" type="cve" id="CVE-2022-1114" title="CVE-2022-1114" />
			<reference href="https://bdu.fstec.ru/vul/2023-01719" type="self" id="BDU:2023-01719" title="BDU:2023-01719" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ImageMagick" epoch="0" version="6.9.12.89" release="1.el7" arch="x86_64" src="">
					<filename>ImageMagick-0:6.9.12.89-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240613-04</id>
		<issued date="2024-06-13" />
		<updated date="2024-12-23" />
		<title>Уязвимость ImageMagick7 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в ImageMagick7</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick-cve-2022-11146837/</description>
               <solution>
                    Запретить использование в ОС пакета ImageMagick7
                или
                    Установить обновление для пакета(ов) ImageMagick7
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick-cve-2022-11146837/" type="self" id="ROS-20240613-04" title="ROS-20240613-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1114" type="cve" id="CVE-2022-1114" title="CVE-2022-1114" />
			<reference href="https://bdu.fstec.ru/vul/2023-01719" type="self" id="BDU:2023-01719" title="BDU:2023-01719" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ImageMagick7" epoch="0" version="7.1.1.11" release="1.el7" arch="x86_64" src="">
					<filename>ImageMagick7-0:7.1.1.11-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240613-03</id>
		<issued date="2024-06-13" />
		<updated date="2024-06-13" />
		<title>Уязвимость roundcubemail </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в roundcubemail</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-roundcubemail-cve-2023-43770/</description>
               <solution>
                    Запретить использование в ОС пакета roundcubemail
                или
                    Установить обновление для пакета(ов) roundcubemail
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-roundcubemail-cve-2023-43770/" type="self" id="ROS-20240613-03" title="ROS-20240613-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43770" type="cve" id="CVE-2023-43770" title="CVE-2023-43770" />
			<reference href="https://bdu.fstec.ru/vul/2023-06297" type="self" id="BDU:2023-06297" title="BDU:2023-06297" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="roundcubemail" epoch="0" version="1.5.6" release="1.el7" arch="noarch" src="">
					<filename>roundcubemail-0:1.5.6-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240614-01</id>
		<issued date="2024-06-14" />
		<updated date="2024-06-14" />
		<title>Уязвимость unrar </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в unrar</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-unrar-cve-2022-30333/</description>
               <solution>
                    Запретить использование в ОС пакета unrar
                или
                    Установить обновление для пакета(ов) unrar
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-unrar-cve-2022-30333/" type="self" id="ROS-20240614-01" title="ROS-20240614-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30333" type="cve" id="CVE-2022-30333" title="CVE-2022-30333" />
			<reference href="https://bdu.fstec.ru/vul/2022-02992" type="self" id="BDU:2022-02992" title="BDU:2022-02992" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="unrar" epoch="0" version="7.0.7" release="2.el7" arch="x86_64" src="">
					<filename>unrar-0:7.0.7-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240614-02</id>
		<issued date="2024-06-14" />
		<updated date="2024-06-14" />
		<title>Уязвимость python3 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2020-10735/</description>
               <solution>
                    Запретить использование в ОС пакета python3
                или
                    Установить обновление для пакета(ов) python3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2020-10735/" type="self" id="ROS-20240614-02" title="ROS-20240614-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10735" type="cve" id="CVE-2020-10735" title="CVE-2020-10735" />
			<reference href="https://bdu.fstec.ru/vul/2022-05599" type="self" id="BDU:2022-05599" title="BDU:2022-05599" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3" epoch="0" version="3.8.18" release="1.el7" arch="x86_64" src="">
					<filename>python3-0:3.8.18-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240617-01</id>
		<issued date="2024-06-17" />
		<updated date="2024-06-17" />
		<title>Уязвимость strongswan </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в strongswan</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-strongswan-cve-2023-26463/</description>
               <solution>
                    Запретить использование в ОС пакета strongswan
                или
                    Установить обновление для пакета(ов) strongswan
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-strongswan-cve-2023-26463/" type="self" id="ROS-20240617-01" title="ROS-20240617-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26463" type="cve" id="CVE-2023-26463" title="CVE-2023-26463" />
			<reference href="https://bdu.fstec.ru/vul/2023-02129" type="self" id="BDU:2023-02129" title="BDU:2023-02129" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="strongswan" epoch="0" version="5.9.10" release="2.el7" arch="x86_64" src="">
					<filename>strongswan-0:5.9.10-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240617-02</id>
		<issued date="2024-06-17" />
		<updated date="2024-06-17" />
		<title>Множественные уязвимости frr</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в frr</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-frr-17-06-24/</description>
               <solution>
                    Запретить использование в ОС пакета frr
                или
                    Установить обновление для пакета(ов) frr
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-frr-17-06-24/" type="self" id="ROS-20240617-02" title="ROS-20240617-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41360" type="cve" id="CVE-2023-41360" title="CVE-2023-41360" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41359" type="cve" id="CVE-2023-41359" title="CVE-2023-41359" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41909" type="cve" id="CVE-2023-41909" title="CVE-2023-41909" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38406" type="cve" id="CVE-2023-38406" title="CVE-2023-38406" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38407" type="cve" id="CVE-2023-38407" title="CVE-2023-38407" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47234" type="cve" id="CVE-2023-47234" title="CVE-2023-47234" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47235" type="cve" id="CVE-2023-47235" title="CVE-2023-47235" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46752" type="cve" id="CVE-2023-46752" title="CVE-2023-46752" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46753" type="cve" id="CVE-2023-46753" title="CVE-2023-46753" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3748" type="cve" id="CVE-2023-3748" title="CVE-2023-3748" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41361" type="cve" id="CVE-2023-41361" title="CVE-2023-41361" />
			<reference href="https://bdu.fstec.ru/vul/2024-04614" type="self" id="BDU:2024-04614" title="BDU:2024-04614" />
			<reference href="https://bdu.fstec.ru/vul/2024-04612" type="self" id="BDU:2024-04612" title="BDU:2024-04612" />
			<reference href="https://bdu.fstec.ru/vul/2024-04615" type="self" id="BDU:2024-04615" title="BDU:2024-04615" />
			<reference href="https://bdu.fstec.ru/vul/2024-04613" type="self" id="BDU:2024-04613" title="BDU:2024-04613" />
			<reference href="https://bdu.fstec.ru/vul/2024-04616" type="self" id="BDU:2024-04616" title="BDU:2024-04616" />
			<reference href="https://bdu.fstec.ru/vul/2024-04617" type="self" id="BDU:2024-04617" title="BDU:2024-04617" />
			<reference href="https://bdu.fstec.ru/vul/2024-04618" type="self" id="BDU:2024-04618" title="BDU:2024-04618" />
			<reference href="https://bdu.fstec.ru/vul/2023-08243" type="self" id="BDU:2023-08243" title="BDU:2023-08243" />
			<reference href="https://bdu.fstec.ru/vul/2023-08631" type="self" id="BDU:2023-08631" title="BDU:2023-08631" />
			<reference href="https://bdu.fstec.ru/vul/2024-04619" type="self" id="BDU:2024-04619" title="BDU:2024-04619" />
			<reference href="https://bdu.fstec.ru/vul/2024-04620" type="self" id="BDU:2024-04620" title="BDU:2024-04620" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="frr" epoch="0" version="9.1" release="3.el7" arch="x86_64" src="">
					<filename>frr-0:9.1-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240618-01</id>
		<issued date="2024-06-18" />
		<updated date="2024-06-18" />
		<title>Множественные уязвимости roundcubemail </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в roundcubemail</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-roundcubemail-cve-2024-37384-cve-2024-37383/</description>
               <solution>
                    Запретить использование в ОС пакета Roundcube
                или
                    Установить обновление для пакета(ов) Roundcube
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-roundcubemail-cve-2024-37384-cve-2024-37383/" type="self" id="ROS-20240618-01" title="ROS-20240618-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37384" type="cve" id="CVE-2024-37384" title="CVE-2024-37384" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37383" type="cve" id="CVE-2024-37383" title="CVE-2024-37383" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="roundcubemail" epoch="0" version="1.5.7" release="1.el7" arch="noarch" src="">
					<filename>roundcubemail-0:1.5.7-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240618-02</id>
		<issued date="2024-06-18" />
		<updated date="2024-06-18" />
		<title>Уязвимость giflib </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в giflib</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-giflib-cve-2021-40633/</description>
               <solution>
                    Запретить использование в ОС пакета giflib
                или
                    Установить обновление для пакета(ов) giflib
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-giflib-cve-2021-40633/" type="self" id="ROS-20240618-02" title="ROS-20240618-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40633" type="cve" id="CVE-2021-40633" title="CVE-2021-40633" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="giflib" epoch="0" version="5.2.1" release="3.el7" arch="x86_64" src="">
					<filename>giflib-0:5.2.1-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240619-01</id>
		<issued date="2024-06-19" />
		<updated date="2024-06-19" />
		<title>Множественные уязвимости python3-jose </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-jose</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-jose-cve-2024-33663-cve-2024-33664/</description>
               <solution>
                    Запретить использование в ОС пакета Python-jose
                или
                    Установить обновление для пакета(ов) Python-jose
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-jose-cve-2024-33663-cve-2024-33664/" type="self" id="ROS-20240619-01" title="ROS-20240619-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33663" type="cve" id="CVE-2024-33663" title="CVE-2024-33663" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33664" type="cve" id="CVE-2024-33664" title="CVE-2024-33664" />
			<reference href="https://bdu.fstec.ru/vul/2024-04681" type="self" id="BDU:2024-04681" title="BDU:2024-04681" />
			<reference href="https://bdu.fstec.ru/vul/2024-04682" type="self" id="BDU:2024-04682" title="BDU:2024-04682" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-jose" epoch="0" version="3.3.0" release="1.el7" arch="noarch" src="">
					<filename>python3-jose-0:3.3.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240619-02</id>
		<issued date="2024-06-19" />
		<updated date="2024-06-19" />
		<title>Уязвимость erlang-jose </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в erlang-jose</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-erlang-jose-cve-2023-50966/</description>
               <solution>
                    Запретить использование в ОС пакета erlang-jose
                или
                    Установить обновление для пакета(ов) erlang-jose
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-erlang-jose-cve-2023-50966/" type="self" id="ROS-20240619-02" title="ROS-20240619-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50966" type="cve" id="CVE-2023-50966" title="CVE-2023-50966" />
			<reference href="https://bdu.fstec.ru/vul/2024-02605" type="self" id="BDU:2024-02605" title="BDU:2024-02605" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="erlang-jose" epoch="0" version="1.11.10" release="1.el7" arch="noarch" src="">
					<filename>erlang-jose-0:1.11.10-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240619-03</id>
		<issued date="2024-06-19" />
		<updated date="2024-06-19" />
		<title>Уязвимость wget </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в wget</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-wget-cve-2024-38428/</description>
               <solution>
                    Запретить использование в ОС пакета Wget
                или
                    Установить обновление для пакета(ов) Wget
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-wget-cve-2024-38428/" type="self" id="ROS-20240619-03" title="ROS-20240619-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38428" type="cve" id="CVE-2024-38428" title="CVE-2024-38428" />
			<reference href="https://bdu.fstec.ru/vul/2024-04683" type="self" id="BDU:2024-04683" title="BDU:2024-04683" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="wget" epoch="0" version="1.20.3" release="13.el7" arch="x86_64" src="">
					<filename>wget-0:1.20.3-13.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240625-01</id>
		<issued date="2024-06-26" />
		<updated date="2024-06-26" />
		<title>Уязвимость ImageMagick </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в ImageMagick</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick-cve-2022-3213/</description>
               <solution>
                    Запретить использование в ОС пакета imagemagick
                или
                    Установить обновление для пакета(ов) imagemagick
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick-cve-2022-3213/" type="self" id="ROS-20240625-01" title="ROS-20240625-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3213" type="cve" id="CVE-2022-3213" title="CVE-2022-3213" />
			<reference href="https://bdu.fstec.ru/vul/2024-04888" type="self" id="BDU:2024-04888" title="BDU:2024-04888" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ImageMagick" epoch="0" version="6.9.12.89" release="1.el7" arch="x86_64" src="">
					<filename>ImageMagick-0:6.9.12.89-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240625-07</id>
		<issued date="2024-06-26" />
		<updated date="2024-12-23" />
		<title>Уязвимость ImageMagick 7 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в ImageMagick7</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick-cve-2022-32136651/</description>
               <solution>
                    Запретить использование в ОС пакета imagemagick7
                или
                    Установить обновление для пакета(ов) imagemagick7
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick-cve-2022-32136651/" type="self" id="ROS-20240625-07" title="ROS-20240625-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3213" type="cve" id="CVE-2022-3213" title="CVE-2022-3213" />
			<reference href="https://bdu.fstec.ru/vul/2024-04888" type="self" id="BDU:2024-04888" title="BDU:2024-04888" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ImageMagick7" epoch="0" version="7.1.0.57" release="1.el7" arch="x86_64" src="">
					<filename>ImageMagick7-0:7.1.0.57-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240625-02</id>
		<issued date="2024-06-26" />
		<updated date="2024-06-26" />
		<title>Уязвимость lxc </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в lxc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-lxc-cve-2022-47952/</description>
               <solution>
                    Запретить использование в ОС пакета lxc
                или
                    Установить обновление для пакета(ов) lxc
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-lxc-cve-2022-47952/" type="self" id="ROS-20240625-02" title="ROS-20240625-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47952" type="cve" id="CVE-2022-47952" title="CVE-2022-47952" />
			<reference href="https://bdu.fstec.ru/vul/2024-04921" type="self" id="BDU:2024-04921" title="BDU:2024-04921" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="lxc" epoch="0" version="4.0.10" release="2.el7" arch="x86_64" src="">
					<filename>lxc-0:4.0.10-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240625-03</id>
		<issued date="2024-06-26" />
		<updated date="2024-06-26" />
		<title>Множественные уязвимости mupdf </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в mupdf</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mupdf-cve-2023-31794-cve-2024-24258-cve-2024-24259/</description>
               <solution>
                    Запретить использование в ОС пакета mupdf
                или
                    Установить обновление для пакета(ов) mupdf
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mupdf-cve-2023-31794-cve-2024-24258-cve-2024-24259/" type="self" id="ROS-20240625-03" title="ROS-20240625-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31794" type="cve" id="CVE-2023-31794" title="CVE-2023-31794" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24258" type="cve" id="CVE-2024-24258" title="CVE-2024-24258" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24259" type="cve" id="CVE-2024-24259" title="CVE-2024-24259" />
			<reference href="https://bdu.fstec.ru/vul/2024-04861" type="self" id="BDU:2024-04861" title="BDU:2024-04861" />
			<reference href="https://bdu.fstec.ru/vul/2024-04862" type="self" id="BDU:2024-04862" title="BDU:2024-04862" />
			<reference href="https://bdu.fstec.ru/vul/2024-04863" type="self" id="BDU:2024-04863" title="BDU:2024-04863" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mupdf" epoch="0" version="1.22.2" release="1.el7" arch="x86_64" src="">
					<filename>mupdf-0:1.22.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240625-04</id>
		<issued date="2024-06-26" />
		<updated date="2025-10-09" />
		<title>Уязвимости qemu </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в qemu-common</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qemu-cve-2023-3019/</description>
               <solution>
                    Запретить использование в ОС пакета qemu-common
                или
                    Установить обновление для пакета(ов) qemu-common
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qemu-cve-2023-3019/" type="self" id="ROS-20240625-04" title="ROS-20240625-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3019" type="cve" id="CVE-2023-3019" title="CVE-2023-3019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6693" type="cve" id="CVE-2023-6693" title="CVE-2023-6693" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6683" type="cve" id="CVE-2023-6683" title="CVE-2023-6683" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26328" type="cve" id="CVE-2024-26328" title="CVE-2024-26328" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26327" type="cve" id="CVE-2024-26327" title="CVE-2024-26327" />
			<reference href="https://bdu.fstec.ru/vul/2024-04883" type="self" id="BDU:2024-04883" title="BDU:2024-04883" />
			<reference href="https://bdu.fstec.ru/vul/2024-04886" type="self" id="BDU:2024-04886" title="BDU:2024-04886" />
			<reference href="https://bdu.fstec.ru/vul/2024-00308" type="self" id="BDU:2024-00308" title="BDU:2024-00308" />
			<reference href="https://bdu.fstec.ru/vul/2024-01711" type="self" id="BDU:2024-01711" title="BDU:2024-01711" />
			<reference href="https://bdu.fstec.ru/vul/2024-01712" type="self" id="BDU:2024-01712" title="BDU:2024-01712" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="qemu-common" epoch="15" version="7.2.12" release="1.el7" arch="x86_64" src="">
					<filename>qemu-common-15:7.2.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240625-05</id>
		<issued date="2024-06-26" />
		<updated date="2024-06-26" />
		<title>Множественные уязвимости salt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в salt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-salt-cve-2024-22231-cve-2024-22232/</description>
               <solution>
                    Запретить использование в ОС пакета Salt
                или
                    Установить обновление для пакета(ов) Salt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-salt-cve-2024-22231-cve-2024-22232/" type="self" id="ROS-20240625-05" title="ROS-20240625-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22231" type="cve" id="CVE-2024-22231" title="CVE-2024-22231" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22232" type="cve" id="CVE-2024-22232" title="CVE-2024-22232" />
			<reference href="https://bdu.fstec.ru/vul/2024-04876" type="self" id="BDU:2024-04876" title="BDU:2024-04876" />
			<reference href="https://bdu.fstec.ru/vul/2024-04877" type="self" id="BDU:2024-04877" title="BDU:2024-04877" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="salt" epoch="0" version="3006.8" release="1.el7" arch="noarch" src="">
					<filename>salt-0:3006.8-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240625-06</id>
		<issued date="2024-06-26" />
		<updated date="2024-06-26" />
		<title>Множественные уязвимости edk2-tools</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в edk2-tools</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-edk2-tools-26-06-24/</description>
               <solution>
                    Запретить использование в ОС пакета edk2-tools
                или
                    Установить обновление для пакета(ов) edk2-tools
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-edk2-tools-26-06-24/" type="self" id="ROS-20240625-06" title="ROS-20240625-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45235" type="cve" id="CVE-2023-45235" title="CVE-2023-45235" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36763" type="cve" id="CVE-2022-36763" title="CVE-2022-36763" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36764" type="cve" id="CVE-2022-36764" title="CVE-2022-36764" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36765" type="cve" id="CVE-2022-36765" title="CVE-2022-36765" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45229" type="cve" id="CVE-2023-45229" title="CVE-2023-45229" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45236" type="cve" id="CVE-2023-45236" title="CVE-2023-45236" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45237" type="cve" id="CVE-2023-45237" title="CVE-2023-45237" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45230" type="cve" id="CVE-2023-45230" title="CVE-2023-45230" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45231" type="cve" id="CVE-2023-45231" title="CVE-2023-45231" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45232" type="cve" id="CVE-2023-45232" title="CVE-2023-45232" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45233" type="cve" id="CVE-2023-45233" title="CVE-2023-45233" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45234" type="cve" id="CVE-2023-45234" title="CVE-2023-45234" />
			<reference href="https://bdu.fstec.ru/vul/2024-00657" type="self" id="BDU:2024-00657" title="BDU:2024-00657" />
			<reference href="https://bdu.fstec.ru/vul/2024-01538" type="self" id="BDU:2024-01538" title="BDU:2024-01538" />
			<reference href="https://bdu.fstec.ru/vul/2024-01537" type="self" id="BDU:2024-01537" title="BDU:2024-01537" />
			<reference href="https://bdu.fstec.ru/vul/2024-01539" type="self" id="BDU:2024-01539" title="BDU:2024-01539" />
			<reference href="https://bdu.fstec.ru/vul/2024-00459" type="self" id="BDU:2024-00459" title="BDU:2024-00459" />
			<reference href="https://bdu.fstec.ru/vul/2024-00658" type="self" id="BDU:2024-00658" title="BDU:2024-00658" />
			<reference href="https://bdu.fstec.ru/vul/2024-00626" type="self" id="BDU:2024-00626" title="BDU:2024-00626" />
			<reference href="https://bdu.fstec.ru/vul/2024-00460" type="self" id="BDU:2024-00460" title="BDU:2024-00460" />
			<reference href="https://bdu.fstec.ru/vul/2024-00458" type="self" id="BDU:2024-00458" title="BDU:2024-00458" />
			<reference href="https://bdu.fstec.ru/vul/2024-00646" type="self" id="BDU:2024-00646" title="BDU:2024-00646" />
			<reference href="https://bdu.fstec.ru/vul/2024-00627" type="self" id="BDU:2024-00627" title="BDU:2024-00627" />
			<reference href="https://bdu.fstec.ru/vul/2024-00659" type="self" id="BDU:2024-00659" title="BDU:2024-00659" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="edk2-tools" epoch="0" version="20240524" release="1.el7" arch="x86_64" src="">
					<filename>edk2-tools-0:20240524-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240626-07</id>
		<issued date="2024-06-26" />
		<updated date="2024-06-26" />
		<title>Уязвимость perl-Net-CIDR-Lite </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в perl-Net-CIDR-Lite</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-net-cidr-lite-cve-2021-47154/</description>
               <solution>
                    Запретить использование в ОС пакета perl-Net-CIDR-Lite
                или
                    Установить обновление для пакета(ов) perl-Net-CIDR-Lite
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-net-cidr-lite-cve-2021-47154/" type="self" id="ROS-20240626-07" title="ROS-20240626-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47154" type="cve" id="CVE-2021-47154" title="CVE-2021-47154" />
			<reference href="https://bdu.fstec.ru/vul/2024-04890" type="self" id="BDU:2024-04890" title="BDU:2024-04890" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="perl-Net-CIDR-Lite" epoch="0" version="0.22" release="1.el7" arch="noarch" src="">
					<filename>perl-Net-CIDR-Lite-0:0.22-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240626-08</id>
		<issued date="2024-06-26" />
		<updated date="2024-06-26" />
		<title>Уязвимость libcdio </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libcdio</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libcdio-cve-2024-36600/</description>
               <solution>
                    Запретить использование в ОС пакета libcdio
                или
                    Установить обновление для пакета(ов) libcdio
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libcdio-cve-2024-36600/" type="self" id="ROS-20240626-08" title="ROS-20240626-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36600" type="cve" id="CVE-2024-36600" title="CVE-2024-36600" />
			<reference href="https://bdu.fstec.ru/vul/2024-04922" type="self" id="BDU:2024-04922" title="BDU:2024-04922" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libcdio" epoch="0" version="2.1.1+gitb187462a" release="1.el7" arch="x86_64" src="">
					<filename>libcdio-0:2.1.1+gitb187462a-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240626-09</id>
		<issued date="2024-06-26" />
		<updated date="2024-06-26" />
		<title>Множественные уязвимости openjpeg2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openjpeg2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-openjpeg2-cve-2021-29338-cve-2022-1122/</description>
               <solution>
                    Запретить использование в ОС пакета openjpeg2
                или
                    Установить обновление для пакета(ов) openjpeg2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-openjpeg2-cve-2021-29338-cve-2022-1122/" type="self" id="ROS-20240626-09" title="ROS-20240626-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338" type="cve" id="CVE-2021-29338" title="CVE-2021-29338" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1122" type="cve" id="CVE-2022-1122" title="CVE-2022-1122" />
			<reference href="https://bdu.fstec.ru/vul/2022-05920" type="self" id="BDU:2022-05920" title="BDU:2022-05920" />
			<reference href="https://bdu.fstec.ru/vul/2023-03838" type="self" id="BDU:2023-03838" title="BDU:2023-03838" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openjpeg2" epoch="0" version="2.4.0" release="4.el7" arch="x86_64" src="">
					<filename>openjpeg2-0:2.4.0-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240626-10</id>
		<issued date="2024-06-26" />
		<updated date="2024-06-26" />
		<title>Множественные уязвимости composer </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в composer</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-composer-cve-2024-35241-cve-2022-24828-cve-2023-43655-cve-2024-35242/</description>
               <solution>
                    Запретить использование в ОС пакета Composer
                или
                    Установить обновление для пакета(ов) Composer
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-composer-cve-2024-35241-cve-2022-24828-cve-2023-43655-cve-2024-35242/" type="self" id="ROS-20240626-10" title="ROS-20240626-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35241" type="cve" id="CVE-2024-35241" title="CVE-2024-35241" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24828" type="cve" id="CVE-2022-24828" title="CVE-2022-24828" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43655" type="cve" id="CVE-2023-43655" title="CVE-2023-43655" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35242" type="cve" id="CVE-2024-35242" title="CVE-2024-35242" />
			<reference href="https://bdu.fstec.ru/vul/2024-04878" type="self" id="BDU:2024-04878" title="BDU:2024-04878" />
			<reference href="https://bdu.fstec.ru/vul/2022-02944" type="self" id="BDU:2022-02944" title="BDU:2022-02944" />
			<reference href="https://bdu.fstec.ru/vul/2024-04879" type="self" id="BDU:2024-04879" title="BDU:2024-04879" />
			<reference href="https://bdu.fstec.ru/vul/2024-04880" type="self" id="BDU:2024-04880" title="BDU:2024-04880" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="composer" epoch="0" version="2.7.7" release="1.el7" arch="noarch" src="">
					<filename>composer-0:2.7.7-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240619-11</id>
		<issued date="2024-06-26" />
		<updated date="2024-06-26" />
		<title>Уязвимость aom </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в aom</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-aom-cve-2024-5171/</description>
               <solution>
                    Запретить использование в ОС пакета aom
                или
                    Установить обновление для пакета(ов) aom
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-aom-cve-2024-5171/" type="self" id="ROS-20240619-11" title="ROS-20240619-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5171" type="cve" id="CVE-2024-5171" title="CVE-2024-5171" />
			<reference href="https://bdu.fstec.ru/vul/2024-04523" type="self" id="BDU:2024-04523" title="BDU:2024-04523" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="aom" epoch="0" version="3.4.0" release="2.el7" arch="x86_64" src="">
					<filename>aom-0:3.4.0-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240626-12</id>
		<issued date="2024-06-26" />
		<updated date="2024-06-26" />
		<title>Уязвимость sphinx </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в sphinx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sphinx-cve-2020-29050/</description>
               <solution>
                    Запретить использование в ОС пакета sphinx
                или
                    Установить обновление для пакета(ов) sphinx
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sphinx-cve-2020-29050/" type="self" id="ROS-20240626-12" title="ROS-20240626-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29050" type="cve" id="CVE-2020-29050" title="CVE-2020-29050" />
			<reference href="https://bdu.fstec.ru/vul/2022-00467" type="self" id="BDU:2022-00467" title="BDU:2022-00467" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="sphinx" epoch="0" version="2.2.11" release="16.el7" arch="x86_64" src="">
					<filename>sphinx-0:2.2.11-16.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240626-13</id>
		<issued date="2024-06-26" />
		<updated date="2024-06-26" />
		<title>Уязвимость libtiff </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libtiff</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libtiff-cve-2023-3164/</description>
               <solution>
                    Запретить использование в ОС пакета libtiff
                или
                    Установить обновление для пакета(ов) libtiff
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libtiff-cve-2023-3164/" type="self" id="ROS-20240626-13" title="ROS-20240626-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3164" type="cve" id="CVE-2023-3164" title="CVE-2023-3164" />
			<reference href="https://bdu.fstec.ru/vul/2024-04889" type="self" id="BDU:2024-04889" title="BDU:2024-04889" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libtiff" epoch="0" version="4.5.1" release="8.el7" arch="x86_64" src="">
					<filename>libtiff-0:4.5.1-8.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240626-14</id>
		<issued date="2024-06-26" />
		<updated date="2024-06-26" />
		<title>Уязвимость postgresql-1c </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-1c-cve-2024-0985/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql-1c
                или
                    Установить обновление для пакета(ов) postgresql-1c
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-1c-cve-2024-0985/" type="self" id="ROS-20240626-14" title="ROS-20240626-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0985" type="cve" id="CVE-2024-0985" title="CVE-2024-0985" />
			<reference href="https://bdu.fstec.ru/vul/2024-01121" type="self" id="BDU:2024-01121" title="BDU:2024-01121" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql-1c" epoch="0" version="14.12" release="1.el7" arch="x86_64" src="">
					<filename>postgresql-1c-0:14.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240626-15</id>
		<issued date="2024-06-26" />
		<updated date="2024-06-26" />
		<title>Уязвимость avahi </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в avahi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-avahi-cve-2021-3502/</description>
               <solution>
                    Запретить использование в ОС пакета avahi
                или
                    Установить обновление для пакета(ов) avahi
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-avahi-cve-2021-3502/" type="self" id="ROS-20240626-15" title="ROS-20240626-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3502" type="cve" id="CVE-2021-3502" title="CVE-2021-3502" />
			<reference href="https://bdu.fstec.ru/vul/2021-04611" type="self" id="BDU:2021-04611" title="BDU:2021-04611" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="avahi" epoch="0" version="0.8" release="6.el7" arch="x86_64" src="">
					<filename>avahi-0:0.8-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240626-16</id>
		<issued date="2024-06-26" />
		<updated date="2024-06-26" />
		<title>Уязвимость cri-o </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в cri-o</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cri-o-cve-2024-5154/</description>
               <solution>
                    Запретить использование в ОС пакета Cri-o
                или
                    Установить обновление для пакета(ов) Cri-o
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cri-o-cve-2024-5154/" type="self" id="ROS-20240626-16" title="ROS-20240626-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5154" type="cve" id="CVE-2024-5154" title="CVE-2024-5154" />
			<reference href="https://bdu.fstec.ru/vul/2024-04923" type="self" id="BDU:2024-04923" title="BDU:2024-04923" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cri-o" epoch="0" version="1.24.1" release="6.el7" arch="x86_64" src="">
					<filename>cri-o-0:1.24.1-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240620-17</id>
		<issued date="2024-06-26" />
		<updated date="2024-06-26" />
		<title>Множественные уязвимости ImageMagick </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ImageMagick</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-imagemagick-cve-2021-3610-cve-2023-1906/</description>
               <solution>
                    Запретить использование в ОС пакета imagemagick
                или
                    Установить обновление для пакета(ов) imagemagick
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-imagemagick-cve-2021-3610-cve-2023-1906/" type="self" id="ROS-20240620-17" title="ROS-20240620-17" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3610" type="cve" id="CVE-2021-3610" title="CVE-2021-3610" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1906" type="cve" id="CVE-2023-1906" title="CVE-2023-1906" />
			<reference href="https://bdu.fstec.ru/vul/2024-04884" type="self" id="BDU:2024-04884" title="BDU:2024-04884" />
			<reference href="https://bdu.fstec.ru/vul/2023-02231" type="self" id="BDU:2023-02231" title="BDU:2023-02231" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ImageMagick" epoch="0" version="6.9.12.89" release="1.el7" arch="x86_64" src="">
					<filename>ImageMagick-0:6.9.12.89-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240620-18</id>
		<issued date="2024-06-26" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости ImageMagick 7 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ImageMagick7</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-imagemagick-cve-2021-3610-cve-2023-19063702/</description>
               <solution>
                    Запретить использование в ОС пакета imagemagick7
                или
                    Установить обновление для пакета(ов) imagemagick7
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-imagemagick-cve-2021-3610-cve-2023-19063702/" type="self" id="ROS-20240620-18" title="ROS-20240620-18" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3610" type="cve" id="CVE-2021-3610" title="CVE-2021-3610" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1906" type="cve" id="CVE-2023-1906" title="CVE-2023-1906" />
			<reference href="https://bdu.fstec.ru/vul/2024-04884" type="self" id="BDU:2024-04884" title="BDU:2024-04884" />
			<reference href="https://bdu.fstec.ru/vul/2023-02231" type="self" id="BDU:2023-02231" title="BDU:2023-02231" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ImageMagick7" epoch="0" version="7.1.1.11" release="1.el7" arch="x86_64" src="">
					<filename>ImageMagick7-0:7.1.1.11-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240627-01</id>
		<issued date="2024-06-27" />
		<updated date="2024-06-27" />
		<title>Множественные уязвимости chromium</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-27-06-24/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-27-06-24/" type="self" id="ROS-20240627-01" title="ROS-20240627-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6103" type="cve" id="CVE-2024-6103" title="CVE-2024-6103" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6102" type="cve" id="CVE-2024-6102" title="CVE-2024-6102" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6101" type="cve" id="CVE-2024-6101" title="CVE-2024-6101" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6100" type="cve" id="CVE-2024-6100" title="CVE-2024-6100" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5847" type="cve" id="CVE-2024-5847" title="CVE-2024-5847" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5846" type="cve" id="CVE-2024-5846" title="CVE-2024-5846" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5845" type="cve" id="CVE-2024-5845" title="CVE-2024-5845" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5844" type="cve" id="CVE-2024-5844" title="CVE-2024-5844" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5843" type="cve" id="CVE-2024-5843" title="CVE-2024-5843" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5842" type="cve" id="CVE-2024-5842" title="CVE-2024-5842" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5841" type="cve" id="CVE-2024-5841" title="CVE-2024-5841" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5840" type="cve" id="CVE-2024-5840" title="CVE-2024-5840" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5839" type="cve" id="CVE-2024-5839" title="CVE-2024-5839" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5838" type="cve" id="CVE-2024-5838" title="CVE-2024-5838" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5837" type="cve" id="CVE-2024-5837" title="CVE-2024-5837" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5836" type="cve" id="CVE-2024-5836" title="CVE-2024-5836" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5835" type="cve" id="CVE-2024-5835" title="CVE-2024-5835" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5834" type="cve" id="CVE-2024-5834" title="CVE-2024-5834" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5833" type="cve" id="CVE-2024-5833" title="CVE-2024-5833" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5832" type="cve" id="CVE-2024-5832" title="CVE-2024-5832" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5831" type="cve" id="CVE-2024-5831" title="CVE-2024-5831" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5830" type="cve" id="CVE-2024-5830" title="CVE-2024-5830" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5171" type="cve" id="CVE-2024-5171" title="CVE-2024-5171" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5499" type="cve" id="CVE-2024-5499" title="CVE-2024-5499" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5498" type="cve" id="CVE-2024-5498" title="CVE-2024-5498" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5497" type="cve" id="CVE-2024-5497" title="CVE-2024-5497" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5496" type="cve" id="CVE-2024-5496" title="CVE-2024-5496" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5495" type="cve" id="CVE-2024-5495" title="CVE-2024-5495" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5494" type="cve" id="CVE-2024-5494" title="CVE-2024-5494" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5493" type="cve" id="CVE-2024-5493" title="CVE-2024-5493" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5274" type="cve" id="CVE-2024-5274" title="CVE-2024-5274" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5160" type="cve" id="CVE-2024-5160" title="CVE-2024-5160" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5159" type="cve" id="CVE-2024-5159" title="CVE-2024-5159" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5158" type="cve" id="CVE-2024-5158" title="CVE-2024-5158" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5157" type="cve" id="CVE-2024-5157" title="CVE-2024-5157" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4950" type="cve" id="CVE-2024-4950" title="CVE-2024-4950" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4949" type="cve" id="CVE-2024-4949" title="CVE-2024-4949" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4948" type="cve" id="CVE-2024-4948" title="CVE-2024-4948" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4947" type="cve" id="CVE-2024-4947" title="CVE-2024-4947" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4761" type="cve" id="CVE-2024-4761" title="CVE-2024-4761" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4671" type="cve" id="CVE-2024-4671" title="CVE-2024-4671" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4559" type="cve" id="CVE-2024-4559" title="CVE-2024-4559" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4558" type="cve" id="CVE-2024-4558" title="CVE-2024-4558" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4368" type="cve" id="CVE-2024-4368" title="CVE-2024-4368" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4331" type="cve" id="CVE-2024-4331" title="CVE-2024-4331" />
			<reference href="https://bdu.fstec.ru/vul/2024-04867" type="self" id="BDU:2024-04867" title="BDU:2024-04867" />
			<reference href="https://bdu.fstec.ru/vul/2024-04868" type="self" id="BDU:2024-04868" title="BDU:2024-04868" />
			<reference href="https://bdu.fstec.ru/vul/2024-04869" type="self" id="BDU:2024-04869" title="BDU:2024-04869" />
			<reference href="https://bdu.fstec.ru/vul/2024-04870" type="self" id="BDU:2024-04870" title="BDU:2024-04870" />
			<reference href="https://bdu.fstec.ru/vul/2024-04720" type="self" id="BDU:2024-04720" title="BDU:2024-04720" />
			<reference href="https://bdu.fstec.ru/vul/2024-04715" type="self" id="BDU:2024-04715" title="BDU:2024-04715" />
			<reference href="https://bdu.fstec.ru/vul/2024-04730" type="self" id="BDU:2024-04730" title="BDU:2024-04730" />
			<reference href="https://bdu.fstec.ru/vul/2024-04716" type="self" id="BDU:2024-04716" title="BDU:2024-04716" />
			<reference href="https://bdu.fstec.ru/vul/2024-04721" type="self" id="BDU:2024-04721" title="BDU:2024-04721" />
			<reference href="https://bdu.fstec.ru/vul/2024-04717" type="self" id="BDU:2024-04717" title="BDU:2024-04717" />
			<reference href="https://bdu.fstec.ru/vul/2024-04719" type="self" id="BDU:2024-04719" title="BDU:2024-04719" />
			<reference href="https://bdu.fstec.ru/vul/2024-04718" type="self" id="BDU:2024-04718" title="BDU:2024-04718" />
			<reference href="https://bdu.fstec.ru/vul/2024-04725" type="self" id="BDU:2024-04725" title="BDU:2024-04725" />
			<reference href="https://bdu.fstec.ru/vul/2024-04732" type="self" id="BDU:2024-04732" title="BDU:2024-04732" />
			<reference href="https://bdu.fstec.ru/vul/2024-04729" type="self" id="BDU:2024-04729" title="BDU:2024-04729" />
			<reference href="https://bdu.fstec.ru/vul/2024-04731" type="self" id="BDU:2024-04731" title="BDU:2024-04731" />
			<reference href="https://bdu.fstec.ru/vul/2024-04723" type="self" id="BDU:2024-04723" title="BDU:2024-04723" />
			<reference href="https://bdu.fstec.ru/vul/2024-04722" type="self" id="BDU:2024-04722" title="BDU:2024-04722" />
			<reference href="https://bdu.fstec.ru/vul/2024-04724" type="self" id="BDU:2024-04724" title="BDU:2024-04724" />
			<reference href="https://bdu.fstec.ru/vul/2024-04728" type="self" id="BDU:2024-04728" title="BDU:2024-04728" />
			<reference href="https://bdu.fstec.ru/vul/2024-04726" type="self" id="BDU:2024-04726" title="BDU:2024-04726" />
			<reference href="https://bdu.fstec.ru/vul/2024-04727" type="self" id="BDU:2024-04727" title="BDU:2024-04727" />
			<reference href="https://bdu.fstec.ru/vul/2024-04523" type="self" id="BDU:2024-04523" title="BDU:2024-04523" />
			<reference href="https://bdu.fstec.ru/vul/2024-04341" type="self" id="BDU:2024-04341" title="BDU:2024-04341" />
			<reference href="https://bdu.fstec.ru/vul/2024-04339" type="self" id="BDU:2024-04339" title="BDU:2024-04339" />
			<reference href="https://bdu.fstec.ru/vul/2024-04338" type="self" id="BDU:2024-04338" title="BDU:2024-04338" />
			<reference href="https://bdu.fstec.ru/vul/2024-04342" type="self" id="BDU:2024-04342" title="BDU:2024-04342" />
			<reference href="https://bdu.fstec.ru/vul/2024-04343" type="self" id="BDU:2024-04343" title="BDU:2024-04343" />
			<reference href="https://bdu.fstec.ru/vul/2024-04340" type="self" id="BDU:2024-04340" title="BDU:2024-04340" />
			<reference href="https://bdu.fstec.ru/vul/2024-04371" type="self" id="BDU:2024-04371" title="BDU:2024-04371" />
			<reference href="https://bdu.fstec.ru/vul/2024-04460" type="self" id="BDU:2024-04460" title="BDU:2024-04460" />
			<reference href="https://bdu.fstec.ru/vul/2024-04784" type="self" id="BDU:2024-04784" title="BDU:2024-04784" />
			<reference href="https://bdu.fstec.ru/vul/2024-04785" type="self" id="BDU:2024-04785" title="BDU:2024-04785" />
			<reference href="https://bdu.fstec.ru/vul/2024-04786" type="self" id="BDU:2024-04786" title="BDU:2024-04786" />
			<reference href="https://bdu.fstec.ru/vul/2024-04787" type="self" id="BDU:2024-04787" title="BDU:2024-04787" />
			<reference href="https://bdu.fstec.ru/vul/2024-03960" type="self" id="BDU:2024-03960" title="BDU:2024-03960" />
			<reference href="https://bdu.fstec.ru/vul/2024-03980" type="self" id="BDU:2024-03980" title="BDU:2024-03980" />
			<reference href="https://bdu.fstec.ru/vul/2024-03979" type="self" id="BDU:2024-03979" title="BDU:2024-03979" />
			<reference href="https://bdu.fstec.ru/vul/2024-03978" type="self" id="BDU:2024-03978" title="BDU:2024-03978" />
			<reference href="https://bdu.fstec.ru/vul/2024-04864" type="self" id="BDU:2024-04864" title="BDU:2024-04864" />
			<reference href="https://bdu.fstec.ru/vul/2024-03604" type="self" id="BDU:2024-03604" title="BDU:2024-03604" />
			<reference href="https://bdu.fstec.ru/vul/2024-04865" type="self" id="BDU:2024-04865" title="BDU:2024-04865" />
			<reference href="https://bdu.fstec.ru/vul/2024-04866" type="self" id="BDU:2024-04866" title="BDU:2024-04866" />
			<reference href="https://bdu.fstec.ru/vul/2024-03877" type="self" id="BDU:2024-03877" title="BDU:2024-03877" />
			<reference href="https://bdu.fstec.ru/vul/2024-03876" type="self" id="BDU:2024-03876" title="BDU:2024-03876" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="126.0.6478.114" release="1.el7" arch="x86_64" src="">
					<filename>chromium-0:126.0.6478.114-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240627-02</id>
		<issued date="2024-06-27" />
		<updated date="2024-06-27" />
		<title>Уязвимость libreswan </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libreswan</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libreswan-cve-2024-3652/</description>
               <solution>
                    Запретить использование в ОС пакета Libreswan
                или
                    Установить обновление для пакета(ов) Libreswan
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libreswan-cve-2024-3652/" type="self" id="ROS-20240627-02" title="ROS-20240627-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3652" type="cve" id="CVE-2024-3652" title="CVE-2024-3652" />
			<reference href="https://bdu.fstec.ru/vul/2024-04885" type="self" id="BDU:2024-04885" title="BDU:2024-04885" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libreswan" epoch="0" version="4.15" release="1.el7" arch="x86_64" src="">
					<filename>libreswan-0:4.15-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240627-03</id>
		<issued date="2024-06-27" />
		<updated date="2025-10-09" />
		<title>Уязвимость qemu </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в qemu-common</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qemu-cve-2024-3446/</description>
               <solution>
                    Запретить использование в ОС пакета qemu-common
                или
                    Установить обновление для пакета(ов) qemu-common
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qemu-cve-2024-3446/" type="self" id="ROS-20240627-03" title="ROS-20240627-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3446" type="cve" id="CVE-2024-3446" title="CVE-2024-3446" />
			<reference href="https://bdu.fstec.ru/vul/2024-03304" type="self" id="BDU:2024-03304" title="BDU:2024-03304" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="qemu-common" epoch="15" version="7.2.12" release="1.el7" arch="x86_64" src="">
					<filename>qemu-common-15:7.2.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240627-04</id>
		<issued date="2024-06-27" />
		<updated date="2024-06-27" />
		<title>Множественные уязвимости flatpak </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в flatpak</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-flatpak-cve-2023-28100-cve-2023-28101/</description>
               <solution>
                    Запретить использование в ОС пакета Flatpak
                или
                    Установить обновление для пакета(ов) Flatpak
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-flatpak-cve-2023-28100-cve-2023-28101/" type="self" id="ROS-20240627-04" title="ROS-20240627-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28100" type="cve" id="CVE-2023-28100" title="CVE-2023-28100" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28101" type="cve" id="CVE-2023-28101" title="CVE-2023-28101" />
			<reference href="https://bdu.fstec.ru/vul/2024-04881" type="self" id="BDU:2024-04881" title="BDU:2024-04881" />
			<reference href="https://bdu.fstec.ru/vul/2024-04882" type="self" id="BDU:2024-04882" title="BDU:2024-04882" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="flatpak" epoch="0" version="1.10.9" release="1.el7" arch="x86_64" src="">
					<filename>flatpak-0:1.10.9-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240627-05</id>
		<issued date="2024-06-27" />
		<updated date="2025-10-09" />
		<title>Уязвимость qemu </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в qemu-common</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qemu-cve-2024-3567/</description>
               <solution>
                    Запретить использование в ОС пакета qemu-common
                или
                    Установить обновление для пакета(ов) qemu-common
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qemu-cve-2024-3567/" type="self" id="ROS-20240627-05" title="ROS-20240627-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3567" type="cve" id="CVE-2024-3567" title="CVE-2024-3567" />
			<reference href="https://bdu.fstec.ru/vul/2024-04887" type="self" id="BDU:2024-04887" title="BDU:2024-04887" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="qemu-common" epoch="15" version="7.2.7" release="0.15.el7" arch="x86_64" src="">
					<filename>qemu-common-15:7.2.7-0.15.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240627-06</id>
		<issued date="2024-06-27" />
		<updated date="2024-06-27" />
		<title>Множественные уязвимости nextcloud</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в nextcloud</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nextcloud-27-06-24/</description>
               <solution>
                    Запретить использование в ОС пакета Nextcloud Server
                или
                    Установить обновление для пакета(ов) Nextcloud Server
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nextcloud-27-06-24/" type="self" id="ROS-20240627-06" title="ROS-20240627-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37887" type="cve" id="CVE-2024-37887" title="CVE-2024-37887" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37315" type="cve" id="CVE-2024-37315" title="CVE-2024-37315" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37884" type="cve" id="CVE-2024-37884" title="CVE-2024-37884" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37882" type="cve" id="CVE-2024-37882" title="CVE-2024-37882" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37313" type="cve" id="CVE-2024-37313" title="CVE-2024-37313" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22403" type="cve" id="CVE-2024-22403" title="CVE-2024-22403" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49791" type="cve" id="CVE-2023-49791" title="CVE-2023-49791" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49792" type="cve" id="CVE-2023-49792" title="CVE-2023-49792" />
			<reference href="https://bdu.fstec.ru/vul/2024-04871" type="self" id="BDU:2024-04871" title="BDU:2024-04871" />
			<reference href="https://bdu.fstec.ru/vul/2024-04872" type="self" id="BDU:2024-04872" title="BDU:2024-04872" />
			<reference href="https://bdu.fstec.ru/vul/2024-04873" type="self" id="BDU:2024-04873" title="BDU:2024-04873" />
			<reference href="https://bdu.fstec.ru/vul/2024-04874" type="self" id="BDU:2024-04874" title="BDU:2024-04874" />
			<reference href="https://bdu.fstec.ru/vul/2024-04840" type="self" id="BDU:2024-04840" title="BDU:2024-04840" />
			<reference href="https://bdu.fstec.ru/vul/2024-00723" type="self" id="BDU:2024-00723" title="BDU:2024-00723" />
			<reference href="https://bdu.fstec.ru/vul/2024-04875" type="self" id="BDU:2024-04875" title="BDU:2024-04875" />
			<reference href="https://bdu.fstec.ru/vul/2024-00708" type="self" id="BDU:2024-00708" title="BDU:2024-00708" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nextcloud" epoch="0" version="27.1.10" release="1.el7" arch="noarch" src="">
					<filename>nextcloud-0:27.1.10-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240628-01</id>
		<issued date="2024-06-28" />
		<updated date="2024-06-28" />
		<title>Уязвимость nextcloud-app-notes </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nextcloud-app-notes</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nextcloud-app-notes-cve-2024-37317/</description>
               <solution>
                    Запретить использование в ОС пакета Nextcloud Notes
                или
                    Установить обновление для пакета(ов) Nextcloud Notes
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nextcloud-app-notes-cve-2024-37317/" type="self" id="ROS-20240628-01" title="ROS-20240628-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37317" type="cve" id="CVE-2024-37317" title="CVE-2024-37317" />
			<reference href="https://bdu.fstec.ru/vul/2024-04911" type="self" id="BDU:2024-04911" title="BDU:2024-04911" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nextcloud-app-notes" epoch="0" version="4.9.3" release="1.el7" arch="noarch" src="">
					<filename>nextcloud-app-notes-0:4.9.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240701-01</id>
		<issued date="2024-07-01" />
		<updated date="2024-07-01" />
		<title>Множественные уязвимости gimp </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gimp-cve-2023-44441-cve-2023-44442-cve-2023-44443/</description>
               <solution>
                    Запретить использование в ОС пакета GIMP
                или
                    Установить обновление для пакета(ов) GIMP
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gimp-cve-2023-44441-cve-2023-44442-cve-2023-44443/" type="self" id="ROS-20240701-01" title="ROS-20240701-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44441" type="cve" id="CVE-2023-44441" title="CVE-2023-44441" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44442" type="cve" id="CVE-2023-44442" title="CVE-2023-44442" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44443" type="cve" id="CVE-2023-44443" title="CVE-2023-44443" />
			<reference href="https://bdu.fstec.ru/vul/2024-06921" type="self" id="BDU:2024-06921" title="BDU:2024-06921" />
			<reference href="https://bdu.fstec.ru/vul/2023-08306" type="self" id="BDU:2023-08306" title="BDU:2023-08306" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gimp" epoch="2" version="2.10.36" release="1.el7" arch="x86_64" src="">
					<filename>gimp-2:2.10.36-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240701-02</id>
		<issued date="2024-07-01" />
		<updated date="2024-07-01" />
		<title>Уязвимость dnsmasq </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dnsmasq</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dnsmasq-cve-2023-50868/</description>
               <solution>
                    Запретить использование в ОС пакета dnsmasq
                или
                    Установить обновление для пакета(ов) dnsmasq
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dnsmasq-cve-2023-50868/" type="self" id="ROS-20240701-02" title="ROS-20240701-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868" type="cve" id="CVE-2023-50868" title="CVE-2023-50868" />
			<reference href="https://bdu.fstec.ru/vul/2024-01462" type="self" id="BDU:2024-01462" title="BDU:2024-01462" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dnsmasq" epoch="0" version="2.90" release="1.el7" arch="x86_64" src="">
					<filename>dnsmasq-0:2.90-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240701-03</id>
		<issued date="2024-07-01" />
		<updated date="2024-07-01" />
		<title>Множественные уязвимости moodle</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-moodle-01-07-24/</description>
               <solution>
                    Запретить использование в ОС пакета Moodle
                или
                    Установить обновление для пакета(ов) Moodle
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-moodle-01-07-24/" type="self" id="ROS-20240701-03" title="ROS-20240701-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33996" type="cve" id="CVE-2024-33996" title="CVE-2024-33996" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33997" type="cve" id="CVE-2024-33997" title="CVE-2024-33997" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33998" type="cve" id="CVE-2024-33998" title="CVE-2024-33998" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33999" type="cve" id="CVE-2024-33999" title="CVE-2024-33999" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34000" type="cve" id="CVE-2024-34000" title="CVE-2024-34000" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34008" type="cve" id="CVE-2024-34008" title="CVE-2024-34008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34007" type="cve" id="CVE-2024-34007" title="CVE-2024-34007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34006" type="cve" id="CVE-2024-34006" title="CVE-2024-34006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34001" type="cve" id="CVE-2024-34001" title="CVE-2024-34001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34009" type="cve" id="CVE-2024-34009" title="CVE-2024-34009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34002" type="cve" id="CVE-2024-34002" title="CVE-2024-34002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34003" type="cve" id="CVE-2024-34003" title="CVE-2024-34003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34004" type="cve" id="CVE-2024-34004" title="CVE-2024-34004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34005" type="cve" id="CVE-2024-34005" title="CVE-2024-34005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38275" type="cve" id="CVE-2024-38275" title="CVE-2024-38275" />
			<reference href="https://bdu.fstec.ru/vul/2024-05157" type="self" id="BDU:2024-05157" title="BDU:2024-05157" />
			<reference href="https://bdu.fstec.ru/vul/2024-04202" type="self" id="BDU:2024-04202" title="BDU:2024-04202" />
			<reference href="https://bdu.fstec.ru/vul/2024-04201" type="self" id="BDU:2024-04201" title="BDU:2024-04201" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="moodle" epoch="0" version="4.2.8" release="1.el7" arch="noarch" src="">
					<filename>moodle-0:4.2.8-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240702-01</id>
		<issued date="2024-07-03" />
		<updated date="2024-09-03" />
		<title>Уязвимость dotnet </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dotnet</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet-cve-2023-38180/</description>
               <solution>
                    Запретить использование в ОС пакета dotnet
                или
                    Установить обновление для пакета(ов) dotnet
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet-cve-2023-38180/" type="self" id="ROS-20240702-01" title="ROS-20240702-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38180" type="cve" id="CVE-2023-38180" title="CVE-2023-38180" />
			<reference href="https://bdu.fstec.ru/vul/2023-04540" type="self" id="BDU:2023-04540" title="BDU:2023-04540" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dotnet" epoch="0" version="6.0.125" release="3.el7" arch="x86_64" src="">
					<filename>dotnet-0:6.0.125-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240702-02</id>
		<issued date="2024-07-03" />
		<updated date="2024-07-03" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2023-3079/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2023-3079/" type="self" id="ROS-20240702-02" title="ROS-20240702-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3079" type="cve" id="CVE-2023-3079" title="CVE-2023-3079" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2033" type="cve" id="CVE-2023-2033" title="CVE-2023-2033" />
			<reference href="https://bdu.fstec.ru/vul/2023-03080" type="self" id="BDU:2023-03080" title="BDU:2023-03080" />
			<reference href="https://bdu.fstec.ru/vul/2023-02114" type="self" id="BDU:2023-02114" title="BDU:2023-02114" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="120.0.6099.224" release="1.el7" arch="x86_64" src="">
					<filename>chromium-0:120.0.6099.224-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240702-03</id>
		<issued date="2024-07-03" />
		<updated date="2024-07-03" />
		<title>Уязвимость libxml2 </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в libxml2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libxml2-cve-2024-34459/</description>
               <solution>
                    Запретить использование в ОС пакета libxml2
                или
                    Установить обновление для пакета(ов) libxml2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libxml2-cve-2024-34459/" type="self" id="ROS-20240702-03" title="ROS-20240702-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34459" type="cve" id="CVE-2024-34459" title="CVE-2024-34459" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libxml2" epoch="0" version="2.9.8" release="16.el7.3" arch="x86_64" src="">
					<filename>libxml2-0:2.9.8-16.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240702-04</id>
		<issued date="2024-07-03" />
		<updated date="2024-07-03" />
		<title>Уязвимость php-phpseclib </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в php-phpseclib</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-phpseclib-cve-2023-52892/</description>
               <solution>
                    Запретить использование в ОС пакета php-phpseclib
                или
                    Установить обновление для пакета(ов) php-phpseclib
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-phpseclib-cve-2023-52892/" type="self" id="ROS-20240702-04" title="ROS-20240702-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52892" type="cve" id="CVE-2023-52892" title="CVE-2023-52892" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php-phpseclib" epoch="0" version="2.0.47" release="1.el7" arch="noarch" src="">
					<filename>php-phpseclib-0:2.0.47-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240702-05</id>
		<issued date="2024-07-03" />
		<updated date="2024-07-03" />
		<title>Уязвимость php-adodb </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в php-adodb</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-adodb-cve-2016-7405/</description>
               <solution>
                    Запретить использование в ОС пакета php-adodb
                или
                    Установить обновление для пакета(ов) php-adodb
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-adodb-cve-2016-7405/" type="self" id="ROS-20240702-05" title="ROS-20240702-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7405" type="cve" id="CVE-2016-7405" title="CVE-2016-7405" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php-adodb" epoch="0" version="5.22.7" release="1.el7" arch="noarch" src="">
					<filename>php-adodb-0:5.22.7-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240702-06</id>
		<issued date="2024-07-03" />
		<updated date="2024-07-03" />
		<title>Уязвимость libarchive </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libarchive</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libarchive-cve-2024-26256/</description>
               <solution>
                    Запретить использование в ОС пакета libarchive
                или
                    Установить обновление для пакета(ов) libarchive
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libarchive-cve-2024-26256/" type="self" id="ROS-20240702-06" title="ROS-20240702-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26256" type="cve" id="CVE-2024-26256" title="CVE-2024-26256" />
			<reference href="https://bdu.fstec.ru/vul/2024-02924" type="self" id="BDU:2024-02924" title="BDU:2024-02924" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libarchive" epoch="0" version="3.6.2" release="2.el7" arch="x86_64" src="">
					<filename>libarchive-0:3.6.2-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240702-07</id>
		<issued date="2024-07-03" />
		<updated date="2024-07-03" />
		<title>Уязвимость nginx </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nginx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nginx-cve-2024-32760/</description>
               <solution>
                    Запретить использование в ОС пакета nginx
                или
                    Установить обновление для пакета(ов) nginx
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nginx-cve-2024-32760/" type="self" id="ROS-20240702-07" title="ROS-20240702-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32760" type="cve" id="CVE-2024-32760" title="CVE-2024-32760" />
			<reference href="https://bdu.fstec.ru/vul/2024-04388" type="self" id="BDU:2024-04388" title="BDU:2024-04388" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nginx" epoch="1" version="1.26.1" release="1.el7" arch="x86_64" src="">
					<filename>nginx-1:1.26.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240703-08</id>
		<issued date="2024-07-03" />
		<updated date="2024-07-03" />
		<title>Уязвимость protobuf-c </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в protobuf-c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-protobuf-c-cve-2022-33070/</description>
               <solution>
                    Запретить использование в ОС пакета protobuf-c
                или
                    Установить обновление для пакета(ов) protobuf-c
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-protobuf-c-cve-2022-33070/" type="self" id="ROS-20240703-08" title="ROS-20240703-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33070" type="cve" id="CVE-2022-33070" title="CVE-2022-33070" />
			<reference href="https://bdu.fstec.ru/vul/2023-03849" type="self" id="BDU:2023-03849" title="BDU:2023-03849" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="protobuf-c" epoch="0" version="1.4.0" release="2.el7" arch="x86_64" src="">
					<filename>protobuf-c-0:1.4.0-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240703-09</id>
		<issued date="2024-07-03" />
		<updated date="2024-07-03" />
		<title>Множественные уязвимости python-werkzeug </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-werkzeug</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python-werkzeug-cve-2024-34069-cve-2023-25577-cve-2023-23934-cve-2023-461/</description>
               <solution>
                    Запретить использование в ОС пакета python-werkzeug
                или
                    Установить обновление для пакета(ов) python-werkzeug
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python-werkzeug-cve-2024-34069-cve-2023-25577-cve-2023-23934-cve-2023-461/" type="self" id="ROS-20240703-09" title="ROS-20240703-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34069" type="cve" id="CVE-2024-34069" title="CVE-2024-34069" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25577" type="cve" id="CVE-2023-25577" title="CVE-2023-25577" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23934" type="cve" id="CVE-2023-23934" title="CVE-2023-23934" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46136" type="cve" id="CVE-2023-46136" title="CVE-2023-46136" />
			<reference href="https://bdu.fstec.ru/vul/2025-03918" type="self" id="BDU:2025-03918" title="BDU:2025-03918" />
			<reference href="https://bdu.fstec.ru/vul/2023-02343" type="self" id="BDU:2023-02343" title="BDU:2023-02343" />
			<reference href="https://bdu.fstec.ru/vul/2023-02449" type="self" id="BDU:2023-02449" title="BDU:2023-02449" />
			<reference href="https://bdu.fstec.ru/vul/2025-03945" type="self" id="BDU:2025-03945" title="BDU:2025-03945" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-werkzeug" epoch="0" version="3.0.3" release="1.el7" arch="noarch" src="">
					<filename>python3-werkzeug-0:3.0.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240703-10</id>
		<issued date="2024-07-03" />
		<updated date="2024-07-03" />
		<title>Уязвимость usbguard </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в usbguard</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-usbguard-cve-2019-25058/</description>
               <solution>
                    Запретить использование в ОС пакета usbguard
                или
                    Установить обновление для пакета(ов) usbguard
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-usbguard-cve-2019-25058/" type="self" id="ROS-20240703-10" title="ROS-20240703-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25058" type="cve" id="CVE-2019-25058" title="CVE-2019-25058" />
			<reference href="https://bdu.fstec.ru/vul/2023-01654" type="self" id="BDU:2023-01654" title="BDU:2023-01654" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="usbguard" epoch="0" version="1.1.2" release="1.el7" arch="x86_64" src="">
					<filename>usbguard-0:1.1.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240703-11</id>
		<issued date="2024-07-03" />
		<updated date="2024-07-03" />
		<title>Множественные уязвимости cloud-init </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в cloud-init</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-cloud-init-cve-2023-1786-cve-2022-2084/</description>
               <solution>
                    Запретить использование в ОС пакета Cloud-init
                или
                    Установить обновление для пакета(ов) Cloud-init
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-cloud-init-cve-2023-1786-cve-2022-2084/" type="self" id="ROS-20240703-11" title="ROS-20240703-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1786" type="cve" id="CVE-2023-1786" title="CVE-2023-1786" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2084" type="cve" id="CVE-2022-2084" title="CVE-2022-2084" />
			<reference href="https://bdu.fstec.ru/vul/2025-03969" type="self" id="BDU:2025-03969" title="BDU:2025-03969" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cloud-init" epoch="0" version="23.2" release="2.el7" arch="noarch" src="">
					<filename>cloud-init-0:23.2-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240703-12</id>
		<issued date="2024-07-03" />
		<updated date="2024-07-03" />
		<title>Уязвимость tomcat </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2024-24549/</description>
               <solution>
                    Запретить использование в ОС пакета Tomcat
                или
                    Установить обновление для пакета(ов) tomcat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2024-24549/" type="self" id="ROS-20240703-12" title="ROS-20240703-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24549" type="cve" id="CVE-2024-24549" title="CVE-2024-24549" />
			<reference href="https://bdu.fstec.ru/vul/2024-02608" type="self" id="BDU:2024-02608" title="BDU:2024-02608" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat" epoch="1" version="9.0.86" release="1.el7" arch="noarch" src="">
					<filename>tomcat-1:9.0.86-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240704-01</id>
		<issued date="2024-07-04" />
		<updated date="2024-07-04" />
		<title>Уязвимость openssh </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в openssh</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssh-cve-2024-6387/</description>
               <solution>
                    Запретить использование в ОС пакета openssh
                или
                    Установить обновление для пакета(ов) openssh
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssh-cve-2024-6387/" type="self" id="ROS-20240704-01" title="ROS-20240704-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6387" type="cve" id="CVE-2024-6387" title="CVE-2024-6387" />
			<reference href="https://bdu.fstec.ru/vul/2024-04914" type="self" id="BDU:2024-04914" title="BDU:2024-04914" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssh" epoch="0" version="8.9p1" release="12.el7" arch="x86_64" src="">
					<filename>openssh-0:8.9p1-12.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240704-02</id>
		<issued date="2024-07-04" />
		<updated date="2024-07-04" />
		<title>Уязвимость openssh </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в openssh</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssh-cve-2024-39894/</description>
               <solution>
                    Запретить использование в ОС пакета OpenSSH
                или
                    Установить обновление для пакета(ов) OpenSSH
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssh-cve-2024-39894/" type="self" id="ROS-20240704-02" title="ROS-20240704-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39894" type="cve" id="CVE-2024-39894" title="CVE-2024-39894" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssh" epoch="0" version="8.9p1" release="12.el7" arch="x86_64" src="">
					<filename>openssh-0:8.9p1-12.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240704-03</id>
		<issued date="2024-07-04" />
		<updated date="2024-07-04" />
		<title>Уязвимость vte291 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в vte291</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vte291-cve-2024-37535/</description>
               <solution>
                    Запретить использование в ОС пакета vte291
                или
                    Установить обновление для пакета(ов) vte291
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vte291-cve-2024-37535/" type="self" id="ROS-20240704-03" title="ROS-20240704-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37535" type="cve" id="CVE-2024-37535" title="CVE-2024-37535" />
			<reference href="https://bdu.fstec.ru/vul/2026-06680" type="self" id="BDU:2026-06680" title="BDU:2026-06680" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vte291" epoch="0" version="0.74.2" release="2.el7" arch="x86_64" src="">
					<filename>vte291-0:0.74.2-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240704-04</id>
		<issued date="2024-07-04" />
		<updated date="2024-07-04" />
		<title>Уязвимость openssl3 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в openssl3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2024-4741/</description>
               <solution>
                    Запретить использование в ОС пакета OpenSSL
                или
                    Установить обновление для пакета(ов) OpenSSL
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2024-4741/" type="self" id="ROS-20240704-04" title="ROS-20240704-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4741" type="cve" id="CVE-2024-4741" title="CVE-2024-4741" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl3" epoch="0" version="3.2.1" release="4.el7" arch="x86_64" src="">
					<filename>openssl3-0:3.2.1-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240704-05</id>
		<issued date="2024-07-04" />
		<updated date="2024-07-04" />
		<title>Уязвимость opensearch </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в opensearch</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opensearch-cve-2023-4218/</description>
               <solution>
                    Запретить использование в ОС пакета opensearch
                или
                    Установить обновление для пакета(ов) opensearch
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opensearch-cve-2023-4218/" type="self" id="ROS-20240704-05" title="ROS-20240704-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4218" type="cve" id="CVE-2023-4218" title="CVE-2023-4218" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="opensearch" epoch="0" version="2.14.0" release="1.el7" arch="x86_64" src="">
					<filename>opensearch-0:2.14.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240704-06</id>
		<issued date="2024-07-04" />
		<updated date="2024-07-04" />
		<title>Уязвимость opensearch </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в opensearch</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opensearch-cve-2023-6378/</description>
               <solution>
                    Запретить использование в ОС пакета opensearch
                или
                    Установить обновление для пакета(ов) opensearch
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opensearch-cve-2023-6378/" type="self" id="ROS-20240704-06" title="ROS-20240704-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6378" type="cve" id="CVE-2023-6378" title="CVE-2023-6378" />
			<reference href="https://bdu.fstec.ru/vul/2023-09017" type="self" id="BDU:2023-09017" title="BDU:2023-09017" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="opensearch" epoch="0" version="2.13.0" release="1.el7" arch="x86_64" src="">
					<filename>opensearch-0:2.13.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240704-07</id>
		<issued date="2024-07-04" />
		<updated date="2024-07-04" />
		<title>Множественные уязвимости opensearch-dashboards</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в opensearch-dashboards</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-opensearch-dashboards-04-07-24/</description>
               <solution>
                    Запретить использование в ОС пакета opensearch-dashboards
                или
                    Установить обновление для пакета(ов) opensearch-dashboards
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-opensearch-dashboards-04-07-24/" type="self" id="ROS-20240704-07" title="ROS-20240704-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38900" type="cve" id="CVE-2022-38900" title="CVE-2022-38900" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3807" type="cve" id="CVE-2021-3807" title="CVE-2021-3807" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43138" type="cve" id="CVE-2021-43138" title="CVE-2021-43138" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25858" type="cve" id="CVE-2022-25858" title="CVE-2022-25858" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37603" type="cve" id="CVE-2022-37603" title="CVE-2022-37603" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26136" type="cve" id="CVE-2023-26136" title="CVE-2023-26136" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37599" type="cve" id="CVE-2022-37599" title="CVE-2022-37599" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37601" type="cve" id="CVE-2022-37601" title="CVE-2022-37601" />
			<reference href="https://bdu.fstec.ru/vul/2024-05189" type="self" id="BDU:2024-05189" title="BDU:2024-05189" />
			<reference href="https://bdu.fstec.ru/vul/2022-00256" type="self" id="BDU:2022-00256" title="BDU:2022-00256" />
			<reference href="https://bdu.fstec.ru/vul/2024-02595" type="self" id="BDU:2024-02595" title="BDU:2024-02595" />
			<reference href="https://bdu.fstec.ru/vul/2023-05172" type="self" id="BDU:2023-05172" title="BDU:2023-05172" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="opensearch-dashboards" epoch="0" version="2.13.0" release="1.el7" arch="x86_64" src="">
					<filename>opensearch-dashboards-0:2.13.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240704-08</id>
		<issued date="2024-07-04" />
		<updated date="2024-07-04" />
		<title>Уязвимость curl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2023-46219/</description>
               <solution>
                    Запретить использование в ОС пакета curl
                или
                    Установить обновление для пакета(ов) curl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2023-46219/" type="self" id="ROS-20240704-08" title="ROS-20240704-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46219" type="cve" id="CVE-2023-46219" title="CVE-2023-46219" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="curl" epoch="0" version="7.85.0" release="19.el7.3" arch="x86_64" src="">
					<filename>curl-0:7.85.0-19.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240704-09</id>
		<issued date="2024-07-04" />
		<updated date="2024-07-04" />
		<title>Уязвимость chrony </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chrony</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chrony-cve-2020-14367/</description>
               <solution>
                    Запретить использование в ОС пакета chrony
                или
                    Установить обновление для пакета(ов) chrony
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chrony-cve-2020-14367/" type="self" id="ROS-20240704-09" title="ROS-20240704-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14367" type="cve" id="CVE-2020-14367" title="CVE-2020-14367" />
			<reference href="https://bdu.fstec.ru/vul/2021-01809" type="self" id="BDU:2021-01809" title="BDU:2021-01809" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chrony" epoch="0" version="4.0" release="3.el7" arch="x86_64" src="">
					<filename>chrony-0:4.0-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240704-10</id>
		<issued date="2024-07-04" />
		<updated date="2024-07-04" />
		<title>Множественные уязвимости python3 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в python3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-cve-2019-20907-cve-2020-15801/</description>
               <solution>
                    Запретить использование в ОС пакета python3
                или
                    Установить обновление для пакета(ов) python3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-cve-2019-20907-cve-2020-15801/" type="self" id="ROS-20240704-10" title="ROS-20240704-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15801" type="cve" id="CVE-2020-15801" title="CVE-2020-15801" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20907" type="cve" id="CVE-2019-20907" title="CVE-2019-20907" />
			<reference href="https://bdu.fstec.ru/vul/2021-00726" type="self" id="BDU:2021-00726" title="BDU:2021-00726" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3" epoch="0" version="3.8.19" release="2.el7" arch="x86_64" src="">
					<filename>python3-0:3.8.19-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240704-11</id>
		<issued date="2024-07-04" />
		<updated date="2024-07-04" />
		<title>Уязвимость gnutls </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gnutls</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gnutls-cve-2020-13777/</description>
               <solution>
                    Запретить использование в ОС пакета gnutls
                или
                    Установить обновление для пакета(ов) gnutls
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gnutls-cve-2020-13777/" type="self" id="ROS-20240704-11" title="ROS-20240704-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13777" type="cve" id="CVE-2020-13777" title="CVE-2020-13777" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gnutls" epoch="0" version="3.6.16" release="1.el7" arch="x86_64" src="">
					<filename>gnutls-0:3.6.16-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240708-01</id>
		<issued date="2024-07-08" />
		<updated date="2025-09-09" />
		<title>Уязвимость curl </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-curl-cve-2024-2398-cve-2024-2004/</description>
               <solution>
                    Запретить использование в ОС пакета curl
                или
                    Установить обновление для пакета(ов) curl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-curl-cve-2024-2398-cve-2024-2004/" type="self" id="ROS-20240708-01" title="ROS-20240708-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2004" type="cve" id="CVE-2024-2004" title="CVE-2024-2004" />
			<reference href="https://bdu.fstec.ru/vul/2024-02723" type="self" id="BDU:2024-02723" title="BDU:2024-02723" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="curl" epoch="0" version="7.85.0" release="19.el7.3" arch="x86_64" src="">
					<filename>curl-0:7.85.0-19.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240708-02</id>
		<issued date="2024-07-08" />
		<updated date="2024-07-08" />
		<title>Уязвимость tpm2-tools </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в tpm2-tools</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tpm2-tools-cve-2024-29039/</description>
               <solution>
                    Запретить использование в ОС пакета tpm2-tools
                или
                    Установить обновление для пакета(ов) tpm2-tools
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tpm2-tools-cve-2024-29039/" type="self" id="ROS-20240708-02" title="ROS-20240708-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29039" type="cve" id="CVE-2024-29039" title="CVE-2024-29039" />
			<reference href="https://bdu.fstec.ru/vul/2025-16174" type="self" id="BDU:2025-16174" title="BDU:2025-16174" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tpm2-tools" epoch="0" version="5.7" release="1.el7" arch="x86_64" src="">
					<filename>tpm2-tools-0:5.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240709-01</id>
		<issued date="2024-07-13" />
		<updated date="2024-07-13" />
		<title>Уязвимость icu </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в icu</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-icu-cve-2020-10531/</description>
               <solution>
                    Запретить использование в ОС пакета icu
                или
                    Установить обновление для пакета(ов) icu
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-icu-cve-2020-10531/" type="self" id="ROS-20240709-01" title="ROS-20240709-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10531" type="cve" id="CVE-2020-10531" title="CVE-2020-10531" />
			<reference href="https://bdu.fstec.ru/vul/2020-02034" type="self" id="BDU:2020-02034" title="BDU:2020-02034" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="icu" epoch="1" version="65.1" release="5.el7" arch="x86_64" src="">
					<filename>icu-1:65.1-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240711-01</id>
		<issued date="2024-07-13" />
		<updated date="2024-07-13" />
		<title>Уязвимость rubygem-yard </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в rubygem-yard</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-yard-cve-2024-27285/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-yard
                или
                    Установить обновление для пакета(ов) rubygem-yard
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-yard-cve-2024-27285/" type="self" id="ROS-20240711-01" title="ROS-20240711-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27285" type="cve" id="CVE-2024-27285" title="CVE-2024-27285" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-yard" epoch="0" version="0.9.36" release="1.el7" arch="noarch" src="">
					<filename>rubygem-yard-0:0.9.36-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240709-02</id>
		<issued date="2024-07-13" />
		<updated date="2024-07-13" />
		<title>Уязвимость python3 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2023-6597/</description>
               <solution>
                    Запретить использование в ОС пакета python3
                или
                    Установить обновление для пакета(ов) python3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2023-6597/" type="self" id="ROS-20240709-02" title="ROS-20240709-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6597" type="cve" id="CVE-2023-6597" title="CVE-2023-6597" />
			<reference href="https://bdu.fstec.ru/vul/2024-02120" type="self" id="BDU:2024-02120" title="BDU:2024-02120" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3" epoch="0" version="3.8.19" release="2.el7" arch="x86_64" src="">
					<filename>python3-0:3.8.19-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240709-03</id>
		<issued date="2024-07-13" />
		<updated date="2024-07-13" />
		<title>Уязвимость apache-kafka </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в apache-kafka</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-kafka-cve-2024-27309/</description>
               <solution>
                    Запретить использование в ОС пакета apache-kafka
                или
                    Установить обновление для пакета(ов) apache-kafka
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-kafka-cve-2024-27309/" type="self" id="ROS-20240709-03" title="ROS-20240709-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27309" type="cve" id="CVE-2024-27309" title="CVE-2024-27309" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="apache-kafka" epoch="0" version="3.7.1" release="1.el7" arch="x86_64" src="">
					<filename>apache-kafka-0:3.7.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240709-04</id>
		<issued date="2024-07-13" />
		<updated date="2024-07-13" />
		<title>Уязвимость botan2 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в botan2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-botan2-cve-2024-34703/</description>
               <solution>
                    Запретить использование в ОС пакета botan2
                или
                    Установить обновление для пакета(ов) botan2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-botan2-cve-2024-34703/" type="self" id="ROS-20240709-04" title="ROS-20240709-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34703" type="cve" id="CVE-2024-34703" title="CVE-2024-34703" />
			<reference href="https://bdu.fstec.ru/vul/2024-06990" type="self" id="BDU:2024-06990" title="BDU:2024-06990" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="botan2" epoch="0" version="2.19.4" release="1.el7" arch="x86_64" src="">
					<filename>botan2-0:2.19.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240711-02</id>
		<issued date="2024-07-13" />
		<updated date="2024-07-13" />
		<title>Уязвимость buildah </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в buildah</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-buildah-cve-2024-3727/</description>
               <solution>
                    Запретить использование в ОС пакета buildah
                или
                    Установить обновление для пакета(ов) buildah
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-buildah-cve-2024-3727/" type="self" id="ROS-20240711-02" title="ROS-20240711-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3727" type="cve" id="CVE-2024-3727" title="CVE-2024-3727" />
			<reference href="https://bdu.fstec.ru/vul/2024-05780" type="self" id="BDU:2024-05780" title="BDU:2024-05780" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="buildah" epoch="0" version="1.36.0" release="1.el7" arch="x86_64" src="">
					<filename>buildah-0:1.36.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240711-04</id>
		<issued date="2024-07-13" />
		<updated date="2024-12-23" />
		<title>Уязвимость skopeo </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в skopeo</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-skopeo-cve-2024-37275985/</description>
               <solution>
                    Запретить использование в ОС пакета skopeo
                или
                    Установить обновление для пакета(ов) skopeo
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-skopeo-cve-2024-37275985/" type="self" id="ROS-20240711-04" title="ROS-20240711-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3727" type="cve" id="CVE-2024-3727" title="CVE-2024-3727" />
			<reference href="https://bdu.fstec.ru/vul/2024-05780" type="self" id="BDU:2024-05780" title="BDU:2024-05780" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="skopeo" epoch="0" version="1.15.1" release="1.el7" arch="x86_64" src="">
					<filename>skopeo-0:1.15.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240711-03</id>
		<issued date="2024-07-13" />
		<updated date="2024-07-13" />
		<title>Множественные уязвимости 7zip </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в 7zip</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-7zip-cve-2023-52169-cve-2023-52168/</description>
               <solution>
                    Запретить использование в ОС пакета 7zip
                или
                    Установить обновление для пакета(ов) 7zip
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-7zip-cve-2023-52169-cve-2023-52168/" type="self" id="ROS-20240711-03" title="ROS-20240711-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52169" type="cve" id="CVE-2023-52169" title="CVE-2023-52169" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52168" type="cve" id="CVE-2023-52168" title="CVE-2023-52168" />
			<reference href="https://bdu.fstec.ru/vul/2024-04975" type="self" id="BDU:2024-04975" title="BDU:2024-04975" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="7zip" epoch="0" version="24.07" release="1.el7" arch="x86_64" src="">
					<filename>7zip-0:24.07-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240712-01</id>
		<issued date="2024-07-13" />
		<updated date="2025-07-16" />
		<title>Уязвимость exim </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в exim</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-exim-cve-2024-39929/</description>
               <solution>
                    Запретить использование в ОС пакета Exim
                или
                    Установить обновление для пакета(ов) Exim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-exim-cve-2024-39929/" type="self" id="ROS-20240712-01" title="ROS-20240712-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39929" type="cve" id="CVE-2024-39929" title="CVE-2024-39929" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="exim" epoch="0" version="4.98~rc3" release="1.el7" arch="x86_64" src="">
					<filename>exim-0:4.98~rc3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240712-02</id>
		<issued date="2024-07-13" />
		<updated date="2024-07-13" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2024-24784/</description>
               <solution>
                    Запретить использование в ОС пакета golang
                или
                    Установить обновление для пакета(ов) golang
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2024-24784/" type="self" id="ROS-20240712-02" title="ROS-20240712-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24784" type="cve" id="CVE-2024-24784" title="CVE-2024-24784" />
			<reference href="https://bdu.fstec.ru/vul/2024-04962" type="self" id="BDU:2024-04962" title="BDU:2024-04962" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.21.8" release="1.el7" arch="x86_64" src="">
					<filename>golang-0:1.21.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240715-01</id>
		<issued date="2024-07-15" />
		<updated date="2024-07-15" />
		<title>Уязвимость tomcat </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2022-42252/</description>
               <solution>
                    Запретить использование в ОС пакета tomcat
                или
                    Установить обновление для пакета(ов) tomcat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2022-42252/" type="self" id="ROS-20240715-01" title="ROS-20240715-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42252" type="cve" id="CVE-2022-42252" title="CVE-2022-42252" />
			<reference href="https://bdu.fstec.ru/vul/2022-07501" type="self" id="BDU:2022-07501" title="BDU:2022-07501" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat" epoch="1" version="9.0.68" release="1.el7" arch="noarch" src="">
					<filename>tomcat-1:9.0.68-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240712-03</id>
		<issued date="2024-07-15" />
		<updated date="2024-12-23" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2023-44487/</description>
               <solution>
                    Запретить использование в ОС пакета golang
                или
                    Установить обновление для пакета(ов) golang
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2023-44487/" type="self" id="ROS-20240712-03" title="ROS-20240712-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487" type="cve" id="CVE-2023-44487" title="CVE-2023-44487" />
			<reference href="https://bdu.fstec.ru/vul/2023-06559" type="self" id="BDU:2023-06559" title="BDU:2023-06559" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.21.6" release="1.el7" arch="x86_64" src="">
					<filename>golang-0:1.21.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240716-01</id>
		<issued date="2024-07-16" />
		<updated date="2024-07-16" />
		<title>Множественные уязвимости opensearch </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в opensearch</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-opensearch-cve-2024-39901-cve-2024-39900/</description>
               <solution>
                    Запретить использование в ОС пакета OpenSearch
                или
                    Установить обновление для пакета(ов) OpenSearch
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-opensearch-cve-2024-39901-cve-2024-39900/" type="self" id="ROS-20240716-01" title="ROS-20240716-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39901" type="cve" id="CVE-2024-39901" title="CVE-2024-39901" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39900" type="cve" id="CVE-2024-39900" title="CVE-2024-39900" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="opensearch" epoch="0" version="2.14.0" release="1.el7" arch="x86_64" src="">
					<filename>opensearch-0:2.14.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20210716-02</id>
		<issued date="2024-07-16" />
		<updated date="2024-07-16" />
		<title>Множественные уязвимости dcmtk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dcmtk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-dcmtk-cve-2021-41690-cve-2021-41689-cve-2021-41688-cve-2021-41687-cve-202/</description>
               <solution>
                    Запретить использование в ОС пакета dcmtk
                или
                    Установить обновление для пакета(ов) dcmtk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-dcmtk-cve-2021-41690-cve-2021-41689-cve-2021-41688-cve-2021-41687-cve-202/" type="self" id="ROS-20210716-02" title="ROS-20210716-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41690" type="cve" id="CVE-2021-41690" title="CVE-2021-41690" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41689" type="cve" id="CVE-2021-41689" title="CVE-2021-41689" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41688" type="cve" id="CVE-2021-41688" title="CVE-2021-41688" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41687" type="cve" id="CVE-2021-41687" title="CVE-2021-41687" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2121" type="cve" id="CVE-2022-2121" title="CVE-2022-2121" />
			<reference href="https://bdu.fstec.ru/vul/2025-03972" type="self" id="BDU:2025-03972" title="BDU:2025-03972" />
			<reference href="https://bdu.fstec.ru/vul/2025-03977" type="self" id="BDU:2025-03977" title="BDU:2025-03977" />
			<reference href="https://bdu.fstec.ru/vul/2025-03978" type="self" id="BDU:2025-03978" title="BDU:2025-03978" />
			<reference href="https://bdu.fstec.ru/vul/2025-03979" type="self" id="BDU:2025-03979" title="BDU:2025-03979" />
			<reference href="https://bdu.fstec.ru/vul/2023-03842" type="self" id="BDU:2023-03842" title="BDU:2023-03842" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dcmtk" epoch="0" version="3.6.8" release="1.el7" arch="x86_64" src="">
					<filename>dcmtk-0:3.6.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240716-03</id>
		<issued date="2024-07-16" />
		<updated date="2024-07-16" />
		<title>Уязвимость emacs </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в emacs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-emacs-cve-2024-39331/</description>
               <solution>
                    Запретить использование в ОС пакета emacs
                или
                    Установить обновление для пакета(ов) emacs
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-emacs-cve-2024-39331/" type="self" id="ROS-20240716-03" title="ROS-20240716-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39331" type="cve" id="CVE-2024-39331" title="CVE-2024-39331" />
			<reference href="https://bdu.fstec.ru/vul/2024-04783" type="self" id="BDU:2024-04783" title="BDU:2024-04783" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="emacs" epoch="1" version="25.0.92" release="6.el7" arch="x86_64" src="">
					<filename>emacs-1:25.0.92-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240717-01</id>
		<issued date="2024-07-17" />
		<updated date="2024-07-17" />
		<title>Множественные уязвимости gnutls </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в gnutls</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gnutls-cve-2021-20231-cve-2021-20232/</description>
               <solution>
                    Запретить использование в ОС пакета gnutls
                или
                    Установить обновление для пакета(ов) gnutls
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gnutls-cve-2021-20231-cve-2021-20232/" type="self" id="ROS-20240717-01" title="ROS-20240717-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20231" type="cve" id="CVE-2021-20231" title="CVE-2021-20231" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20232" type="cve" id="CVE-2021-20232" title="CVE-2021-20232" />
			<reference href="https://bdu.fstec.ru/vul/2022-00206" type="self" id="BDU:2022-00206" title="BDU:2022-00206" />
			<reference href="https://bdu.fstec.ru/vul/2022-00220" type="self" id="BDU:2022-00220" title="BDU:2022-00220" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gnutls" epoch="0" version="3.6.16" release="1.el7" arch="x86_64" src="">
					<filename>gnutls-0:3.6.16-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231019-02</id>
		<issued date="2024-07-17" />
		<updated date="2024-07-17" />
		<title>Уязвимость nextcloud </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в nextcloud</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nextcloud-cve-2023-39960/</description>
               <solution>
                    Запретить использование в ОС пакета Nextcloud Server
                или
                    Установить обновление для пакета(ов) Nextcloud Server
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nextcloud-cve-2023-39960/" type="self" id="ROS-20231019-02" title="ROS-20231019-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39960" type="cve" id="CVE-2023-39960" title="CVE-2023-39960" />
			<reference href="https://bdu.fstec.ru/vul/2023-06928" type="self" id="BDU:2023-06928" title="BDU:2023-06928" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nextcloud" epoch="0" version="22.0.0" release="2.el7" arch="noarch" src="">
					<filename>nextcloud-0:22.0.0-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240717-03</id>
		<issued date="2024-07-17" />
		<updated date="2024-07-17" />
		<title>Множественные уязвимости gnutls </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gnutls</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gnutls-cve-2022-2509-cve-2021-4209/</description>
               <solution>
                    Запретить использование в ОС пакета gnutls
                или
                    Установить обновление для пакета(ов) gnutls
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gnutls-cve-2022-2509-cve-2021-4209/" type="self" id="ROS-20240717-03" title="ROS-20240717-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2509" type="cve" id="CVE-2022-2509" title="CVE-2022-2509" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4209" type="cve" id="CVE-2021-4209" title="CVE-2021-4209" />
			<reference href="https://bdu.fstec.ru/vul/2024-07315" type="self" id="BDU:2024-07315" title="BDU:2024-07315" />
			<reference href="https://bdu.fstec.ru/vul/2022-01898" type="self" id="BDU:2022-01898" title="BDU:2022-01898" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gnutls" epoch="0" version="3.6.16" release="6.el7" arch="x86_64" src="">
					<filename>gnutls-0:3.6.16-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240717-04</id>
		<issued date="2024-07-17" />
		<updated date="2024-07-17" />
		<title>Уязвимость libcaca </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libcaca</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libcaca-cve-2022-0856/</description>
               <solution>
                    Запретить использование в ОС пакета libcaca
                или
                    Установить обновление для пакета(ов) libcaca
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libcaca-cve-2022-0856/" type="self" id="ROS-20240717-04" title="ROS-20240717-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0856" type="cve" id="CVE-2022-0856" title="CVE-2022-0856" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libcaca" epoch="0" version="0.99" release="0.46.beta19.el7" arch="x86_64" src="">
					<filename>libcaca-0:0.99-0.46.beta19.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240717-05</id>
		<issued date="2024-07-17" />
		<updated date="2024-07-17" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2023-5388/</description>
               <solution>
                    Запретить использование в ОС пакета firefox
                или
                    Установить обновление для пакета(ов) firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2023-5388/" type="self" id="ROS-20240717-05" title="ROS-20240717-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388" type="cve" id="CVE-2023-5388" title="CVE-2023-5388" />
			<reference href="https://bdu.fstec.ru/vul/2023-06938" type="self" id="BDU:2023-06938" title="BDU:2023-06938" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.12.0" release="1.el7" arch="x86_64" src="">
					<filename>firefox-0:115.12.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240717-06</id>
		<issued date="2024-07-17" />
		<updated date="2024-07-17" />
		<title>Уязвимость gnutls </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gnutls</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gnutls-cve-2024-28834/</description>
               <solution>
                    Запретить использование в ОС пакета GnuTLS
                или
                    Установить обновление для пакета(ов) GnuTLS
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gnutls-cve-2024-28834/" type="self" id="ROS-20240717-06" title="ROS-20240717-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28834" type="cve" id="CVE-2024-28834" title="CVE-2024-28834" />
			<reference href="https://bdu.fstec.ru/vul/2025-08089" type="self" id="BDU:2025-08089" title="BDU:2025-08089" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gnutls" epoch="0" version="3.6.16" release="6.el7" arch="x86_64" src="">
					<filename>gnutls-0:3.6.16-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240718-01</id>
		<issued date="2024-07-18" />
		<updated date="2024-07-18" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2024-29944/</description>
               <solution>
                    Запретить использование в ОС пакета firefox
                или
                    Установить обновление для пакета(ов) firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2024-29944/" type="self" id="ROS-20240718-01" title="ROS-20240718-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29944" type="cve" id="CVE-2024-29944" title="CVE-2024-29944" />
			<reference href="https://bdu.fstec.ru/vul/2024-02304" type="self" id="BDU:2024-02304" title="BDU:2024-02304" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.12.0" release="1.el7" arch="x86_64" src="">
					<filename>firefox-0:115.12.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240718-02</id>
		<issued date="2024-07-18" />
		<updated date="2024-07-18" />
		<title>Уязвимость nomad </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в nomad</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nomad-cve-2024-3817/</description>
               <solution>
                    Запретить использование в ОС пакета nomad
                или
                    Установить обновление для пакета(ов) nomad
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nomad-cve-2024-3817/" type="self" id="ROS-20240718-02" title="ROS-20240718-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3817" type="cve" id="CVE-2024-3817" title="CVE-2024-3817" />
			<reference href="https://bdu.fstec.ru/vul/2024-05787" type="self" id="BDU:2024-05787" title="BDU:2024-05787" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nomad" epoch="0" version="1.7.7" release="1.el7" arch="x86_64" src="">
					<filename>nomad-0:1.7.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240422-11</id>
		<issued date="2024-07-18" />
		<updated date="2024-12-23" />
		<title>Уязвимость terraform </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в terraform</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-terraform-cve-2023-45288/</description>
               <solution>
                    Запретить использование в ОС пакета terraform
                или
                    Установить обновление для пакета(ов) terraform
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-terraform-cve-2023-45288/" type="self" id="ROS-20240422-11" title="ROS-20240422-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45288" type="cve" id="CVE-2023-45288" title="CVE-2023-45288" />
			<reference href="https://bdu.fstec.ru/vul/2024-02688" type="self" id="BDU:2024-02688" title="BDU:2024-02688" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="terraform" epoch="0" version="1.8.4" release="1.el7" arch="x86_64" src="">
					<filename>terraform-0:1.8.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240718-03</id>
		<issued date="2024-07-18" />
		<updated date="2024-07-18" />
		<title>Уязвимость consul </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в consul</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-consul-cve-2024-28180/</description>
               <solution>
                    Запретить использование в ОС пакета consul
                или
                    Установить обновление для пакета(ов) consul
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-consul-cve-2024-28180/" type="self" id="ROS-20240718-03" title="ROS-20240718-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28180" type="cve" id="CVE-2024-28180" title="CVE-2024-28180" />
			<reference href="https://bdu.fstec.ru/vul/2024-01928" type="self" id="BDU:2024-01928" title="BDU:2024-01928" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="consul" epoch="0" version="1.18.2" release="1.el7" arch="x86_64" src="">
					<filename>consul-0:1.18.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240718-04</id>
		<issued date="2024-07-18" />
		<updated date="2024-07-18" />
		<title>Множественные уязвимости libvpx </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libvpx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libvpx-cve-2023-6349-cve-2024-5197/</description>
               <solution>
                    Запретить использование в ОС пакета libvpx
                или
                    Установить обновление для пакета(ов) libvpx
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libvpx-cve-2023-6349-cve-2024-5197/" type="self" id="ROS-20240718-04" title="ROS-20240718-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6349" type="cve" id="CVE-2023-6349" title="CVE-2023-6349" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5197" type="cve" id="CVE-2024-5197" title="CVE-2024-5197" />
			<reference href="https://bdu.fstec.ru/vul/2024-05778" type="self" id="BDU:2024-05778" title="BDU:2024-05778" />
			<reference href="https://bdu.fstec.ru/vul/2024-04531" type="self" id="BDU:2024-04531" title="BDU:2024-04531" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libvpx" epoch="0" version="1.10.0" release="2.el7" arch="x86_64" src="">
					<filename>libvpx-0:1.10.0-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240719-01</id>
		<issued date="2024-07-19" />
		<updated date="2024-07-19" />
		<title>Уязвимость podman </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в podman</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-podman-cve-2024-3727/</description>
               <solution>
                    Запретить использование в ОС пакета podman
                или
                    Установить обновление для пакета(ов) podman
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-podman-cve-2024-3727/" type="self" id="ROS-20240719-01" title="ROS-20240719-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3727" type="cve" id="CVE-2024-3727" title="CVE-2024-3727" />
			<reference href="https://bdu.fstec.ru/vul/2024-05780" type="self" id="BDU:2024-05780" title="BDU:2024-05780" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="podman" epoch="0" version="4.9.5" release="1.el7" arch="x86_64" src="">
					<filename>podman-0:4.9.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240719-02</id>
		<issued date="2024-07-19" />
		<updated date="2024-07-19" />
		<title>Уязвимость phpldapadmin </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в phpldapadmin</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-phpldapadmin-cve-2016-15039/</description>
               <solution>
                    Запретить использование в ОС пакета phpLDAPadmin
                или
                    Установить обновление для пакета(ов) phpLDAPadmin
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-phpldapadmin-cve-2016-15039/" type="self" id="ROS-20240719-02" title="ROS-20240719-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-15039" type="cve" id="CVE-2016-15039" title="CVE-2016-15039" />
			<reference href="https://bdu.fstec.ru/vul/2024-05788" type="self" id="BDU:2024-05788" title="BDU:2024-05788" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="phpldapadmin" epoch="0" version="1.2.6.7" release="1.el7" arch="noarch" src="">
					<filename>phpldapadmin-0:1.2.6.7-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240719-03</id>
		<issued date="2024-07-19" />
		<updated date="2024-07-19" />
		<title>Уязвимость python3-zipp </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-zipp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-zipp-cve-2024-5569/</description>
               <solution>
                    Запретить использование в ОС пакета python3-zipp
                или
                    Установить обновление для пакета(ов) python3-zipp
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-zipp-cve-2024-5569/" type="self" id="ROS-20240719-03" title="ROS-20240719-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5569" type="cve" id="CVE-2024-5569" title="CVE-2024-5569" />
			<reference href="https://bdu.fstec.ru/vul/2024-05789" type="self" id="BDU:2024-05789" title="BDU:2024-05789" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-zipp" epoch="0" version="3.19.2" release="2.el7" arch="noarch" src="">
					<filename>python3-zipp-0:3.19.2-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240719-04</id>
		<issued date="2024-07-19" />
		<updated date="2024-07-19" />
		<title>Множественные уязвимости dotnet </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dotnet</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-dotnet-cve-2024-38095-cve-2024-30105-cve-2024-35264/</description>
               <solution>
                    Запретить использование в ОС пакета dotnet
                или
                    Установить обновление для пакета(ов) dotnet
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-dotnet-cve-2024-38095-cve-2024-30105-cve-2024-35264/" type="self" id="ROS-20240719-04" title="ROS-20240719-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38095" type="cve" id="CVE-2024-38095" title="CVE-2024-38095" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30105" type="cve" id="CVE-2024-30105" title="CVE-2024-30105" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35264" type="cve" id="CVE-2024-35264" title="CVE-2024-35264" />
			<reference href="https://bdu.fstec.ru/vul/2024-05713" type="self" id="BDU:2024-05713" title="BDU:2024-05713" />
			<reference href="https://bdu.fstec.ru/vul/2024-05254" type="self" id="BDU:2024-05254" title="BDU:2024-05254" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dotnet" epoch="0" version="8.0.107" release="1.el7" arch="x86_64" src="">
					<filename>dotnet-0:8.0.107-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240719-05</id>
		<issued date="2024-07-19" />
		<updated date="2024-07-19" />
		<title>Множественные уязвимости opensearch </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в opensearch</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-opensearch-cve-2024-33883-cve-2024-29041/</description>
               <solution>
                    Запретить использование в ОС пакета opensearch
                или
                    Установить обновление для пакета(ов) opensearch
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-opensearch-cve-2024-33883-cve-2024-29041/" type="self" id="ROS-20240719-05" title="ROS-20240719-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33883" type="cve" id="CVE-2024-33883" title="CVE-2024-33883" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29041" type="cve" id="CVE-2024-29041" title="CVE-2024-29041" />
			<reference href="https://bdu.fstec.ru/vul/2024-04916" type="self" id="BDU:2024-04916" title="BDU:2024-04916" />
			<reference href="https://bdu.fstec.ru/vul/2024-05779" type="self" id="BDU:2024-05779" title="BDU:2024-05779" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="opensearch" epoch="0" version="2.15.0" release="1.el7" arch="x86_64" src="">
					<filename>opensearch-0:2.15.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240723-01</id>
		<issued date="2024-07-24" />
		<updated date="2024-07-24" />
		<title>Уязвимость krb5-server </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в krb5-server</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-krb5-server-cve-2021-36222/</description>
               <solution>
                    Запретить использование в ОС пакета krb5-server
                или
                    Установить обновление для пакета(ов) krb5-server
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-krb5-server-cve-2021-36222/" type="self" id="ROS-20240723-01" title="ROS-20240723-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222" type="cve" id="CVE-2021-36222" title="CVE-2021-36222" />
			<reference href="https://bdu.fstec.ru/vul/2021-03997" type="self" id="BDU:2021-03997" title="BDU:2021-03997" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="krb5-server" epoch="0" version="1.20.1" release="1.el7" arch="x86_64" src="">
					<filename>krb5-server-0:1.20.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240723-02</id>
		<issued date="2024-07-24" />
		<updated date="2024-07-24" />
		<title>Уязвимость python3-pygments </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-pygments</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-pygments-cve-2021-20270/</description>
               <solution>
                    Запретить использование в ОС пакета python3-pygments
                или
                    Установить обновление для пакета(ов) python3-pygments
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-pygments-cve-2021-20270/" type="self" id="ROS-20240723-02" title="ROS-20240723-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20270" type="cve" id="CVE-2021-20270" title="CVE-2021-20270" />
			<reference href="https://bdu.fstec.ru/vul/2021-03173" type="self" id="BDU:2021-03173" title="BDU:2021-03173" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-pygments" epoch="0" version="2.11.2" release="1.el7" arch="noarch" src="">
					<filename>python3-pygments-0:2.11.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240723-03</id>
		<issued date="2024-07-24" />
		<updated date="2024-07-24" />
		<title>Множественные уязвимости ruby </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в ruby</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-ruby-cve-2021-31810-cve-2021-32066/</description>
               <solution>
                    Запретить использование в ОС пакета ruby
                или
                    Установить обновление для пакета(ов) ruby
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-ruby-cve-2021-31810-cve-2021-32066/" type="self" id="ROS-20240723-03" title="ROS-20240723-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31810" type="cve" id="CVE-2021-31810" title="CVE-2021-31810" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32066" type="cve" id="CVE-2021-32066" title="CVE-2021-32066" />
			<reference href="https://bdu.fstec.ru/vul/2021-04565" type="self" id="BDU:2021-04565" title="BDU:2021-04565" />
			<reference href="https://bdu.fstec.ru/vul/2021-04264" type="self" id="BDU:2021-04264" title="BDU:2021-04264" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ruby" epoch="0" version="2.7.6" release="129.el7" arch="x86_64" src="">
					<filename>ruby-0:2.7.6-129.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240723-04</id>
		<issued date="2024-07-24" />
		<updated date="2024-07-24" />
		<title>Уязвимость fetchmail </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в fetchmail</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-fetchmail-cve-2021-36386/</description>
               <solution>
                    Запретить использование в ОС пакета fetchmail
                или
                    Установить обновление для пакета(ов) fetchmail
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-fetchmail-cve-2021-36386/" type="self" id="ROS-20240723-04" title="ROS-20240723-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36386" type="cve" id="CVE-2021-36386" title="CVE-2021-36386" />
			<reference href="https://bdu.fstec.ru/vul/2021-03928" type="self" id="BDU:2021-03928" title="BDU:2021-03928" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="fetchmail" epoch="0" version="6.3.24" release="8.el7.3" arch="x86_64" src="">
					<filename>fetchmail-0:6.3.24-8.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240723-05</id>
		<issued date="2024-07-24" />
		<updated date="2024-07-24" />
		<title>Множественные уязвимости VirtualBox</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-virtualbox-23-07-24/</description>
               <solution>
                    Запретить использование в ОС пакета VirtualBox
                или
                    Установить обновление для пакета(ов) VirtualBox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-virtualbox-23-07-24/" type="self" id="ROS-20240723-05" title="ROS-20240723-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21112" type="cve" id="CVE-2024-21112" title="CVE-2024-21112" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21113" type="cve" id="CVE-2024-21113" title="CVE-2024-21113" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21114" type="cve" id="CVE-2024-21114" title="CVE-2024-21114" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21115" type="cve" id="CVE-2024-21115" title="CVE-2024-21115" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21103" type="cve" id="CVE-2024-21103" title="CVE-2024-21103" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21116" type="cve" id="CVE-2024-21116" title="CVE-2024-21116" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21110" type="cve" id="CVE-2024-21110" title="CVE-2024-21110" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21106" type="cve" id="CVE-2024-21106" title="CVE-2024-21106" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21121" type="cve" id="CVE-2024-21121" title="CVE-2024-21121" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21109" type="cve" id="CVE-2024-21109" title="CVE-2024-21109" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21108" type="cve" id="CVE-2024-21108" title="CVE-2024-21108" />
			<reference href="https://bdu.fstec.ru/vul/2024-05433" type="self" id="BDU:2024-05433" title="BDU:2024-05433" />
			<reference href="https://bdu.fstec.ru/vul/2024-03538" type="self" id="BDU:2024-03538" title="BDU:2024-03538" />
			<reference href="https://bdu.fstec.ru/vul/2024-03425" type="self" id="BDU:2024-03425" title="BDU:2024-03425" />
			<reference href="https://bdu.fstec.ru/vul/2024-03479" type="self" id="BDU:2024-03479" title="BDU:2024-03479" />
			<reference href="https://bdu.fstec.ru/vul/2024-03172" type="self" id="BDU:2024-03172" title="BDU:2024-03172" />
			<reference href="https://bdu.fstec.ru/vul/2024-03501" type="self" id="BDU:2024-03501" title="BDU:2024-03501" />
			<reference href="https://bdu.fstec.ru/vul/2024-03472" type="self" id="BDU:2024-03472" title="BDU:2024-03472" />
			<reference href="https://bdu.fstec.ru/vul/2024-05430" type="self" id="BDU:2024-05430" title="BDU:2024-05430" />
			<reference href="https://bdu.fstec.ru/vul/2024-05437" type="self" id="BDU:2024-05437" title="BDU:2024-05437" />
			<reference href="https://bdu.fstec.ru/vul/2024-05407" type="self" id="BDU:2024-05407" title="BDU:2024-05407" />
			<reference href="https://bdu.fstec.ru/vul/2024-05431" type="self" id="BDU:2024-05431" title="BDU:2024-05431" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox" epoch="0" version="7.0.18" release="1.el7" arch="x86_64" src="">
					<filename>VirtualBox-0:7.0.18-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240723-06</id>
		<issued date="2024-07-24" />
		<updated date="2024-07-24" />
		<title>Уязвимость thunderbird </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-thunderbird-cve-2024-5702/</description>
               <solution>
                    Запретить использование в ОС пакета thunderbird
                или
                    Установить обновление для пакета(ов) thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-thunderbird-cve-2024-5702/" type="self" id="ROS-20240723-06" title="ROS-20240723-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702" type="cve" id="CVE-2024-5702" title="CVE-2024-5702" />
			<reference href="https://bdu.fstec.ru/vul/2024-05167" type="self" id="BDU:2024-05167" title="BDU:2024-05167" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="115.12.1" release="1.el7" arch="x86_64" src="">
					<filename>thunderbird-0:115.12.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240724-01</id>
		<issued date="2024-07-24" />
		<updated date="2024-07-24" />
		<title>Множественные уязвимости chromium</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-24-07-24-1/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-24-07-24-1/" type="self" id="ROS-20240724-01" title="ROS-20240724-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3176" type="cve" id="CVE-2024-3176" title="CVE-2024-3176" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3175" type="cve" id="CVE-2024-3175" title="CVE-2024-3175" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3173" type="cve" id="CVE-2024-3173" title="CVE-2024-3173" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3172" type="cve" id="CVE-2024-3172" title="CVE-2024-3172" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3174" type="cve" id="CVE-2024-3174" title="CVE-2024-3174" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3171" type="cve" id="CVE-2024-3171" title="CVE-2024-3171" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3170" type="cve" id="CVE-2024-3170" title="CVE-2024-3170" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3169" type="cve" id="CVE-2024-3169" title="CVE-2024-3169" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3168" type="cve" id="CVE-2024-3168" title="CVE-2024-3168" />
			<reference href="https://bdu.fstec.ru/vul/2024-05781" type="self" id="BDU:2024-05781" title="BDU:2024-05781" />
			<reference href="https://bdu.fstec.ru/vul/2024-05783" type="self" id="BDU:2024-05783" title="BDU:2024-05783" />
			<reference href="https://bdu.fstec.ru/vul/2024-05782" type="self" id="BDU:2024-05782" title="BDU:2024-05782" />
			<reference href="https://bdu.fstec.ru/vul/2024-05784" type="self" id="BDU:2024-05784" title="BDU:2024-05784" />
			<reference href="https://bdu.fstec.ru/vul/2024-05785" type="self" id="BDU:2024-05785" title="BDU:2024-05785" />
			<reference href="https://bdu.fstec.ru/vul/2024-05786" type="self" id="BDU:2024-05786" title="BDU:2024-05786" />
			<reference href="https://bdu.fstec.ru/vul/2024-05775" type="self" id="BDU:2024-05775" title="BDU:2024-05775" />
			<reference href="https://bdu.fstec.ru/vul/2024-05776" type="self" id="BDU:2024-05776" title="BDU:2024-05776" />
			<reference href="https://bdu.fstec.ru/vul/2024-05777" type="self" id="BDU:2024-05777" title="BDU:2024-05777" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="124.0.6367.78" release="1.el7" arch="x86_64" src="">
					<filename>chromium-0:124.0.6367.78-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240724-02</id>
		<issued date="2024-07-24" />
		<updated date="2024-07-24" />
		<title>Множественные уязвимости chromium</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-24-07-24-2/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-24-07-24-2/" type="self" id="ROS-20240724-02" title="ROS-20240724-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6293" type="cve" id="CVE-2024-6293" title="CVE-2024-6293" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6292" type="cve" id="CVE-2024-6292" title="CVE-2024-6292" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6291" type="cve" id="CVE-2024-6291" title="CVE-2024-6291" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6290" type="cve" id="CVE-2024-6290" title="CVE-2024-6290" />
			<reference href="https://bdu.fstec.ru/vul/2024-05053" type="self" id="BDU:2024-05053" title="BDU:2024-05053" />
			<reference href="https://bdu.fstec.ru/vul/2024-05055" type="self" id="BDU:2024-05055" title="BDU:2024-05055" />
			<reference href="https://bdu.fstec.ru/vul/2024-05056" type="self" id="BDU:2024-05056" title="BDU:2024-05056" />
			<reference href="https://bdu.fstec.ru/vul/2024-05054" type="self" id="BDU:2024-05054" title="BDU:2024-05054" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="126.0.6478.126" release="1.el7" arch="x86_64" src="">
					<filename>chromium-0:126.0.6478.126-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240725-01</id>
		<issued date="2024-07-25" />
		<updated date="2024-07-25" />
		<title>Множественные уязвимости nginx </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nginx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nginx-cve-2024-31079-cve-2024-35200-cve-2024-34161/</description>
               <solution>
                    Запретить использование в ОС пакета nginx
                или
                    Установить обновление для пакета(ов) nginx
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nginx-cve-2024-31079-cve-2024-35200-cve-2024-34161/" type="self" id="ROS-20240725-01" title="ROS-20240725-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31079" type="cve" id="CVE-2024-31079" title="CVE-2024-31079" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35200" type="cve" id="CVE-2024-35200" title="CVE-2024-35200" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34161" type="cve" id="CVE-2024-34161" title="CVE-2024-34161" />
			<reference href="https://bdu.fstec.ru/vul/2024-04387" type="self" id="BDU:2024-04387" title="BDU:2024-04387" />
			<reference href="https://bdu.fstec.ru/vul/2024-04389" type="self" id="BDU:2024-04389" title="BDU:2024-04389" />
			<reference href="https://bdu.fstec.ru/vul/2024-04386" type="self" id="BDU:2024-04386" title="BDU:2024-04386" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nginx" epoch="1" version="1.26.1" release="1.el7" arch="x86_64" src="">
					<filename>nginx-1:1.26.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240725-02</id>
		<issued date="2024-07-25" />
		<updated date="2024-07-25" />
		<title>Уязвимость squid </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в squid</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-squid-cve-2023-46724/</description>
               <solution>
                    Запретить использование в ОС пакета squid
                или
                    Установить обновление для пакета(ов) squid
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-squid-cve-2023-46724/" type="self" id="ROS-20240725-02" title="ROS-20240725-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46724" type="cve" id="CVE-2023-46724" title="CVE-2023-46724" />
			<reference href="https://bdu.fstec.ru/vul/2023-07699" type="self" id="BDU:2023-07699" title="BDU:2023-07699" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="squid" epoch="7" version="6.5" release="1.el7" arch="x86_64" src="">
					<filename>squid-7:6.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240725-03</id>
		<issued date="2024-07-25" />
		<updated date="2024-07-25" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2024-2884/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2024-2884/" type="self" id="ROS-20240725-03" title="ROS-20240725-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2884" type="cve" id="CVE-2024-2884" title="CVE-2024-2884" />
			<reference href="https://bdu.fstec.ru/vul/2024-06897" type="self" id="BDU:2024-06897" title="BDU:2024-06897" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="124.0.6367.78" release="1.el7" arch="x86_64" src="">
					<filename>chromium-0:124.0.6367.78-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240726-01</id>
		<issued date="2024-07-26" />
		<updated date="2024-07-26" />
		<title>Множественные уязвимости glpi</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-glpi-26-07-24/</description>
               <solution>
                    Запретить использование в ОС пакета GLPI
                или
                    Установить обновление для пакета(ов) GLPI
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-glpi-26-07-24/" type="self" id="ROS-20240726-01" title="ROS-20240726-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24867" type="cve" id="CVE-2022-24867" title="CVE-2022-24867" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24869" type="cve" id="CVE-2022-24869" title="CVE-2022-24869" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24868" type="cve" id="CVE-2022-24868" title="CVE-2022-24868" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31061" type="cve" id="CVE-2022-31061" title="CVE-2022-31061" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36112" type="cve" id="CVE-2022-36112" title="CVE-2022-36112" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35947" type="cve" id="CVE-2022-35947" title="CVE-2022-35947" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35946" type="cve" id="CVE-2022-35946" title="CVE-2022-35946" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35945" type="cve" id="CVE-2022-35945" title="CVE-2022-35945" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31187" type="cve" id="CVE-2022-31187" title="CVE-2022-31187" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31143" type="cve" id="CVE-2022-31143" title="CVE-2022-31143" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39276" type="cve" id="CVE-2022-39276" title="CVE-2022-39276" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39262" type="cve" id="CVE-2022-39262" title="CVE-2022-39262" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39234" type="cve" id="CVE-2022-39234" title="CVE-2022-39234" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39376" type="cve" id="CVE-2022-39376" title="CVE-2022-39376" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39375" type="cve" id="CVE-2022-39375" title="CVE-2022-39375" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39372" type="cve" id="CVE-2022-39372" title="CVE-2022-39372" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39370" type="cve" id="CVE-2022-39370" title="CVE-2022-39370" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39277" type="cve" id="CVE-2022-39277" title="CVE-2022-39277" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39323" type="cve" id="CVE-2022-39323" title="CVE-2022-39323" />
			<reference href="https://bdu.fstec.ru/vul/2024-05821" type="self" id="BDU:2024-05821" title="BDU:2024-05821" />
			<reference href="https://bdu.fstec.ru/vul/2024-05820" type="self" id="BDU:2024-05820" title="BDU:2024-05820" />
			<reference href="https://bdu.fstec.ru/vul/2024-05819" type="self" id="BDU:2024-05819" title="BDU:2024-05819" />
			<reference href="https://bdu.fstec.ru/vul/2022-04910" type="self" id="BDU:2022-04910" title="BDU:2022-04910" />
			<reference href="https://bdu.fstec.ru/vul/2024-05818" type="self" id="BDU:2024-05818" title="BDU:2024-05818" />
			<reference href="https://bdu.fstec.ru/vul/2024-05817" type="self" id="BDU:2024-05817" title="BDU:2024-05817" />
			<reference href="https://bdu.fstec.ru/vul/2024-05816" type="self" id="BDU:2024-05816" title="BDU:2024-05816" />
			<reference href="https://bdu.fstec.ru/vul/2024-05815" type="self" id="BDU:2024-05815" title="BDU:2024-05815" />
			<reference href="https://bdu.fstec.ru/vul/2024-05814" type="self" id="BDU:2024-05814" title="BDU:2024-05814" />
			<reference href="https://bdu.fstec.ru/vul/2024-05813" type="self" id="BDU:2024-05813" title="BDU:2024-05813" />
			<reference href="https://bdu.fstec.ru/vul/2024-05812" type="self" id="BDU:2024-05812" title="BDU:2024-05812" />
			<reference href="https://bdu.fstec.ru/vul/2024-05808" type="self" id="BDU:2024-05808" title="BDU:2024-05808" />
			<reference href="https://bdu.fstec.ru/vul/2024-05807" type="self" id="BDU:2024-05807" title="BDU:2024-05807" />
			<reference href="https://bdu.fstec.ru/vul/2024-05800" type="self" id="BDU:2024-05800" title="BDU:2024-05800" />
			<reference href="https://bdu.fstec.ru/vul/2024-05806" type="self" id="BDU:2024-05806" title="BDU:2024-05806" />
			<reference href="https://bdu.fstec.ru/vul/2024-05805" type="self" id="BDU:2024-05805" title="BDU:2024-05805" />
			<reference href="https://bdu.fstec.ru/vul/2024-05811" type="self" id="BDU:2024-05811" title="BDU:2024-05811" />
			<reference href="https://bdu.fstec.ru/vul/2024-05810" type="self" id="BDU:2024-05810" title="BDU:2024-05810" />
			<reference href="https://bdu.fstec.ru/vul/2024-05809" type="self" id="BDU:2024-05809" title="BDU:2024-05809" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi" epoch="0" version="10.0.15" release="3.el7" arch="noarch" src="">
					<filename>glpi-0:10.0.15-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240726-02</id>
		<issued date="2024-07-26" />
		<updated date="2024-07-26" />
		<title>Уязвимость haproxy </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в haproxy</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-haproxy-cve-2023-0056/</description>
               <solution>
                    Запретить использование в ОС пакета haproxy
                или
                    Установить обновление для пакета(ов) haproxy
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-haproxy-cve-2023-0056/" type="self" id="ROS-20240726-02" title="ROS-20240726-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0056" type="cve" id="CVE-2023-0056" title="CVE-2023-0056" />
			<reference href="https://bdu.fstec.ru/vul/2023-04835" type="self" id="BDU:2023-04835" title="BDU:2023-04835" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="haproxy" epoch="0" version="2.9.9" release="1.el7" arch="x86_64" src="">
					<filename>haproxy-0:2.9.9-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240726-03</id>
		<issued date="2024-07-26" />
		<updated date="2024-07-26" />
		<title>Уязвимость redis </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в redis</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-redis-cve-2022-24834/</description>
               <solution>
                    Запретить использование в ОС пакета redis
                или
                    Установить обновление для пакета(ов) redis
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-redis-cve-2022-24834/" type="self" id="ROS-20240726-03" title="ROS-20240726-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24834" type="cve" id="CVE-2022-24834" title="CVE-2022-24834" />
			<reference href="https://bdu.fstec.ru/vul/2023-07213" type="self" id="BDU:2023-07213" title="BDU:2023-07213" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="redis" epoch="0" version="7.0.13" release="1.el7" arch="x86_64" src="">
					<filename>redis-0:7.0.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240726-04</id>
		<issued date="2024-07-26" />
		<updated date="2024-07-26" />
		<title>Уязвимость moodle </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-moodle-cve-2023-5541/</description>
               <solution>
                    Запретить использование в ОС пакета Moodle
                или
                    Установить обновление для пакета(ов) Moodle
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-moodle-cve-2023-5541/" type="self" id="ROS-20240726-04" title="ROS-20240726-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5541" type="cve" id="CVE-2023-5541" title="CVE-2023-5541" />
			<reference href="https://bdu.fstec.ru/vul/2024-05803" type="self" id="BDU:2024-05803" title="BDU:2024-05803" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="moodle" epoch="0" version="4.2.8" release="1.el7" arch="noarch" src="">
					<filename>moodle-0:4.2.8-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240726-05</id>
		<issued date="2024-07-26" />
		<updated date="2024-07-26" />
		<title>Множественные уязвимости httpd </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в httpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-httpd-cve-2024-24795-cve-2023-38709/</description>
               <solution>
                    Запретить использование в ОС пакета httpd
                или
                    Установить обновление для пакета(ов) httpd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-httpd-cve-2024-24795-cve-2023-38709/" type="self" id="ROS-20240726-05" title="ROS-20240726-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24795" type="cve" id="CVE-2024-24795" title="CVE-2024-24795" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38709" type="cve" id="CVE-2023-38709" title="CVE-2023-38709" />
			<reference href="https://bdu.fstec.ru/vul/2024-03102" type="self" id="BDU:2024-03102" title="BDU:2024-03102" />
			<reference href="https://bdu.fstec.ru/vul/2024-03101" type="self" id="BDU:2024-03101" title="BDU:2024-03101" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="httpd" epoch="0" version="2.4.59" release="1.el7" arch="x86_64" src="">
					<filename>httpd-0:2.4.59-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240726-06</id>
		<issued date="2024-07-26" />
		<updated date="2024-07-26" />
		<title>Уязвимость webkit2gtk3 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в webkit2gtk3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-webkit2gtk3-cve-2021-42762/</description>
               <solution>
                    Запретить использование в ОС пакета webkit2gtk3
                или
                    Установить обновление для пакета(ов) webkit2gtk3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-webkit2gtk3-cve-2021-42762/" type="self" id="ROS-20240726-06" title="ROS-20240726-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762" type="cve" id="CVE-2021-42762" title="CVE-2021-42762" />
			<reference href="https://bdu.fstec.ru/vul/2024-05804" type="self" id="BDU:2024-05804" title="BDU:2024-05804" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="webkit2gtk3" epoch="1" version="2.35.1" release="5.el7" arch="x86_64" src="">
					<filename>webkit2gtk3-1:2.35.1-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240726-07</id>
		<issued date="2024-07-26" />
		<updated date="2024-07-26" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2024-5500/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2024-5500/" type="self" id="ROS-20240726-07" title="ROS-20240726-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5500" type="cve" id="CVE-2024-5500" title="CVE-2024-5500" />
			<reference href="https://bdu.fstec.ru/vul/2024-05802" type="self" id="BDU:2024-05802" title="BDU:2024-05802" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="124.0.6367.78" release="1.el7" arch="x86_64" src="">
					<filename>chromium-0:124.0.6367.78-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240726-08</id>
		<issued date="2024-07-26" />
		<updated date="2024-07-26" />
		<title>Уязвимость filebeat </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в filebeat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-filebeat-cve-2023-31413/</description>
               <solution>
                    Запретить использование в ОС пакета filebeat
                или
                    Установить обновление для пакета(ов) filebeat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-filebeat-cve-2023-31413/" type="self" id="ROS-20240726-08" title="ROS-20240726-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31413" type="cve" id="CVE-2023-31413" title="CVE-2023-31413" />
			<reference href="https://bdu.fstec.ru/vul/2024-05801" type="self" id="BDU:2024-05801" title="BDU:2024-05801" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="filebeat" epoch="0" version="8.14.1" release="1.el7" arch="x86_64" src="">
					<filename>filebeat-0:8.14.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240729-01</id>
		<issued date="2024-07-29" />
		<updated date="2024-07-29" />
		<title>Уязвимость tomcat </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в tomcat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2022-34305/</description>
               <solution>
                    Запретить использование в ОС пакета tomcat
                или
                    Установить обновление для пакета(ов) tomcat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2022-34305/" type="self" id="ROS-20240729-01" title="ROS-20240729-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34305" type="cve" id="CVE-2022-34305" title="CVE-2022-34305" />
			<reference href="https://bdu.fstec.ru/vul/2022-03746" type="self" id="BDU:2022-03746" title="BDU:2022-03746" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat" epoch="1" version="9.0.68" release="1.el7" arch="noarch" src="">
					<filename>tomcat-1:9.0.68-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240729-02</id>
		<issued date="2024-07-29" />
		<updated date="2024-07-29" />
		<title>Уязвимость tomcat </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2022-29885/</description>
               <solution>
                    Запретить использование в ОС пакета tomcat
                или
                    Установить обновление для пакета(ов) tomcat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2022-29885/" type="self" id="ROS-20240729-02" title="ROS-20240729-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29885" type="cve" id="CVE-2022-29885" title="CVE-2022-29885" />
			<reference href="https://bdu.fstec.ru/vul/2022-03434" type="self" id="BDU:2022-03434" title="BDU:2022-03434" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat" epoch="1" version="9.0.68" release="1.el7" arch="noarch" src="">
					<filename>tomcat-1:9.0.68-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240729-03</id>
		<issued date="2024-07-29" />
		<updated date="2024-07-29" />
		<title>Уязвимость glpi-plugin-reports </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в glpi-plugin-reports</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-plugin-reports-cve-2022-39181/</description>
               <solution>
                    Запретить использование в ОС пакета GLPI-plugin-reports
                или
                    Установить обновление для пакета(ов) GLPI-plugin-reports
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-plugin-reports-cve-2022-39181/" type="self" id="ROS-20240729-03" title="ROS-20240729-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39181" type="cve" id="CVE-2022-39181" title="CVE-2022-39181" />
			<reference href="https://bdu.fstec.ru/vul/2024-05822" type="self" id="BDU:2024-05822" title="BDU:2024-05822" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi-plugin-reports" epoch="0" version="1.16.0" release="1.el7" arch="noarch" src="">
					<filename>glpi-plugin-reports-0:1.16.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240729-04</id>
		<issued date="2024-07-29" />
		<updated date="2024-07-29" />
		<title>Уязвимость tomcat </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2022-45143/</description>
               <solution>
                    Запретить использование в ОС пакета tomcat
                или
                    Установить обновление для пакета(ов) tomcat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2022-45143/" type="self" id="ROS-20240729-04" title="ROS-20240729-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45143" type="cve" id="CVE-2022-45143" title="CVE-2022-45143" />
			<reference href="https://bdu.fstec.ru/vul/2024-03597" type="self" id="BDU:2024-03597" title="BDU:2024-03597" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat" epoch="1" version="9.0.70" release="1.el7" arch="noarch" src="">
					<filename>tomcat-1:9.0.70-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240729-05</id>
		<issued date="2024-07-29" />
		<updated date="2024-07-29" />
		<title>Уязвимость libgit2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libgit2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libgit2-cve-2023-22742/</description>
               <solution>
                    Запретить использование в ОС пакета libgit2
                или
                    Установить обновление для пакета(ов) libgit2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libgit2-cve-2023-22742/" type="self" id="ROS-20240729-05" title="ROS-20240729-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22742" type="cve" id="CVE-2023-22742" title="CVE-2023-22742" />
			<reference href="https://bdu.fstec.ru/vul/2023-00574" type="self" id="BDU:2023-00574" title="BDU:2023-00574" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libgit2" epoch="0" version="1.7.2" release="1.el7" arch="x86_64" src="">
					<filename>libgit2-0:1.7.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240729-06</id>
		<issued date="2024-07-29" />
		<updated date="2024-07-29" />
		<title>Уязвимость mbedtls </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в mbedtls</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mbedtls-cve-2022-46393/</description>
               <solution>
                    Запретить использование в ОС пакета mbedtls
                или
                    Установить обновление для пакета(ов) mbedtls
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mbedtls-cve-2022-46393/" type="self" id="ROS-20240729-06" title="ROS-20240729-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46393" type="cve" id="CVE-2022-46393" title="CVE-2022-46393" />
			<reference href="https://bdu.fstec.ru/vul/2023-00041" type="self" id="BDU:2023-00041" title="BDU:2023-00041" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mbedtls" epoch="0" version="2.28.8" release="1.el7" arch="x86_64" src="">
					<filename>mbedtls-0:2.28.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240729-07</id>
		<issued date="2024-07-29" />
		<updated date="2024-07-29" />
		<title>Множественные уязвимости glpi </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-glpi-cve-2023-23610-cve-2023-22725-cve-2023-22722-cve-2022-41941/</description>
               <solution>
                    Запретить использование в ОС пакета GLPI
                или
                    Установить обновление для пакета(ов) GLPI
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-glpi-cve-2023-23610-cve-2023-22725-cve-2023-22722-cve-2022-41941/" type="self" id="ROS-20240729-07" title="ROS-20240729-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23610" type="cve" id="CVE-2023-23610" title="CVE-2023-23610" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22725" type="cve" id="CVE-2023-22725" title="CVE-2023-22725" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22722" type="cve" id="CVE-2023-22722" title="CVE-2023-22722" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41941" type="cve" id="CVE-2022-41941" title="CVE-2022-41941" />
			<reference href="https://bdu.fstec.ru/vul/2024-05827" type="self" id="BDU:2024-05827" title="BDU:2024-05827" />
			<reference href="https://bdu.fstec.ru/vul/2024-05826" type="self" id="BDU:2024-05826" title="BDU:2024-05826" />
			<reference href="https://bdu.fstec.ru/vul/2024-05825" type="self" id="BDU:2024-05825" title="BDU:2024-05825" />
			<reference href="https://bdu.fstec.ru/vul/2024-05824" type="self" id="BDU:2024-05824" title="BDU:2024-05824" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi" epoch="0" version="10.0.10" release="1.el7" arch="noarch" src="">
					<filename>glpi-0:10.0.10-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240729-08</id>
		<issued date="2024-07-29" />
		<updated date="2024-07-29" />
		<title>Уязвимость cups </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в cups</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cups-cve-2023-4504/</description>
               <solution>
                    Запретить использование в ОС пакета cups
                или
                    Установить обновление для пакета(ов) cups
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cups-cve-2023-4504/" type="self" id="ROS-20240729-08" title="ROS-20240729-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4504" type="cve" id="CVE-2023-4504" title="CVE-2023-4504" />
			<reference href="https://bdu.fstec.ru/vul/2023-06408" type="self" id="BDU:2023-06408" title="BDU:2023-06408" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cups" epoch="1" version="2.4.7" release="2.el7" arch="x86_64" src="">
					<filename>cups-1:2.4.7-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240729-09</id>
		<issued date="2024-07-29" />
		<updated date="2024-07-29" />
		<title>Уязвимость rust </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в rust</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rust-cve-2023-38497/</description>
               <solution>
                    Запретить использование в ОС пакета rust
                или
                    Установить обновление для пакета(ов) rust
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rust-cve-2023-38497/" type="self" id="ROS-20240729-09" title="ROS-20240729-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38497" type="cve" id="CVE-2023-38497" title="CVE-2023-38497" />
			<reference href="https://bdu.fstec.ru/vul/2024-05823" type="self" id="BDU:2024-05823" title="BDU:2024-05823" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rust" epoch="0" version="1.71.1" release="7.el7" arch="x86_64" src="">
					<filename>rust-0:1.71.1-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240729-10</id>
		<issued date="2024-07-29" />
		<updated date="2024-07-29" />
		<title>Множественные уязвимости jetty </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в jetty</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-jetty-cve-2023-26049-cve-2023-26048/</description>
               <solution>
                    Запретить использование в ОС пакета jetty
                или
                    Установить обновление для пакета(ов) jetty
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-jetty-cve-2023-26049-cve-2023-26048/" type="self" id="ROS-20240729-10" title="ROS-20240729-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26049" type="cve" id="CVE-2023-26049" title="CVE-2023-26049" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26048" type="cve" id="CVE-2023-26048" title="CVE-2023-26048" />
			<reference href="https://bdu.fstec.ru/vul/2023-05682" type="self" id="BDU:2023-05682" title="BDU:2023-05682" />
			<reference href="https://bdu.fstec.ru/vul/2023-05675" type="self" id="BDU:2023-05675" title="BDU:2023-05675" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jetty" epoch="0" version="9.4.54" release="1.el7" arch="noarch" src="">
					<filename>jetty-0:9.4.54-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240729-11</id>
		<issued date="2024-07-29" />
		<updated date="2024-07-29" />
		<title>Уязвимость rust </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в rust</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rust-cve-2023-40030/</description>
               <solution>
                    Запретить использование в ОС пакета rust
                или
                    Установить обновление для пакета(ов) rust
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rust-cve-2023-40030/" type="self" id="ROS-20240729-11" title="ROS-20240729-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40030" type="cve" id="CVE-2023-40030" title="CVE-2023-40030" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rust" epoch="0" version="1.79.0" release="2.el7" arch="x86_64" src="">
					<filename>rust-0:1.79.0-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240729-12</id>
		<issued date="2024-07-29" />
		<updated date="2024-07-29" />
		<title>Уязвимость jetty </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в jetty</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jetty-cve-2023-36478/</description>
               <solution>
                    Запретить использование в ОС пакета jetty
                или
                    Установить обновление для пакета(ов) jetty
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jetty-cve-2023-36478/" type="self" id="ROS-20240729-12" title="ROS-20240729-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36478" type="cve" id="CVE-2023-36478" title="CVE-2023-36478" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jetty" epoch="0" version="9.4.54" release="1.el7" arch="noarch" src="">
					<filename>jetty-0:9.4.54-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240729-13</id>
		<issued date="2024-07-29" />
		<updated date="2024-07-29" />
		<title>Уязвимость cjson </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в cjson</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cjson-cve-2023-50471/</description>
               <solution>
                    Запретить использование в ОС пакета cjson
                или
                    Установить обновление для пакета(ов) cjson
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cjson-cve-2023-50471/" type="self" id="ROS-20240729-13" title="ROS-20240729-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50471" type="cve" id="CVE-2023-50471" title="CVE-2023-50471" />
			<reference href="https://bdu.fstec.ru/vul/2024-01768" type="self" id="BDU:2024-01768" title="BDU:2024-01768" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cjson" epoch="0" version="1.7.18" release="1.el7" arch="x86_64" src="">
					<filename>cjson-0:1.7.18-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240729-14</id>
		<issued date="2024-07-29" />
		<updated date="2024-07-29" />
		<title>Уязвимость 389-ds-base </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в 389-ds-base</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-389-ds-base-cve-2024-1062/</description>
               <solution>
                    Запретить использование в ОС пакета 389-ds-base
                или
                    Установить обновление для пакета(ов) 389-ds-base
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-389-ds-base-cve-2024-1062/" type="self" id="ROS-20240729-14" title="ROS-20240729-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1062" type="cve" id="CVE-2024-1062" title="CVE-2024-1062" />
			<reference href="https://bdu.fstec.ru/vul/2024-01420" type="self" id="BDU:2024-01420" title="BDU:2024-01420" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="389-ds-base" epoch="0" version="2.4.5" release="1.el7" arch="x86_64" src="">
					<filename>389-ds-base-0:2.4.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240729-15</id>
		<issued date="2024-07-29" />
		<updated date="2024-07-29" />
		<title>Уязвимость python3-django </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-django</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-django-cve-2024-27351/</description>
               <solution>
                    Запретить использование в ОС пакета python3-django
                или
                    Установить обновление для пакета(ов) python3-django
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-django-cve-2024-27351/" type="self" id="ROS-20240729-15" title="ROS-20240729-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27351" type="cve" id="CVE-2024-27351" title="CVE-2024-27351" />
			<reference href="https://bdu.fstec.ru/vul/2024-04292" type="self" id="BDU:2024-04292" title="BDU:2024-04292" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-django" epoch="0" version="3.2.25" release="1.el7" arch="noarch" src="">
					<filename>python3-django-0:3.2.25-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240729-16</id>
		<issued date="2024-07-29" />
		<updated date="2024-07-29" />
		<title>Уязвимость cri-o </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в cri-o</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cri-o-cve-2024-3727/</description>
               <solution>
                    Запретить использование в ОС пакета cri-o
                или
                    Установить обновление для пакета(ов) cri-o
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cri-o-cve-2024-3727/" type="self" id="ROS-20240729-16" title="ROS-20240729-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3727" type="cve" id="CVE-2024-3727" title="CVE-2024-3727" />
			<reference href="https://bdu.fstec.ru/vul/2024-05780" type="self" id="BDU:2024-05780" title="BDU:2024-05780" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cri-o" epoch="0" version="1.24.1" release="7.el7" arch="x86_64" src="">
					<filename>cri-o-0:1.24.1-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240729-17</id>
		<issued date="2024-07-29" />
		<updated date="2024-07-29" />
		<title>Уязвимость httpd </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в httpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-httpd-cve-2024-40898/</description>
               <solution>
                    Запретить использование в ОС пакета httpd
                или
                    Установить обновление для пакета(ов) httpd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-httpd-cve-2024-40898/" type="self" id="ROS-20240729-17" title="ROS-20240729-17" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40898" type="cve" id="CVE-2024-40898" title="CVE-2024-40898" />
			<reference href="https://bdu.fstec.ru/vul/2024-05368" type="self" id="BDU:2024-05368" title="BDU:2024-05368" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="httpd" epoch="0" version="2.4.62" release="1.el7" arch="x86_64" src="">
					<filename>httpd-0:2.4.62-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240729-18</id>
		<issued date="2024-07-29" />
		<updated date="2024-07-29" />
		<title>Уязвимость kubernetes </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kubernetes</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kubernetes-cve-2024-5321/</description>
               <solution>
                    Запретить использование в ОС пакета kubernetes
                или
                    Установить обновление для пакета(ов) kubernetes
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kubernetes-cve-2024-5321/" type="self" id="ROS-20240729-18" title="ROS-20240729-18" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5321" type="cve" id="CVE-2024-5321" title="CVE-2024-5321" />
			<reference href="https://bdu.fstec.ru/vul/2024-05549" type="self" id="BDU:2024-05549" title="BDU:2024-05549" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kubernetes" epoch="0" version="1.24.17" release="6.el7" arch="x86_64" src="">
					<filename>kubernetes-0:1.24.17-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240729-19</id>
		<issued date="2024-07-29" />
		<updated date="2024-07-29" />
		<title>Уязвимость 389-ds-base </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в 389-ds-base</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-389-ds-base-cve-2024-6237/</description>
               <solution>
                    Запретить использование в ОС пакета 389-ds-base
                или
                    Установить обновление для пакета(ов) 389-ds-base
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-389-ds-base-cve-2024-6237/" type="self" id="ROS-20240729-19" title="ROS-20240729-19" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6237" type="cve" id="CVE-2024-6237" title="CVE-2024-6237" />
			<reference href="https://bdu.fstec.ru/vul/2025-11968" type="self" id="BDU:2025-11968" title="BDU:2025-11968" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="389-ds-base" epoch="0" version="2.4.5" release="1.el7" arch="x86_64" src="">
					<filename>389-ds-base-0:2.4.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240729-20</id>
		<issued date="2024-07-29" />
		<updated date="2024-07-29" />
		<title>Уязвимость squid </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в squid</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-squid-cve-2024-37894/</description>
               <solution>
                    Запретить использование в ОС пакета squid
                или
                    Установить обновление для пакета(ов) squid
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-squid-cve-2024-37894/" type="self" id="ROS-20240729-20" title="ROS-20240729-20" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37894" type="cve" id="CVE-2024-37894" title="CVE-2024-37894" />
			<reference href="https://bdu.fstec.ru/vul/2024-05070" type="self" id="BDU:2024-05070" title="BDU:2024-05070" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="squid" epoch="7" version="6.10" release="1.el7" arch="x86_64" src="">
					<filename>squid-7:6.10-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240729-21</id>
		<issued date="2024-07-29" />
		<updated date="2024-07-29" />
		<title>Уязвимость docker-ce </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в docker-ce</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-docker-ce-cve-2024-41110/</description>
               <solution>
                    Запретить использование в ОС пакета docker-ce
                или
                    Установить обновление для пакета(ов) docker-ce
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-docker-ce-cve-2024-41110/" type="self" id="ROS-20240729-21" title="ROS-20240729-21" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41110" type="cve" id="CVE-2024-41110" title="CVE-2024-41110" />
			<reference href="https://bdu.fstec.ru/vul/2024-05760" type="self" id="BDU:2024-05760" title="BDU:2024-05760" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="docker-ce" epoch="4" version="24.0.9" release="4.el7" arch="x86_64" src="">
					<filename>docker-ce-4:24.0.9-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240730-01</id>
		<issued date="2024-07-30" />
		<updated date="2024-07-30" />
		<title>Множественные уязвимости mplayer</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mplayer</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mplayer-30-07-24/</description>
               <solution>
                    Запретить использование в ОС пакета mplayer
                или
                    Установить обновление для пакета(ов) mplayer
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mplayer-30-07-24/" type="self" id="ROS-20240730-01" title="ROS-20240730-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38851" type="cve" id="CVE-2022-38851" title="CVE-2022-38851" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38850" type="cve" id="CVE-2022-38850" title="CVE-2022-38850" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38600" type="cve" id="CVE-2022-38600" title="CVE-2022-38600" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38866" type="cve" id="CVE-2022-38866" title="CVE-2022-38866" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38865" type="cve" id="CVE-2022-38865" title="CVE-2022-38865" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38864" type="cve" id="CVE-2022-38864" title="CVE-2022-38864" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38863" type="cve" id="CVE-2022-38863" title="CVE-2022-38863" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38861" type="cve" id="CVE-2022-38861" title="CVE-2022-38861" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38855" type="cve" id="CVE-2022-38855" title="CVE-2022-38855" />
			<reference href="https://bdu.fstec.ru/vul/2024-05834" type="self" id="BDU:2024-05834" title="BDU:2024-05834" />
			<reference href="https://bdu.fstec.ru/vul/2024-05840" type="self" id="BDU:2024-05840" title="BDU:2024-05840" />
			<reference href="https://bdu.fstec.ru/vul/2024-05835" type="self" id="BDU:2024-05835" title="BDU:2024-05835" />
			<reference href="https://bdu.fstec.ru/vul/2024-05836" type="self" id="BDU:2024-05836" title="BDU:2024-05836" />
			<reference href="https://bdu.fstec.ru/vul/2024-05837" type="self" id="BDU:2024-05837" title="BDU:2024-05837" />
			<reference href="https://bdu.fstec.ru/vul/2024-05838" type="self" id="BDU:2024-05838" title="BDU:2024-05838" />
			<reference href="https://bdu.fstec.ru/vul/2024-05839" type="self" id="BDU:2024-05839" title="BDU:2024-05839" />
			<reference href="https://bdu.fstec.ru/vul/2024-05841" type="self" id="BDU:2024-05841" title="BDU:2024-05841" />
			<reference href="https://bdu.fstec.ru/vul/2024-05842" type="self" id="BDU:2024-05842" title="BDU:2024-05842" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mplayer" epoch="0" version="1.5.1" release="2.20230228svn.el7" arch="x86_64" src="">
					<filename>mplayer-0:1.5.1-2.20230228svn.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240730-02</id>
		<issued date="2024-07-30" />
		<updated date="2024-07-30" />
		<title>Уязвимость lasso </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в lasso</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-lasso-cve-2021-28091/</description>
               <solution>
                    Запретить использование в ОС пакета lasso
                или
                    Установить обновление для пакета(ов) lasso
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-lasso-cve-2021-28091/" type="self" id="ROS-20240730-02" title="ROS-20240730-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28091" type="cve" id="CVE-2021-28091" title="CVE-2021-28091" />
			<reference href="https://bdu.fstec.ru/vul/2021-02957" type="self" id="BDU:2021-02957" title="BDU:2021-02957" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="lasso" epoch="0" version="2.8.2" release="1.el7" arch="x86_64" src="">
					<filename>lasso-0:2.8.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240730-03</id>
		<issued date="2024-07-30" />
		<updated date="2024-07-30" />
		<title>Уязвимость cpio </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в cpio</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cpio-cve-2021-38185/</description>
               <solution>
                    Запретить использование в ОС пакета cpio
                или
                    Установить обновление для пакета(ов) cpio
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cpio-cve-2021-38185/" type="self" id="ROS-20240730-03" title="ROS-20240730-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38185" type="cve" id="CVE-2021-38185" title="CVE-2021-38185" />
			<reference href="https://bdu.fstec.ru/vul/2021-05090" type="self" id="BDU:2021-05090" title="BDU:2021-05090" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cpio" epoch="0" version="2.15" release="1.el7" arch="x86_64" src="">
					<filename>cpio-0:2.15-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240730-15</id>
		<issued date="2024-07-30" />
		<updated date="2024-12-23" />
		<title>Уязвимость automake </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в automake</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-automake-cve-2021-381856566/</description>
               <solution>
                    Запретить использование в ОС пакета automake
                или
                    Установить обновление для пакета(ов) automake
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-automake-cve-2021-381856566/" type="self" id="ROS-20240730-15" title="ROS-20240730-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38185" type="cve" id="CVE-2021-38185" title="CVE-2021-38185" />
			<reference href="https://bdu.fstec.ru/vul/2021-05090" type="self" id="BDU:2021-05090" title="BDU:2021-05090" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="automake" epoch="0" version="1.16.5" release="1.el7" arch="noarch" src="">
					<filename>automake-0:1.16.5-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240730-04</id>
		<issued date="2024-07-30" />
		<updated date="2024-07-30" />
		<title>Уязвимость ghostscript </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в ghostscript</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ghostscript-cve-2021-3781/</description>
               <solution>
                    Запретить использование в ОС пакета ghostscript
                или
                    Установить обновление для пакета(ов) ghostscript
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ghostscript-cve-2021-3781/" type="self" id="ROS-20240730-04" title="ROS-20240730-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3781" type="cve" id="CVE-2021-3781" title="CVE-2021-3781" />
			<reference href="https://bdu.fstec.ru/vul/2024-05832" type="self" id="BDU:2024-05832" title="BDU:2024-05832" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ghostscript" epoch="0" version="9.52" release="8.el7" arch="x86_64" src="">
					<filename>ghostscript-0:9.52-8.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240730-05</id>
		<issued date="2024-07-30" />
		<updated date="2024-07-30" />
		<title>Уязвимость 389-ds-base </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в 389-ds-base</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-389-ds-base-cve-2022-1949/</description>
               <solution>
                    Запретить использование в ОС пакета 389-ds-base
                или
                    Установить обновление для пакета(ов) 389-ds-base
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-389-ds-base-cve-2022-1949/" type="self" id="ROS-20240730-05" title="ROS-20240730-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1949" type="cve" id="CVE-2022-1949" title="CVE-2022-1949" />
			<reference href="https://bdu.fstec.ru/vul/2022-04434" type="self" id="BDU:2022-04434" title="BDU:2022-04434" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="389-ds-base" epoch="0" version="2.1.7" release="1.el7" arch="x86_64" src="">
					<filename>389-ds-base-0:2.1.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240730-06</id>
		<issued date="2024-07-30" />
		<updated date="2024-07-30" />
		<title>Уязвимость libgit2 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libgit2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libgit2-cve-2022-29187/</description>
               <solution>
                    Запретить использование в ОС пакета libgit2
                или
                    Установить обновление для пакета(ов) libgit2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libgit2-cve-2022-29187/" type="self" id="ROS-20240730-06" title="ROS-20240730-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29187" type="cve" id="CVE-2022-29187" title="CVE-2022-29187" />
			<reference href="https://bdu.fstec.ru/vul/2022-04385" type="self" id="BDU:2022-04385" title="BDU:2022-04385" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libgit2" epoch="0" version="1.7.2" release="1.el7" arch="x86_64" src="">
					<filename>libgit2-0:1.7.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240730-07</id>
		<issued date="2024-07-30" />
		<updated date="2024-07-30" />
		<title>Уязвимость php </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в php</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-cve-2022-31629/</description>
               <solution>
                    Запретить использование в ОС пакета php
                или
                    Установить обновление для пакета(ов) php
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-cve-2022-31629/" type="self" id="ROS-20240730-07" title="ROS-20240730-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31629" type="cve" id="CVE-2022-31629" title="CVE-2022-31629" />
			<reference href="https://bdu.fstec.ru/vul/2024-05844" type="self" id="BDU:2024-05844" title="BDU:2024-05844" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php" epoch="0" version="7.4.33" release="1.el7" arch="x86_64" src="">
					<filename>php-0:7.4.33-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240730-08</id>
		<issued date="2024-07-30" />
		<updated date="2024-07-30" />
		<title>Множественные уязвимости jetty </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в jetty</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-jetty-cve-2023-36479-cve-2023-40167/</description>
               <solution>
                    Запретить использование в ОС пакета jetty
                или
                    Установить обновление для пакета(ов) jetty
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-jetty-cve-2023-36479-cve-2023-40167/" type="self" id="ROS-20240730-08" title="ROS-20240730-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36479" type="cve" id="CVE-2023-36479" title="CVE-2023-36479" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40167" type="cve" id="CVE-2023-40167" title="CVE-2023-40167" />
			<reference href="https://bdu.fstec.ru/vul/2024-05833" type="self" id="BDU:2024-05833" title="BDU:2024-05833" />
			<reference href="https://bdu.fstec.ru/vul/2024-02254" type="self" id="BDU:2024-02254" title="BDU:2024-02254" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jetty" epoch="0" version="9.4.54" release="1.el7" arch="noarch" src="">
					<filename>jetty-0:9.4.54-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240730-09</id>
		<issued date="2024-07-30" />
		<updated date="2024-07-30" />
		<title>Уязвимость exim </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в exim</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-exim-cve-2023-42114/</description>
               <solution>
                    Запретить использование в ОС пакета exim
                или
                    Установить обновление для пакета(ов) exim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-exim-cve-2023-42114/" type="self" id="ROS-20240730-09" title="ROS-20240730-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42114" type="cve" id="CVE-2023-42114" title="CVE-2023-42114" />
			<reference href="https://bdu.fstec.ru/vul/2023-06277" type="self" id="BDU:2023-06277" title="BDU:2023-06277" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="exim" epoch="0" version="4.98" release="2.el7" arch="x86_64" src="">
					<filename>exim-0:4.98-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240730-10</id>
		<issued date="2024-07-30" />
		<updated date="2024-07-30" />
		<title>Уязвимость mbedtls </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в mbedtls</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mbedtls-cve-2023-43615/</description>
               <solution>
                    Запретить использование в ОС пакета mbedtls
                или
                    Установить обновление для пакета(ов) mbedtls
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mbedtls-cve-2023-43615/" type="self" id="ROS-20240730-10" title="ROS-20240730-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43615" type="cve" id="CVE-2023-43615" title="CVE-2023-43615" />
			<reference href="https://bdu.fstec.ru/vul/2023-06575" type="self" id="BDU:2023-06575" title="BDU:2023-06575" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mbedtls" epoch="0" version="2.28.8" release="1.el7" arch="x86_64" src="">
					<filename>mbedtls-0:2.28.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240729-22</id>
		<issued date="2024-07-30" />
		<updated date="2024-12-23" />
		<title>Уязвимость python3-setuptools </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-setuptools</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-setuptools-cve-2024-6345/</description>
               <solution>
                    Запретить использование в ОС пакета python3-setuptools
                или
                    Установить обновление для пакета(ов) python3-setuptools
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-setuptools-cve-2024-6345/" type="self" id="ROS-20240729-22" title="ROS-20240729-22" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6345" type="cve" id="CVE-2024-6345" title="CVE-2024-6345" />
			<reference href="https://bdu.fstec.ru/vul/2024-05843" type="self" id="BDU:2024-05843" title="BDU:2024-05843" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-setuptools" epoch="0" version="70.3.0" release="1.el7" arch="noarch" src="">
					<filename>python3-setuptools-0:70.3.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240730-12</id>
		<issued date="2024-07-30" />
		<updated date="2024-07-30" />
		<title>Уязвимость python3-django </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-django</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-django-cve-2023-46695/</description>
               <solution>
                    Запретить использование в ОС пакета python3-django
                или
                    Установить обновление для пакета(ов) python3-django
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-django-cve-2023-46695/" type="self" id="ROS-20240730-12" title="ROS-20240730-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46695" type="cve" id="CVE-2023-46695" title="CVE-2023-46695" />
			<reference href="https://bdu.fstec.ru/vul/2023-08741" type="self" id="BDU:2023-08741" title="BDU:2023-08741" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-django" epoch="0" version="3.2.25" release="1.el7" arch="noarch" src="">
					<filename>python3-django-0:3.2.25-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240730-13</id>
		<issued date="2024-07-30" />
		<updated date="2024-07-30" />
		<title>Уязвимость lxd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в lxd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-lxd-cve-2023-48795/</description>
               <solution>
                    Запретить использование в ОС пакета lxd
                или
                    Установить обновление для пакета(ов) lxd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-lxd-cve-2023-48795/" type="self" id="ROS-20240730-13" title="ROS-20240730-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48795" type="cve" id="CVE-2023-48795" title="CVE-2023-48795" />
			<reference href="https://bdu.fstec.ru/vul/2023-08853" type="self" id="BDU:2023-08853" title="BDU:2023-08853" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="lxd" epoch="0" version="4.24" release="2.el7" arch="x86_64" src="">
					<filename>lxd-0:4.24-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240730-14</id>
		<issued date="2024-07-30" />
		<updated date="2024-07-30" />
		<title>Множественные уязвимости java-1.8.0-openjdk</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-1.8.0-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-1-8-0-openjdk-30-07-24/</description>
               <solution>
                    Запретить использование в ОС пакета java-1.8.0-openjdk
                или
                    Установить обновление для пакета(ов) java-1.8.0-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-1-8-0-openjdk-30-07-24/" type="self" id="ROS-20240730-14" title="ROS-20240730-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926" type="cve" id="CVE-2024-20926" title="CVE-2024-20926" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918" type="cve" id="CVE-2024-20918" title="CVE-2024-20918" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952" type="cve" id="CVE-2024-20952" title="CVE-2024-20952" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919" type="cve" id="CVE-2024-20919" title="CVE-2024-20919" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921" type="cve" id="CVE-2024-20921" title="CVE-2024-20921" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945" type="cve" id="CVE-2024-20945" title="CVE-2024-20945" />
			<reference href="https://bdu.fstec.ru/vul/2024-00484" type="self" id="BDU:2024-00484" title="BDU:2024-00484" />
			<reference href="https://bdu.fstec.ru/vul/2024-00485" type="self" id="BDU:2024-00485" title="BDU:2024-00485" />
			<reference href="https://bdu.fstec.ru/vul/2024-01064" type="self" id="BDU:2024-01064" title="BDU:2024-01064" />
			<reference href="https://bdu.fstec.ru/vul/2024-00614" type="self" id="BDU:2024-00614" title="BDU:2024-00614" />
			<reference href="https://bdu.fstec.ru/vul/2024-00604" type="self" id="BDU:2024-00604" title="BDU:2024-00604" />
			<reference href="https://bdu.fstec.ru/vul/2024-00615" type="self" id="BDU:2024-00615" title="BDU:2024-00615" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-1.8.0-openjdk" epoch="1" version="1.8.0.402.b06" release="3.el7" arch="x86_64" src="">
					<filename>java-1.8.0-openjdk-1:1.8.0.402.b06-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240730-16</id>
		<issued date="2024-07-30" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости java-11-openjdk</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-11-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-11-openjdk-30-07-244968/</description>
               <solution>
                    Запретить использование в ОС пакета java-11-openjdk
                или
                    Установить обновление для пакета(ов) java-11-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-11-openjdk-30-07-244968/" type="self" id="ROS-20240730-16" title="ROS-20240730-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926" type="cve" id="CVE-2024-20926" title="CVE-2024-20926" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918" type="cve" id="CVE-2024-20918" title="CVE-2024-20918" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952" type="cve" id="CVE-2024-20952" title="CVE-2024-20952" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919" type="cve" id="CVE-2024-20919" title="CVE-2024-20919" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921" type="cve" id="CVE-2024-20921" title="CVE-2024-20921" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945" type="cve" id="CVE-2024-20945" title="CVE-2024-20945" />
			<reference href="https://bdu.fstec.ru/vul/2024-00484" type="self" id="BDU:2024-00484" title="BDU:2024-00484" />
			<reference href="https://bdu.fstec.ru/vul/2024-00485" type="self" id="BDU:2024-00485" title="BDU:2024-00485" />
			<reference href="https://bdu.fstec.ru/vul/2024-01064" type="self" id="BDU:2024-01064" title="BDU:2024-01064" />
			<reference href="https://bdu.fstec.ru/vul/2024-00614" type="self" id="BDU:2024-00614" title="BDU:2024-00614" />
			<reference href="https://bdu.fstec.ru/vul/2024-00604" type="self" id="BDU:2024-00604" title="BDU:2024-00604" />
			<reference href="https://bdu.fstec.ru/vul/2024-00615" type="self" id="BDU:2024-00615" title="BDU:2024-00615" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-11-openjdk" epoch="1" version="11.0.22.0.7" release="1.el7" arch="x86_64" src="">
					<filename>java-11-openjdk-1:11.0.22.0.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240730-17</id>
		<issued date="2024-07-30" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости java-17-openjdk</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-17-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-17-openjdk-30-07-24/</description>
               <solution>
                    Запретить использование в ОС пакета java-17-openjdk
                или
                    Установить обновление для пакета(ов) java-17-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-17-openjdk-30-07-24/" type="self" id="ROS-20240730-17" title="ROS-20240730-17" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932" type="cve" id="CVE-2024-20932" title="CVE-2024-20932" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918" type="cve" id="CVE-2024-20918" title="CVE-2024-20918" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952" type="cve" id="CVE-2024-20952" title="CVE-2024-20952" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919" type="cve" id="CVE-2024-20919" title="CVE-2024-20919" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921" type="cve" id="CVE-2024-20921" title="CVE-2024-20921" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945" type="cve" id="CVE-2024-20945" title="CVE-2024-20945" />
			<reference href="https://bdu.fstec.ru/vul/2024-00611" type="self" id="BDU:2024-00611" title="BDU:2024-00611" />
			<reference href="https://bdu.fstec.ru/vul/2024-00485" type="self" id="BDU:2024-00485" title="BDU:2024-00485" />
			<reference href="https://bdu.fstec.ru/vul/2024-01064" type="self" id="BDU:2024-01064" title="BDU:2024-01064" />
			<reference href="https://bdu.fstec.ru/vul/2024-00614" type="self" id="BDU:2024-00614" title="BDU:2024-00614" />
			<reference href="https://bdu.fstec.ru/vul/2024-00604" type="self" id="BDU:2024-00604" title="BDU:2024-00604" />
			<reference href="https://bdu.fstec.ru/vul/2024-00615" type="self" id="BDU:2024-00615" title="BDU:2024-00615" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-17-openjdk" epoch="1" version="17.0.10.0.7" release="1.el7" arch="x86_64" src="">
					<filename>java-17-openjdk-1:17.0.10.0.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240730-18</id>
		<issued date="2024-07-30" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости java-21-openjdk</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-21-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-21-openjdk-30-07-24/</description>
               <solution>
                    Запретить использование в ОС пакета java-21-openjdk
                или
                    Установить обновление для пакета(ов) java-21-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-21-openjdk-30-07-24/" type="self" id="ROS-20240730-18" title="ROS-20240730-18" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918" type="cve" id="CVE-2024-20918" title="CVE-2024-20918" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952" type="cve" id="CVE-2024-20952" title="CVE-2024-20952" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919" type="cve" id="CVE-2024-20919" title="CVE-2024-20919" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921" type="cve" id="CVE-2024-20921" title="CVE-2024-20921" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945" type="cve" id="CVE-2024-20945" title="CVE-2024-20945" />
			<reference href="https://bdu.fstec.ru/vul/2024-00485" type="self" id="BDU:2024-00485" title="BDU:2024-00485" />
			<reference href="https://bdu.fstec.ru/vul/2024-01064" type="self" id="BDU:2024-01064" title="BDU:2024-01064" />
			<reference href="https://bdu.fstec.ru/vul/2024-00614" type="self" id="BDU:2024-00614" title="BDU:2024-00614" />
			<reference href="https://bdu.fstec.ru/vul/2024-00604" type="self" id="BDU:2024-00604" title="BDU:2024-00604" />
			<reference href="https://bdu.fstec.ru/vul/2024-00615" type="self" id="BDU:2024-00615" title="BDU:2024-00615" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-21-openjdk" epoch="1" version="21.0.2.0.13" release="1.el7" arch="x86_64" src="">
					<filename>java-21-openjdk-1:21.0.2.0.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240731-01</id>
		<issued date="2024-07-31" />
		<updated date="2024-07-31" />
		<title>Множественные уязвимости emacs </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в emacs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-emacs-cve-2022-45939-cve-2023-2491/</description>
               <solution>
                    Запретить использование в ОС пакета emacs
                или
                    Установить обновление для пакета(ов) emacs
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-emacs-cve-2022-45939-cve-2023-2491/" type="self" id="ROS-20240731-01" title="ROS-20240731-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45939" type="cve" id="CVE-2022-45939" title="CVE-2022-45939" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2491" type="cve" id="CVE-2023-2491" title="CVE-2023-2491" />
			<reference href="https://bdu.fstec.ru/vul/2024-05926" type="self" id="BDU:2024-05926" title="BDU:2024-05926" />
			<reference href="https://bdu.fstec.ru/vul/2024-05925" type="self" id="BDU:2024-05925" title="BDU:2024-05925" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="emacs" epoch="1" version="25.0.92" release="7.el7" arch="x86_64" src="">
					<filename>emacs-1:25.0.92-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240731-02</id>
		<issued date="2024-07-31" />
		<updated date="2024-07-31" />
		<title>Уязвимость libcue </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libcue</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libcue-cve-2023-43641/</description>
               <solution>
                    Запретить использование в ОС пакета libcue
                или
                    Установить обновление для пакета(ов) libcue
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libcue-cve-2023-43641/" type="self" id="ROS-20240731-02" title="ROS-20240731-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43641" type="cve" id="CVE-2023-43641" title="CVE-2023-43641" />
			<reference href="https://bdu.fstec.ru/vul/2023-06566" type="self" id="BDU:2023-06566" title="BDU:2023-06566" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libcue" epoch="0" version="2.3.0" release="1.el7" arch="x86_64" src="">
					<filename>libcue-0:2.3.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240731-03</id>
		<issued date="2024-07-31" />
		<updated date="2024-07-31" />
		<title>Уязвимость gstreamer1-plugins-bad-free </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gstreamer1-plugins-bad-free</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gstreamer1-plugins-bad-free-cve-2023-44446/</description>
               <solution>
                    Запретить использование в ОС пакета gstreamer1-plugins-bad-free
                или
                    Установить обновление для пакета(ов) gstreamer1-plugins-bad-free
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gstreamer1-plugins-bad-free-cve-2023-44446/" type="self" id="ROS-20240731-03" title="ROS-20240731-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44446" type="cve" id="CVE-2023-44446" title="CVE-2023-44446" />
			<reference href="https://bdu.fstec.ru/vul/2023-08257" type="self" id="BDU:2023-08257" title="BDU:2023-08257" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gstreamer1-plugins-bad-free" epoch="0" version="1.16.3" release="2.el7" arch="x86_64" src="">
					<filename>gstreamer1-plugins-bad-free-0:1.16.3-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240731-04</id>
		<issued date="2024-07-31" />
		<updated date="2024-07-31" />
		<title>Уязвимость pcs </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в pcs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pcs-cve-2022-1049/</description>
               <solution>
                    Запретить использование в ОС пакета pcs
                или
                    Установить обновление для пакета(ов) pcs
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pcs-cve-2022-1049/" type="self" id="ROS-20240731-04" title="ROS-20240731-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1049" type="cve" id="CVE-2022-1049" title="CVE-2022-1049" />
			<reference href="https://bdu.fstec.ru/vul/2022-05543" type="self" id="BDU:2022-05543" title="BDU:2022-05543" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pcs" epoch="0" version="0.10.17" release="2.el7" arch="x86_64" src="">
					<filename>pcs-0:0.10.17-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240731-05</id>
		<issued date="2024-07-31" />
		<updated date="2024-07-31" />
		<title>Уязвимость php </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в php</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-cve-2022-37454/</description>
               <solution>
                    Запретить использование в ОС пакета php
                или
                    Установить обновление для пакета(ов) php
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-cve-2022-37454/" type="self" id="ROS-20240731-05" title="ROS-20240731-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37454" type="cve" id="CVE-2022-37454" title="CVE-2022-37454" />
			<reference href="https://bdu.fstec.ru/vul/2022-06445" type="self" id="BDU:2022-06445" title="BDU:2022-06445" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php" epoch="0" version="7.4.33" release="1.el7" arch="x86_64" src="">
					<filename>php-0:7.4.33-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240731-06</id>
		<issued date="2024-07-31" />
		<updated date="2024-12-23" />
		<title>Уязвимость python3 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в python3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2022-374543620/</description>
               <solution>
                    Запретить использование в ОС пакета python3
                или
                    Установить обновление для пакета(ов) python3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2022-374543620/" type="self" id="ROS-20240731-06" title="ROS-20240731-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37454" type="cve" id="CVE-2022-37454" title="CVE-2022-37454" />
			<reference href="https://bdu.fstec.ru/vul/2022-06445" type="self" id="BDU:2022-06445" title="BDU:2022-06445" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3" epoch="0" version="3.8.18" release="1.el7" arch="x86_64" src="">
					<filename>python3-0:3.8.18-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240801-01</id>
		<issued date="2024-08-02" />
		<updated date="2024-08-02" />
		<title>Уязвимость httpd </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в httpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-httpd-cve-2024-38475/</description>
               <solution>
                    Запретить использование в ОС пакета httpd
                или
                    Установить обновление для пакета(ов) httpd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-httpd-cve-2024-38475/" type="self" id="ROS-20240801-01" title="ROS-20240801-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38475" type="cve" id="CVE-2024-38475" title="CVE-2024-38475" />
			<reference href="https://bdu.fstec.ru/vul/2024-04936" type="self" id="BDU:2024-04936" title="BDU:2024-04936" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="httpd" epoch="0" version="2.4.61" release="1.el7" arch="x86_64" src="">
					<filename>httpd-0:2.4.61-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240801-02</id>
		<issued date="2024-08-02" />
		<updated date="2024-08-02" />
		<title>Множественные уязвимости java-1.8.0-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в java-1.8.0-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-1-8-0-openjdk-cve-2023-22067-cve-2023-22081/</description>
               <solution>
                    Запретить использование в ОС пакета java-1.8.0-openjdk
                или
                    Установить обновление для пакета(ов) java-1.8.0-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-1-8-0-openjdk-cve-2023-22067-cve-2023-22081/" type="self" id="ROS-20240801-02" title="ROS-20240801-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22067" type="cve" id="CVE-2023-22067" title="CVE-2023-22067" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22081" type="cve" id="CVE-2023-22081" title="CVE-2023-22081" />
			<reference href="https://bdu.fstec.ru/vul/2023-06980" type="self" id="BDU:2023-06980" title="BDU:2023-06980" />
			<reference href="https://bdu.fstec.ru/vul/2023-07023" type="self" id="BDU:2023-07023" title="BDU:2023-07023" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-1.8.0-openjdk" epoch="1" version="1.8.0.402.b06" release="1.el7" arch="x86_64" src="">
					<filename>java-1.8.0-openjdk-1:1.8.0.402.b06-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240801-03</id>
		<issued date="2024-08-02" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости java-11-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в java-11-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-11-openjdk-cve-2023-22067-cve-2023-220813561/</description>
               <solution>
                    Запретить использование в ОС пакета java-11-openjdk
                или
                    Установить обновление для пакета(ов) java-11-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-11-openjdk-cve-2023-22067-cve-2023-220813561/" type="self" id="ROS-20240801-03" title="ROS-20240801-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22067" type="cve" id="CVE-2023-22067" title="CVE-2023-22067" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22081" type="cve" id="CVE-2023-22081" title="CVE-2023-22081" />
			<reference href="https://bdu.fstec.ru/vul/2023-06980" type="self" id="BDU:2023-06980" title="BDU:2023-06980" />
			<reference href="https://bdu.fstec.ru/vul/2023-07023" type="self" id="BDU:2023-07023" title="BDU:2023-07023" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-11-openjdk" epoch="1" version="11.0.22.0.7" release="1.el7" arch="x86_64" src="">
					<filename>java-11-openjdk-1:11.0.22.0.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240801-04</id>
		<issued date="2024-08-02" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости java-17-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в java-17-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-17-openjdk-cve-2023-22067-cve-2023-220814051/</description>
               <solution>
                    Запретить использование в ОС пакета java-17-openjdk
                или
                    Установить обновление для пакета(ов) java-17-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-17-openjdk-cve-2023-22067-cve-2023-220814051/" type="self" id="ROS-20240801-04" title="ROS-20240801-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22067" type="cve" id="CVE-2023-22067" title="CVE-2023-22067" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22081" type="cve" id="CVE-2023-22081" title="CVE-2023-22081" />
			<reference href="https://bdu.fstec.ru/vul/2023-06980" type="self" id="BDU:2023-06980" title="BDU:2023-06980" />
			<reference href="https://bdu.fstec.ru/vul/2023-07023" type="self" id="BDU:2023-07023" title="BDU:2023-07023" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-17-openjdk" epoch="1" version="17.0.10.0.7" release="1.el7" arch="x86_64" src="">
					<filename>java-17-openjdk-1:17.0.10.0.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240801-05</id>
		<issued date="2024-08-02" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости java-21-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в java-21-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-21-openjdk-cve-2023-22067-cve-2023-220812126/</description>
               <solution>
                    Запретить использование в ОС пакета java-21-openjdk
                или
                    Установить обновление для пакета(ов) java-21-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-21-openjdk-cve-2023-22067-cve-2023-220812126/" type="self" id="ROS-20240801-05" title="ROS-20240801-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22067" type="cve" id="CVE-2023-22067" title="CVE-2023-22067" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22081" type="cve" id="CVE-2023-22081" title="CVE-2023-22081" />
			<reference href="https://bdu.fstec.ru/vul/2023-06980" type="self" id="BDU:2023-06980" title="BDU:2023-06980" />
			<reference href="https://bdu.fstec.ru/vul/2023-07023" type="self" id="BDU:2023-07023" title="BDU:2023-07023" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-21-openjdk" epoch="1" version="21.0.2.0.13" release="1.el7" arch="x86_64" src="">
					<filename>java-21-openjdk-1:21.0.2.0.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240805-01</id>
		<issued date="2024-08-05" />
		<updated date="2024-08-05" />
		<title>Уязвимость terraform </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в terraform</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-terraform-cve-2023-44487/</description>
               <solution>
                    Запретить использование в ОС пакета terraform
                или
                    Установить обновление для пакета(ов) terraform
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-terraform-cve-2023-44487/" type="self" id="ROS-20240805-01" title="ROS-20240805-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487" type="cve" id="CVE-2023-44487" title="CVE-2023-44487" />
			<reference href="https://bdu.fstec.ru/vul/2023-06559" type="self" id="BDU:2023-06559" title="BDU:2023-06559" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="terraform" epoch="0" version="1.8.4" release="1.el7" arch="x86_64" src="">
					<filename>terraform-0:1.8.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240805-02</id>
		<issued date="2024-08-05" />
		<updated date="2024-08-05" />
		<title>Уязвимость rust </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в rust</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rust-cve-2024-24576/</description>
               <solution>
                    Запретить использование в ОС пакета rust
                или
                    Установить обновление для пакета(ов) rust
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rust-cve-2024-24576/" type="self" id="ROS-20240805-02" title="ROS-20240805-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24576" type="cve" id="CVE-2024-24576" title="CVE-2024-24576" />
			<reference href="https://bdu.fstec.ru/vul/2024-02838" type="self" id="BDU:2024-02838" title="BDU:2024-02838" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rust" epoch="0" version="1.79.0" release="2.el7" arch="x86_64" src="">
					<filename>rust-0:1.79.0-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240805-03</id>
		<issued date="2024-08-05" />
		<updated date="2024-08-05" />
		<title>Множественные уязвимости consul</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в consul</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-consul-05-08-24/</description>
               <solution>
                    Запретить использование в ОС пакета consul
                или
                    Установить обновление для пакета(ов) consul
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-consul-05-08-24/" type="self" id="ROS-20240805-03" title="ROS-20240805-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48795" type="cve" id="CVE-2023-48795" title="CVE-2023-48795" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487" type="cve" id="CVE-2023-44487" title="CVE-2023-44487" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39326" type="cve" id="CVE-2023-39326" title="CVE-2023-39326" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45285" type="cve" id="CVE-2023-45285" title="CVE-2023-45285" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1297" type="cve" id="CVE-2023-1297" title="CVE-2023-1297" />
			<reference href="https://bdu.fstec.ru/vul/2023-08853" type="self" id="BDU:2023-08853" title="BDU:2023-08853" />
			<reference href="https://bdu.fstec.ru/vul/2023-06559" type="self" id="BDU:2023-06559" title="BDU:2023-06559" />
			<reference href="https://bdu.fstec.ru/vul/2024-00175" type="self" id="BDU:2024-00175" title="BDU:2024-00175" />
			<reference href="https://bdu.fstec.ru/vul/2024-00176" type="self" id="BDU:2024-00176" title="BDU:2024-00176" />
			<reference href="https://bdu.fstec.ru/vul/2024-06032" type="self" id="BDU:2024-06032" title="BDU:2024-06032" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="consul" epoch="0" version="1.18.2" release="1.el7" arch="x86_64" src="">
					<filename>consul-0:1.18.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240805-04</id>
		<issued date="2024-08-05" />
		<updated date="2024-08-05" />
		<title>Множественные уязвимости vault</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в vault</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vault-05-08-24/</description>
               <solution>
                    Запретить использование в ОС пакета vault
                или
                    Установить обновление для пакета(ов) vault
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vault-05-08-24/" type="self" id="ROS-20240805-04" title="ROS-20240805-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2660" type="cve" id="CVE-2024-2660" title="CVE-2024-2660" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2048" type="cve" id="CVE-2024-2048" title="CVE-2024-2048" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5077" type="cve" id="CVE-2023-5077" title="CVE-2023-5077" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5954" type="cve" id="CVE-2023-5954" title="CVE-2023-5954" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6337" type="cve" id="CVE-2023-6337" title="CVE-2023-6337" />
			<reference href="https://bdu.fstec.ru/vul/2024-03127" type="self" id="BDU:2024-03127" title="BDU:2024-03127" />
			<reference href="https://bdu.fstec.ru/vul/2024-02063" type="self" id="BDU:2024-02063" title="BDU:2024-02063" />
			<reference href="https://bdu.fstec.ru/vul/2024-06028" type="self" id="BDU:2024-06028" title="BDU:2024-06028" />
			<reference href="https://bdu.fstec.ru/vul/2023-08117" type="self" id="BDU:2023-08117" title="BDU:2023-08117" />
			<reference href="https://bdu.fstec.ru/vul/2023-08660" type="self" id="BDU:2023-08660" title="BDU:2023-08660" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vault" epoch="0" version="1.16.0" release="1.el7" arch="x86_64" src="">
					<filename>vault-0:1.16.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240805-05</id>
		<issued date="2024-08-05" />
		<updated date="2024-08-05" />
		<title>Уязвимость consul </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в consul</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-consul-cve-2020-8559/</description>
               <solution>
                    Запретить использование в ОС пакета consul
                или
                    Установить обновление для пакета(ов) consul
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-consul-cve-2020-8559/" type="self" id="ROS-20240805-05" title="ROS-20240805-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8559" type="cve" id="CVE-2020-8559" title="CVE-2020-8559" />
			<reference href="https://bdu.fstec.ru/vul/2024-06031" type="self" id="BDU:2024-06031" title="BDU:2024-06031" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="consul" epoch="0" version="1.18.2" release="1.el7" arch="x86_64" src="">
					<filename>consul-0:1.18.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240805-06</id>
		<issued date="2024-08-05" />
		<updated date="2024-08-05" />
		<title>Уязвимость consul </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в consul</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-consul-cve-2024-32475/</description>
               <solution>
                    Запретить использование в ОС пакета consul
                или
                    Установить обновление для пакета(ов) consul
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-consul-cve-2024-32475/" type="self" id="ROS-20240805-06" title="ROS-20240805-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32475" type="cve" id="CVE-2024-32475" title="CVE-2024-32475" />
			<reference href="https://bdu.fstec.ru/vul/2024-03289" type="self" id="BDU:2024-03289" title="BDU:2024-03289" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="consul" epoch="0" version="1.18.2" release="1.el7" arch="x86_64" src="">
					<filename>consul-0:1.18.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240805-07</id>
		<issued date="2024-08-05" />
		<updated date="2024-08-05" />
		<title>Уязвимость consul </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в consul</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-consul-cve-2024-27919/</description>
               <solution>
                    Запретить использование в ОС пакета consul
                или
                    Установить обновление для пакета(ов) consul
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-consul-cve-2024-27919/" type="self" id="ROS-20240805-07" title="ROS-20240805-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27919" type="cve" id="CVE-2024-27919" title="CVE-2024-27919" />
			<reference href="https://bdu.fstec.ru/vul/2024-02719" type="self" id="BDU:2024-02719" title="BDU:2024-02719" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="consul" epoch="0" version="1.18.2" release="1.el7" arch="x86_64" src="">
					<filename>consul-0:1.18.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240805-08</id>
		<issued date="2024-08-05" />
		<updated date="2024-08-05" />
		<title>Множественные уязвимости consul</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в consul</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-consul-05-08-24-2/</description>
               <solution>
                    Запретить использование в ОС пакета consul
                или
                    Установить обновление для пакета(ов) consul
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-consul-05-08-24-2/" type="self" id="ROS-20240805-08" title="ROS-20240805-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24786" type="cve" id="CVE-2024-24786" title="CVE-2024-24786" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52425" type="cve" id="CVE-2023-52425" title="CVE-2023-52425" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52426" type="cve" id="CVE-2023-52426" title="CVE-2023-52426" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24783" type="cve" id="CVE-2024-24783" title="CVE-2024-24783" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45290" type="cve" id="CVE-2023-45290" title="CVE-2023-45290" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45289" type="cve" id="CVE-2023-45289" title="CVE-2023-45289" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24785" type="cve" id="CVE-2024-24785" title="CVE-2024-24785" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24784" type="cve" id="CVE-2024-24784" title="CVE-2024-24784" />
			<reference href="https://bdu.fstec.ru/vul/2024-04111" type="self" id="BDU:2024-04111" title="BDU:2024-04111" />
			<reference href="https://bdu.fstec.ru/vul/2024-01514" type="self" id="BDU:2024-01514" title="BDU:2024-01514" />
			<reference href="https://bdu.fstec.ru/vul/2024-04334" type="self" id="BDU:2024-04334" title="BDU:2024-04334" />
			<reference href="https://bdu.fstec.ru/vul/2024-02048" type="self" id="BDU:2024-02048" title="BDU:2024-02048" />
			<reference href="https://bdu.fstec.ru/vul/2024-02047" type="self" id="BDU:2024-02047" title="BDU:2024-02047" />
			<reference href="https://bdu.fstec.ru/vul/2024-02034" type="self" id="BDU:2024-02034" title="BDU:2024-02034" />
			<reference href="https://bdu.fstec.ru/vul/2024-03248" type="self" id="BDU:2024-03248" title="BDU:2024-03248" />
			<reference href="https://bdu.fstec.ru/vul/2024-03248" type="self" id="BDU:2024-03248" title="BDU:2024-03248" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="consul" epoch="0" version="1.18.2" release="1.el7" arch="x86_64" src="">
					<filename>consul-0:1.18.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240806-01</id>
		<issued date="2024-08-06" />
		<updated date="2024-08-06" />
		<title>Множественные уязвимости apache-commons-compress </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в apache-commons-compress</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-apache-commons-compress-cve-2021-35515-cve-2021-36090-cve-2021-35517-cve-/</description>
               <solution>
                    Запретить использование в ОС пакета apache-commons-compress
                или
                    Установить обновление для пакета(ов) apache-commons-compress
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-apache-commons-compress-cve-2021-35515-cve-2021-36090-cve-2021-35517-cve-/" type="self" id="ROS-20240806-01" title="ROS-20240806-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35515" type="cve" id="CVE-2021-35515" title="CVE-2021-35515" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36090" type="cve" id="CVE-2021-36090" title="CVE-2021-36090" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35517" type="cve" id="CVE-2021-35517" title="CVE-2021-35517" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35516" type="cve" id="CVE-2021-35516" title="CVE-2021-35516" />
			<reference href="https://bdu.fstec.ru/vul/2021-04515" type="self" id="BDU:2021-04515" title="BDU:2021-04515" />
			<reference href="https://bdu.fstec.ru/vul/2021-03966" type="self" id="BDU:2021-03966" title="BDU:2021-03966" />
			<reference href="https://bdu.fstec.ru/vul/2021-04206" type="self" id="BDU:2021-04206" title="BDU:2021-04206" />
			<reference href="https://bdu.fstec.ru/vul/2021-03965" type="self" id="BDU:2021-03965" title="BDU:2021-03965" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="apache-commons-compress" epoch="0" version="1.25.0" release="1.el7" arch="noarch" src="">
					<filename>apache-commons-compress-0:1.25.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240806-02</id>
		<issued date="2024-08-06" />
		<updated date="2024-08-06" />
		<title>Уязвимость gajim </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gajim</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gajim-cve-2022-39835/</description>
               <solution>
                    Запретить использование в ОС пакета gajim
                или
                    Установить обновление для пакета(ов) gajim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gajim-cve-2022-39835/" type="self" id="ROS-20240806-02" title="ROS-20240806-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39835" type="cve" id="CVE-2022-39835" title="CVE-2022-39835" />
			<reference href="https://bdu.fstec.ru/vul/2024-06030" type="self" id="BDU:2024-06030" title="BDU:2024-06030" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gajim" epoch="0" version="1.5.0" release="1.el7" arch="noarch" src="">
					<filename>gajim-0:1.5.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240806-03</id>
		<issued date="2024-08-06" />
		<updated date="2024-08-06" />
		<title>Уязвимость bcel </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в bcel</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-bcel-cve-2022-42920/</description>
               <solution>
                    Запретить использование в ОС пакета bcel
                или
                    Установить обновление для пакета(ов) bcel
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-bcel-cve-2022-42920/" type="self" id="ROS-20240806-03" title="ROS-20240806-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42920" type="cve" id="CVE-2022-42920" title="CVE-2022-42920" />
			<reference href="https://bdu.fstec.ru/vul/2024-02279" type="self" id="BDU:2024-02279" title="BDU:2024-02279" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="bcel" epoch="0" version="6.8.1" release="1.el7.noarch" arch="rpm" src="">
					<filename>bcel-0:6.8.1-1.el7.noarch.rpm.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240806-04</id>
		<issued date="2024-08-06" />
		<updated date="2024-08-06" />
		<title>Уязвимость sysstat </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в sysstat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sysstat-cve-2022-39377/</description>
               <solution>
                    Запретить использование в ОС пакета sysstat
                или
                    Установить обновление для пакета(ов) sysstat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sysstat-cve-2022-39377/" type="self" id="ROS-20240806-04" title="ROS-20240806-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39377" type="cve" id="CVE-2022-39377" title="CVE-2022-39377" />
			<reference href="https://bdu.fstec.ru/vul/2024-06029" type="self" id="BDU:2024-06029" title="BDU:2024-06029" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="sysstat" epoch="0" version="12.5.4" release="1.el7" arch="x86_64" src="">
					<filename>sysstat-0:12.5.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240806-05</id>
		<issued date="2024-08-06" />
		<updated date="2024-08-06" />
		<title>Множественные уязвимости php-symfony4 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в php-symfony4</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-symfony4-cve-2022-24894-cve-2022-24895-cve-2023-46734/</description>
               <solution>
                    Запретить использование в ОС пакета php-symfony4
                или
                    Установить обновление для пакета(ов) php-symfony4
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-symfony4-cve-2022-24894-cve-2022-24895-cve-2023-46734/" type="self" id="ROS-20240806-05" title="ROS-20240806-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24894" type="cve" id="CVE-2022-24894" title="CVE-2022-24894" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24895" type="cve" id="CVE-2022-24895" title="CVE-2022-24895" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46734" type="cve" id="CVE-2023-46734" title="CVE-2023-46734" />
			<reference href="https://bdu.fstec.ru/vul/2023-01072" type="self" id="BDU:2023-01072" title="BDU:2023-01072" />
			<reference href="https://bdu.fstec.ru/vul/2023-01057" type="self" id="BDU:2023-01057" title="BDU:2023-01057" />
			<reference href="https://bdu.fstec.ru/vul/2023-08237" type="self" id="BDU:2023-08237" title="BDU:2023-08237" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php-symfony4" epoch="0" version="4.4.50" release="2.el7" arch="noarch" src="">
					<filename>php-symfony4-0:4.4.50-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240806-06</id>
		<issued date="2024-08-06" />
		<updated date="2024-08-06" />
		<title>Множественные уязвимости emacs </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в emacs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-emacs-cve-2022-48337-cve-2022-48338-cve-2022-48339/</description>
               <solution>
                    Запретить использование в ОС пакета emacs
                или
                    Установить обновление для пакета(ов) emacs
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-emacs-cve-2022-48337-cve-2022-48338-cve-2022-48339/" type="self" id="ROS-20240806-06" title="ROS-20240806-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48337" type="cve" id="CVE-2022-48337" title="CVE-2022-48337" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48338" type="cve" id="CVE-2022-48338" title="CVE-2022-48338" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48339" type="cve" id="CVE-2022-48339" title="CVE-2022-48339" />
			<reference href="https://bdu.fstec.ru/vul/2024-06036" type="self" id="BDU:2024-06036" title="BDU:2024-06036" />
			<reference href="https://bdu.fstec.ru/vul/2024-06035" type="self" id="BDU:2024-06035" title="BDU:2024-06035" />
			<reference href="https://bdu.fstec.ru/vul/2024-06037" type="self" id="BDU:2024-06037" title="BDU:2024-06037" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="emacs" epoch="1" version="25.0.92" release="7.el7" arch="x86_64" src="">
					<filename>emacs-1:25.0.92-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240806-07</id>
		<issued date="2024-08-06" />
		<updated date="2024-08-06" />
		<title>Уязвимость opendkim </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в opendkim</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opendkim-cve-2022-48521/</description>
               <solution>
                    Запретить использование в ОС пакета opendkim
                или
                    Установить обновление для пакета(ов) opendkim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opendkim-cve-2022-48521/" type="self" id="ROS-20240806-07" title="ROS-20240806-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48521" type="cve" id="CVE-2022-48521" title="CVE-2022-48521" />
			<reference href="https://bdu.fstec.ru/vul/2024-06034" type="self" id="BDU:2024-06034" title="BDU:2024-06034" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="opendkim" epoch="0" version="2.11.0" release="3.el7" arch="x86_64" src="">
					<filename>opendkim-0:2.11.0-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240806-08</id>
		<issued date="2024-08-06" />
		<updated date="2024-08-06" />
		<title>Уязвимость libnbd </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libnbd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libnbd-cve-2023-5215/</description>
               <solution>
                    Запретить использование в ОС пакета libnbd
                или
                    Установить обновление для пакета(ов) libnbd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libnbd-cve-2023-5215/" type="self" id="ROS-20240806-08" title="ROS-20240806-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5215" type="cve" id="CVE-2023-5215" title="CVE-2023-5215" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libnbd" epoch="0" version="1.21.3" release="2.el7" arch="x86_64" src="">
					<filename>libnbd-0:1.21.3-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240806-09</id>
		<issued date="2024-08-06" />
		<updated date="2024-08-06" />
		<title>Множественные уязвимости gstreamer1-plugins-bad-free </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gstreamer1-plugins-bad-free</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gstreamer1-plugins-bad-free-cve-2023-40474-cve-2023-40475-cve-2023-40476/</description>
               <solution>
                    Запретить использование в ОС пакета gstreamer1-plugins-bad-free
                или
                    Установить обновление для пакета(ов) gstreamer1-plugins-bad-free
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gstreamer1-plugins-bad-free-cve-2023-40474-cve-2023-40475-cve-2023-40476/" type="self" id="ROS-20240806-09" title="ROS-20240806-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40474" type="cve" id="CVE-2023-40474" title="CVE-2023-40474" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40475" type="cve" id="CVE-2023-40475" title="CVE-2023-40475" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40476" type="cve" id="CVE-2023-40476" title="CVE-2023-40476" />
			<reference href="https://bdu.fstec.ru/vul/2023-06204" type="self" id="BDU:2023-06204" title="BDU:2023-06204" />
			<reference href="https://bdu.fstec.ru/vul/2023-06294" type="self" id="BDU:2023-06294" title="BDU:2023-06294" />
			<reference href="https://bdu.fstec.ru/vul/2023-06295" type="self" id="BDU:2023-06295" title="BDU:2023-06295" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gstreamer1-plugins-bad-free" epoch="0" version="1.16.3" release="2.el7" arch="x86_64" src="">
					<filename>gstreamer1-plugins-bad-free-0:1.16.3-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240806-10</id>
		<issued date="2024-08-06" />
		<updated date="2024-08-06" />
		<title>Уязвимость mod_http2 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в mod_http2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mod-http2-cve-2023-45802/</description>
               <solution>
                    Запретить использование в ОС пакета mod_http2
                или
                    Установить обновление для пакета(ов) mod_http2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mod-http2-cve-2023-45802/" type="self" id="ROS-20240806-10" title="ROS-20240806-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45802" type="cve" id="CVE-2023-45802" title="CVE-2023-45802" />
			<reference href="https://bdu.fstec.ru/vul/2023-07003" type="self" id="BDU:2023-07003" title="BDU:2023-07003" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mod_http2" epoch="0" version="2.0.29" release="1.el7" arch="x86_64" src="">
					<filename>mod_http2-0:2.0.29-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240806-11</id>
		<issued date="2024-08-06" />
		<updated date="2024-08-06" />
		<title>Уязвимость rabbitmq-java-client </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в rabbitmq-java-client</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rabbitmq-java-client-cve-2023-46120/</description>
               <solution>
                    Запретить использование в ОС пакета rabbitmq-java-client
                или
                    Установить обновление для пакета(ов) rabbitmq-java-client
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rabbitmq-java-client-cve-2023-46120/" type="self" id="ROS-20240806-11" title="ROS-20240806-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46120" type="cve" id="CVE-2023-46120" title="CVE-2023-46120" />
			<reference href="https://bdu.fstec.ru/vul/2024-00247" type="self" id="BDU:2024-00247" title="BDU:2024-00247" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rabbitmq-java-client" epoch="0" version="5.21.0" release="1.el7" arch="noarch" src="">
					<filename>rabbitmq-java-client-0:5.21.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240806-12</id>
		<issued date="2024-08-06" />
		<updated date="2024-08-06" />
		<title>Уязвимость perl-CPAN </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в perl-CPAN</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-cpan-cve-2023-31484/</description>
               <solution>
                    Запретить использование в ОС пакета perl-CPAN
                или
                    Установить обновление для пакета(ов) perl-CPAN
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-cpan-cve-2023-31484/" type="self" id="ROS-20240806-12" title="ROS-20240806-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31484" type="cve" id="CVE-2023-31484" title="CVE-2023-31484" />
			<reference href="https://bdu.fstec.ru/vul/2023-03871" type="self" id="BDU:2023-03871" title="BDU:2023-03871" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="perl-CPAN" epoch="0" version="2.28" release="4.el7" arch="noarch" src="">
					<filename>perl-CPAN-0:2.28-4.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240806-13</id>
		<issued date="2024-08-06" />
		<updated date="2024-08-06" />
		<title>Уязвимость golang-github-prometheus-exporter-toolkit-devel </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang-github-prometheus-exporter-toolkit-devel</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-github-prometheus-exporter-toolkit-devel-cve-2022-46146/</description>
               <solution>
                    Запретить использование в ОС пакета golang-github-prometheus-exporter-toolkit-devel
                или
                    Установить обновление для пакета(ов) golang-github-prometheus-exporter-toolkit-devel
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-github-prometheus-exporter-toolkit-devel-cve-2022-46146/" type="self" id="ROS-20240806-13" title="ROS-20240806-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46146" type="cve" id="CVE-2022-46146" title="CVE-2022-46146" />
			<reference href="https://bdu.fstec.ru/vul/2023-02338" type="self" id="BDU:2023-02338" title="BDU:2023-02338" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang-github-prometheus-exporter-toolkit-devel" epoch="0" version="0.7.3" release="1.el7" arch="noarch" src="">
					<filename>golang-github-prometheus-exporter-toolkit-devel-0:0.7.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240806-14</id>
		<issued date="2024-08-06" />
		<updated date="2024-08-06" />
		<title>Уязвимость gstreamer1-plugins-base </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gstreamer1-plugins-base</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gstreamer1-plugins-base-cve-2021-3522/</description>
               <solution>
                    Запретить использование в ОС пакета gstreamer1-plugins-base
                или
                    Установить обновление для пакета(ов) gstreamer1-plugins-base
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gstreamer1-plugins-base-cve-2021-3522/" type="self" id="ROS-20240806-14" title="ROS-20240806-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3522" type="cve" id="CVE-2021-3522" title="CVE-2021-3522" />
			<reference href="https://bdu.fstec.ru/vul/2023-07625" type="self" id="BDU:2023-07625" title="BDU:2023-07625" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gstreamer1-plugins-base" epoch="0" version="1.16.3" release="2.el7" arch="x86_64" src="">
					<filename>gstreamer1-plugins-base-0:1.16.3-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240806-15</id>
		<issued date="2024-08-06" />
		<updated date="2024-08-06" />
		<title>Уязвимость openssl3 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openssl3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2024-0727/</description>
               <solution>
                    Запретить использование в ОС пакета openssl3
                или
                    Установить обновление для пакета(ов) openssl3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2024-0727/" type="self" id="ROS-20240806-15" title="ROS-20240806-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0727" type="cve" id="CVE-2024-0727" title="CVE-2024-0727" />
			<reference href="https://bdu.fstec.ru/vul/2024-01337" type="self" id="BDU:2024-01337" title="BDU:2024-01337" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl3" epoch="0" version="3.2.1" release="2.el7" arch="x86_64" src="">
					<filename>openssl3-0:3.2.1-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240806-16</id>
		<issued date="2024-08-06" />
		<updated date="2024-08-06" />
		<title>Уязвимость libglvnd </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в libglvnd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libglvnd-cve-2023-45924/</description>
               <solution>
                    Запретить использование в ОС пакета libglvnd
                или
                    Установить обновление для пакета(ов) libglvnd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libglvnd-cve-2023-45924/" type="self" id="ROS-20240806-16" title="ROS-20240806-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45924" type="cve" id="CVE-2023-45924" title="CVE-2023-45924" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libglvnd" epoch="1" version="1.5.0" release="2.el7" arch="x86_64" src="">
					<filename>libglvnd-1:1.5.0-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240806-17</id>
		<issued date="2024-08-06" />
		<updated date="2024-08-06" />
		<title>Уязвимость 389-ds-base </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в 389-ds-base</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-389-ds-base-cve-2024-3657/</description>
               <solution>
                    Запретить использование в ОС пакета 389-ds-base
                или
                    Установить обновление для пакета(ов) 389-ds-base
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-389-ds-base-cve-2024-3657/" type="self" id="ROS-20240806-17" title="ROS-20240806-17" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3657" type="cve" id="CVE-2024-3657" title="CVE-2024-3657" />
			<reference href="https://bdu.fstec.ru/vul/2025-00952" type="self" id="BDU:2025-00952" title="BDU:2025-00952" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="389-ds-base" epoch="0" version="2.4.5" release="2.el7" arch="x86_64" src="">
					<filename>389-ds-base-0:2.4.5-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240806-18</id>
		<issued date="2024-08-06" />
		<updated date="2024-08-06" />
		<title>Уязвимость 389-ds-base </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в 389-ds-base</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-389-ds-base-cve-2024-2199/</description>
               <solution>
                    Запретить использование в ОС пакета 389-ds-base
                или
                    Установить обновление для пакета(ов) 389-ds-base
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-389-ds-base-cve-2024-2199/" type="self" id="ROS-20240806-18" title="ROS-20240806-18" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2199" type="cve" id="CVE-2024-2199" title="CVE-2024-2199" />
			<reference href="https://bdu.fstec.ru/vul/2025-11957" type="self" id="BDU:2025-11957" title="BDU:2025-11957" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="389-ds-base" epoch="0" version="2.4.5" release="2.el7" arch="x86_64" src="">
					<filename>389-ds-base-0:2.4.5-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240806-19</id>
		<issued date="2024-08-06" />
		<updated date="2024-08-06" />
		<title>Уязвимость cups </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в cups</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cups-cve-2024-35235/</description>
               <solution>
                    Запретить использование в ОС пакета cups
                или
                    Установить обновление для пакета(ов) cups
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cups-cve-2024-35235/" type="self" id="ROS-20240806-19" title="ROS-20240806-19" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35235" type="cve" id="CVE-2024-35235" title="CVE-2024-35235" />
			<reference href="https://bdu.fstec.ru/vul/2024-05605" type="self" id="BDU:2024-05605" title="BDU:2024-05605" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cups" epoch="1" version="2.4.7" release="3.el7" arch="x86_64" src="">
					<filename>cups-1:2.4.7-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240806-20</id>
		<issued date="2024-08-06" />
		<updated date="2024-08-06" />
		<title>Уязвимость libtiff </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libtiff</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libtiff-cve-2024-6716/</description>
               <solution>
                    Запретить использование в ОС пакета libtiff
                или
                    Установить обновление для пакета(ов) libtiff
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libtiff-cve-2024-6716/" type="self" id="ROS-20240806-20" title="ROS-20240806-20" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6716" type="cve" id="CVE-2024-6716" title="CVE-2024-6716" />
			<reference href="https://bdu.fstec.ru/vul/2024-06210" type="self" id="BDU:2024-06210" title="BDU:2024-06210" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libtiff" epoch="0" version="4.5.1" release="9.el7" arch="x86_64" src="">
					<filename>libtiff-0:4.5.1-9.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240806-21</id>
		<issued date="2024-08-06" />
		<updated date="2024-08-06" />
		<title>Уязвимость postgresql-jdbc </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в postgresql-jdbc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-jdbc-cve-2022-21724/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql-jdbc
                или
                    Установить обновление для пакета(ов) postgresql-jdbc
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-jdbc-cve-2022-21724/" type="self" id="ROS-20240806-21" title="ROS-20240806-21" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21724" type="cve" id="CVE-2022-21724" title="CVE-2022-21724" />
			<reference href="https://bdu.fstec.ru/vul/2022-00821" type="self" id="BDU:2022-00821" title="BDU:2022-00821" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql-jdbc" epoch="0" version="42.2.29" release="1.el7" arch="noarch" src="">
					<filename>postgresql-jdbc-0:42.2.29-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240806-22</id>
		<issued date="2024-08-06" />
		<updated date="2024-08-06" />
		<title>Уязвимость rubygem-activerecord </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в rubygem-activerecord</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-activerecord-cve-2022-44566/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-activerecord
                или
                    Установить обновление для пакета(ов) rubygem-activerecord
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-activerecord-cve-2022-44566/" type="self" id="ROS-20240806-22" title="ROS-20240806-22" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44566" type="cve" id="CVE-2022-44566" title="CVE-2022-44566" />
			<reference href="https://bdu.fstec.ru/vul/2025-01400" type="self" id="BDU:2025-01400" title="BDU:2025-01400" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-activerecord" epoch="2" version="6.1.6.1" release="3.el7" arch="noarch" src="">
					<filename>rubygem-activerecord-2:6.1.6.1-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240807-01</id>
		<issued date="2024-08-07" />
		<updated date="2024-08-07" />
		<title>Множественные уязвимости assimp </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в assimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-assimp-cve-2022-45748-cve-2024-40724/</description>
               <solution>
                    Запретить использование в ОС пакета assimp
                или
                    Установить обновление для пакета(ов) assimp
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-assimp-cve-2022-45748-cve-2024-40724/" type="self" id="ROS-20240807-01" title="ROS-20240807-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45748" type="cve" id="CVE-2022-45748" title="CVE-2022-45748" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40724" type="cve" id="CVE-2024-40724" title="CVE-2024-40724" />
			<reference href="https://bdu.fstec.ru/vul/2024-06187" type="self" id="BDU:2024-06187" title="BDU:2024-06187" />
			<reference href="https://bdu.fstec.ru/vul/2024-06186" type="self" id="BDU:2024-06186" title="BDU:2024-06186" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="assimp" epoch="0" version="5.2.5" release="1.el7" arch="x86_64" src="">
					<filename>assimp-0:5.2.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240807-02</id>
		<issued date="2024-08-07" />
		<updated date="2024-08-07" />
		<title>Множественные уязвимости espeak-ng</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в espeak-ng</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-espeak-ng/</description>
               <solution>
                    Запретить использование в ОС пакета espeak-ng
                или
                    Установить обновление для пакета(ов) espeak-ng
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-espeak-ng/" type="self" id="ROS-20240807-02" title="ROS-20240807-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49994" type="cve" id="CVE-2023-49994" title="CVE-2023-49994" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49993" type="cve" id="CVE-2023-49993" title="CVE-2023-49993" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49992" type="cve" id="CVE-2023-49992" title="CVE-2023-49992" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49991" type="cve" id="CVE-2023-49991" title="CVE-2023-49991" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49990" type="cve" id="CVE-2023-49990" title="CVE-2023-49990" />
			<reference href="https://bdu.fstec.ru/vul/2024-06185" type="self" id="BDU:2024-06185" title="BDU:2024-06185" />
			<reference href="https://bdu.fstec.ru/vul/2024-06184" type="self" id="BDU:2024-06184" title="BDU:2024-06184" />
			<reference href="https://bdu.fstec.ru/vul/2024-06183" type="self" id="BDU:2024-06183" title="BDU:2024-06183" />
			<reference href="https://bdu.fstec.ru/vul/2024-06182" type="self" id="BDU:2024-06182" title="BDU:2024-06182" />
			<reference href="https://bdu.fstec.ru/vul/2024-06181" type="self" id="BDU:2024-06181" title="BDU:2024-06181" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="espeak-ng" epoch="0" version="1.51.1" release="1.el7" arch="x86_64" src="">
					<filename>espeak-ng-0:1.51.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240807-03</id>
		<issued date="2024-08-07" />
		<updated date="2024-08-07" />
		<title>Множественные уязвимости asterisk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в asterisk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-asterisk-cve-2023-49786-cve-2023-49294-cve-2023-37457/</description>
               <solution>
                    Запретить использование в ОС пакета asterisk
                или
                    Установить обновление для пакета(ов) asterisk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-asterisk-cve-2023-49786-cve-2023-49294-cve-2023-37457/" type="self" id="ROS-20240807-03" title="ROS-20240807-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49786" type="cve" id="CVE-2023-49786" title="CVE-2023-49786" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49294" type="cve" id="CVE-2023-49294" title="CVE-2023-49294" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37457" type="cve" id="CVE-2023-37457" title="CVE-2023-37457" />
			<reference href="https://bdu.fstec.ru/vul/2023-08816" type="self" id="BDU:2023-08816" title="BDU:2023-08816" />
			<reference href="https://bdu.fstec.ru/vul/2023-08871" type="self" id="BDU:2023-08871" title="BDU:2023-08871" />
			<reference href="https://bdu.fstec.ru/vul/2023-08817" type="self" id="BDU:2023-08817" title="BDU:2023-08817" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="asterisk" epoch="0" version="18.4.0" release="6.el7" arch="x86_64" src="">
					<filename>asterisk-0:18.4.0-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240807-04</id>
		<issued date="2024-08-07" />
		<updated date="2024-08-07" />
		<title>Множественные уязвимости mupdf </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в mupdf</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mupdf-cve-2023-51105-cve-2023-51104-cve-2023-51103/</description>
               <solution>
                    Запретить использование в ОС пакета mupdf
                или
                    Установить обновление для пакета(ов) mupdf
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mupdf-cve-2023-51105-cve-2023-51104-cve-2023-51103/" type="self" id="ROS-20240807-04" title="ROS-20240807-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51105" type="cve" id="CVE-2023-51105" title="CVE-2023-51105" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51104" type="cve" id="CVE-2023-51104" title="CVE-2023-51104" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51103" type="cve" id="CVE-2023-51103" title="CVE-2023-51103" />
			<reference href="https://bdu.fstec.ru/vul/2024-06180" type="self" id="BDU:2024-06180" title="BDU:2024-06180" />
			<reference href="https://bdu.fstec.ru/vul/2024-06179" type="self" id="BDU:2024-06179" title="BDU:2024-06179" />
			<reference href="https://bdu.fstec.ru/vul/2024-06178" type="self" id="BDU:2024-06178" title="BDU:2024-06178" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mupdf" epoch="0" version="1.24.2" release="1.el7" arch="x86_64" src="">
					<filename>mupdf-0:1.24.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240807-05</id>
		<issued date="2024-08-07" />
		<updated date="2024-08-07" />
		<title>Множественные уязвимости minio </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в minio</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-minio-cve-2023-28434-cve-2023-28433-cve-2023-28432-cve-2024-36107/</description>
               <solution>
                    Запретить использование в ОС пакета minio
                или
                    Установить обновление для пакета(ов) minio
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-minio-cve-2023-28434-cve-2023-28433-cve-2023-28432-cve-2024-36107/" type="self" id="ROS-20240807-05" title="ROS-20240807-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28434" type="cve" id="CVE-2023-28434" title="CVE-2023-28434" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28433" type="cve" id="CVE-2023-28433" title="CVE-2023-28433" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28432" type="cve" id="CVE-2023-28432" title="CVE-2023-28432" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36107" type="cve" id="CVE-2024-36107" title="CVE-2024-36107" />
			<reference href="https://bdu.fstec.ru/vul/2023-05199" type="self" id="BDU:2023-05199" title="BDU:2023-05199" />
			<reference href="https://bdu.fstec.ru/vul/2023-07540" type="self" id="BDU:2023-07540" title="BDU:2023-07540" />
			<reference href="https://bdu.fstec.ru/vul/2023-02098" type="self" id="BDU:2023-02098" title="BDU:2023-02098" />
			<reference href="https://bdu.fstec.ru/vul/2024-06172" type="self" id="BDU:2024-06172" title="BDU:2024-06172" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="minio" epoch="0" version="20240710T184149Z" release="1.el7" arch="x86_64" src="">
					<filename>minio-0:20240710T184149Z-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240807-06</id>
		<issued date="2024-08-07" />
		<updated date="2024-08-07" />
		<title>Множественные уязвимости gpac</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в gpac</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gpac-07-08-24/</description>
               <solution>
                    Запретить использование в ОС пакета gpac
                или
                    Установить обновление для пакета(ов) gpac
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gpac-07-08-24/" type="self" id="ROS-20240807-06" title="ROS-20240807-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47384" type="cve" id="CVE-2023-47384" title="CVE-2023-47384" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46929" type="cve" id="CVE-2023-46929" title="CVE-2023-46929" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0321" type="cve" id="CVE-2024-0321" title="CVE-2024-0321" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0322" type="cve" id="CVE-2024-0322" title="CVE-2024-0322" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50120" type="cve" id="CVE-2023-50120" title="CVE-2023-50120" />
			<reference href="https://bdu.fstec.ru/vul/2024-06177" type="self" id="BDU:2024-06177" title="BDU:2024-06177" />
			<reference href="https://bdu.fstec.ru/vul/2024-06176" type="self" id="BDU:2024-06176" title="BDU:2024-06176" />
			<reference href="https://bdu.fstec.ru/vul/2024-06175" type="self" id="BDU:2024-06175" title="BDU:2024-06175" />
			<reference href="https://bdu.fstec.ru/vul/2024-06174" type="self" id="BDU:2024-06174" title="BDU:2024-06174" />
			<reference href="https://bdu.fstec.ru/vul/2024-06173" type="self" id="BDU:2024-06173" title="BDU:2024-06173" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gpac" epoch="0" version="2.3.0" release="2.20240126gitf30e0d1.el7" arch="x86_64" src="">
					<filename>gpac-0:2.3.0-2.20240126gitf30e0d1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240807-07</id>
		<issued date="2024-08-07" />
		<updated date="2024-08-07" />
		<title>Множественные уязвимости postgresql-jdbc </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в postgresql-jdbc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql-jdbc-cve-2022-41946-cve-2024-1597/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql-jdbc
                или
                    Установить обновление для пакета(ов) postgresql-jdbc
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql-jdbc-cve-2022-41946-cve-2024-1597/" type="self" id="ROS-20240807-07" title="ROS-20240807-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41946" type="cve" id="CVE-2022-41946" title="CVE-2022-41946" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1597" type="cve" id="CVE-2024-1597" title="CVE-2024-1597" />
			<reference href="https://bdu.fstec.ru/vul/2022-07190" type="self" id="BDU:2022-07190" title="BDU:2022-07190" />
			<reference href="https://bdu.fstec.ru/vul/2024-01541" type="self" id="BDU:2024-01541" title="BDU:2024-01541" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql-jdbc" epoch="0" version="42.2.29" release="1.el7" arch="noarch" src="">
					<filename>postgresql-jdbc-0:42.2.29-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240725-08</id>
		<issued date="2024-08-07" />
		<updated date="2024-08-07" />
		<title>Множественные уязвимости nvidia-modprobe</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nvidia-modprobe</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nvidia-modprobe-07-08-24/</description>
               <solution>
                    Запретить использование в ОС пакета nvidia-modprobe
                или
                    Установить обновление для пакета(ов) nvidia-modprobe
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nvidia-modprobe-07-08-24/" type="self" id="ROS-20240725-08" title="ROS-20240725-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0074" type="cve" id="CVE-2024-0074" title="CVE-2024-0074" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0075" type="cve" id="CVE-2024-0075" title="CVE-2024-0075" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0077" type="cve" id="CVE-2024-0077" title="CVE-2024-0077" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0078" type="cve" id="CVE-2024-0078" title="CVE-2024-0078" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0079" type="cve" id="CVE-2024-0079" title="CVE-2024-0079" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0084" type="cve" id="CVE-2024-0084" title="CVE-2024-0084" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0085" type="cve" id="CVE-2024-0085" title="CVE-2024-0085" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0086" type="cve" id="CVE‑2024‑0086" title="CVE‑2024‑0086" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0090" type="cve" id="CVE‑2024‑0090" title="CVE‑2024‑0090" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0091" type="cve" id="CVE‑2024‑0091" title="CVE‑2024‑0091" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0092" type="cve" id="CVE‑2024‑0092" title="CVE‑2024‑0092" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0093" type="cve" id="CVE‑2024‑0093" title="CVE‑2024‑0093" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0094" type="cve" id="CVE‑2024‑0094" title="CVE‑2024‑0094" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0099" type="cve" id="CVE‑2024‑0099" title="CVE‑2024‑0099" />
			<reference href="https://bdu.fstec.ru/vul/2024-04206" type="self" id="BDU:2024-04206" title="BDU:2024-04206" />
			<reference href="https://bdu.fstec.ru/vul/2024-04277" type="self" id="BDU:2024-04277" title="BDU:2024-04277" />
			<reference href="https://bdu.fstec.ru/vul/2024-04275" type="self" id="BDU:2024-04275" title="BDU:2024-04275" />
			<reference href="https://bdu.fstec.ru/vul/2024-04204" type="self" id="BDU:2024-04204" title="BDU:2024-04204" />
			<reference href="https://bdu.fstec.ru/vul/2024-04276" type="self" id="BDU:2024-04276" title="BDU:2024-04276" />
			<reference href="https://bdu.fstec.ru/vul/2024-04850" type="self" id="BDU:2024-04850" title="BDU:2024-04850" />
			<reference href="https://bdu.fstec.ru/vul/2024-04854" type="self" id="BDU:2024-04854" title="BDU:2024-04854" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nvidia-modprobe" epoch="3" version="555.58.02" release="1.el7.3" arch="x86_64" src="">
					<filename>nvidia-modprobe-3:555.58.02-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240725-10</id>
		<issued date="2024-08-07" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости nvidia-persistenced</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nvidia-persistenced</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nvidia-persistenced-07-08-248326/</description>
               <solution>
                    Запретить использование в ОС пакета nvidia-persistenced
                или
                    Установить обновление для пакета(ов) nvidia-persistenced
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nvidia-persistenced-07-08-248326/" type="self" id="ROS-20240725-10" title="ROS-20240725-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0074" type="cve" id="CVE-2024-0074" title="CVE-2024-0074" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0075" type="cve" id="CVE-2024-0075" title="CVE-2024-0075" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0077" type="cve" id="CVE-2024-0077" title="CVE-2024-0077" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0078" type="cve" id="CVE-2024-0078" title="CVE-2024-0078" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0079" type="cve" id="CVE-2024-0079" title="CVE-2024-0079" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0084" type="cve" id="CVE-2024-0084" title="CVE-2024-0084" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0085" type="cve" id="CVE-2024-0085" title="CVE-2024-0085" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0086" type="cve" id="CVE‑2024‑0086" title="CVE‑2024‑0086" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0090" type="cve" id="CVE‑2024‑0090" title="CVE‑2024‑0090" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0091" type="cve" id="CVE‑2024‑0091" title="CVE‑2024‑0091" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0092" type="cve" id="CVE‑2024‑0092" title="CVE‑2024‑0092" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0093" type="cve" id="CVE‑2024‑0093" title="CVE‑2024‑0093" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0094" type="cve" id="CVE‑2024‑0094" title="CVE‑2024‑0094" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0099" type="cve" id="CVE‑2024‑0099" title="CVE‑2024‑0099" />
			<reference href="https://bdu.fstec.ru/vul/2024-04206" type="self" id="BDU:2024-04206" title="BDU:2024-04206" />
			<reference href="https://bdu.fstec.ru/vul/2024-04277" type="self" id="BDU:2024-04277" title="BDU:2024-04277" />
			<reference href="https://bdu.fstec.ru/vul/2024-04275" type="self" id="BDU:2024-04275" title="BDU:2024-04275" />
			<reference href="https://bdu.fstec.ru/vul/2024-04204" type="self" id="BDU:2024-04204" title="BDU:2024-04204" />
			<reference href="https://bdu.fstec.ru/vul/2024-04276" type="self" id="BDU:2024-04276" title="BDU:2024-04276" />
			<reference href="https://bdu.fstec.ru/vul/2024-04850" type="self" id="BDU:2024-04850" title="BDU:2024-04850" />
			<reference href="https://bdu.fstec.ru/vul/2024-04854" type="self" id="BDU:2024-04854" title="BDU:2024-04854" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nvidia-persistenced" epoch="3" version="555.58.02" release="1.el7.3" arch="x86_64" src="">
					<filename>nvidia-persistenced-3:555.58.02-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240725-09</id>
		<issued date="2024-08-07" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости nvidia-settings</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nvidia-settings</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nvidia-settings-07-08-247047/</description>
               <solution>
                    Запретить использование в ОС пакета nvidia-settings
                или
                    Установить обновление для пакета(ов) nvidia-settings
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nvidia-settings-07-08-247047/" type="self" id="ROS-20240725-09" title="ROS-20240725-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0074" type="cve" id="CVE-2024-0074" title="CVE-2024-0074" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0075" type="cve" id="CVE-2024-0075" title="CVE-2024-0075" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0077" type="cve" id="CVE-2024-0077" title="CVE-2024-0077" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0078" type="cve" id="CVE-2024-0078" title="CVE-2024-0078" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0079" type="cve" id="CVE-2024-0079" title="CVE-2024-0079" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0084" type="cve" id="CVE-2024-0084" title="CVE-2024-0084" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0085" type="cve" id="CVE-2024-0085" title="CVE-2024-0085" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0086" type="cve" id="CVE‑2024‑0086" title="CVE‑2024‑0086" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0090" type="cve" id="CVE‑2024‑0090" title="CVE‑2024‑0090" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0091" type="cve" id="CVE‑2024‑0091" title="CVE‑2024‑0091" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0092" type="cve" id="CVE‑2024‑0092" title="CVE‑2024‑0092" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0093" type="cve" id="CVE‑2024‑0093" title="CVE‑2024‑0093" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0094" type="cve" id="CVE‑2024‑0094" title="CVE‑2024‑0094" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0099" type="cve" id="CVE‑2024‑0099" title="CVE‑2024‑0099" />
			<reference href="https://bdu.fstec.ru/vul/2024-04206" type="self" id="BDU:2024-04206" title="BDU:2024-04206" />
			<reference href="https://bdu.fstec.ru/vul/2024-04277" type="self" id="BDU:2024-04277" title="BDU:2024-04277" />
			<reference href="https://bdu.fstec.ru/vul/2024-04275" type="self" id="BDU:2024-04275" title="BDU:2024-04275" />
			<reference href="https://bdu.fstec.ru/vul/2024-04204" type="self" id="BDU:2024-04204" title="BDU:2024-04204" />
			<reference href="https://bdu.fstec.ru/vul/2024-04276" type="self" id="BDU:2024-04276" title="BDU:2024-04276" />
			<reference href="https://bdu.fstec.ru/vul/2024-04850" type="self" id="BDU:2024-04850" title="BDU:2024-04850" />
			<reference href="https://bdu.fstec.ru/vul/2024-04854" type="self" id="BDU:2024-04854" title="BDU:2024-04854" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nvidia-settings" epoch="3" version="555.58.02" release="1.el7.3" arch="x86_64" src="">
					<filename>nvidia-settings-3:555.58.02-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240725-11</id>
		<issued date="2024-08-07" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости nvidia-xconfig</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nvidia-xconfig</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nvidia-xconfig-07-08-249270/</description>
               <solution>
                    Запретить использование в ОС пакета nvidia-xconfig
                или
                    Установить обновление для пакета(ов) nvidia-xconfig
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nvidia-xconfig-07-08-249270/" type="self" id="ROS-20240725-11" title="ROS-20240725-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0074" type="cve" id="CVE-2024-0074" title="CVE-2024-0074" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0075" type="cve" id="CVE-2024-0075" title="CVE-2024-0075" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0077" type="cve" id="CVE-2024-0077" title="CVE-2024-0077" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0078" type="cve" id="CVE-2024-0078" title="CVE-2024-0078" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0079" type="cve" id="CVE-2024-0079" title="CVE-2024-0079" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0084" type="cve" id="CVE-2024-0084" title="CVE-2024-0084" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0085" type="cve" id="CVE-2024-0085" title="CVE-2024-0085" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0086" type="cve" id="CVE‑2024‑0086" title="CVE‑2024‑0086" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0090" type="cve" id="CVE‑2024‑0090" title="CVE‑2024‑0090" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0091" type="cve" id="CVE‑2024‑0091" title="CVE‑2024‑0091" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0092" type="cve" id="CVE‑2024‑0092" title="CVE‑2024‑0092" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0093" type="cve" id="CVE‑2024‑0093" title="CVE‑2024‑0093" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0094" type="cve" id="CVE‑2024‑0094" title="CVE‑2024‑0094" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0099" type="cve" id="CVE‑2024‑0099" title="CVE‑2024‑0099" />
			<reference href="https://bdu.fstec.ru/vul/2024-04206" type="self" id="BDU:2024-04206" title="BDU:2024-04206" />
			<reference href="https://bdu.fstec.ru/vul/2024-04277" type="self" id="BDU:2024-04277" title="BDU:2024-04277" />
			<reference href="https://bdu.fstec.ru/vul/2024-04275" type="self" id="BDU:2024-04275" title="BDU:2024-04275" />
			<reference href="https://bdu.fstec.ru/vul/2024-04204" type="self" id="BDU:2024-04204" title="BDU:2024-04204" />
			<reference href="https://bdu.fstec.ru/vul/2024-04276" type="self" id="BDU:2024-04276" title="BDU:2024-04276" />
			<reference href="https://bdu.fstec.ru/vul/2024-04850" type="self" id="BDU:2024-04850" title="BDU:2024-04850" />
			<reference href="https://bdu.fstec.ru/vul/2024-04854" type="self" id="BDU:2024-04854" title="BDU:2024-04854" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nvidia-xconfig" epoch="3" version="555.58.02" release="1.el7.3" arch="x86_64" src="">
					<filename>nvidia-xconfig-3:555.58.02-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240725-12</id>
		<issued date="2024-08-07" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости xorg-x11-drv-nvidia</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в xorg-x11-drv-nvidia</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-xorg-x11-drv-nvidia-07-08-243898/</description>
               <solution>
                    Запретить использование в ОС пакета xorg-x11-drv-nvidia
                или
                    Установить обновление для пакета(ов) xorg-x11-drv-nvidia
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-xorg-x11-drv-nvidia-07-08-243898/" type="self" id="ROS-20240725-12" title="ROS-20240725-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0074" type="cve" id="CVE-2024-0074" title="CVE-2024-0074" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0075" type="cve" id="CVE-2024-0075" title="CVE-2024-0075" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0077" type="cve" id="CVE-2024-0077" title="CVE-2024-0077" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0078" type="cve" id="CVE-2024-0078" title="CVE-2024-0078" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0079" type="cve" id="CVE-2024-0079" title="CVE-2024-0079" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0084" type="cve" id="CVE-2024-0084" title="CVE-2024-0084" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0085" type="cve" id="CVE-2024-0085" title="CVE-2024-0085" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0086" type="cve" id="CVE‑2024‑0086" title="CVE‑2024‑0086" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0090" type="cve" id="CVE‑2024‑0090" title="CVE‑2024‑0090" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0091" type="cve" id="CVE‑2024‑0091" title="CVE‑2024‑0091" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0092" type="cve" id="CVE‑2024‑0092" title="CVE‑2024‑0092" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0093" type="cve" id="CVE‑2024‑0093" title="CVE‑2024‑0093" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0094" type="cve" id="CVE‑2024‑0094" title="CVE‑2024‑0094" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0099" type="cve" id="CVE‑2024‑0099" title="CVE‑2024‑0099" />
			<reference href="https://bdu.fstec.ru/vul/2024-04206" type="self" id="BDU:2024-04206" title="BDU:2024-04206" />
			<reference href="https://bdu.fstec.ru/vul/2024-04277" type="self" id="BDU:2024-04277" title="BDU:2024-04277" />
			<reference href="https://bdu.fstec.ru/vul/2024-04275" type="self" id="BDU:2024-04275" title="BDU:2024-04275" />
			<reference href="https://bdu.fstec.ru/vul/2024-04204" type="self" id="BDU:2024-04204" title="BDU:2024-04204" />
			<reference href="https://bdu.fstec.ru/vul/2024-04276" type="self" id="BDU:2024-04276" title="BDU:2024-04276" />
			<reference href="https://bdu.fstec.ru/vul/2024-04850" type="self" id="BDU:2024-04850" title="BDU:2024-04850" />
			<reference href="https://bdu.fstec.ru/vul/2024-04854" type="self" id="BDU:2024-04854" title="BDU:2024-04854" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="xorg-x11-drv-nvidia" epoch="3" version="555.58.02" release="1.el7" arch="x86_64" src="">
					<filename>xorg-x11-drv-nvidia-3:555.58.02-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240725-13</id>
		<issued date="2024-08-07" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости libXNVCtrl</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libXNVCtrl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libXNVCtrl-07-08-249079/</description>
               <solution>
                    Запретить использование в ОС пакета libXNVCtrl
                или
                    Установить обновление для пакета(ов) libXNVCtrl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libXNVCtrl-07-08-249079/" type="self" id="ROS-20240725-13" title="ROS-20240725-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0074" type="cve" id="CVE-2024-0074" title="CVE-2024-0074" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0075" type="cve" id="CVE-2024-0075" title="CVE-2024-0075" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0077" type="cve" id="CVE-2024-0077" title="CVE-2024-0077" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0078" type="cve" id="CVE-2024-0078" title="CVE-2024-0078" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0079" type="cve" id="CVE-2024-0079" title="CVE-2024-0079" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0084" type="cve" id="CVE-2024-0084" title="CVE-2024-0084" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0085" type="cve" id="CVE-2024-0085" title="CVE-2024-0085" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0086" type="cve" id="CVE‑2024‑0086" title="CVE‑2024‑0086" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0090" type="cve" id="CVE‑2024‑0090" title="CVE‑2024‑0090" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0091" type="cve" id="CVE‑2024‑0091" title="CVE‑2024‑0091" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0092" type="cve" id="CVE‑2024‑0092" title="CVE‑2024‑0092" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0093" type="cve" id="CVE‑2024‑0093" title="CVE‑2024‑0093" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0094" type="cve" id="CVE‑2024‑0094" title="CVE‑2024‑0094" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE‑2024‑0099" type="cve" id="CVE‑2024‑0099" title="CVE‑2024‑0099" />
			<reference href="https://bdu.fstec.ru/vul/2024-04206" type="self" id="BDU:2024-04206" title="BDU:2024-04206" />
			<reference href="https://bdu.fstec.ru/vul/2024-04277" type="self" id="BDU:2024-04277" title="BDU:2024-04277" />
			<reference href="https://bdu.fstec.ru/vul/2024-04275" type="self" id="BDU:2024-04275" title="BDU:2024-04275" />
			<reference href="https://bdu.fstec.ru/vul/2024-04204" type="self" id="BDU:2024-04204" title="BDU:2024-04204" />
			<reference href="https://bdu.fstec.ru/vul/2024-04276" type="self" id="BDU:2024-04276" title="BDU:2024-04276" />
			<reference href="https://bdu.fstec.ru/vul/2024-04850" type="self" id="BDU:2024-04850" title="BDU:2024-04850" />
			<reference href="https://bdu.fstec.ru/vul/2024-04854" type="self" id="BDU:2024-04854" title="BDU:2024-04854" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libXNVCtrl" epoch="3" version="555.58.02" release="1.el7" arch="x86_64" src="">
					<filename>libXNVCtrl-3:555.58.02-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240807-09</id>
		<issued date="2024-08-07" />
		<updated date="2024-09-18" />
		<title>Множественные уязвимости chromium</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-07-08-24/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-07-08-24/" type="self" id="ROS-20240807-09" title="ROS-20240807-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7256" type="cve" id="CVE-2024-7256" title="CVE-2024-7256" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7255" type="cve" id="CVE-2024-7255" title="CVE-2024-7255" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6990" type="cve" id="CVE-2024-6990" title="CVE-2024-6990" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6993" type="cve" id="CVE-2024-6993" title="CVE-2024-6993" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6992" type="cve" id="CVE-2024-6992" title="CVE-2024-6992" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7005" type="cve" id="CVE-2024-7005" title="CVE-2024-7005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7004" type="cve" id="CVE-2024-7004" title="CVE-2024-7004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7003" type="cve" id="CVE-2024-7003" title="CVE-2024-7003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7001" type="cve" id="CVE-2024-7001" title="CVE-2024-7001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7000" type="cve" id="CVE-2024-7000" title="CVE-2024-7000" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6999" type="cve" id="CVE-2024-6999" title="CVE-2024-6999" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6998" type="cve" id="CVE-2024-6998" title="CVE-2024-6998" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6997" type="cve" id="CVE-2024-6997" title="CVE-2024-6997" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6996" type="cve" id="CVE-2024-6996" title="CVE-2024-6996" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6995" type="cve" id="CVE-2024-6995" title="CVE-2024-6995" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6994" type="cve" id="CVE-2024-6994" title="CVE-2024-6994" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6991" type="cve" id="CVE-2024-6991" title="CVE-2024-6991" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6989" type="cve" id="CVE-2024-6989" title="CVE-2024-6989" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6779" type="cve" id="CVE-2024-6779" title="CVE-2024-6779" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6778" type="cve" id="CVE-2024-6778" title="CVE-2024-6778" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6777" type="cve" id="CVE-2024-6777" title="CVE-2024-6777" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6776" type="cve" id="CVE-2024-6776" title="CVE-2024-6776" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6775" type="cve" id="CVE-2024-6775" title="CVE-2024-6775" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6774" type="cve" id="CVE-2024-6774" title="CVE-2024-6774" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6773" type="cve" id="CVE-2024-6773" title="CVE-2024-6773" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6772" type="cve" id="CVE-2024-6772" title="CVE-2024-6772" />
			<reference href="https://bdu.fstec.ru/vul/2024-06133" type="self" id="BDU:2024-06133" title="BDU:2024-06133" />
			<reference href="https://bdu.fstec.ru/vul/2024-06108" type="self" id="BDU:2024-06108" title="BDU:2024-06108" />
			<reference href="https://bdu.fstec.ru/vul/2024-06132" type="self" id="BDU:2024-06132" title="BDU:2024-06132" />
			<reference href="https://bdu.fstec.ru/vul/2024-05932" type="self" id="BDU:2024-05932" title="BDU:2024-05932" />
			<reference href="https://bdu.fstec.ru/vul/2024-05896" type="self" id="BDU:2024-05896" title="BDU:2024-05896" />
			<reference href="https://bdu.fstec.ru/vul/2024-05930" type="self" id="BDU:2024-05930" title="BDU:2024-05930" />
			<reference href="https://bdu.fstec.ru/vul/2024-05929" type="self" id="BDU:2024-05929" title="BDU:2024-05929" />
			<reference href="https://bdu.fstec.ru/vul/2024-05928" type="self" id="BDU:2024-05928" title="BDU:2024-05928" />
			<reference href="https://bdu.fstec.ru/vul/2024-05931" type="self" id="BDU:2024-05931" title="BDU:2024-05931" />
			<reference href="https://bdu.fstec.ru/vul/2024-05927" type="self" id="BDU:2024-05927" title="BDU:2024-05927" />
			<reference href="https://bdu.fstec.ru/vul/2024-05905" type="self" id="BDU:2024-05905" title="BDU:2024-05905" />
			<reference href="https://bdu.fstec.ru/vul/2024-05906" type="self" id="BDU:2024-05906" title="BDU:2024-05906" />
			<reference href="https://bdu.fstec.ru/vul/2024-05889" type="self" id="BDU:2024-05889" title="BDU:2024-05889" />
			<reference href="https://bdu.fstec.ru/vul/2024-05890" type="self" id="BDU:2024-05890" title="BDU:2024-05890" />
			<reference href="https://bdu.fstec.ru/vul/2024-05891" type="self" id="BDU:2024-05891" title="BDU:2024-05891" />
			<reference href="https://bdu.fstec.ru/vul/2024-05893" type="self" id="BDU:2024-05893" title="BDU:2024-05893" />
			<reference href="https://bdu.fstec.ru/vul/2024-05895" type="self" id="BDU:2024-05895" title="BDU:2024-05895" />
			<reference href="https://bdu.fstec.ru/vul/2024-05892" type="self" id="BDU:2024-05892" title="BDU:2024-05892" />
			<reference href="https://bdu.fstec.ru/vul/2024-06113" type="self" id="BDU:2024-06113" title="BDU:2024-06113" />
			<reference href="https://bdu.fstec.ru/vul/2024-06114" type="self" id="BDU:2024-06114" title="BDU:2024-06114" />
			<reference href="https://bdu.fstec.ru/vul/2024-06110" type="self" id="BDU:2024-06110" title="BDU:2024-06110" />
			<reference href="https://bdu.fstec.ru/vul/2024-06109" type="self" id="BDU:2024-06109" title="BDU:2024-06109" />
			<reference href="https://bdu.fstec.ru/vul/2024-06111" type="self" id="BDU:2024-06111" title="BDU:2024-06111" />
			<reference href="https://bdu.fstec.ru/vul/2024-06112" type="self" id="BDU:2024-06112" title="BDU:2024-06112" />
			<reference href="https://bdu.fstec.ru/vul/2024-06115" type="self" id="BDU:2024-06115" title="BDU:2024-06115" />
			<reference href="https://bdu.fstec.ru/vul/2024-06067" type="self" id="BDU:2024-06067" title="BDU:2024-06067" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="127.0.6533.88" release="1.el7" arch="x86_64" src="">
					<filename>chromium-0:127.0.6533.88-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240807-10</id>
		<issued date="2024-08-07" />
		<updated date="2024-08-07" />
		<title>Множественные уязвимости bind </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в bind</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-bind-cve-2024-4076-cve-2024-1975-cve-2024-1737-cve-2024-0760/</description>
               <solution>
                    Запретить использование в ОС пакета BIND
                или
                    Установить обновление для пакета(ов) BIND
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-bind-cve-2024-4076-cve-2024-1975-cve-2024-1737-cve-2024-0760/" type="self" id="ROS-20240807-10" title="ROS-20240807-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4076" type="cve" id="CVE-2024-4076" title="CVE-2024-4076" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1975" type="cve" id="CVE-2024-1975" title="CVE-2024-1975" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1737" type="cve" id="CVE-2024-1737" title="CVE-2024-1737" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0760" type="cve" id="CVE-2024-0760" title="CVE-2024-0760" />
			<reference href="https://bdu.fstec.ru/vul/2024-06134" type="self" id="BDU:2024-06134" title="BDU:2024-06134" />
			<reference href="https://bdu.fstec.ru/vul/2024-06188" type="self" id="BDU:2024-06188" title="BDU:2024-06188" />
			<reference href="https://bdu.fstec.ru/vul/2024-05964" type="self" id="BDU:2024-05964" title="BDU:2024-05964" />
			<reference href="https://bdu.fstec.ru/vul/2024-05771" type="self" id="BDU:2024-05771" title="BDU:2024-05771" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="bind" epoch="32" version="9.18.28" release="1.el7" arch="x86_64" src="">
					<filename>bind-32:9.18.28-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240808-01</id>
		<issued date="2024-08-08" />
		<updated date="2024-08-08" />
		<title>Множественные уязвимости gpac</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gpac</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gpac-08-08-24/</description>
               <solution>
                    Запретить использование в ОС пакета gpac
                или
                    Установить обновление для пакета(ов) gpac
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gpac-08-08-24/" type="self" id="ROS-20240808-01" title="ROS-20240808-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0841" type="cve" id="CVE-2023-0841" title="CVE-2023-0841" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46426" type="cve" id="CVE-2023-46426" title="CVE-2023-46426" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1452" type="cve" id="CVE-2023-1452" title="CVE-2023-1452" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1449" type="cve" id="CVE-2023-1449" title="CVE-2023-1449" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1448" type="cve" id="CVE-2023-1448" title="CVE-2023-1448" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38530" type="cve" id="CVE-2022-38530" title="CVE-2022-38530" />
			<reference href="https://bdu.fstec.ru/vul/2024-06196" type="self" id="BDU:2024-06196" title="BDU:2024-06196" />
			<reference href="https://bdu.fstec.ru/vul/2024-06195" type="self" id="BDU:2024-06195" title="BDU:2024-06195" />
			<reference href="https://bdu.fstec.ru/vul/2024-06194" type="self" id="BDU:2024-06194" title="BDU:2024-06194" />
			<reference href="https://bdu.fstec.ru/vul/2024-06193" type="self" id="BDU:2024-06193" title="BDU:2024-06193" />
			<reference href="https://bdu.fstec.ru/vul/2024-06192" type="self" id="BDU:2024-06192" title="BDU:2024-06192" />
			<reference href="https://bdu.fstec.ru/vul/2024-06191" type="self" id="BDU:2024-06191" title="BDU:2024-06191" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gpac" epoch="0" version="2.3.0" release="2.20240126gitf30e0d1.el7" arch="x86_64" src="">
					<filename>gpac-0:2.3.0-2.20240126gitf30e0d1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240808-02</id>
		<issued date="2024-08-08" />
		<updated date="2024-08-08" />
		<title>Уязвимость heimdal-libs </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в heimdal-libs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-heimdal-libs-cve-2022-3116/</description>
               <solution>
                    Запретить использование в ОС пакета heimdal-libs
                или
                    Установить обновление для пакета(ов) heimdal-libs
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-heimdal-libs-cve-2022-3116/" type="self" id="ROS-20240808-02" title="ROS-20240808-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3116" type="cve" id="CVE-2022-3116" title="CVE-2022-3116" />
			<reference href="https://bdu.fstec.ru/vul/2024-06189" type="self" id="BDU:2024-06189" title="BDU:2024-06189" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="heimdal-libs" epoch="0" version="7.8.0" release="5.el7.3" arch="x86_64" src="">
					<filename>heimdal-libs-0:7.8.0-5.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240808-03</id>
		<issued date="2024-08-08" />
		<updated date="2024-08-08" />
		<title>Уязвимость nodejs </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nodejs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-cve-2024-22019/</description>
               <solution>
                    Запретить использование в ОС пакета nodejs
                или
                    Установить обновление для пакета(ов) nodejs
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-cve-2024-22019/" type="self" id="ROS-20240808-03" title="ROS-20240808-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22019" type="cve" id="CVE-2024-22019" title="CVE-2024-22019" />
			<reference href="https://bdu.fstec.ru/vul/2024-02798" type="self" id="BDU:2024-02798" title="BDU:2024-02798" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs" epoch="1" version="18.20.1" release="1.el7" arch="x86_64" src="">
					<filename>nodejs-1:18.20.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240808-04</id>
		<issued date="2024-08-08" />
		<updated date="2024-08-08" />
		<title>Уязвимость php-pear-CAS </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в php-pear-CAS</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-pear-cas-cve-2022-39369/</description>
               <solution>
                    Запретить использование в ОС пакета php-pear-CAS
                или
                    Установить обновление для пакета(ов) php-pear-CAS
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-pear-cas-cve-2022-39369/" type="self" id="ROS-20240808-04" title="ROS-20240808-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39369" type="cve" id="CVE-2022-39369" title="CVE-2022-39369" />
			<reference href="https://bdu.fstec.ru/vul/2024-06190" type="self" id="BDU:2024-06190" title="BDU:2024-06190" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php-pear-CAS" epoch="0" version="1.6.1" release="1.el7" arch="noarch" src="">
					<filename>php-pear-CAS-0:1.6.1-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240812-01</id>
		<issued date="2024-08-12" />
		<updated date="2024-08-12" />
		<title>Уязвимость heimdal-libs </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в heimdal-libs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-heimdal-libs-cve-2022-41916/</description>
               <solution>
                    Запретить использование в ОС пакета heimdal-libs
                или
                    Установить обновление для пакета(ов) heimdal-libs
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-heimdal-libs-cve-2022-41916/" type="self" id="ROS-20240812-01" title="ROS-20240812-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916" type="cve" id="CVE-2022-41916" title="CVE-2022-41916" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="heimdal-libs" epoch="0" version="7.8.0" release="5.el7.3" arch="x86_64" src="">
					<filename>heimdal-libs-0:7.8.0-5.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240812-02</id>
		<issued date="2024-08-12" />
		<updated date="2024-08-12" />
		<title>Уязвимость glpi-plugin-formcreator </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в glpi-plugin-formcreator</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-plugin-formcreator-cve-2023-33971/</description>
               <solution>
                    Запретить использование в ОС пакета glpi-plugin-formcreator
                или
                    Установить обновление для пакета(ов) glpi-plugin-formcreator
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-plugin-formcreator-cve-2023-33971/" type="self" id="ROS-20240812-02" title="ROS-20240812-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33971" type="cve" id="CVE-2023-33971" title="CVE-2023-33971" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi-plugin-formcreator" epoch="0" version="2.13.6" release="1.el7" arch="noarch" src="">
					<filename>glpi-plugin-formcreator-0:2.13.6-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240812-03</id>
		<issued date="2024-08-12" />
		<updated date="2024-08-12" />
		<title>Уязвимость glpi-agent </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в glpi-agent</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-agent-cve-2023-34254/</description>
               <solution>
                    Запретить использование в ОС пакета Glpi-agent
                или
                    Установить обновление для пакета(ов) Glpi-agent
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-agent-cve-2023-34254/" type="self" id="ROS-20240812-03" title="ROS-20240812-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34254" type="cve" id="CVE-2023-34254" title="CVE-2023-34254" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi-agent" epoch="0" version="1.5" release="1.el7" arch="noarch" src="">
					<filename>glpi-agent-0:1.5-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240812-04</id>
		<issued date="2024-08-12" />
		<updated date="2024-08-12" />
		<title>Множественные уязвимости squid </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в squid</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-squid-cve-2023-49286-cve-2023-49288-cve-2023-49285/</description>
               <solution>
                    Запретить использование в ОС пакета squid
                или
                    Установить обновление для пакета(ов) squid
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-squid-cve-2023-49286-cve-2023-49288-cve-2023-49285/" type="self" id="ROS-20240812-04" title="ROS-20240812-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49286" type="cve" id="CVE-2023-49286" title="CVE-2023-49286" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49288" type="cve" id="CVE-2023-49288" title="CVE-2023-49288" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49285" type="cve" id="CVE-2023-49285" title="CVE-2023-49285" />
			<reference href="https://bdu.fstec.ru/vul/2023-08580" type="self" id="BDU:2023-08580" title="BDU:2023-08580" />
			<reference href="https://bdu.fstec.ru/vul/2023-09004" type="self" id="BDU:2023-09004" title="BDU:2023-09004" />
			<reference href="https://bdu.fstec.ru/vul/2023-08580" type="self" id="BDU:2023-08580" title="BDU:2023-08580" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="squid" epoch="7" version="6.5" release="1.el7" arch="x86_64" src="">
					<filename>squid-7:6.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240812-05</id>
		<issued date="2024-08-12" />
		<updated date="2024-08-12" />
		<title>Уязвимость squid </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в squid</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-squid-cve-2023-50269/</description>
               <solution>
                    Запретить использование в ОС пакета squid
                или
                    Установить обновление для пакета(ов) squid
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-squid-cve-2023-50269/" type="self" id="ROS-20240812-05" title="ROS-20240812-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50269" type="cve" id="CVE-2023-50269" title="CVE-2023-50269" />
			<reference href="https://bdu.fstec.ru/vul/2023-08827" type="self" id="BDU:2023-08827" title="BDU:2023-08827" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="squid" epoch="7" version="6.6" release="1.el7" arch="x86_64" src="">
					<filename>squid-7:6.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240812-06</id>
		<issued date="2024-08-12" />
		<updated date="2024-08-12" />
		<title>Множественные уязвимости glpi</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-glpi-12-08-24/</description>
               <solution>
                    Запретить использование в ОС пакета glpi
                или
                    Установить обновление для пакета(ов) glpi
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-glpi-12-08-24/" type="self" id="ROS-20240812-06" title="ROS-20240812-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34107" type="cve" id="CVE-2023-34107" title="CVE-2023-34107" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34244" type="cve" id="CVE-2023-34244" title="CVE-2023-34244" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35924" type="cve" id="CVE-2023-35924" title="CVE-2023-35924" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35939" type="cve" id="CVE-2023-35939" title="CVE-2023-35939" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35940" type="cve" id="CVE-2023-35940" title="CVE-2023-35940" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36808" type="cve" id="CVE-2023-36808" title="CVE-2023-36808" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34106" type="cve" id="CVE-2023-34106" title="CVE-2023-34106" />
			<reference href="https://bdu.fstec.ru/vul/2023-04593" type="self" id="BDU:2023-04593" title="BDU:2023-04593" />
			<reference href="https://bdu.fstec.ru/vul/2023-04090" type="self" id="BDU:2023-04090" title="BDU:2023-04090" />
			<reference href="https://bdu.fstec.ru/vul/2023-04089" type="self" id="BDU:2023-04089" title="BDU:2023-04089" />
			<reference href="https://bdu.fstec.ru/vul/2023-04591" type="self" id="BDU:2023-04591" title="BDU:2023-04591" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi" epoch="0" version="10.0.10" release="1.el7" arch="noarch" src="">
					<filename>glpi-0:10.0.10-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240812-07</id>
		<issued date="2024-08-12" />
		<updated date="2024-08-12" />
		<title>Уязвимость squid </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в squid</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-squid-cve-2024-25617/</description>
               <solution>
                    Запретить использование в ОС пакета squid
                или
                    Установить обновление для пакета(ов) squid
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-squid-cve-2024-25617/" type="self" id="ROS-20240812-07" title="ROS-20240812-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25617" type="cve" id="CVE-2024-25617" title="CVE-2024-25617" />
			<reference href="https://bdu.fstec.ru/vul/2024-02844" type="self" id="BDU:2024-02844" title="BDU:2024-02844" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="squid" epoch="7" version="6.5" release="1.el7" arch="x86_64" src="">
					<filename>squid-7:6.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240812-08</id>
		<issued date="2024-08-12" />
		<updated date="2024-08-12" />
		<title>Уязвимость nodejs </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nodejs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-cve-2024-21892/</description>
               <solution>
                    Запретить использование в ОС пакета nodejs
                или
                    Установить обновление для пакета(ов) nodejs
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-cve-2024-21892/" type="self" id="ROS-20240812-08" title="ROS-20240812-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21892" type="cve" id="CVE-2024-21892" title="CVE-2024-21892" />
			<reference href="https://bdu.fstec.ru/vul/2024-01672" type="self" id="BDU:2024-01672" title="BDU:2024-01672" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs" epoch="1" version="18.19.1" release="1.el7" arch="x86_64" src="">
					<filename>nodejs-1:18.19.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240812-09</id>
		<issued date="2024-08-12" />
		<updated date="2024-08-12" />
		<title>Уязвимость squid </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в squid</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-squid-cve-2024-25111/</description>
               <solution>
                    Запретить использование в ОС пакета squid
                или
                    Установить обновление для пакета(ов) squid
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-squid-cve-2024-25111/" type="self" id="ROS-20240812-09" title="ROS-20240812-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25111" type="cve" id="CVE-2024-25111" title="CVE-2024-25111" />
			<reference href="https://bdu.fstec.ru/vul/2024-02061" type="self" id="BDU:2024-02061" title="BDU:2024-02061" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="squid" epoch="7" version="6.10" release="1.el7" arch="x86_64" src="">
					<filename>squid-7:6.10-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240812-10</id>
		<issued date="2024-08-12" />
		<updated date="2024-08-12" />
		<title>Уязвимость gpac </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gpac</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gpac-cve-2023-46427/</description>
               <solution>
                    Запретить использование в ОС пакета gpac
                или
                    Установить обновление для пакета(ов) gpac
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gpac-cve-2023-46427/" type="self" id="ROS-20240812-10" title="ROS-20240812-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46427" type="cve" id="CVE-2023-46427" title="CVE-2023-46427" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gpac" epoch="0" version="2.3.0" release="2.20240126gitf30e0d1.el7" arch="x86_64" src="">
					<filename>gpac-0:2.3.0-2.20240126gitf30e0d1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240812-11</id>
		<issued date="2024-08-12" />
		<updated date="2024-08-12" />
		<title>Уязвимость glpi-agent </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в glpi-agent</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-agent-cve-2024-28241/</description>
               <solution>
                    Запретить использование в ОС пакета glpi-agent
                или
                    Установить обновление для пакета(ов) glpi-agent
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-agent-cve-2024-28241/" type="self" id="ROS-20240812-11" title="ROS-20240812-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28241" type="cve" id="CVE-2024-28241" title="CVE-2024-28241" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi-agent" epoch="0" version="1.8" release="1.el7" arch="noarch" src="">
					<filename>glpi-agent-0:1.8-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240812-12</id>
		<issued date="2024-08-12" />
		<updated date="2024-08-12" />
		<title>Уязвимость glpi </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2024-29889/</description>
               <solution>
                    Запретить использование в ОС пакета glpi
                или
                    Установить обновление для пакета(ов) glpi
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2024-29889/" type="self" id="ROS-20240812-12" title="ROS-20240812-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29889" type="cve" id="CVE-2024-29889" title="CVE-2024-29889" />
			<reference href="https://bdu.fstec.ru/vul/2024-03309" type="self" id="BDU:2024-03309" title="BDU:2024-03309" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi" epoch="0" version="10.0.15" release="3.el7" arch="noarch" src="">
					<filename>glpi-0:10.0.15-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240812-13</id>
		<issued date="2024-08-12" />
		<updated date="2024-08-12" />
		<title>Множественные уязвимости glpi</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-glpi-12-08-24-1/</description>
               <solution>
                    Запретить использование в ОС пакета glpi
                или
                    Установить обновление для пакета(ов) glpi
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-glpi-12-08-24-1/" type="self" id="ROS-20240812-13" title="ROS-20240812-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23645" type="cve" id="CVE-2024-23645" title="CVE-2024-23645" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51446" type="cve" id="CVE-2023-51446" title="CVE-2023-51446" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27914" type="cve" id="CVE-2024-27914" title="CVE-2024-27914" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27098" type="cve" id="CVE-2024-27098" title="CVE-2024-27098" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27096" type="cve" id="CVE-2024-27096" title="CVE-2024-27096" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27937" type="cve" id="CVE-2024-27937" title="CVE-2024-27937" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27930" type="cve" id="CVE-2024-27930" title="CVE-2024-27930" />
			<reference href="https://bdu.fstec.ru/vul/2024-02142" type="self" id="BDU:2024-02142" title="BDU:2024-02142" />
			<reference href="https://bdu.fstec.ru/vul/2024-02268" type="self" id="BDU:2024-02268" title="BDU:2024-02268" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi" epoch="0" version="10.0.13" release="1.el7" arch="noarch" src="">
					<filename>glpi-0:10.0.13-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240812-14</id>
		<issued date="2024-08-12" />
		<updated date="2024-08-12" />
		<title>Уязвимость curl </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2024-6197/</description>
               <solution>
                    Запретить использование в ОС пакета curl
                или
                    Установить обновление для пакета(ов) curl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2024-6197/" type="self" id="ROS-20240812-14" title="ROS-20240812-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6197" type="cve" id="CVE-2024-6197" title="CVE-2024-6197" />
			<reference href="https://bdu.fstec.ru/vul/2024-06023" type="self" id="BDU:2024-06023" title="BDU:2024-06023" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="curl" epoch="0" version="7.85.0" release="20.el7.3" arch="x86_64" src="">
					<filename>curl-0:7.85.0-20.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240812-15</id>
		<issued date="2024-08-12" />
		<updated date="2024-08-12" />
		<title>Множественные уязвимости httpd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в httpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-httpd-cve-2024-39884-cve-2024-40725-cve-2024-39573/</description>
               <solution>
                    Запретить использование в ОС пакета httpd
                или
                    Установить обновление для пакета(ов) httpd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-httpd-cve-2024-39884-cve-2024-40725-cve-2024-39573/" type="self" id="ROS-20240812-15" title="ROS-20240812-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39884" type="cve" id="CVE-2024-39884" title="CVE-2024-39884" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40725" type="cve" id="CVE-2024-40725" title="CVE-2024-40725" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39573" type="cve" id="CVE-2024-39573" title="CVE-2024-39573" />
			<reference href="https://bdu.fstec.ru/vul/2024-06280" type="self" id="BDU:2024-06280" title="BDU:2024-06280" />
			<reference href="https://bdu.fstec.ru/vul/2024-05741" type="self" id="BDU:2024-05741" title="BDU:2024-05741" />
			<reference href="https://bdu.fstec.ru/vul/2024-05631" type="self" id="BDU:2024-05631" title="BDU:2024-05631" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="httpd" epoch="0" version="2.4.62" release="1.el7" arch="x86_64" src="">
					<filename>httpd-0:2.4.62-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240812-16</id>
		<issued date="2024-08-12" />
		<updated date="2024-08-13" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-12-08-24/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-12-08-24/" type="self" id="ROS-20240812-16" title="ROS-20240812-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45871" type="cve" id="CVE-2023-45871" title="CVE-2023-45871" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4921" type="cve" id="CVE-2023-4921" title="CVE-2023-4921" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42755" type="cve" id="CVE-2023-42755" title="CVE-2023-42755" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3344" type="cve" id="CVE-2022-3344" title="CVE-2022-3344" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782" type="cve" id="CVE-2023-51782" title="CVE-2023-51782" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781" type="cve" id="CVE-2023-51781" title="CVE-2023-51781" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780" type="cve" id="CVE-2023-51780" title="CVE-2023-51780" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51779" type="cve" id="CVE-2023-51779" title="CVE-2023-51779" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6622" type="cve" id="CVE-2023-6622" title="CVE-2023-6622" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817" type="cve" id="CVE-2023-6817" title="CVE-2023-6817" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6176" type="cve" id="CVE-2023-6176" title="CVE-2023-6176" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1192" type="cve" id="CVE-2023-1192" title="CVE-2023-1192" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1193" type="cve" id="CVE-2023-1193" title="CVE-2023-1193" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178" type="cve" id="CVE-2023-5178" title="CVE-2023-5178" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717" type="cve" id="CVE-2023-5717" title="CVE-2023-5717" />
			<reference href="https://bdu.fstec.ru/vul/2023-06999" type="self" id="BDU:2023-06999" title="BDU:2023-06999" />
			<reference href="https://bdu.fstec.ru/vul/2023-05783" type="self" id="BDU:2023-05783" title="BDU:2023-05783" />
			<reference href="https://bdu.fstec.ru/vul/2023-06161" type="self" id="BDU:2023-06161" title="BDU:2023-06161" />
			<reference href="https://bdu.fstec.ru/vul/2023-01299" type="self" id="BDU:2023-01299" title="BDU:2023-01299" />
			<reference href="https://bdu.fstec.ru/vul/2024-00101" type="self" id="BDU:2024-00101" title="BDU:2024-00101" />
			<reference href="https://bdu.fstec.ru/vul/2024-00102" type="self" id="BDU:2024-00102" title="BDU:2024-00102" />
			<reference href="https://bdu.fstec.ru/vul/2024-00104" type="self" id="BDU:2024-00104" title="BDU:2024-00104" />
			<reference href="https://bdu.fstec.ru/vul/2024-00105" type="self" id="BDU:2024-00105" title="BDU:2024-00105" />
			<reference href="https://bdu.fstec.ru/vul/2023-08636" type="self" id="BDU:2023-08636" title="BDU:2023-08636" />
			<reference href="https://bdu.fstec.ru/vul/2023-08958" type="self" id="BDU:2023-08958" title="BDU:2023-08958" />
			<reference href="https://bdu.fstec.ru/vul/2023-08129" type="self" id="BDU:2023-08129" title="BDU:2023-08129" />
			<reference href="https://bdu.fstec.ru/vul/2023-01276" type="self" id="BDU:2023-01276" title="BDU:2023-01276" />
			<reference href="https://bdu.fstec.ru/vul/2023-01277" type="self" id="BDU:2023-01277" title="BDU:2023-01277" />
			<reference href="https://bdu.fstec.ru/vul/2023-06750" type="self" id="BDU:2023-06750" title="BDU:2023-06750" />
			<reference href="https://bdu.fstec.ru/vul/2023-07316" type="self" id="BDU:2023-07316" title="BDU:2023-07316" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240813-01</id>
		<issued date="2024-08-13" />
		<updated date="2024-08-13" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-13-08-24/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-13-08-24/" type="self" id="ROS-20240813-01" title="ROS-20240813-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26584" type="cve" id="CVE-2024-26584" title="CVE-2024-26584" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52433" type="cve" id="CVE-2023-52433" title="CVE-2023-52433" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52434" type="cve" id="CVE-2023-52434" title="CVE-2023-52434" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26581" type="cve" id="CVE-2024-26581" title="CVE-2024-26581" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435" type="cve" id="CVE-2023-52435" title="CVE-2023-52435" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52436" type="cve" id="CVE-2023-52436" title="CVE-2023-52436" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52438" type="cve" id="CVE-2023-52438" title="CVE-2023-52438" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52439" type="cve" id="CVE-2023-52439" title="CVE-2023-52439" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52440" type="cve" id="CVE-2023-52440" title="CVE-2023-52440" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52441" type="cve" id="CVE-2023-52441" title="CVE-2023-52441" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52442" type="cve" id="CVE-2023-52442" title="CVE-2023-52442" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26583" type="cve" id="CVE-2024-26583" title="CVE-2024-26583" />
			<reference href="https://bdu.fstec.ru/vul/2024-01602" type="self" id="BDU:2024-01602" title="BDU:2024-01602" />
			<reference href="https://bdu.fstec.ru/vul/2024-01588" type="self" id="BDU:2024-01588" title="BDU:2024-01588" />
			<reference href="https://bdu.fstec.ru/vul/2024-01673" type="self" id="BDU:2024-01673" title="BDU:2024-01673" />
			<reference href="https://bdu.fstec.ru/vul/2024-01724" type="self" id="BDU:2024-01724" title="BDU:2024-01724" />
			<reference href="https://bdu.fstec.ru/vul/2024-01977" type="self" id="BDU:2024-01977" title="BDU:2024-01977" />
			<reference href="https://bdu.fstec.ru/vul/2024-03704" type="self" id="BDU:2024-03704" title="BDU:2024-03704" />
			<reference href="https://bdu.fstec.ru/vul/2024-03705" type="self" id="BDU:2024-03705" title="BDU:2024-03705" />
			<reference href="https://bdu.fstec.ru/vul/2024-03706" type="self" id="BDU:2024-03706" title="BDU:2024-03706" />
			<reference href="https://bdu.fstec.ru/vul/2024-01670" type="self" id="BDU:2024-01670" title="BDU:2024-01670" />
			<reference href="https://bdu.fstec.ru/vul/2024-01676" type="self" id="BDU:2024-01676" title="BDU:2024-01676" />
			<reference href="https://bdu.fstec.ru/vul/2024-01629" type="self" id="BDU:2024-01629" title="BDU:2024-01629" />
			<reference href="https://bdu.fstec.ru/vul/2024-01589" type="self" id="BDU:2024-01589" title="BDU:2024-01589" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240813-02</id>
		<issued date="2024-08-13" />
		<updated date="2024-08-13" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-13-08-24-1/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-13-08-24-1/" type="self" id="ROS-20240813-02" title="ROS-20240813-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458" type="cve" id="CVE-2023-52458" title="CVE-2023-52458" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52457" type="cve" id="CVE-2023-52457" title="CVE-2023-52457" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52456" type="cve" id="CVE-2023-52456" title="CVE-2023-52456" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26594" type="cve" id="CVE-2024-26594" title="CVE-2024-26594" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52454" type="cve" id="CVE-2023-52454" title="CVE-2023-52454" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593" type="cve" id="CVE-2024-26593" title="CVE-2024-26593" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26592" type="cve" id="CVE-2024-26592" title="CVE-2024-26592" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26591" type="cve" id="CVE-2024-26591" title="CVE-2024-26591" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26589" type="cve" id="CVE-2024-26589" title="CVE-2024-26589" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26586" type="cve" id="CVE-2024-26586" title="CVE-2024-26586" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52451" type="cve" id="CVE-2023-52451" title="CVE-2023-52451" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52449" type="cve" id="CVE-2023-52449" title="CVE-2023-52449" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52448" type="cve" id="CVE-2023-52448" title="CVE-2023-52448" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447" type="cve" id="CVE-2023-52447" title="CVE-2023-52447" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52445" type="cve" id="CVE-2023-52445" title="CVE-2023-52445" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52444" type="cve" id="CVE-2023-52444" title="CVE-2023-52444" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52443" type="cve" id="CVE-2023-52443" title="CVE-2023-52443" />
			<reference href="https://bdu.fstec.ru/vul/2024-04132" type="self" id="BDU:2024-04132" title="BDU:2024-04132" />
			<reference href="https://bdu.fstec.ru/vul/2024-01833" type="self" id="BDU:2024-01833" title="BDU:2024-01833" />
			<reference href="https://bdu.fstec.ru/vul/2024-01843" type="self" id="BDU:2024-01843" title="BDU:2024-01843" />
			<reference href="https://bdu.fstec.ru/vul/2024-01862" type="self" id="BDU:2024-01862" title="BDU:2024-01862" />
			<reference href="https://bdu.fstec.ru/vul/2024-01860" type="self" id="BDU:2024-01860" title="BDU:2024-01860" />
			<reference href="https://bdu.fstec.ru/vul/2024-01832" type="self" id="BDU:2024-01832" title="BDU:2024-01832" />
			<reference href="https://bdu.fstec.ru/vul/2024-01606" type="self" id="BDU:2024-01606" title="BDU:2024-01606" />
			<reference href="https://bdu.fstec.ru/vul/2024-01844" type="self" id="BDU:2024-01844" title="BDU:2024-01844" />
			<reference href="https://bdu.fstec.ru/vul/2024-01866" type="self" id="BDU:2024-01866" title="BDU:2024-01866" />
			<reference href="https://bdu.fstec.ru/vul/2024-01840" type="self" id="BDU:2024-01840" title="BDU:2024-01840" />
			<reference href="https://bdu.fstec.ru/vul/2024-01852" type="self" id="BDU:2024-01852" title="BDU:2024-01852" />
			<reference href="https://bdu.fstec.ru/vul/2024-01858" type="self" id="BDU:2024-01858" title="BDU:2024-01858" />
			<reference href="https://bdu.fstec.ru/vul/2024-01848" type="self" id="BDU:2024-01848" title="BDU:2024-01848" />
			<reference href="https://bdu.fstec.ru/vul/2024-01851" type="self" id="BDU:2024-01851" title="BDU:2024-01851" />
			<reference href="https://bdu.fstec.ru/vul/2024-01838" type="self" id="BDU:2024-01838" title="BDU:2024-01838" />
			<reference href="https://bdu.fstec.ru/vul/2024-01590" type="self" id="BDU:2024-01590" title="BDU:2024-01590" />
			<reference href="https://bdu.fstec.ru/vul/2024-01867" type="self" id="BDU:2024-01867" title="BDU:2024-01867" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240813-03</id>
		<issued date="2024-08-13" />
		<updated date="2024-08-13" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-13-08-24-2/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-13-08-24-2/" type="self" id="ROS-20240813-03" title="ROS-20240813-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46923" type="cve" id="CVE-2021-46923" title="CVE-2021-46923" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52474" type="cve" id="CVE-2023-52474" title="CVE-2023-52474" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25162" type="cve" id="CVE-2019-25162" title="CVE-2019-25162" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26606" type="cve" id="CVE-2024-26606" title="CVE-2024-26606" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26603" type="cve" id="CVE-2024-26603" title="CVE-2024-26603" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602" type="cve" id="CVE-2024-26602" title="CVE-2024-26602" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601" type="cve" id="CVE-2024-26601" title="CVE-2024-26601" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26600" type="cve" id="CVE-2024-26600" title="CVE-2024-26600" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52470" type="cve" id="CVE-2023-52470" title="CVE-2023-52470" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52469" type="cve" id="CVE-2023-52469" title="CVE-2023-52469" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52467" type="cve" id="CVE-2023-52467" title="CVE-2023-52467" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48626" type="cve" id="CVE-2022-48626" title="CVE-2022-48626" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26598" type="cve" id="CVE-2024-26598" title="CVE-2024-26598" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26597" type="cve" id="CVE-2024-26597" title="CVE-2024-26597" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52464" type="cve" id="CVE-2023-52464" title="CVE-2023-52464" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52463" type="cve" id="CVE-2023-52463" title="CVE-2023-52463" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52462" type="cve" id="CVE-2023-52462" title="CVE-2023-52462" />
			<reference href="https://bdu.fstec.ru/vul/2024-06276" type="self" id="BDU:2024-06276" title="BDU:2024-06276" />
			<reference href="https://bdu.fstec.ru/vul/2024-01694" type="self" id="BDU:2024-01694" title="BDU:2024-01694" />
			<reference href="https://bdu.fstec.ru/vul/2024-01697" type="self" id="BDU:2024-01697" title="BDU:2024-01697" />
			<reference href="https://bdu.fstec.ru/vul/2024-01747" type="self" id="BDU:2024-01747" title="BDU:2024-01747" />
			<reference href="https://bdu.fstec.ru/vul/2024-01854" type="self" id="BDU:2024-01854" title="BDU:2024-01854" />
			<reference href="https://bdu.fstec.ru/vul/2024-01736" type="self" id="BDU:2024-01736" title="BDU:2024-01736" />
			<reference href="https://bdu.fstec.ru/vul/2024-01853" type="self" id="BDU:2024-01853" title="BDU:2024-01853" />
			<reference href="https://bdu.fstec.ru/vul/2024-01863" type="self" id="BDU:2024-01863" title="BDU:2024-01863" />
			<reference href="https://bdu.fstec.ru/vul/2024-01695" type="self" id="BDU:2024-01695" title="BDU:2024-01695" />
			<reference href="https://bdu.fstec.ru/vul/2024-01669" type="self" id="BDU:2024-01669" title="BDU:2024-01669" />
			<reference href="https://bdu.fstec.ru/vul/2024-01667" type="self" id="BDU:2024-01667" title="BDU:2024-01667" />
			<reference href="https://bdu.fstec.ru/vul/2024-01731" type="self" id="BDU:2024-01731" title="BDU:2024-01731" />
			<reference href="https://bdu.fstec.ru/vul/2024-01834" type="self" id="BDU:2024-01834" title="BDU:2024-01834" />
			<reference href="https://bdu.fstec.ru/vul/2024-01842" type="self" id="BDU:2024-01842" title="BDU:2024-01842" />
			<reference href="https://bdu.fstec.ru/vul/2024-01837" type="self" id="BDU:2024-01837" title="BDU:2024-01837" />
			<reference href="https://bdu.fstec.ru/vul/2024-01849" type="self" id="BDU:2024-01849" title="BDU:2024-01849" />
			<reference href="https://bdu.fstec.ru/vul/2024-01865" type="self" id="BDU:2024-01865" title="BDU:2024-01865" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240813-04</id>
		<issued date="2024-08-13" />
		<updated date="2024-08-13" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-13-08-24-4/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-13-08-24-4/" type="self" id="ROS-20240813-04" title="ROS-20240813-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46931" type="cve" id="CVE-2021-46931" title="CVE-2021-46931" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46930" type="cve" id="CVE-2021-46930" title="CVE-2021-46930" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46929" type="cve" id="CVE-2021-46929" title="CVE-2021-46929" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46928" type="cve" id="CVE-2021-46928" title="CVE-2021-46928" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46927" type="cve" id="CVE-2021-46927" title="CVE-2021-46927" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46926" type="cve" id="CVE-2021-46926" title="CVE-2021-46926" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46925" type="cve" id="CVE-2021-46925" title="CVE-2021-46925" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46924" type="cve" id="CVE-2021-46924" title="CVE-2021-46924" />
			<reference href="https://bdu.fstec.ru/vul/2024-06317" type="self" id="BDU:2024-06317" title="BDU:2024-06317" />
			<reference href="https://bdu.fstec.ru/vul/2024-06316" type="self" id="BDU:2024-06316" title="BDU:2024-06316" />
			<reference href="https://bdu.fstec.ru/vul/2024-06314" type="self" id="BDU:2024-06314" title="BDU:2024-06314" />
			<reference href="https://bdu.fstec.ru/vul/2024-06305" type="self" id="BDU:2024-06305" title="BDU:2024-06305" />
			<reference href="https://bdu.fstec.ru/vul/2024-06300" type="self" id="BDU:2024-06300" title="BDU:2024-06300" />
			<reference href="https://bdu.fstec.ru/vul/2024-06298" type="self" id="BDU:2024-06298" title="BDU:2024-06298" />
			<reference href="https://bdu.fstec.ru/vul/2024-06294" type="self" id="BDU:2024-06294" title="BDU:2024-06294" />
			<reference href="https://bdu.fstec.ru/vul/2024-06290" type="self" id="BDU:2024-06290" title="BDU:2024-06290" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240814-01</id>
		<issued date="2024-08-14" />
		<updated date="2024-08-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-6040/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-6040/" type="self" id="ROS-20240814-01" title="ROS-20240814-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6040" type="cve" id="CVE-2023-6040" title="CVE-2023-6040" />
			<reference href="https://bdu.fstec.ru/vul/2024-00474" type="self" id="BDU:2024-00474" title="BDU:2024-00474" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.20" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.20-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240814-02</id>
		<issued date="2024-08-14" />
		<updated date="2024-08-14" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-14-08-24-1/</description>
               <solution>Установить обновление для пакета(ов) linux_kernel</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-14-08-24-1/" type="self" id="ROS-20240814-02" title="ROS-20240814-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429" type="cve" id="CVE-2023-52429" title="CVE-2023-52429" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46932" type="cve" id="CVE-2021-46932" title="CVE-2021-46932" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46933" type="cve" id="CVE-2021-46933" title="CVE-2021-46933" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46934" type="cve" id="CVE-2021-46934" title="CVE-2021-46934" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46935" type="cve" id="CVE-2021-46935" title="CVE-2021-46935" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46936" type="cve" id="CVE-2021-46936" title="CVE-2021-46936" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46937" type="cve" id="CVE-2021-46937" title="CVE-2021-46937" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46343" type="cve" id="CVE-2023-46343" title="CVE-2023-46343" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961" type="cve" id="CVE-2024-26961" title="CVE-2024-26961" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=LVC-2023-00018" type="cve" id="LVC-2023-00018" title="LVC-2023-00018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6915" type="cve" id="CVE-2023-6915" title="CVE-2023-6915" />
			<reference href="https://bdu.fstec.ru/vul/2024-06349" type="self" id="BDU:2024-06349" title="BDU:2024-06349" />
			<reference href="https://bdu.fstec.ru/vul/2024-06348" type="self" id="BDU:2024-06348" title="BDU:2024-06348" />
			<reference href="https://bdu.fstec.ru/vul/2024-06347" type="self" id="BDU:2024-06347" title="BDU:2024-06347" />
			<reference href="https://bdu.fstec.ru/vul/2024-06346" type="self" id="BDU:2024-06346" title="BDU:2024-06346" />
			<reference href="https://bdu.fstec.ru/vul/2024-06345" type="self" id="BDU:2024-06345" title="BDU:2024-06345" />
			<reference href="https://bdu.fstec.ru/vul/2024-03687" type="self" id="BDU:2024-03687" title="BDU:2024-03687" />
			<reference href="https://bdu.fstec.ru/vul/2024-06286" type="self" id="BDU:2024-06286" title="BDU:2024-06286" />
			<reference href="https://bdu.fstec.ru/vul/2024-00865" type="self" id="BDU:2024-00865" title="BDU:2024-00865" />
			<reference href="https://bdu.fstec.ru/vul/2024-03671" type="self" id="BDU:2024-03671" title="BDU:2024-03671" />
			<reference href="https://bdu.fstec.ru/vul/2024-04244" type="self" id="BDU:2024-04244" title="BDU:2024-04244" />
			<reference href="https://bdu.fstec.ru/vul/2024-00580" type="self" id="BDU:2024-00580" title="BDU:2024-00580" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240814-03</id>
		<issued date="2024-08-14" />
		<updated date="2024-08-14" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-14-08-24-2/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-14-08-24-2/" type="self" id="ROS-20240814-03" title="ROS-20240814-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48671" type="cve" id="CVE-2022-48671" title="CVE-2022-48671" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48672" type="cve" id="CVE-2022-48672" title="CVE-2022-48672" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48674" type="cve" id="CVE-2022-48674" title="CVE-2022-48674" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48686" type="cve" id="CVE-2022-48686" title="CVE-2022-48686" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48687" type="cve" id="CVE-2022-48687" title="CVE-2022-48687" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48688" type="cve" id="CVE-2022-48688" title="CVE-2022-48688" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48689" type="cve" id="CVE-2022-48689" title="CVE-2022-48689" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48691" type="cve" id="CVE-2022-48691" title="CVE-2022-48691" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48692" type="cve" id="CVE-2022-48692" title="CVE-2022-48692" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48693" type="cve" id="CVE-2022-48693" title="CVE-2022-48693" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48694" type="cve" id="CVE-2022-48694" title="CVE-2022-48694" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48675" type="cve" id="CVE-2022-48675" title="CVE-2022-48675" />
			<reference href="https://bdu.fstec.ru/vul/2024-06344" type="self" id="BDU:2024-06344" title="BDU:2024-06344" />
			<reference href="https://bdu.fstec.ru/vul/2024-04572" type="self" id="BDU:2024-04572" title="BDU:2024-04572" />
			<reference href="https://bdu.fstec.ru/vul/2024-04573" type="self" id="BDU:2024-04573" title="BDU:2024-04573" />
			<reference href="https://bdu.fstec.ru/vul/2024-04574" type="self" id="BDU:2024-04574" title="BDU:2024-04574" />
			<reference href="https://bdu.fstec.ru/vul/2024-06343" type="self" id="BDU:2024-06343" title="BDU:2024-06343" />
			<reference href="https://bdu.fstec.ru/vul/2024-06342" type="self" id="BDU:2024-06342" title="BDU:2024-06342" />
			<reference href="https://bdu.fstec.ru/vul/2024-04586" type="self" id="BDU:2024-04586" title="BDU:2024-04586" />
			<reference href="https://bdu.fstec.ru/vul/2024-06341" type="self" id="BDU:2024-06341" title="BDU:2024-06341" />
			<reference href="https://bdu.fstec.ru/vul/2024-06340" type="self" id="BDU:2024-06340" title="BDU:2024-06340" />
			<reference href="https://bdu.fstec.ru/vul/2024-06339" type="self" id="BDU:2024-06339" title="BDU:2024-06339" />
			<reference href="https://bdu.fstec.ru/vul/2024-04575" type="self" id="BDU:2024-04575" title="BDU:2024-04575" />
			<reference href="https://bdu.fstec.ru/vul/2024-06338" type="self" id="BDU:2024-06338" title="BDU:2024-06338" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240814-04</id>
		<issued date="2024-08-14" />
		<updated date="2024-08-14" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-14-08-24-4/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-14-08-24-4/" type="self" id="ROS-20240814-04" title="ROS-20240814-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48655" type="cve" id="CVE-2022-48655" title="CVE-2022-48655" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48654" type="cve" id="CVE-2022-48654" title="CVE-2022-48654" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48651" type="cve" id="CVE-2022-48651" title="CVE-2022-48651" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48657" type="cve" id="CVE-2022-48657" title="CVE-2022-48657" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48658" type="cve" id="CVE-2022-48658" title="CVE-2022-48658" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48659" type="cve" id="CVE-2022-48659" title="CVE-2022-48659" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48660" type="cve" id="CVE-2022-48660" title="CVE-2022-48660" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48661" type="cve" id="CVE-2022-48661" title="CVE-2022-48661" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48662" type="cve" id="CVE-2022-48662" title="CVE-2022-48662" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48656" type="cve" id="CVE-2022-48656" title="CVE-2022-48656" />
			<reference href="https://bdu.fstec.ru/vul/2024-03711" type="self" id="BDU:2024-03711" title="BDU:2024-03711" />
			<reference href="https://bdu.fstec.ru/vul/2024-06337" type="self" id="BDU:2024-06337" title="BDU:2024-06337" />
			<reference href="https://bdu.fstec.ru/vul/2024-06336" type="self" id="BDU:2024-06336" title="BDU:2024-06336" />
			<reference href="https://bdu.fstec.ru/vul/2024-04235" type="self" id="BDU:2024-04235" title="BDU:2024-04235" />
			<reference href="https://bdu.fstec.ru/vul/2024-03710" type="self" id="BDU:2024-03710" title="BDU:2024-03710" />
			<reference href="https://bdu.fstec.ru/vul/2024-06284" type="self" id="BDU:2024-06284" title="BDU:2024-06284" />
			<reference href="https://bdu.fstec.ru/vul/2024-06335" type="self" id="BDU:2024-06335" title="BDU:2024-06335" />
			<reference href="https://bdu.fstec.ru/vul/2024-06310" type="self" id="BDU:2024-06310" title="BDU:2024-06310" />
			<reference href="https://bdu.fstec.ru/vul/2024-03709" type="self" id="BDU:2024-03709" title="BDU:2024-03709" />
			<reference href="https://bdu.fstec.ru/vul/2024-06320" type="self" id="BDU:2024-06320" title="BDU:2024-06320" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240814-05</id>
		<issued date="2024-08-14" />
		<updated date="2024-08-14" />
		<title>Множественные уязвимости firefox</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-14-08-24/</description>
               <solution>
                    Запретить использование в ОС пакета firefox
                или
                    Установить обновление для пакета(ов) firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-14-08-24/" type="self" id="ROS-20240814-05" title="ROS-20240814-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1546" type="cve" id="CVE-2024-1546" title="CVE-2024-1546" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1553" type="cve" id="CVE-2024-1553" title="CVE-2024-1553" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3864" type="cve" id="CVE-2024-3864" title="CVE-2024-3864" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688" type="cve" id="CVE-2024-5688" title="CVE-2024-5688" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690" type="cve" id="CVE-2024-5690" title="CVE-2024-5690" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691" type="cve" id="CVE-2024-5691" title="CVE-2024-5691" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5692" type="cve" id="CVE-2024-5692" title="CVE-2024-5692" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693" type="cve" id="CVE-2024-5693" title="CVE-2024-5693" />
			<reference href="https://bdu.fstec.ru/vul/2024-01662" type="self" id="BDU:2024-01662" title="BDU:2024-01662" />
			<reference href="https://bdu.fstec.ru/vul/2024-01815" type="self" id="BDU:2024-01815" title="BDU:2024-01815" />
			<reference href="https://bdu.fstec.ru/vul/2024-03796" type="self" id="BDU:2024-03796" title="BDU:2024-03796" />
			<reference href="https://bdu.fstec.ru/vul/2024-05145" type="self" id="BDU:2024-05145" title="BDU:2024-05145" />
			<reference href="https://bdu.fstec.ru/vul/2024-05143" type="self" id="BDU:2024-05143" title="BDU:2024-05143" />
			<reference href="https://bdu.fstec.ru/vul/2024-05144" type="self" id="BDU:2024-05144" title="BDU:2024-05144" />
			<reference href="https://bdu.fstec.ru/vul/2024-05142" type="self" id="BDU:2024-05142" title="BDU:2024-05142" />
			<reference href="https://bdu.fstec.ru/vul/2024-05169" type="self" id="BDU:2024-05169" title="BDU:2024-05169" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.12.0" release="1.el7" arch="x86_64" src="">
					<filename>firefox-0:115.12.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240814-06</id>
		<issued date="2024-08-14" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости thunderbird</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-14-08-245793/</description>
               <solution>
                    Запретить использование в ОС пакета thunderbird
                или
                    Установить обновление для пакета(ов) thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-14-08-245793/" type="self" id="ROS-20240814-06" title="ROS-20240814-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1546" type="cve" id="CVE-2024-1546" title="CVE-2024-1546" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1553" type="cve" id="CVE-2024-1553" title="CVE-2024-1553" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3864" type="cve" id="CVE-2024-3864" title="CVE-2024-3864" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688" type="cve" id="CVE-2024-5688" title="CVE-2024-5688" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690" type="cve" id="CVE-2024-5690" title="CVE-2024-5690" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691" type="cve" id="CVE-2024-5691" title="CVE-2024-5691" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5692" type="cve" id="CVE-2024-5692" title="CVE-2024-5692" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693" type="cve" id="CVE-2024-5693" title="CVE-2024-5693" />
			<reference href="https://bdu.fstec.ru/vul/2024-01662" type="self" id="BDU:2024-01662" title="BDU:2024-01662" />
			<reference href="https://bdu.fstec.ru/vul/2024-01815" type="self" id="BDU:2024-01815" title="BDU:2024-01815" />
			<reference href="https://bdu.fstec.ru/vul/2024-03796" type="self" id="BDU:2024-03796" title="BDU:2024-03796" />
			<reference href="https://bdu.fstec.ru/vul/2024-05145" type="self" id="BDU:2024-05145" title="BDU:2024-05145" />
			<reference href="https://bdu.fstec.ru/vul/2024-05143" type="self" id="BDU:2024-05143" title="BDU:2024-05143" />
			<reference href="https://bdu.fstec.ru/vul/2024-05144" type="self" id="BDU:2024-05144" title="BDU:2024-05144" />
			<reference href="https://bdu.fstec.ru/vul/2024-05142" type="self" id="BDU:2024-05142" title="BDU:2024-05142" />
			<reference href="https://bdu.fstec.ru/vul/2024-05169" type="self" id="BDU:2024-05169" title="BDU:2024-05169" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="115.12.1" release="1.el7" arch="x86_64" src="">
					<filename>thunderbird-0:115.12.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240815-01</id>
		<issued date="2024-08-15" />
		<updated date="2024-08-15" />
		<title>Множественные уязвимости glibc </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в glibc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-glibc-cve-2020-27618-cve-2019-25013/</description>
               <solution>
                    Запретить использование в ОС пакета glibc
                или
                    Установить обновление для пакета(ов) glibc
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-glibc-cve-2020-27618-cve-2019-25013/" type="self" id="ROS-20240815-01" title="ROS-20240815-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618" type="cve" id="CVE-2020-27618" title="CVE-2020-27618" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013" type="cve" id="CVE-2019-25013" title="CVE-2019-25013" />
			<reference href="https://bdu.fstec.ru/vul/2021-06406" type="self" id="BDU:2021-06406" title="BDU:2021-06406" />
			<reference href="https://bdu.fstec.ru/vul/2021-03123" type="self" id="BDU:2021-03123" title="BDU:2021-03123" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glibc" epoch="0" version="2.28" release="11.el7" arch="x86_64" src="">
					<filename>glibc-0:2.28-11.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240815-02</id>
		<issued date="2024-08-15" />
		<updated date="2024-08-15" />
		<title>Уязвимость gnupg2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gnupg2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gnupg2-cve-2022-34903/</description>
               <solution>
                    Запретить использование в ОС пакета gnupg2
                или
                    Установить обновление для пакета(ов) gnupg2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gnupg2-cve-2022-34903/" type="self" id="ROS-20240815-02" title="ROS-20240815-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34903" type="cve" id="CVE-2022-34903" title="CVE-2022-34903" />
			<reference href="https://bdu.fstec.ru/vul/2023-03850" type="self" id="BDU:2023-03850" title="BDU:2023-03850" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gnupg2" epoch="0" version="2.2.20" release="3.el7" arch="x86_64" src="">
					<filename>gnupg2-0:2.2.20-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240815-03</id>
		<issued date="2024-08-15" />
		<updated date="2024-08-15" />
		<title>Множественные уязвимости net-snmp </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в net-snmp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-net-snmp-cve-2022-44792-cve-2022-44793/</description>
               <solution>
                    Запретить использование в ОС пакета Net-snmp
                или
                    Установить обновление для пакета(ов) Net-snmp
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-net-snmp-cve-2022-44792-cve-2022-44793/" type="self" id="ROS-20240815-03" title="ROS-20240815-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44792" type="cve" id="CVE-2022-44792" title="CVE-2022-44792" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44793" type="cve" id="CVE-2022-44793" title="CVE-2022-44793" />
			<reference href="https://bdu.fstec.ru/vul/2024-06510" type="self" id="BDU:2024-06510" title="BDU:2024-06510" />
			<reference href="https://bdu.fstec.ru/vul/2024-06511" type="self" id="BDU:2024-06511" title="BDU:2024-06511" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="net-snmp" epoch="1" version="5.9.4" release="1.el7" arch="x86_64" src="">
					<filename>net-snmp-1:5.9.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240815-04</id>
		<issued date="2024-08-15" />
		<updated date="2024-08-15" />
		<title>Множественные уязвимости nasm </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nasm</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nasm-cve-2022-46457-cve-2022-46456/</description>
               <solution>
                    Запретить использование в ОС пакета nasm
                или
                    Установить обновление для пакета(ов) nasm
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nasm-cve-2022-46457-cve-2022-46456/" type="self" id="ROS-20240815-04" title="ROS-20240815-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46457" type="cve" id="CVE-2022-46457" title="CVE-2022-46457" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46456" type="cve" id="CVE-2022-46456" title="CVE-2022-46456" />
			<reference href="https://bdu.fstec.ru/vul/2024-06504" type="self" id="BDU:2024-06504" title="BDU:2024-06504" />
			<reference href="https://bdu.fstec.ru/vul/2024-06505" type="self" id="BDU:2024-06505" title="BDU:2024-06505" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nasm" epoch="0" version="2.16.03" release="1.el7" arch="x86_64" src="">
					<filename>nasm-0:2.16.03-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240815-05</id>
		<issued date="2024-08-15" />
		<updated date="2024-08-15" />
		<title>Множественные уязвимости zookeeper</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в zookeeper</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zookeeper-15-08-24/</description>
               <solution>
                    Запретить использование в ОС пакета ZooKeeper
                или
                    Установить обновление для пакета(ов) ZooKeeper
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zookeeper-15-08-24/" type="self" id="ROS-20240815-05" title="ROS-20240815-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23944" type="cve" id="CVE-2024-23944" title="CVE-2024-23944" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0201" type="cve" id="CVE-2019-0201" title="CVE-2019-0201" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8012" type="cve" id="CVE-2018-8012" title="CVE-2018-8012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5637" type="cve" id="CVE-2017-5637" title="CVE-2017-5637" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5017" type="cve" id="CVE-2016-5017" title="CVE-2016-5017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44981" type="cve" id="CVE-2023-44981" title="CVE-2023-44981" />
			<reference href="https://bdu.fstec.ru/vul/2024-06490" type="self" id="BDU:2024-06490" title="BDU:2024-06490" />
			<reference href="https://bdu.fstec.ru/vul/2020-02563" type="self" id="BDU:2020-02563" title="BDU:2020-02563" />
			<reference href="https://bdu.fstec.ru/vul/2019-03811" type="self" id="BDU:2019-03811" title="BDU:2019-03811" />
			<reference href="https://bdu.fstec.ru/vul/2022-04726" type="self" id="BDU:2022-04726" title="BDU:2022-04726" />
			<reference href="https://bdu.fstec.ru/vul/2024-06489" type="self" id="BDU:2024-06489" title="BDU:2024-06489" />
			<reference href="https://bdu.fstec.ru/vul/2023-06799" type="self" id="BDU:2023-06799" title="BDU:2023-06799" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zookeeper" epoch="0" version="3.9.2" release="1.el7" arch="x86_64" src="">
					<filename>zookeeper-0:3.9.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240815-06</id>
		<issued date="2024-08-15" />
		<updated date="2024-08-15" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2024-3302/</description>
               <solution>
                    Запретить использование в ОС пакета firefox
                или
                    Установить обновление для пакета(ов) firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2024-3302/" type="self" id="ROS-20240815-06" title="ROS-20240815-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3302" type="cve" id="CVE-2024-3302" title="CVE-2024-3302" />
			<reference href="https://bdu.fstec.ru/vul/2024-03795" type="self" id="BDU:2024-03795" title="BDU:2024-03795" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.12.0" release="1.el7" arch="x86_64" src="">
					<filename>firefox-0:115.12.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240815-18</id>
		<issued date="2024-08-15" />
		<updated date="2024-12-23" />
		<title>Уязвимость thunderbird </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-thunderbird-cve-2024-33024225/</description>
               <solution>
                    Запретить использование в ОС пакета thunderbird
                или
                    Установить обновление для пакета(ов) thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-thunderbird-cve-2024-33024225/" type="self" id="ROS-20240815-18" title="ROS-20240815-18" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3302" type="cve" id="CVE-2024-3302" title="CVE-2024-3302" />
			<reference href="https://bdu.fstec.ru/vul/2024-03795" type="self" id="BDU:2024-03795" title="BDU:2024-03795" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="115.12.1" release="1.el7" arch="x86_64" src="">
					<filename>thunderbird-0:115.12.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240815-07</id>
		<issued date="2024-08-15" />
		<updated date="2024-08-15" />
		<title>Множественные уязвимости glibc </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в glibc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-glibc-cve-2024-33599-cve-2024-33600-cve-2024-33601-cve-2024-33602/</description>
               <solution>
                    Запретить использование в ОС пакета glibc
                или
                    Установить обновление для пакета(ов) glibc
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-glibc-cve-2024-33599-cve-2024-33600-cve-2024-33601-cve-2024-33602/" type="self" id="ROS-20240815-07" title="ROS-20240815-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599" type="cve" id="CVE-2024-33599" title="CVE-2024-33599" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600" type="cve" id="CVE-2024-33600" title="CVE-2024-33600" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601" type="cve" id="CVE-2024-33601" title="CVE-2024-33601" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602" type="cve" id="CVE-2024-33602" title="CVE-2024-33602" />
			<reference href="https://bdu.fstec.ru/vul/2024-03561" type="self" id="BDU:2024-03561" title="BDU:2024-03561" />
			<reference href="https://bdu.fstec.ru/vul/2024-03562" type="self" id="BDU:2024-03562" title="BDU:2024-03562" />
			<reference href="https://bdu.fstec.ru/vul/2024-03602" type="self" id="BDU:2024-03602" title="BDU:2024-03602" />
			<reference href="https://bdu.fstec.ru/vul/2024-03601" type="self" id="BDU:2024-03601" title="BDU:2024-03601" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glibc" epoch="0" version="2.28" release="11.el7" arch="x86_64" src="">
					<filename>glibc-0:2.28-11.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240815-08</id>
		<issued date="2024-08-15" />
		<updated date="2024-08-15" />
		<title>Множественные уязвимости chromium</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-15-08-24/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-15-08-24/" type="self" id="ROS-20240815-08" title="ROS-20240815-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7532" type="cve" id="CVE-2024-7532" title="CVE-2024-7532" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7550" type="cve" id="CVE-2024-7550" title="CVE-2024-7550" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7534" type="cve" id="CVE-2024-7534" title="CVE-2024-7534" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7535" type="cve" id="CVE-2024-7535" title="CVE-2024-7535" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7536" type="cve" id="CVE-2024-7536" title="CVE-2024-7536" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="127.0.6533.99" release="1.el7" arch="x86_64" src="">
					<filename>chromium-0:127.0.6533.99-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240815-09</id>
		<issued date="2024-08-15" />
		<updated date="2024-08-15" />
		<title>Уязвимость mod_auth_openidc </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в mod_auth_openidc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mod-auth-openidc-cve-2023-28625/</description>
               <solution>
                    Запретить использование в ОС пакета mod_auth_openidc
                или
                    Установить обновление для пакета(ов) mod_auth_openidc
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mod-auth-openidc-cve-2023-28625/" type="self" id="ROS-20240815-09" title="ROS-20240815-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28625" type="cve" id="CVE-2023-28625" title="CVE-2023-28625" />
			<reference href="https://bdu.fstec.ru/vul/2024-06538" type="self" id="BDU:2024-06538" title="BDU:2024-06538" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mod_auth_openidc" epoch="0" version="2.4.2.1" release="2.el7" arch="x86_64" src="">
					<filename>mod_auth_openidc-0:2.4.2.1-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240815-10</id>
		<issued date="2024-08-15" />
		<updated date="2024-08-15" />
		<title>Множественные уязвимости net-snmp</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в net-snmp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-net-snmp/</description>
               <solution>
                    Запретить использование в ОС пакета Net-SNMP
                или
                    Установить обновление для пакета(ов) Net-SNMP
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-net-snmp/" type="self" id="ROS-20240815-10" title="ROS-20240815-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24810" type="cve" id="CVE-2022-24810" title="CVE-2022-24810" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24808" type="cve" id="CVE-2022-24808" title="CVE-2022-24808" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24807" type="cve" id="CVE-2022-24807" title="CVE-2022-24807" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24806" type="cve" id="CVE-2022-24806" title="CVE-2022-24806" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24809" type="cve" id="CVE-2022-24809" title="CVE-2022-24809" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24805" type="cve" id="CVE-2022-24805" title="CVE-2022-24805" />
			<reference href="https://bdu.fstec.ru/vul/2024-06506" type="self" id="BDU:2024-06506" title="BDU:2024-06506" />
			<reference href="https://bdu.fstec.ru/vul/2024-06507" type="self" id="BDU:2024-06507" title="BDU:2024-06507" />
			<reference href="https://bdu.fstec.ru/vul/2022-04644" type="self" id="BDU:2022-04644" title="BDU:2022-04644" />
			<reference href="https://bdu.fstec.ru/vul/2022-04637" type="self" id="BDU:2022-04637" title="BDU:2022-04637" />
			<reference href="https://bdu.fstec.ru/vul/2024-06508" type="self" id="BDU:2024-06508" title="BDU:2024-06508" />
			<reference href="https://bdu.fstec.ru/vul/2024-06509" type="self" id="BDU:2024-06509" title="BDU:2024-06509" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="net-snmp" epoch="1" version="5.9.4" release="1.el7" arch="x86_64" src="">
					<filename>net-snmp-1:5.9.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240815-11</id>
		<issued date="2024-08-15" />
		<updated date="2024-08-15" />
		<title>Уязвимость postgresql-jdbc </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в postgresql-jdbc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-jdbc-cve-2022-26520/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql-jdbc
                или
                    Установить обновление для пакета(ов) postgresql-jdbc
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-jdbc-cve-2022-26520/" type="self" id="ROS-20240815-11" title="ROS-20240815-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26520" type="cve" id="CVE-2022-26520" title="CVE-2022-26520" />
			<reference href="https://bdu.fstec.ru/vul/2024-06539" type="self" id="BDU:2024-06539" title="BDU:2024-06539" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql-jdbc" epoch="0" version="42.2.29" release="2.el7" arch="noarch" src="">
					<filename>postgresql-jdbc-0:42.2.29-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240815-12</id>
		<issued date="2024-08-15" />
		<updated date="2024-08-15" />
		<title>Уязвимость ghc-aeson </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в ghc-aeson</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ghc-aeson-cve-2022-3433/</description>
               <solution>
                    Запретить использование в ОС пакета ghc-aeson
                или
                    Установить обновление для пакета(ов) ghc-aeson
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ghc-aeson-cve-2022-3433/" type="self" id="ROS-20240815-12" title="ROS-20240815-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3433" type="cve" id="CVE-2022-3433" title="CVE-2022-3433" />
			<reference href="https://bdu.fstec.ru/vul/2024-06542" type="self" id="BDU:2024-06542" title="BDU:2024-06542" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ghc-aeson" epoch="0" version="2.1.0.0" release="2.el7" arch="x86_64" src="">
					<filename>ghc-aeson-0:2.1.0.0-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240815-13</id>
		<issued date="2024-08-15" />
		<updated date="2024-08-15" />
		<title>Множественные уязвимости rubygem-rails-html-sanitizer </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в rubygem-rails-html-sanitizer</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rubygem-rails-html-sanitizer-cve-2022-23519-cve-2022-23518-cve-2022-23517/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-rails-html-sanitizer
                или
                    Установить обновление для пакета(ов) rubygem-rails-html-sanitizer
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rubygem-rails-html-sanitizer-cve-2022-23519-cve-2022-23518-cve-2022-23517/" type="self" id="ROS-20240815-13" title="ROS-20240815-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23519" type="cve" id="CVE-2022-23519" title="CVE-2022-23519" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23518" type="cve" id="CVE-2022-23518" title="CVE-2022-23518" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23517" type="cve" id="CVE-2022-23517" title="CVE-2022-23517" />
			<reference href="https://bdu.fstec.ru/vul/2024-06512" type="self" id="BDU:2024-06512" title="BDU:2024-06512" />
			<reference href="https://bdu.fstec.ru/vul/2024-06513" type="self" id="BDU:2024-06513" title="BDU:2024-06513" />
			<reference href="https://bdu.fstec.ru/vul/2024-06514" type="self" id="BDU:2024-06514" title="BDU:2024-06514" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-rails-html-sanitizer" epoch="0" version="1.6.0" release="1.el7" arch="noarch" src="">
					<filename>rubygem-rails-html-sanitizer-0:1.6.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240815-14</id>
		<issued date="2024-08-15" />
		<updated date="2024-08-15" />
		<title>Уязвимость python3 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2023-24329/</description>
               <solution>
                    Запретить использование в ОС пакета python3
                или
                    Установить обновление для пакета(ов) python3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2023-24329/" type="self" id="ROS-20240815-14" title="ROS-20240815-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24329" type="cve" id="CVE-2023-24329" title="CVE-2023-24329" />
			<reference href="https://bdu.fstec.ru/vul/2023-04978" type="self" id="BDU:2023-04978" title="BDU:2023-04978" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3" epoch="0" version="3.8.18" release="1.el7" arch="x86_64" src="">
					<filename>python3-0:3.8.18-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240815-15</id>
		<issued date="2024-08-15" />
		<updated date="2024-08-15" />
		<title>Уязвимость apache-commons-fileupload </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в apache-commons-fileupload</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-commons-fileupload-cve-2023-24998/</description>
               <solution>
                    Запретить использование в ОС пакета apache-commons-fileupload
                или
                    Установить обновление для пакета(ов) apache-commons-fileupload
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-commons-fileupload-cve-2023-24998/" type="self" id="ROS-20240815-15" title="ROS-20240815-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24998" type="cve" id="CVE-2023-24998" title="CVE-2023-24998" />
			<reference href="https://bdu.fstec.ru/vul/2023-02037" type="self" id="BDU:2023-02037" title="BDU:2023-02037" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="apache-commons-fileupload" epoch="0" version="2.0.0~M2" release="1.el7" arch="noarch" src="">
					<filename>apache-commons-fileupload-0:2.0.0~M2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240815-16</id>
		<issued date="2024-08-15" />
		<updated date="2024-08-15" />
		<title>Уязвимость mod_auth_openidc </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в mod_auth_openidc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mod-auth-openidc-cve-2024-24814/</description>
               <solution>
                    Запретить использование в ОС пакета mod_auth_openidc
                или
                    Установить обновление для пакета(ов) mod_auth_openidc
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mod-auth-openidc-cve-2024-24814/" type="self" id="ROS-20240815-16" title="ROS-20240815-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24814" type="cve" id="CVE-2024-24814" title="CVE-2024-24814" />
			<reference href="https://bdu.fstec.ru/vul/2024-02794" type="self" id="BDU:2024-02794" title="BDU:2024-02794" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mod_auth_openidc" epoch="0" version="2.4.2.1" release="3.el7" arch="x86_64" src="">
					<filename>mod_auth_openidc-0:2.4.2.1-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240815-17</id>
		<issued date="2024-08-15" />
		<updated date="2024-08-15" />
		<title>Уязвимость fwupd </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в fwupd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-fwupd-cve-2022-3287/</description>
               <solution>
                    Запретить использование в ОС пакета fwupd
                или
                    Установить обновление для пакета(ов) fwupd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-fwupd-cve-2022-3287/" type="self" id="ROS-20240815-17" title="ROS-20240815-17" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3287" type="cve" id="CVE-2022-3287" title="CVE-2022-3287" />
			<reference href="https://bdu.fstec.ru/vul/2024-06519" type="self" id="BDU:2024-06519" title="BDU:2024-06519" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="fwupd" epoch="0" version="1.8.17" release="1.el7" arch="x86_64" src="">
					<filename>fwupd-0:1.8.17-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240816-01</id>
		<issued date="2024-08-16" />
		<updated date="2024-08-16" />
		<title>Уязвимость portainer-ce </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в portainer-ce</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-portainer-ce-cve-2024-29296/</description>
               <solution>
                    Запретить использование в ОС пакета portainer-ce
                или
                    Установить обновление для пакета(ов) portainer-ce
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-portainer-ce-cve-2024-29296/" type="self" id="ROS-20240816-01" title="ROS-20240816-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29296" type="cve" id="CVE-2024-29296" title="CVE-2024-29296" />
			<reference href="https://bdu.fstec.ru/vul/2024-06543" type="self" id="BDU:2024-06543" title="BDU:2024-06543" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="portainer-ce" epoch="0" version="2.20.2" release="1.el7" arch="x86_64" src="">
					<filename>portainer-ce-0:2.20.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240816-02</id>
		<issued date="2024-08-16" />
		<updated date="2024-08-16" />
		<title>Уязвимость curl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2024-7264/</description>
               <solution>
                    Запретить использование в ОС пакета curl
                или
                    Установить обновление для пакета(ов) curl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2024-7264/" type="self" id="ROS-20240816-02" title="ROS-20240816-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7264" type="cve" id="CVE-2024-7264" title="CVE-2024-7264" />
			<reference href="https://bdu.fstec.ru/vul/2024-05923" type="self" id="BDU:2024-05923" title="BDU:2024-05923" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="curl" epoch="0" version="7.85.0" release="21.el7.3" arch="x86_64" src="">
					<filename>curl-0:7.85.0-21.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240816-13</id>
		<issued date="2024-08-16" />
		<updated date="2024-12-23" />
		<title>Уязвимость zlib </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в zlib</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zlib-cve-2024-72648710/</description>
               <solution>
                    Запретить использование в ОС пакета zlib
                или
                    Установить обновление для пакета(ов) zlib
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zlib-cve-2024-72648710/" type="self" id="ROS-20240816-13" title="ROS-20240816-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7264" type="cve" id="CVE-2024-7264" title="CVE-2024-7264" />
			<reference href="https://bdu.fstec.ru/vul/2024-05923" type="self" id="BDU:2024-05923" title="BDU:2024-05923" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zlib" epoch="0" version="1.2.11" release="18.el7" arch="x86_64" src="">
					<filename>zlib-0:1.2.11-18.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240816-03</id>
		<issued date="2024-08-16" />
		<updated date="2024-08-16" />
		<title>Уязвимость perl-HTTP-Daemon </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в perl-HTTP-Daemon</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-http-daemon-cve-2022-31081/</description>
               <solution>
                    Запретить использование в ОС пакета perl-HTTP-Daemon
                или
                    Установить обновление для пакета(ов) perl-HTTP-Daemon
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-http-daemon-cve-2022-31081/" type="self" id="ROS-20240816-03" title="ROS-20240816-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31081" type="cve" id="CVE-2022-31081" title="CVE-2022-31081" />
			<reference href="https://bdu.fstec.ru/vul/2022-05817" type="self" id="BDU:2022-05817" title="BDU:2022-05817" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="perl-HTTP-Daemon" epoch="0" version="6.16" release="1.el7" arch="noarch" src="">
					<filename>perl-HTTP-Daemon-0:6.16-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240816-04</id>
		<issued date="2024-08-16" />
		<updated date="2024-08-16" />
		<title>Уязвимость openldap </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в openldap</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openldap-cve-2023-2953/</description>
               <solution>
                    Запретить использование в ОС пакета openldap
                или
                    Установить обновление для пакета(ов) openldap
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openldap-cve-2023-2953/" type="self" id="ROS-20240816-04" title="ROS-20240816-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2953" type="cve" id="CVE-2023-2953" title="CVE-2023-2953" />
			<reference href="https://bdu.fstec.ru/vul/2023-04057" type="self" id="BDU:2023-04057" title="BDU:2023-04057" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openldap" epoch="0" version="2.4.55" release="9.el7.3" arch="x86_64" src="">
					<filename>openldap-0:2.4.55-9.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240816-05</id>
		<issued date="2024-08-16" />
		<updated date="2024-08-16" />
		<title>Уязвимость python3-pillow </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-pillow</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-pillow-cve-2023-44271/</description>
               <solution>
                    Запретить использование в ОС пакета python3-pillow
                или
                    Установить обновление для пакета(ов) python3-pillow
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-pillow-cve-2023-44271/" type="self" id="ROS-20240816-05" title="ROS-20240816-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44271" type="cve" id="CVE-2023-44271" title="CVE-2023-44271" />
			<reference href="https://bdu.fstec.ru/vul/2024-06540" type="self" id="BDU:2024-06540" title="BDU:2024-06540" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-pillow" epoch="0" version="9.5.0" release="2.el7" arch="x86_64" src="">
					<filename>python3-pillow-0:9.5.0-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240816-06</id>
		<issued date="2024-08-16" />
		<updated date="2024-08-16" />
		<title>Уязвимость openvpn </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openvpn</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openvpn-cve-2024-28882/</description>
               <solution>
                    Запретить использование в ОС пакета OpenVPN
                или
                    Установить обновление для пакета(ов) OpenVPN
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openvpn-cve-2024-28882/" type="self" id="ROS-20240816-06" title="ROS-20240816-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28882" type="cve" id="CVE-2024-28882" title="CVE-2024-28882" />
			<reference href="https://bdu.fstec.ru/vul/2024-06537" type="self" id="BDU:2024-06537" title="BDU:2024-06537" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openvpn" epoch="0" version="2.6.11" release="1.el7" arch="x86_64" src="">
					<filename>openvpn-0:2.6.11-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240816-07</id>
		<issued date="2024-08-16" />
		<updated date="2024-08-16" />
		<title>Множественные уязвимости chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-cve-2023-7011-cve-2023-7012-cve-2023-7010-cve-2023-4860/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-cve-2023-7011-cve-2023-7012-cve-2023-7010-cve-2023-4860/" type="self" id="ROS-20240816-07" title="ROS-20240816-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7011" type="cve" id="CVE-2023-7011" title="CVE-2023-7011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7012" type="cve" id="CVE-2023-7012" title="CVE-2023-7012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7010" type="cve" id="CVE-2023-7010" title="CVE-2023-7010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4860" type="cve" id="CVE-2023-4860" title="CVE-2023-4860" />
			<reference href="https://bdu.fstec.ru/vul/2024-06515" type="self" id="BDU:2024-06515" title="BDU:2024-06515" />
			<reference href="https://bdu.fstec.ru/vul/2024-06516" type="self" id="BDU:2024-06516" title="BDU:2024-06516" />
			<reference href="https://bdu.fstec.ru/vul/2024-06517" type="self" id="BDU:2024-06517" title="BDU:2024-06517" />
			<reference href="https://bdu.fstec.ru/vul/2024-06518" type="self" id="BDU:2024-06518" title="BDU:2024-06518" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="120.0.6099.224" release="1.el7" arch="x86_64" src="">
					<filename>chromium-0:120.0.6099.224-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240816-08</id>
		<issued date="2024-08-16" />
		<updated date="2024-08-16" />
		<title>Множественные уязвимости php </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в php</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-cve-2023-3247-cve-2023-3823-cve-2023-3824/</description>
               <solution>
                    Запретить использование в ОС пакета PHP
                или
                    Установить обновление для пакета(ов) php
                                        Установка и обновление пакетов PHP до версии 8.Х на РЕД ОС производится по инструкции https://redos.red-soft.ru/base/arm/arm-other/php-8-redos-73/
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-cve-2023-3247-cve-2023-3823-cve-2023-3824/" type="self" id="ROS-20240816-08" title="ROS-20240816-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3247" type="cve" id="CVE-2023-3247" title="CVE-2023-3247" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3823" type="cve" id="CVE-2023-3823" title="CVE-2023-3823" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3824" type="cve" id="CVE-2023-3824" title="CVE-2023-3824" />
			<reference href="https://bdu.fstec.ru/vul/2023-05887" type="self" id="BDU:2023-05887" title="BDU:2023-05887" />
			<reference href="https://bdu.fstec.ru/vul/2023-06656" type="self" id="BDU:2023-06656" title="BDU:2023-06656" />
			<reference href="https://bdu.fstec.ru/vul/2023-06657" type="self" id="BDU:2023-06657" title="BDU:2023-06657" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php" epoch="0" version="8.1.24" release="1.el7" arch="x86_64" src="">
					<filename>php-0:8.1.24-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240816-14</id>
		<issued date="2024-08-16" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости php </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в php</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-cve-2023-3247-cve-2023-3823-cve-2023-38242663/</description>
               <solution>
                    Запретить использование в ОС пакета PHP
                или
                    Установить обновление для пакета(ов) php
                    Установка и обновление пакетов PHP до версии 8.Х на РЕД ОС производится по инструкции https://redos.red-soft.ru/base/arm/arm-other/php-8-redos-73/
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-cve-2023-3247-cve-2023-3823-cve-2023-38242663/" type="self" id="ROS-20240816-14" title="ROS-20240816-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3247" type="cve" id="CVE-2023-3247" title="CVE-2023-3247" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3823" type="cve" id="CVE-2023-3823" title="CVE-2023-3823" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3824" type="cve" id="CVE-2023-3824" title="CVE-2023-3824" />
			<reference href="https://bdu.fstec.ru/vul/2023-05887" type="self" id="BDU:2023-05887" title="BDU:2023-05887" />
			<reference href="https://bdu.fstec.ru/vul/2023-06656" type="self" id="BDU:2023-06656" title="BDU:2023-06656" />
			<reference href="https://bdu.fstec.ru/vul/2023-06657" type="self" id="BDU:2023-06657" title="BDU:2023-06657" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php" epoch="0" version="8.2.20" release="1.el7" arch="x86_64" src="">
					<filename>php-0:8.2.20-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240816-09</id>
		<issued date="2024-08-16" />
		<updated date="2024-08-16" />
		<title>Уязвимость php </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в php</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-cve-2024-2757/</description>
               <solution>
                    Запретить использование в ОС пакета PHP
                или
                    Установить обновление для пакета(ов) PHP
                    Установка и обновление пакетов PHP до версии 8.Х на РЕД ОС производится по инструкции https://redos.red-soft.ru/base/arm/arm-other/php-8-redos-73/
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-cve-2024-2757/" type="self" id="ROS-20240816-09" title="ROS-20240816-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2757" type="cve" id="CVE-2024-2757" title="CVE-2024-2757" />
			<reference href="https://bdu.fstec.ru/vul/2024-03214" type="self" id="BDU:2024-03214" title="BDU:2024-03214" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php" epoch="0" version="8.3.8" release="1.el7" arch="x86_64" src="">
					<filename>php-0:8.3.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240816-10</id>
		<issued date="2024-08-16" />
		<updated date="2024-08-16" />
		<title>Уязвимость php </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в php</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-cve-2024-2756/</description>
               <solution>
                    Запретить использование в ОС пакета php
                или
                    Установить обновление для пакета(ов) php
                    Установка и обновление пакетов PHP до версии 8.Х на РЕД ОС производится по инструкции https://redos.red-soft.ru/base/arm/arm-other/php-8-redos-73/
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-cve-2024-2756/" type="self" id="ROS-20240816-10" title="ROS-20240816-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2756" type="cve" id="CVE-2024-2756" title="CVE-2024-2756" />
			<reference href="https://bdu.fstec.ru/vul/2024-03785" type="self" id="BDU:2024-03785" title="BDU:2024-03785" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php" epoch="0" version="8.1.29" release="1.el7" arch="x86_64" src="">
					<filename>php-0:8.1.29-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240816-15</id>
		<issued date="2024-08-16" />
		<updated date="2024-12-23" />
		<title>Уязвимость php </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в php</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-cve-2024-27562075/</description>
               <solution>
                    Запретить использование в ОС пакета php
                или
                    Установить обновление для пакета(ов) php
                    Установка и обновление пакетов PHP до версии 8.Х на РЕД ОС производится по инструкции https://redos.red-soft.ru/base/arm/arm-other/php-8-redos-73/
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-cve-2024-27562075/" type="self" id="ROS-20240816-15" title="ROS-20240816-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2756" type="cve" id="CVE-2024-2756" title="CVE-2024-2756" />
			<reference href="https://bdu.fstec.ru/vul/2024-03785" type="self" id="BDU:2024-03785" title="BDU:2024-03785" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php" epoch="0" version="8.3.8" release="1.el7" arch="x86_64" src="">
					<filename>php-0:8.3.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240816-11</id>
		<issued date="2024-08-16" />
		<updated date="2024-08-16" />
		<title>Множественные уязвимости php </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в php</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-cve-2024-2408-cve-2024-4577-cve-2024-5585/</description>
               <solution>
                    Запретить использование в ОС пакета php
                или
                    Установить обновление для пакета(ов) php
                    Установка и обновление пакетов PHP до версии 8.Х на РЕД ОС производится по инструкции https://redos.red-soft.ru/base/arm/arm-other/php-8-redos-73/
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-cve-2024-2408-cve-2024-4577-cve-2024-5585/" type="self" id="ROS-20240816-11" title="ROS-20240816-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2408" type="cve" id="CVE-2024-2408" title="CVE-2024-2408" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4577" type="cve" id="CVE-2024-4577" title="CVE-2024-4577" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5585" type="cve" id="CVE-2024-5585" title="CVE-2024-5585" />
			<reference href="https://bdu.fstec.ru/vul/2024-06520" type="self" id="BDU:2024-06520" title="BDU:2024-06520" />
			<reference href="https://bdu.fstec.ru/vul/2024-04432" type="self" id="BDU:2024-04432" title="BDU:2024-04432" />
			<reference href="https://bdu.fstec.ru/vul/2024-05512" type="self" id="BDU:2024-05512" title="BDU:2024-05512" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php" epoch="0" version="8.3.8" release="1.el7" arch="x86_64" src="">
					<filename>php-0:8.3.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240816-16</id>
		<issued date="2024-08-16" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости php </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в php</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-cve-2024-2408-cve-2024-4577-cve-2024-55859767/</description>
               <solution>
                    Запретить использование в ОС пакета php
                или
                    Установить обновление для пакета(ов) php
                    Установка и обновление пакетов PHP до версии 8.Х на РЕД ОС производится по инструкции https://redos.red-soft.ru/base/arm/arm-other/php-8-redos-73/
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-cve-2024-2408-cve-2024-4577-cve-2024-55859767/" type="self" id="ROS-20240816-16" title="ROS-20240816-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2408" type="cve" id="CVE-2024-2408" title="CVE-2024-2408" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4577" type="cve" id="CVE-2024-4577" title="CVE-2024-4577" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5585" type="cve" id="CVE-2024-5585" title="CVE-2024-5585" />
			<reference href="https://bdu.fstec.ru/vul/2024-06520" type="self" id="BDU:2024-06520" title="BDU:2024-06520" />
			<reference href="https://bdu.fstec.ru/vul/2024-04432" type="self" id="BDU:2024-04432" title="BDU:2024-04432" />
			<reference href="https://bdu.fstec.ru/vul/2024-05512" type="self" id="BDU:2024-05512" title="BDU:2024-05512" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php" epoch="0" version="8.1.29" release="1.el7" arch="x86_64" src="">
					<filename>php-0:8.1.29-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240816-12</id>
		<issued date="2024-08-16" />
		<updated date="2024-08-16" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-16-08-24/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-16-08-24/" type="self" id="ROS-20240816-12" title="ROS-20240816-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36897" type="cve" id="CVE-2024-36897" title="CVE-2024-36897" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36905" type="cve" id="CVE-2024-36905" title="CVE-2024-36905" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36902" type="cve" id="CVE-2024-36902" title="CVE-2024-36902" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36967" type="cve" id="CVE-2024-36967" title="CVE-2024-36967" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36969" type="cve" id="CVE-2024-36969" title="CVE-2024-36969" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36965" type="cve" id="CVE-2024-36965" title="CVE-2024-36965" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38662" type="cve" id="CVE-2024-38662" title="CVE-2024-38662" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36288" type="cve" id="CVE-2024-36288" title="CVE-2024-36288" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39480" type="cve" id="CVE-2024-39480" title="CVE-2024-39480" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39476" type="cve" id="CVE-2024-39476" title="CVE-2024-39476" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39493" type="cve" id="CVE-2024-39493" title="CVE-2024-39493" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39489" type="cve" id="CVE-2024-39489" title="CVE-2024-39489" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48791" type="cve" id="CVE-2022-48791" title="CVE-2022-48791" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48796" type="cve" id="CVE-2022-48796" title="CVE-2022-48796" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48793" type="cve" id="CVE-2022-48793" title="CVE-2022-48793" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48840" type="cve" id="CVE-2022-48840" title="CVE-2022-48840" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48846" type="cve" id="CVE-2022-48846" title="CVE-2022-48846" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48844" type="cve" id="CVE-2022-48844" title="CVE-2022-48844" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48850" type="cve" id="CVE-2022-48850" title="CVE-2022-48850" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48849" type="cve" id="CVE-2022-48849" title="CVE-2022-48849" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48847" type="cve" id="CVE-2022-48847" title="CVE-2022-48847" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48851" type="cve" id="CVE-2022-48851" title="CVE-2022-48851" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48857" type="cve" id="CVE-2022-48857" title="CVE-2022-48857" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48856" type="cve" id="CVE-2022-48856" title="CVE-2022-48856" />
			<reference href="https://bdu.fstec.ru/vul/2024-06521" type="self" id="BDU:2024-06521" title="BDU:2024-06521" />
			<reference href="https://bdu.fstec.ru/vul/2024-06522" type="self" id="BDU:2024-06522" title="BDU:2024-06522" />
			<reference href="https://bdu.fstec.ru/vul/2024-04556" type="self" id="BDU:2024-04556" title="BDU:2024-04556" />
			<reference href="https://bdu.fstec.ru/vul/2024-04591" type="self" id="BDU:2024-04591" title="BDU:2024-04591" />
			<reference href="https://bdu.fstec.ru/vul/2024-04564" type="self" id="BDU:2024-04564" title="BDU:2024-04564" />
			<reference href="https://bdu.fstec.ru/vul/2024-04589" type="self" id="BDU:2024-04589" title="BDU:2024-04589" />
			<reference href="https://bdu.fstec.ru/vul/2024-06057" type="self" id="BDU:2024-06057" title="BDU:2024-06057" />
			<reference href="https://bdu.fstec.ru/vul/2024-06053" type="self" id="BDU:2024-06053" title="BDU:2024-06053" />
			<reference href="https://bdu.fstec.ru/vul/2024-06084" type="self" id="BDU:2024-06084" title="BDU:2024-06084" />
			<reference href="https://bdu.fstec.ru/vul/2024-06088" type="self" id="BDU:2024-06088" title="BDU:2024-06088" />
			<reference href="https://bdu.fstec.ru/vul/2024-06523" type="self" id="BDU:2024-06523" title="BDU:2024-06523" />
			<reference href="https://bdu.fstec.ru/vul/2024-06524" type="self" id="BDU:2024-06524" title="BDU:2024-06524" />
			<reference href="https://bdu.fstec.ru/vul/2024-06525" type="self" id="BDU:2024-06525" title="BDU:2024-06525" />
			<reference href="https://bdu.fstec.ru/vul/2024-06526" type="self" id="BDU:2024-06526" title="BDU:2024-06526" />
			<reference href="https://bdu.fstec.ru/vul/2024-06527" type="self" id="BDU:2024-06527" title="BDU:2024-06527" />
			<reference href="https://bdu.fstec.ru/vul/2024-06528" type="self" id="BDU:2024-06528" title="BDU:2024-06528" />
			<reference href="https://bdu.fstec.ru/vul/2024-06529" type="self" id="BDU:2024-06529" title="BDU:2024-06529" />
			<reference href="https://bdu.fstec.ru/vul/2024-06530" type="self" id="BDU:2024-06530" title="BDU:2024-06530" />
			<reference href="https://bdu.fstec.ru/vul/2024-06531" type="self" id="BDU:2024-06531" title="BDU:2024-06531" />
			<reference href="https://bdu.fstec.ru/vul/2024-06532" type="self" id="BDU:2024-06532" title="BDU:2024-06532" />
			<reference href="https://bdu.fstec.ru/vul/2024-06533" type="self" id="BDU:2024-06533" title="BDU:2024-06533" />
			<reference href="https://bdu.fstec.ru/vul/2024-06534" type="self" id="BDU:2024-06534" title="BDU:2024-06534" />
			<reference href="https://bdu.fstec.ru/vul/2024-06535" type="self" id="BDU:2024-06535" title="BDU:2024-06535" />
			<reference href="https://bdu.fstec.ru/vul/2024-06536" type="self" id="BDU:2024-06536" title="BDU:2024-06536" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240819-01</id>
		<issued date="2024-08-19" />
		<updated date="2024-08-20" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-19-08-24/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-19-08-24/" type="self" id="ROS-20240819-01" title="ROS-20240819-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47572" type="cve" id="CVE-2021-47572" title="CVE-2021-47572" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47571" type="cve" id="CVE-2021-47571" title="CVE-2021-47571" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47570" type="cve" id="CVE-2021-47570" title="CVE-2021-47570" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47559" type="cve" id="CVE-2021-47559" title="CVE-2021-47559" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47556" type="cve" id="CVE-2021-47556" title="CVE-2021-47556" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47550" type="cve" id="CVE-2021-47550" title="CVE-2021-47550" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47546" type="cve" id="CVE-2021-47546" title="CVE-2021-47546" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47542" type="cve" id="CVE-2021-47542" title="CVE-2021-47542" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36971" type="cve" id="CVE-2024-36971" title="CVE-2024-36971" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36969" type="cve" id="CVE-2024-36969" title="CVE-2024-36969" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36967" type="cve" id="CVE-2024-36967" title="CVE-2024-36967" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36938" type="cve" id="CVE-2024-36938" title="CVE-2024-36938" />
			<reference href="https://bdu.fstec.ru/vul/2025-04359" type="self" id="BDU:2025-04359" title="BDU:2025-04359" />
			<reference href="https://bdu.fstec.ru/vul/2024-04570" type="self" id="BDU:2024-04570" title="BDU:2024-04570" />
			<reference href="https://bdu.fstec.ru/vul/2025-04457" type="self" id="BDU:2025-04457" title="BDU:2025-04457" />
			<reference href="https://bdu.fstec.ru/vul/2025-14247" type="self" id="BDU:2025-14247" title="BDU:2025-14247" />
			<reference href="https://bdu.fstec.ru/vul/2025-04458" type="self" id="BDU:2025-04458" title="BDU:2025-04458" />
			<reference href="https://bdu.fstec.ru/vul/2025-04459" type="self" id="BDU:2025-04459" title="BDU:2025-04459" />
			<reference href="https://bdu.fstec.ru/vul/2025-04360" type="self" id="BDU:2025-04360" title="BDU:2025-04360" />
			<reference href="https://bdu.fstec.ru/vul/2025-04460" type="self" id="BDU:2025-04460" title="BDU:2025-04460" />
			<reference href="https://bdu.fstec.ru/vul/2024-04585" type="self" id="BDU:2024-04585" title="BDU:2024-04585" />
			<reference href="https://bdu.fstec.ru/vul/2024-04564" type="self" id="BDU:2024-04564" title="BDU:2024-04564" />
			<reference href="https://bdu.fstec.ru/vul/2024-04591" type="self" id="BDU:2024-04591" title="BDU:2024-04591" />
			<reference href="https://bdu.fstec.ru/vul/2024-04561" type="self" id="BDU:2024-04561" title="BDU:2024-04561" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240819-02</id>
		<issued date="2024-08-19" />
		<updated date="2024-08-20" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-19-08-24-2/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-19-08-24-2/" type="self" id="ROS-20240819-02" title="ROS-20240819-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47540" type="cve" id="CVE-2021-47540" title="CVE-2021-47540" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47541" type="cve" id="CVE-2021-47541" title="CVE-2021-47541" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47537" type="cve" id="CVE-2021-47537" title="CVE-2021-47537" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47529" type="cve" id="CVE-2021-47529" title="CVE-2021-47529" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47528" type="cve" id="CVE-2021-47528" title="CVE-2021-47528" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47526" type="cve" id="CVE-2021-47526" title="CVE-2021-47526" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47525" type="cve" id="CVE-2021-47525" title="CVE-2021-47525" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47522" type="cve" id="CVE-2021-47522" title="CVE-2021-47522" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47521" type="cve" id="CVE-2021-47521" title="CVE-2021-47521" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47520" type="cve" id="CVE-2021-47520" title="CVE-2021-47520" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47519" type="cve" id="CVE-2021-47519" title="CVE-2021-47519" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47518" type="cve" id="CVE-2021-47518" title="CVE-2021-47518" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47516" type="cve" id="CVE-2021-47516" title="CVE-2021-47516" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47513" type="cve" id="CVE-2021-47513" title="CVE-2021-47513" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52806" type="cve" id="CVE-2023-52806" title="CVE-2023-52806" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52809" type="cve" id="CVE-2023-52809" title="CVE-2023-52809" />
			<reference href="https://bdu.fstec.ru/vul/2025-14246" type="self" id="BDU:2025-14246" title="BDU:2025-14246" />
			<reference href="https://bdu.fstec.ru/vul/2024-04569" type="self" id="BDU:2024-04569" title="BDU:2024-04569" />
			<reference href="https://bdu.fstec.ru/vul/2025-04362" type="self" id="BDU:2025-04362" title="BDU:2025-04362" />
			<reference href="https://bdu.fstec.ru/vul/2025-04461" type="self" id="BDU:2025-04461" title="BDU:2025-04461" />
			<reference href="https://bdu.fstec.ru/vul/2025-04363" type="self" id="BDU:2025-04363" title="BDU:2025-04363" />
			<reference href="https://bdu.fstec.ru/vul/2025-14242" type="self" id="BDU:2025-14242" title="BDU:2025-14242" />
			<reference href="https://bdu.fstec.ru/vul/2024-04568" type="self" id="BDU:2024-04568" title="BDU:2024-04568" />
			<reference href="https://bdu.fstec.ru/vul/2025-14241" type="self" id="BDU:2025-14241" title="BDU:2025-14241" />
			<reference href="https://bdu.fstec.ru/vul/2024-04567" type="self" id="BDU:2024-04567" title="BDU:2024-04567" />
			<reference href="https://bdu.fstec.ru/vul/2024-04566" type="self" id="BDU:2024-04566" title="BDU:2024-04566" />
			<reference href="https://bdu.fstec.ru/vul/2025-04364" type="self" id="BDU:2025-04364" title="BDU:2025-04364" />
			<reference href="https://bdu.fstec.ru/vul/2025-04462" type="self" id="BDU:2025-04462" title="BDU:2025-04462" />
			<reference href="https://bdu.fstec.ru/vul/2025-04378" type="self" id="BDU:2025-04378" title="BDU:2025-04378" />
			<reference href="https://bdu.fstec.ru/vul/2025-03662" type="self" id="BDU:2025-03662" title="BDU:2025-03662" />
			<reference href="https://bdu.fstec.ru/vul/2024-06978" type="self" id="BDU:2024-06978" title="BDU:2024-06978" />
			<reference href="https://bdu.fstec.ru/vul/2024-06908" type="self" id="BDU:2024-06908" title="BDU:2024-06908" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240820-01</id>
		<issued date="2024-08-20" />
		<updated date="2024-08-20" />
		<title>Множественные уязвимости firefox</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-20-08-24/</description>
               <solution>
                    Запретить использование в ОС пакета firefox
                или
                    Установить обновление для пакета(ов) firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-20-08-24/" type="self" id="ROS-20240820-01" title="ROS-20240820-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2605" type="cve" id="CVE-2024-2605" title="CVE-2024-2605" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612" type="cve" id="CVE-2024-2612" title="CVE-2024-2612" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611" type="cve" id="CVE-2024-2611" title="CVE-2024-2611" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610" type="cve" id="CVE-2024-2610" title="CVE-2024-2610" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608" type="cve" id="CVE-2024-2608" title="CVE-2024-2608" />
			<reference href="https://bdu.fstec.ru/vul/2024-02329" type="self" id="BDU:2024-02329" title="BDU:2024-02329" />
			<reference href="https://bdu.fstec.ru/vul/2024-02333" type="self" id="BDU:2024-02333" title="BDU:2024-02333" />
			<reference href="https://bdu.fstec.ru/vul/2024-02334" type="self" id="BDU:2024-02334" title="BDU:2024-02334" />
			<reference href="https://bdu.fstec.ru/vul/2024-02323" type="self" id="BDU:2024-02323" title="BDU:2024-02323" />
			<reference href="https://bdu.fstec.ru/vul/2024-02316" type="self" id="BDU:2024-02316" title="BDU:2024-02316" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.12.0" release="1.el7" arch="x86_64" src="">
					<filename>firefox-0:115.12.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240820-11</id>
		<issued date="2024-08-20" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости thunderbird</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-20-08-249463/</description>
               <solution>
                    Запретить использование в ОС пакета thunderbird
                или
                    Установить обновление для пакета(ов) thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-20-08-249463/" type="self" id="ROS-20240820-11" title="ROS-20240820-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2605" type="cve" id="CVE-2024-2605" title="CVE-2024-2605" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612" type="cve" id="CVE-2024-2612" title="CVE-2024-2612" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611" type="cve" id="CVE-2024-2611" title="CVE-2024-2611" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610" type="cve" id="CVE-2024-2610" title="CVE-2024-2610" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608" type="cve" id="CVE-2024-2608" title="CVE-2024-2608" />
			<reference href="https://bdu.fstec.ru/vul/2024-02329" type="self" id="BDU:2024-02329" title="BDU:2024-02329" />
			<reference href="https://bdu.fstec.ru/vul/2024-02333" type="self" id="BDU:2024-02333" title="BDU:2024-02333" />
			<reference href="https://bdu.fstec.ru/vul/2024-02334" type="self" id="BDU:2024-02334" title="BDU:2024-02334" />
			<reference href="https://bdu.fstec.ru/vul/2024-02323" type="self" id="BDU:2024-02323" title="BDU:2024-02323" />
			<reference href="https://bdu.fstec.ru/vul/2024-02316" type="self" id="BDU:2024-02316" title="BDU:2024-02316" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="115.12.1" release="1.el7" arch="x86_64" src="">
					<filename>thunderbird-0:115.12.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240820-02</id>
		<issued date="2024-08-20" />
		<updated date="2024-08-20" />
		<title>Уязвимость python3 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2024-0397/</description>
               <solution>
                    Запретить использование в ОС пакета python3
                или
                    Установить обновление для пакета(ов) python3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2024-0397/" type="self" id="ROS-20240820-02" title="ROS-20240820-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0397" type="cve" id="CVE-2024-0397" title="CVE-2024-0397" />
			<reference href="https://bdu.fstec.ru/vul/2024-05177" type="self" id="BDU:2024-05177" title="BDU:2024-05177" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3" epoch="0" version="3.8.19" release="4.el7" arch="x86_64" src="">
					<filename>python3-0:3.8.19-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240820-03</id>
		<issued date="2024-08-20" />
		<updated date="2024-08-20" />
		<title>Уязвимость python3 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2024-0450/</description>
               <solution>
                    Запретить использование в ОС пакета python3
                или
                    Установить обновление для пакета(ов) python3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2024-0450/" type="self" id="ROS-20240820-03" title="ROS-20240820-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0450" type="cve" id="CVE-2024-0450" title="CVE-2024-0450" />
			<reference href="https://bdu.fstec.ru/vul/2024-04927" type="self" id="BDU:2024-04927" title="BDU:2024-04927" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3" epoch="0" version="3.8.19" release="2.el7" arch="x86_64" src="">
					<filename>python3-0:3.8.19-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240820-04</id>
		<issued date="2024-08-20" />
		<updated date="2024-08-20" />
		<title>Уязвимость expat </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в expat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-expat-cve-2023-52425/</description>
               <solution>
                    Запретить использование в ОС пакета expat
                или
                    Установить обновление для пакета(ов) expat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-expat-cve-2023-52425/" type="self" id="ROS-20240820-04" title="ROS-20240820-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52425" type="cve" id="CVE-2023-52425" title="CVE-2023-52425" />
			<reference href="https://bdu.fstec.ru/vul/2024-01514" type="self" id="BDU:2024-01514" title="BDU:2024-01514" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="expat" epoch="0" version="2.5.0" release="1.el7" arch="x86_64" src="">
					<filename>expat-0:2.5.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240820-05</id>
		<issued date="2024-08-20" />
		<updated date="2024-08-20" />
		<title>Множественные уязвимости java-1.8.0-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в java-1.8.0-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-1-8-0-openjdk-cve-2024-20925-cve-2024-20923-cve-2024-20922/</description>
               <solution>
                    Запретить использование в ОС пакета java-1.8.0-openjdk
                или
                    Установить обновление для пакета(ов) java-1.8.0-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-1-8-0-openjdk-cve-2024-20925-cve-2024-20923-cve-2024-20922/" type="self" id="ROS-20240820-05" title="ROS-20240820-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20925" type="cve" id="CVE-2024-20925" title="CVE-2024-20925" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20923" type="cve" id="CVE-2024-20923" title="CVE-2024-20923" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20922" type="cve" id="CVE-2024-20922" title="CVE-2024-20922" />
			<reference href="https://bdu.fstec.ru/vul/2024-00617" type="self" id="BDU:2024-00617" title="BDU:2024-00617" />
			<reference href="https://bdu.fstec.ru/vul/2024-00613" type="self" id="BDU:2024-00613" title="BDU:2024-00613" />
			<reference href="https://bdu.fstec.ru/vul/2024-00517" type="self" id="BDU:2024-00517" title="BDU:2024-00517" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-1.8.0-openjdk" epoch="1" version="1.8.0.402.b06" release="1.el7" arch="x86_64" src="">
					<filename>java-1.8.0-openjdk-1:1.8.0.402.b06-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240820-12</id>
		<issued date="2024-08-20" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости java-11-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в java-11-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-11-openjdk-cve-2024-20925-cve-2024-20923-cve-2024-209227138/</description>
               <solution>
                    Запретить использование в ОС пакета java-11-openjdk
                или
                    Установить обновление для пакета(ов) java-11-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-11-openjdk-cve-2024-20925-cve-2024-20923-cve-2024-209227138/" type="self" id="ROS-20240820-12" title="ROS-20240820-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20925" type="cve" id="CVE-2024-20925" title="CVE-2024-20925" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20923" type="cve" id="CVE-2024-20923" title="CVE-2024-20923" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20922" type="cve" id="CVE-2024-20922" title="CVE-2024-20922" />
			<reference href="https://bdu.fstec.ru/vul/2024-00617" type="self" id="BDU:2024-00617" title="BDU:2024-00617" />
			<reference href="https://bdu.fstec.ru/vul/2024-00613" type="self" id="BDU:2024-00613" title="BDU:2024-00613" />
			<reference href="https://bdu.fstec.ru/vul/2024-00517" type="self" id="BDU:2024-00517" title="BDU:2024-00517" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-11-openjdk" epoch="1" version="11.0.22.0.7" release="1.el7" arch="x86_64" src="">
					<filename>java-11-openjdk-1:11.0.22.0.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240820-13</id>
		<issued date="2024-08-20" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости java-17-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в java-17-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-17-openjdk-cve-2024-20925-cve-2024-20923-cve-2024-20922286/</description>
               <solution>
                    Запретить использование в ОС пакета java-17-openjdk
                или
                    Установить обновление для пакета(ов) java-17-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-17-openjdk-cve-2024-20925-cve-2024-20923-cve-2024-20922286/" type="self" id="ROS-20240820-13" title="ROS-20240820-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20925" type="cve" id="CVE-2024-20925" title="CVE-2024-20925" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20923" type="cve" id="CVE-2024-20923" title="CVE-2024-20923" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20922" type="cve" id="CVE-2024-20922" title="CVE-2024-20922" />
			<reference href="https://bdu.fstec.ru/vul/2024-00617" type="self" id="BDU:2024-00617" title="BDU:2024-00617" />
			<reference href="https://bdu.fstec.ru/vul/2024-00613" type="self" id="BDU:2024-00613" title="BDU:2024-00613" />
			<reference href="https://bdu.fstec.ru/vul/2024-00517" type="self" id="BDU:2024-00517" title="BDU:2024-00517" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-17-openjdk" epoch="1" version="17.0.10.0.7" release="1.el7" arch="x86_64" src="">
					<filename>java-17-openjdk-1:17.0.10.0.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240820-14</id>
		<issued date="2024-08-20" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости java-21-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в java-21-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-21-openjdk-cve-2024-20925-cve-2024-20923-cve-2024-20922719/</description>
               <solution>
                    Запретить использование в ОС пакета java-21-openjdk
                или
                    Установить обновление для пакета(ов) java-21-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-21-openjdk-cve-2024-20925-cve-2024-20923-cve-2024-20922719/" type="self" id="ROS-20240820-14" title="ROS-20240820-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20925" type="cve" id="CVE-2024-20925" title="CVE-2024-20925" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20923" type="cve" id="CVE-2024-20923" title="CVE-2024-20923" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20922" type="cve" id="CVE-2024-20922" title="CVE-2024-20922" />
			<reference href="https://bdu.fstec.ru/vul/2024-00617" type="self" id="BDU:2024-00617" title="BDU:2024-00617" />
			<reference href="https://bdu.fstec.ru/vul/2024-00613" type="self" id="BDU:2024-00613" title="BDU:2024-00613" />
			<reference href="https://bdu.fstec.ru/vul/2024-00517" type="self" id="BDU:2024-00517" title="BDU:2024-00517" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-21-openjdk" epoch="1" version="21.0.2.0.13" release="1.el7" arch="x86_64" src="">
					<filename>java-21-openjdk-1:21.0.2.0.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240820-06</id>
		<issued date="2024-08-20" />
		<updated date="2024-08-20" />
		<title>Уязвимость python3-aiohttp </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-aiohttp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-aiohttp-ghsa-pjjw-qhg8-p2p9/</description>
               <solution>
                    Запретить использование в ОС пакета python3-aiohttp
                или
                    Установить обновление для пакета(ов) python3-aiohttp
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-aiohttp-ghsa-pjjw-qhg8-p2p9/" type="self" id="ROS-20240820-06" title="ROS-20240820-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=" type="cve" id="" title="" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-aiohttp" epoch="0" version="3.9.3" release="1.el7" arch="x86_64" src="">
					<filename>python3-aiohttp-0:3.9.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240820-07</id>
		<issued date="2024-08-20" />
		<updated date="2024-08-20" />
		<title>Множественные уязвимости mariadb </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в mariadb</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mariadb-cve-2022-32084/</description>
               <solution>
                    Запретить использование в ОС пакета mariadb
                или
                    Установить обновление для пакета(ов) mariadb
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mariadb-cve-2022-32084/" type="self" id="ROS-20240820-07" title="ROS-20240820-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32084" type="cve" id="CVE-2022-32084" title="CVE-2022-32084" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32091" type="cve" id="CVE-2022-32091" title="CVE-2022-32091" />
			<reference href="https://bdu.fstec.ru/vul/2022-04078" type="self" id="BDU:2022-04078" title="BDU:2022-04078" />
			<reference href="https://bdu.fstec.ru/vul/2022-04082" type="self" id="BDU:2022-04082" title="BDU:2022-04082" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mariadb" epoch="3" version="10.11.6" release="2.el7" arch="x86_64" src="">
					<filename>mariadb-3:10.11.6-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240820-08</id>
		<issued date="2024-08-20" />
		<updated date="2024-08-20" />
		<title>Уязвимость php 8.1 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в php</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-8-1-cve-2024-5458/</description>
               <solution>
                    Запретить использование в ОС пакета php
                или
                    Установить обновление для пакета(ов) php
Установка и обновление пакетов PHP до версии 8.Х на РЕД ОС производится по инструкции https://redos.red-soft.ru/base/arm/arm-other/php-8-redos-73/
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-8-1-cve-2024-5458/" type="self" id="ROS-20240820-08" title="ROS-20240820-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5458" type="cve" id="CVE-2024-5458" title="CVE-2024-5458" />
			<reference href="https://bdu.fstec.ru/vul/2024-04846" type="self" id="BDU:2024-04846" title="BDU:2024-04846" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php" epoch="0" version="8.1.29" release="1.el7" arch="x86_64" src="">
					<filename>php-0:8.1.29-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240820-15</id>
		<issued date="2024-08-20" />
		<updated date="2024-12-23" />
		<title>Уязвимость php 8.2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в php</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-8-2-cve-2024-54588675/</description>
               <solution>
                    Запретить использование в ОС пакета php
                или
                    Установить обновление для пакета(ов) php
Установка и обновление пакетов PHP до версии 8.Х на РЕД ОС производится по инструкции https://redos.red-soft.ru/base/arm/arm-other/php-8-redos-73/
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-8-2-cve-2024-54588675/" type="self" id="ROS-20240820-15" title="ROS-20240820-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5458" type="cve" id="CVE-2024-5458" title="CVE-2024-5458" />
			<reference href="https://bdu.fstec.ru/vul/2024-04846" type="self" id="BDU:2024-04846" title="BDU:2024-04846" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php" epoch="0" version="8.2.20" release="1.el7" arch="x86_64" src="">
					<filename>php-0:8.2.20-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240820-16</id>
		<issued date="2024-08-20" />
		<updated date="2024-12-23" />
		<title>Уязвимость php 8.3 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в php</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-8-3-cve-2024-545886758961/</description>
               <solution>
                    Запретить использование в ОС пакета php
                или
                    Установить обновление для пакета(ов) php
Установка и обновление пакетов PHP до версии 8.Х на РЕД ОС производится по инструкции https://redos.red-soft.ru/base/arm/arm-other/php-8-redos-73/
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-8-3-cve-2024-545886758961/" type="self" id="ROS-20240820-16" title="ROS-20240820-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5458" type="cve" id="CVE-2024-5458" title="CVE-2024-5458" />
			<reference href="https://bdu.fstec.ru/vul/2024-04846" type="self" id="BDU:2024-04846" title="BDU:2024-04846" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php" epoch="0" version="8.3.8" release="1.el7" arch="x86_64" src="">
					<filename>php-0:8.3.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240820-09</id>
		<issued date="2024-08-20" />
		<updated date="2024-08-20" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-20-08-24/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-20-08-24/" type="self" id="ROS-20240820-09" title="ROS-20240820-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36008" type="cve" id="CVE-2024-36008" title="CVE-2024-36008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26934" type="cve" id="CVE-2024-26934" title="CVE-2024-26934" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26929" type="cve" id="CVE-2024-26929" title="CVE-2024-26929" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26910" type="cve" id="CVE-2024-26910" title="CVE-2024-26910" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52645" type="cve" id="CVE-2023-52645" title="CVE-2023-52645" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907" type="cve" id="CVE-2024-26907" title="CVE-2024-26907" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903" type="cve" id="CVE-2024-26903" title="CVE-2024-26903" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901" type="cve" id="CVE-2024-26901" title="CVE-2024-26901" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26833" type="cve" id="CVE-2024-26833" title="CVE-2024-26833" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26825" type="cve" id="CVE-2024-26825" title="CVE-2024-26825" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47198" type="cve" id="CVE-2021-47198" title="CVE-2021-47198" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47195" type="cve" id="CVE-2021-47195" title="CVE-2021-47195" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47194" type="cve" id="CVE-2021-47194" title="CVE-2021-47194" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47193" type="cve" id="CVE-2021-47193" title="CVE-2021-47193" />
			<reference href="https://bdu.fstec.ru/vul/2024-06488" type="self" id="BDU:2024-06488" title="BDU:2024-06488" />
			<reference href="https://bdu.fstec.ru/vul/2024-04581" type="self" id="BDU:2024-04581" title="BDU:2024-04581" />
			<reference href="https://bdu.fstec.ru/vul/2024-03631" type="self" id="BDU:2024-03631" title="BDU:2024-03631" />
			<reference href="https://bdu.fstec.ru/vul/2024-06493" type="self" id="BDU:2024-06493" title="BDU:2024-06493" />
			<reference href="https://bdu.fstec.ru/vul/2024-06494" type="self" id="BDU:2024-06494" title="BDU:2024-06494" />
			<reference href="https://bdu.fstec.ru/vul/2024-03666" type="self" id="BDU:2024-03666" title="BDU:2024-03666" />
			<reference href="https://bdu.fstec.ru/vul/2024-06495" type="self" id="BDU:2024-06495" title="BDU:2024-06495" />
			<reference href="https://bdu.fstec.ru/vul/2024-06496" type="self" id="BDU:2024-06496" title="BDU:2024-06496" />
			<reference href="https://bdu.fstec.ru/vul/2024-03701" type="self" id="BDU:2024-03701" title="BDU:2024-03701" />
			<reference href="https://bdu.fstec.ru/vul/2024-03620" type="self" id="BDU:2024-03620" title="BDU:2024-03620" />
			<reference href="https://bdu.fstec.ru/vul/2024-03692" type="self" id="BDU:2024-03692" title="BDU:2024-03692" />
			<reference href="https://bdu.fstec.ru/vul/2024-06491" type="self" id="BDU:2024-06491" title="BDU:2024-06491" />
			<reference href="https://bdu.fstec.ru/vul/2024-03691" type="self" id="BDU:2024-03691" title="BDU:2024-03691" />
			<reference href="https://bdu.fstec.ru/vul/2024-06492" type="self" id="BDU:2024-06492" title="BDU:2024-06492" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240820-10</id>
		<issued date="2024-08-20" />
		<updated date="2024-08-20" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-20-08-24-10/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-20-08-24-10/" type="self" id="ROS-20240820-10" title="ROS-20240820-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35997" type="cve" id="CVE-2024-35997" title="CVE-2024-35997" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35990" type="cve" id="CVE-2024-35990" title="CVE-2024-35990" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35984" type="cve" id="CVE-2024-35984" title="CVE-2024-35984" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35982" type="cve" id="CVE-2024-35982" title="CVE-2024-35982" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35978" type="cve" id="CVE-2024-35978" title="CVE-2024-35978" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020" type="cve" id="CVE-2024-27020" title="CVE-2024-27020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27019" type="cve" id="CVE-2024-27019" title="CVE-2024-27019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27018" type="cve" id="CVE-2024-27018" title="CVE-2024-27018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013" type="cve" id="CVE-2024-27013" title="CVE-2024-27013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817" type="cve" id="CVE-2024-26817" title="CVE-2024-26817" />
			<reference href="https://bdu.fstec.ru/vul/2024-06497" type="self" id="BDU:2024-06497" title="BDU:2024-06497" />
			<reference href="https://bdu.fstec.ru/vul/2024-06498" type="self" id="BDU:2024-06498" title="BDU:2024-06498" />
			<reference href="https://bdu.fstec.ru/vul/2024-06499" type="self" id="BDU:2024-06499" title="BDU:2024-06499" />
			<reference href="https://bdu.fstec.ru/vul/2024-06500" type="self" id="BDU:2024-06500" title="BDU:2024-06500" />
			<reference href="https://bdu.fstec.ru/vul/2024-06501" type="self" id="BDU:2024-06501" title="BDU:2024-06501" />
			<reference href="https://bdu.fstec.ru/vul/2024-04587" type="self" id="BDU:2024-04587" title="BDU:2024-04587" />
			<reference href="https://bdu.fstec.ru/vul/2024-06502" type="self" id="BDU:2024-06502" title="BDU:2024-06502" />
			<reference href="https://bdu.fstec.ru/vul/2024-04582" type="self" id="BDU:2024-04582" title="BDU:2024-04582" />
			<reference href="https://bdu.fstec.ru/vul/2024-06503" type="self" id="BDU:2024-06503" title="BDU:2024-06503" />
			<reference href="https://bdu.fstec.ru/vul/2024-03712" type="self" id="BDU:2024-03712" title="BDU:2024-03712" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240821-01</id>
		<issued date="2024-08-21" />
		<updated date="2024-08-21" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-21-08-24-1/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-21-08-24-1/" type="self" id="ROS-20240821-01" title="ROS-20240821-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925" type="cve" id="CVE-2024-26925" title="CVE-2024-26925" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924" type="cve" id="CVE-2024-26924" title="CVE-2024-26924" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923" type="cve" id="CVE-2024-26923" title="CVE-2024-26923" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26900" type="cve" id="CVE-2024-26900" title="CVE-2024-26900" />
			<reference href="https://bdu.fstec.ru/vul/2024-04369" type="self" id="BDU:2024-04369" title="BDU:2024-04369" />
			<reference href="https://bdu.fstec.ru/vul/2024-03625" type="self" id="BDU:2024-03625" title="BDU:2024-03625" />
			<reference href="https://bdu.fstec.ru/vul/2024-03615" type="self" id="BDU:2024-03615" title="BDU:2024-03615" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240821-02</id>
		<issued date="2024-08-21" />
		<updated date="2024-08-21" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-21-08-24-2/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-21-08-24-2/" type="self" id="ROS-20240821-02" title="ROS-20240821-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782" type="cve" id="CVE-2024-26782" title="CVE-2024-26782" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793" type="cve" id="CVE-2024-26793" title="CVE-2024-26793" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614" type="cve" id="CVE-2024-26614" title="CVE-2024-26614" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26613" type="cve" id="CVE-2024-26613" title="CVE-2024-26613" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610" type="cve" id="CVE-2024-26610" title="CVE-2024-26610" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26609" type="cve" id="CVE-2024-26609" title="CVE-2024-26609" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26608" type="cve" id="CVE-2024-26608" title="CVE-2024-26608" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26628" type="cve" id="CVE-2024-26628" title="CVE-2024-26628" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26625" type="cve" id="CVE-2024-26625" title="CVE-2024-26625" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26624" type="cve" id="CVE-2024-26624" title="CVE-2024-26624" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48630" type="cve" id="CVE-2022-48630" title="CVE-2022-48630" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26654" type="cve" id="CVE-2024-26654" title="CVE-2024-26654" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651" type="cve" id="CVE-2024-26651" title="CVE-2024-26651" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26644" type="cve" id="CVE-2024-26644" title="CVE-2024-26644" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643" type="cve" id="CVE-2024-26643" title="CVE-2024-26643" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641" type="cve" id="CVE-2024-26641" title="CVE-2024-26641" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640" type="cve" id="CVE-2024-26640" title="CVE-2024-26640" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636" type="cve" id="CVE-2024-26636" title="CVE-2024-26636" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635" type="cve" id="CVE-2024-26635" title="CVE-2024-26635" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26633" type="cve" id="CVE-2024-26633" title="CVE-2024-26633" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26631" type="cve" id="CVE-2024-26631" title="CVE-2024-26631" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2193" type="cve" id="CVE-2024-2193" title="CVE-2024-2193" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26629" type="cve" id="CVE-2024-26629" title="CVE-2024-26629" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615" type="cve" id="CVE-2024-26615" title="CVE-2024-26615" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754" type="cve" id="CVE-2024-26754" title="CVE-2024-26754" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26749" type="cve" id="CVE-2024-26749" title="CVE-2024-26749" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748" type="cve" id="CVE-2024-26748" title="CVE-2024-26748" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735" type="cve" id="CVE-2024-26735" title="CVE-2024-26735" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26717" type="cve" id="CVE-2024-26717" title="CVE-2024-26717" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26715" type="cve" id="CVE-2024-26715" title="CVE-2024-26715" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704" type="cve" id="CVE-2024-26704" title="CVE-2024-26704" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26695" type="cve" id="CVE-2024-26695" title="CVE-2024-26695" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689" type="cve" id="CVE-2024-26689" title="CVE-2024-26689" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688" type="cve" id="CVE-2024-26688" title="CVE-2024-26688" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816" type="cve" id="CVE-2024-26816" title="CVE-2024-26816" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801" type="cve" id="CVE-2024-26801" title="CVE-2024-26801" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898" type="cve" id="CVE-2024-26898" title="CVE-2024-26898" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26895" type="cve" id="CVE-2024-26895" title="CVE-2024-26895" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885" type="cve" id="CVE-2024-26885" title="CVE-2024-26885" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884" type="cve" id="CVE-2024-26884" title="CVE-2024-26884" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883" type="cve" id="CVE-2024-26883" title="CVE-2024-26883" />
			<reference href="https://bdu.fstec.ru/vul/2024-03682" type="self" id="BDU:2024-03682" title="BDU:2024-03682" />
			<reference href="https://bdu.fstec.ru/vul/2024-03685" type="self" id="BDU:2024-03685" title="BDU:2024-03685" />
			<reference href="https://bdu.fstec.ru/vul/2024-03685" type="self" id="BDU:2024-03685" title="BDU:2024-03685" />
			<reference href="https://bdu.fstec.ru/vul/2024-04144" type="self" id="BDU:2024-04144" title="BDU:2024-04144" />
			<reference href="https://bdu.fstec.ru/vul/2024-04147" type="self" id="BDU:2024-04147" title="BDU:2024-04147" />
			<reference href="https://bdu.fstec.ru/vul/2024-04145" type="self" id="BDU:2024-04145" title="BDU:2024-04145" />
			<reference href="https://bdu.fstec.ru/vul/2024-04146" type="self" id="BDU:2024-04146" title="BDU:2024-04146" />
			<reference href="https://bdu.fstec.ru/vul/2024-01982" type="self" id="BDU:2024-01982" title="BDU:2024-01982" />
			<reference href="https://bdu.fstec.ru/vul/2024-01878" type="self" id="BDU:2024-01878" title="BDU:2024-01878" />
			<reference href="https://bdu.fstec.ru/vul/2024-03767" type="self" id="BDU:2024-03767" title="BDU:2024-03767" />
			<reference href="https://bdu.fstec.ru/vul/2024-02026" type="self" id="BDU:2024-02026" title="BDU:2024-02026" />
			<reference href="https://bdu.fstec.ru/vul/2024-03747" type="self" id="BDU:2024-03747" title="BDU:2024-03747" />
			<reference href="https://bdu.fstec.ru/vul/2024-03763" type="self" id="BDU:2024-03763" title="BDU:2024-03763" />
			<reference href="https://bdu.fstec.ru/vul/2024-03661" type="self" id="BDU:2024-03661" title="BDU:2024-03661" />
			<reference href="https://bdu.fstec.ru/vul/2024-03771" type="self" id="BDU:2024-03771" title="BDU:2024-03771" />
			<reference href="https://bdu.fstec.ru/vul/2024-03651" type="self" id="BDU:2024-03651" title="BDU:2024-03651" />
			<reference href="https://bdu.fstec.ru/vul/2024-03655" type="self" id="BDU:2024-03655" title="BDU:2024-03655" />
			<reference href="https://bdu.fstec.ru/vul/2024-03660" type="self" id="BDU:2024-03660" title="BDU:2024-03660" />
			<reference href="https://bdu.fstec.ru/vul/2024-03659" type="self" id="BDU:2024-03659" title="BDU:2024-03659" />
			<reference href="https://bdu.fstec.ru/vul/2024-03652" type="self" id="BDU:2024-03652" title="BDU:2024-03652" />
			<reference href="https://bdu.fstec.ru/vul/2024-03650" type="self" id="BDU:2024-03650" title="BDU:2024-03650" />
			<reference href="https://bdu.fstec.ru/vul/2024-01950" type="self" id="BDU:2024-01950" title="BDU:2024-01950" />
			<reference href="https://bdu.fstec.ru/vul/2024-03656" type="self" id="BDU:2024-03656" title="BDU:2024-03656" />
			<reference href="https://bdu.fstec.ru/vul/2024-01981" type="self" id="BDU:2024-01981" title="BDU:2024-01981" />
			<reference href="https://bdu.fstec.ru/vul/2024-03681" type="self" id="BDU:2024-03681" title="BDU:2024-03681" />
			<reference href="https://bdu.fstec.ru/vul/2024-03680" type="self" id="BDU:2024-03680" title="BDU:2024-03680" />
			<reference href="https://bdu.fstec.ru/vul/2024-03679" type="self" id="BDU:2024-03679" title="BDU:2024-03679" />
			<reference href="https://bdu.fstec.ru/vul/2024-03678" type="self" id="BDU:2024-03678" title="BDU:2024-03678" />
			<reference href="https://bdu.fstec.ru/vul/2024-03614" type="self" id="BDU:2024-03614" title="BDU:2024-03614" />
			<reference href="https://bdu.fstec.ru/vul/2024-03624" type="self" id="BDU:2024-03624" title="BDU:2024-03624" />
			<reference href="https://bdu.fstec.ru/vul/2024-03623" type="self" id="BDU:2024-03623" title="BDU:2024-03623" />
			<reference href="https://bdu.fstec.ru/vul/2024-03622" type="self" id="BDU:2024-03622" title="BDU:2024-03622" />
			<reference href="https://bdu.fstec.ru/vul/2024-03621" type="self" id="BDU:2024-03621" title="BDU:2024-03621" />
			<reference href="https://bdu.fstec.ru/vul/2024-03751" type="self" id="BDU:2024-03751" title="BDU:2024-03751" />
			<reference href="https://bdu.fstec.ru/vul/2024-03754" type="self" id="BDU:2024-03754" title="BDU:2024-03754" />
			<reference href="https://bdu.fstec.ru/vul/2024-03686" type="self" id="BDU:2024-03686" title="BDU:2024-03686" />
			<reference href="https://bdu.fstec.ru/vul/2024-06900" type="self" id="BDU:2024-06900" title="BDU:2024-06900" />
			<reference href="https://bdu.fstec.ru/vul/2024-03700" type="self" id="BDU:2024-03700" title="BDU:2024-03700" />
			<reference href="https://bdu.fstec.ru/vul/2024-03665" type="self" id="BDU:2024-03665" title="BDU:2024-03665" />
			<reference href="https://bdu.fstec.ru/vul/2024-03664" type="self" id="BDU:2024-03664" title="BDU:2024-03664" />
			<reference href="https://bdu.fstec.ru/vul/2024-03663" type="self" id="BDU:2024-03663" title="BDU:2024-03663" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240822-01</id>
		<issued date="2024-08-22" />
		<updated date="2024-08-22" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-22-08-24/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-22-08-24/" type="self" id="ROS-20240822-01" title="ROS-20240822-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48824" type="cve" id="CVE-2022-48824" title="CVE-2022-48824" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48822" type="cve" id="CVE-2022-48822" title="CVE-2022-48822" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48809" type="cve" id="CVE-2022-48809" title="CVE-2022-48809" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48808" type="cve" id="CVE-2022-48808" title="CVE-2022-48808" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48792" type="cve" id="CVE-2022-48792" title="CVE-2022-48792" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48790" type="cve" id="CVE-2022-48790" title="CVE-2022-48790" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48788" type="cve" id="CVE-2022-48788" title="CVE-2022-48788" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48787" type="cve" id="CVE-2022-48787" title="CVE-2022-48787" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48785" type="cve" id="CVE-2022-48785" title="CVE-2022-48785" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48783" type="cve" id="CVE-2022-48783" title="CVE-2022-48783" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48778" type="cve" id="CVE-2022-48778" title="CVE-2022-48778" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48777" type="cve" id="CVE-2022-48777" title="CVE-2022-48777" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48775" type="cve" id="CVE-2022-48775" title="CVE-2022-48775" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48773" type="cve" id="CVE-2022-48773" title="CVE-2022-48773" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47624" type="cve" id="CVE-2021-47624" title="CVE-2021-47624" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47622" type="cve" id="CVE-2021-47622" title="CVE-2021-47622" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52886" type="cve" id="CVE-2023-52886" title="CVE-2023-52886" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39493" type="cve" id="CVE-2024-39493" title="CVE-2024-39493" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39489" type="cve" id="CVE-2024-39489" title="CVE-2024-39489" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39475" type="cve" id="CVE-2024-39475" title="CVE-2024-39475" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52340" type="cve" id="CVE-2023-52340" title="CVE-2023-52340" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39466" type="cve" id="CVE-2024-39466" title="CVE-2024-39466" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39292" type="cve" id="CVE-2024-39292" title="CVE-2024-39292" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39277" type="cve" id="CVE-2024-39277" title="CVE-2024-39277" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38780" type="cve" id="CVE-2024-38780" title="CVE-2024-38780" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36288" type="cve" id="CVE-2024-36288" title="CVE-2024-36288" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38627" type="cve" id="CVE-2024-38627" title="CVE-2024-38627" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48743" type="cve" id="CVE-2022-48743" title="CVE-2022-48743" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48742" type="cve" id="CVE-2022-48742" title="CVE-2022-48742" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48741" type="cve" id="CVE-2022-48741" title="CVE-2022-48741" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48740" type="cve" id="CVE-2022-48740" title="CVE-2022-48740" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48735" type="cve" id="CVE-2022-48735" title="CVE-2022-48735" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48734" type="cve" id="CVE-2022-48734" title="CVE-2022-48734" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48733" type="cve" id="CVE-2022-48733" title="CVE-2022-48733" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48732" type="cve" id="CVE-2022-48732" title="CVE-2022-48732" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47597" type="cve" id="CVE-2021-47597" title="CVE-2021-47597" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47596" type="cve" id="CVE-2021-47596" title="CVE-2021-47596" />
			<reference href="https://bdu.fstec.ru/vul/2025-14260" type="self" id="BDU:2025-14260" title="BDU:2025-14260" />
			<reference href="https://bdu.fstec.ru/vul/2024-07756" type="self" id="BDU:2024-07756" title="BDU:2024-07756" />
			<reference href="https://bdu.fstec.ru/vul/2025-04441" type="self" id="BDU:2025-04441" title="BDU:2025-04441" />
			<reference href="https://bdu.fstec.ru/vul/2025-03965" type="self" id="BDU:2025-03965" title="BDU:2025-03965" />
			<reference href="https://bdu.fstec.ru/vul/2024-07755" type="self" id="BDU:2024-07755" title="BDU:2024-07755" />
			<reference href="https://bdu.fstec.ru/vul/2024-07743" type="self" id="BDU:2024-07743" title="BDU:2024-07743" />
			<reference href="https://bdu.fstec.ru/vul/2024-07753" type="self" id="BDU:2024-07753" title="BDU:2024-07753" />
			<reference href="https://bdu.fstec.ru/vul/2024-07752" type="self" id="BDU:2024-07752" title="BDU:2024-07752" />
			<reference href="https://bdu.fstec.ru/vul/2024-06075" type="self" id="BDU:2024-06075" title="BDU:2024-06075" />
			<reference href="https://bdu.fstec.ru/vul/2024-06076" type="self" id="BDU:2024-06076" title="BDU:2024-06076" />
			<reference href="https://bdu.fstec.ru/vul/2024-08352" type="self" id="BDU:2024-08352" title="BDU:2024-08352" />
			<reference href="https://bdu.fstec.ru/vul/2025-04442" type="self" id="BDU:2025-04442" title="BDU:2025-04442" />
			<reference href="https://bdu.fstec.ru/vul/2025-14258" type="self" id="BDU:2025-14258" title="BDU:2025-14258" />
			<reference href="https://bdu.fstec.ru/vul/2025-14257" type="self" id="BDU:2025-14257" title="BDU:2025-14257" />
			<reference href="https://bdu.fstec.ru/vul/2024-08345" type="self" id="BDU:2024-08345" title="BDU:2024-08345" />
			<reference href="https://bdu.fstec.ru/vul/2025-04358" type="self" id="BDU:2025-04358" title="BDU:2025-04358" />
			<reference href="https://bdu.fstec.ru/vul/2025-10569" type="self" id="BDU:2025-10569" title="BDU:2025-10569" />
			<reference href="https://bdu.fstec.ru/vul/2024-06523" type="self" id="BDU:2024-06523" title="BDU:2024-06523" />
			<reference href="https://bdu.fstec.ru/vul/2024-06524" type="self" id="BDU:2024-06524" title="BDU:2024-06524" />
			<reference href="https://bdu.fstec.ru/vul/2024-06089" type="self" id="BDU:2024-06089" title="BDU:2024-06089" />
			<reference href="https://bdu.fstec.ru/vul/2024-01036" type="self" id="BDU:2024-01036" title="BDU:2024-01036" />
			<reference href="https://bdu.fstec.ru/vul/2024-06056" type="self" id="BDU:2024-06056" title="BDU:2024-06056" />
			<reference href="https://bdu.fstec.ru/vul/2024-06051" type="self" id="BDU:2024-06051" title="BDU:2024-06051" />
			<reference href="https://bdu.fstec.ru/vul/2024-06055" type="self" id="BDU:2024-06055" title="BDU:2024-06055" />
			<reference href="https://bdu.fstec.ru/vul/2024-06053" type="self" id="BDU:2024-06053" title="BDU:2024-06053" />
			<reference href="https://bdu.fstec.ru/vul/2024-06060" type="self" id="BDU:2024-06060" title="BDU:2024-06060" />
			<reference href="https://bdu.fstec.ru/vul/2025-04446" type="self" id="BDU:2025-04446" title="BDU:2025-04446" />
			<reference href="https://bdu.fstec.ru/vul/2024-08348" type="self" id="BDU:2024-08348" title="BDU:2024-08348" />
			<reference href="https://bdu.fstec.ru/vul/2025-14254" type="self" id="BDU:2025-14254" title="BDU:2025-14254" />
			<reference href="https://bdu.fstec.ru/vul/2024-08353" type="self" id="BDU:2024-08353" title="BDU:2024-08353" />
			<reference href="https://bdu.fstec.ru/vul/2024-08350" type="self" id="BDU:2024-08350" title="BDU:2024-08350" />
			<reference href="https://bdu.fstec.ru/vul/2025-14253" type="self" id="BDU:2025-14253" title="BDU:2025-14253" />
			<reference href="https://bdu.fstec.ru/vul/2024-08341" type="self" id="BDU:2024-08341" title="BDU:2024-08341" />
			<reference href="https://bdu.fstec.ru/vul/2024-06788" type="self" id="BDU:2024-06788" title="BDU:2024-06788" />
			<reference href="https://bdu.fstec.ru/vul/2025-04456" type="self" id="BDU:2025-04456" title="BDU:2025-04456" />
			<reference href="https://bdu.fstec.ru/vul/2024-08347" type="self" id="BDU:2024-08347" title="BDU:2024-08347" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240823-01</id>
		<issued date="2024-08-23" />
		<updated date="2024-08-23" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-23-08-24/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-23-08-24/" type="self" id="ROS-20240823-01" title="ROS-20240823-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52852" type="cve" id="CVE-2023-52852" title="CVE-2023-52852" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52821" type="cve" id="CVE-2023-52821" title="CVE-2023-52821" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52817" type="cve" id="CVE-2023-52817" title="CVE-2023-52817" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52815" type="cve" id="CVE-2023-52815" title="CVE-2023-52815" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52814" type="cve" id="CVE-2023-52814" title="CVE-2023-52814" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52772" type="cve" id="CVE-2023-52772" title="CVE-2023-52772" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52753" type="cve" id="CVE-2023-52753" title="CVE-2023-52753" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35811" type="cve" id="CVE-2024-35811" title="CVE-2024-35811" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35955" type="cve" id="CVE-2024-35955" title="CVE-2024-35955" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35855" type="cve" id="CVE-2024-35855" title="CVE-2024-35855" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35854" type="cve" id="CVE-2024-35854" title="CVE-2024-35854" />
			<reference href="https://bdu.fstec.ru/vul/2024-04588" type="self" id="BDU:2024-04588" title="BDU:2024-04588" />
			<reference href="https://bdu.fstec.ru/vul/2025-12483" type="self" id="BDU:2025-12483" title="BDU:2025-12483" />
			<reference href="https://bdu.fstec.ru/vul/2024-06986" type="self" id="BDU:2024-06986" title="BDU:2024-06986" />
			<reference href="https://bdu.fstec.ru/vul/2024-06905" type="self" id="BDU:2024-06905" title="BDU:2024-06905" />
			<reference href="https://bdu.fstec.ru/vul/2024-06906" type="self" id="BDU:2024-06906" title="BDU:2024-06906" />
			<reference href="https://bdu.fstec.ru/vul/2024-04579" type="self" id="BDU:2024-04579" title="BDU:2024-04579" />
			<reference href="https://bdu.fstec.ru/vul/2024-06910" type="self" id="BDU:2024-06910" title="BDU:2024-06910" />
			<reference href="https://bdu.fstec.ru/vul/2024-04229" type="self" id="BDU:2024-04229" title="BDU:2024-04229" />
			<reference href="https://bdu.fstec.ru/vul/2024-04216" type="self" id="BDU:2024-04216" title="BDU:2024-04216" />
			<reference href="https://bdu.fstec.ru/vul/2024-04227" type="self" id="BDU:2024-04227" title="BDU:2024-04227" />
			<reference href="https://bdu.fstec.ru/vul/2024-04228" type="self" id="BDU:2024-04228" title="BDU:2024-04228" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240823-02</id>
		<issued date="2024-08-23" />
		<updated date="2024-08-23" />
		<title>Уязвимость rubygem-actionpack </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в rubygem-actionpack</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-actionpack-cve-2021-44528/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-actionpack
                или
                    Установить обновление для пакета(ов) rubygem-actionpack
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-actionpack-cve-2021-44528/" type="self" id="ROS-20240823-02" title="ROS-20240823-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44528" type="cve" id="CVE-2021-44528" title="CVE-2021-44528" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-actionpack" epoch="2" version="6.1.6.1" release="2.el7" arch="noarch" src="">
					<filename>rubygem-actionpack-2:6.1.6.1-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240826-01</id>
		<issued date="2024-08-26" />
		<updated date="2024-08-26" />
		<title>Множественные уязвимости packer </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в packer</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-packer-cve-2023-39325-cve-2023-44487-cve-2023-45283/</description>
               <solution>
                    Запретить использование в ОС пакета packer
                или
                    Установить обновление для пакета(ов) packer
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-packer-cve-2023-39325-cve-2023-44487-cve-2023-45283/" type="self" id="ROS-20240826-01" title="ROS-20240826-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39325" type="cve" id="CVE-2023-39325" title="CVE-2023-39325" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487" type="cve" id="CVE-2023-44487" title="CVE-2023-44487" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45283" type="cve" id="CVE-2023-45283" title="CVE-2023-45283" />
			<reference href="https://bdu.fstec.ru/vul/2023-07013" type="self" id="BDU:2023-07013" title="BDU:2023-07013" />
			<reference href="https://bdu.fstec.ru/vul/2023-06559" type="self" id="BDU:2023-06559" title="BDU:2023-06559" />
			<reference href="https://bdu.fstec.ru/vul/2023-09013" type="self" id="BDU:2023-09013" title="BDU:2023-09013" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="packer" epoch="0" version="1.11.1" release="1.el7" arch="x86_64" src="">
					<filename>packer-0:1.11.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240826-02</id>
		<issued date="2024-08-26" />
		<updated date="2024-08-26" />
		<title>Уязвимость php </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в php</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php81-cve-2024-3096/</description>
               <solution>
                    Запретить использование в ОС пакета php
                или
                    Установить обновление для пакета(ов) php
Установка и обновление пакетов PHP до версии 8.Х на РЕД ОС производится по инструкции https://redos.red-soft.ru/base/arm/arm-other/php-8-redos-73/
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php81-cve-2024-3096/" type="self" id="ROS-20240826-02" title="ROS-20240826-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3096" type="cve" id="CVE-2024-3096" title="CVE-2024-3096" />
			<reference href="https://bdu.fstec.ru/vul/2024-03215" type="self" id="BDU:2024-03215" title="BDU:2024-03215" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php" epoch="0" version="8.1.29" release="1.el7" arch="x86_64" src="">
					<filename>php-0:8.1.29-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240826-21</id>
		<issued date="2024-08-26" />
		<updated date="2024-12-23" />
		<title>Уязвимость php </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в php</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php82-cve-2024-30967314/</description>
               <solution>
                    Запретить использование в ОС пакета php
                или
                    Установить обновление для пакета(ов) php
Установка и обновление пакетов PHP до версии 8.Х на РЕД ОС производится по инструкции https://redos.red-soft.ru/base/arm/arm-other/php-8-redos-73/
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php82-cve-2024-30967314/" type="self" id="ROS-20240826-21" title="ROS-20240826-21" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3096" type="cve" id="CVE-2024-3096" title="CVE-2024-3096" />
			<reference href="https://bdu.fstec.ru/vul/2024-03215" type="self" id="BDU:2024-03215" title="BDU:2024-03215" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php" epoch="0" version="8.2.20" release="1.el7" arch="x86_64" src="">
					<filename>php-0:8.2.20-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240826-22</id>
		<issued date="2024-08-26" />
		<updated date="2024-12-23" />
		<title>Уязвимость php </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в php</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php83-cve-2024-30965313/</description>
               <solution>
                    Запретить использование в ОС пакета php
                или
                    Установить обновление для пакета(ов) php
Установка и обновление пакетов PHP до версии 8.Х на РЕД ОС производится по инструкции https://redos.red-soft.ru/base/arm/arm-other/php-8-redos-73/
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php83-cve-2024-30965313/" type="self" id="ROS-20240826-22" title="ROS-20240826-22" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3096" type="cve" id="CVE-2024-3096" title="CVE-2024-3096" />
			<reference href="https://bdu.fstec.ru/vul/2024-03215" type="self" id="BDU:2024-03215" title="BDU:2024-03215" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php" epoch="0" version="8.3.8" release="1.el7" arch="x86_64" src="">
					<filename>php-0:8.3.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240826-03</id>
		<issued date="2024-08-26" />
		<updated date="2024-08-26" />
		<title>Уязвимость exempi </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в exempi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-exempi-cve-2020-18651/</description>
               <solution>
                    Запретить использование в ОС пакета exempi
                или
                    Установить обновление для пакета(ов) exempi
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-exempi-cve-2020-18651/" type="self" id="ROS-20240826-03" title="ROS-20240826-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-18651" type="cve" id="CVE-2020-18651" title="CVE-2020-18651" />
			<reference href="https://bdu.fstec.ru/vul/2024-06662" type="self" id="BDU:2024-06662" title="BDU:2024-06662" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="exempi" epoch="0" version="2.2.0" release="21.el7" arch="x86_64" src="">
					<filename>exempi-0:2.2.0-21.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240826-04</id>
		<issued date="2024-08-26" />
		<updated date="2024-08-26" />
		<title>Уязвимость derby </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в derby</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-derby-cve-2022-46337/</description>
               <solution>
                    Запретить использование в ОС пакета derby
                или
                    Установить обновление для пакета(ов) derby
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-derby-cve-2022-46337/" type="self" id="ROS-20240826-04" title="ROS-20240826-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46337" type="cve" id="CVE-2022-46337" title="CVE-2022-46337" />
			<reference href="https://bdu.fstec.ru/vul/2024-00180" type="self" id="BDU:2024-00180" title="BDU:2024-00180" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="derby" epoch="0" version="10.16.1.2" release="1.el7" arch="noarch" src="">
					<filename>derby-0:10.16.1.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240826-05</id>
		<issued date="2024-08-26" />
		<updated date="2024-08-26" />
		<title>Уязвимость fontforge </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в fontforge</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-fontforge-cve-2024-25081/</description>
               <solution>
                    Запретить использование в ОС пакета fontforge
                или
                    Установить обновление для пакета(ов) fontforge
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-fontforge-cve-2024-25081/" type="self" id="ROS-20240826-05" title="ROS-20240826-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25081" type="cve" id="CVE-2024-25081" title="CVE-2024-25081" />
			<reference href="https://bdu.fstec.ru/vul/2024-01604" type="self" id="BDU:2024-01604" title="BDU:2024-01604" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="fontforge" epoch="0" version="20190801" release="9.el7" arch="x86_64" src="">
					<filename>fontforge-0:20190801-9.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240826-06</id>
		<issued date="2024-08-26" />
		<updated date="2024-08-26" />
		<title>Уязвимость ghostscript </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ghostscript</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimosti-ghostscript-cve-2024-29508/</description>
               <solution>
                    Запретить использование в ОС пакета ghostscript
                или
                    Установить обновление для пакета(ов) ghostscript
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimosti-ghostscript-cve-2024-29508/" type="self" id="ROS-20240826-06" title="ROS-20240826-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29508" type="cve" id="CVE-2024-29508" title="CVE-2024-29508" />
			<reference href="https://bdu.fstec.ru/vul/2024-05559" type="self" id="BDU:2024-05559" title="BDU:2024-05559" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ghostscript" epoch="0" version="9.52" release="9.el7" arch="x86_64" src="">
					<filename>ghostscript-0:9.52-9.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240826-07</id>
		<issued date="2024-08-26" />
		<updated date="2024-08-26" />
		<title>Уязвимость jsoup </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в jsoup</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jsoup-cve-2022-36033/</description>
               <solution>
                    Запретить использование в ОС пакета jsoup
                или
                    Установить обновление для пакета(ов) jsoup
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jsoup-cve-2022-36033/" type="self" id="ROS-20240826-07" title="ROS-20240826-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36033" type="cve" id="CVE-2022-36033" title="CVE-2022-36033" />
			<reference href="https://bdu.fstec.ru/vul/2022-05314" type="self" id="BDU:2022-05314" title="BDU:2022-05314" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jsoup" epoch="0" version="1.16.1" release="2.el7" arch="noarch" src="">
					<filename>jsoup-0:1.16.1-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240826-08</id>
		<issued date="2024-08-26" />
		<updated date="2024-08-26" />
		<title>Множественные уязвимости blender </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в blender</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-blender-cve-2022-0545-cve-2022-0546-cve-2022-0544/</description>
               <solution>
                    Запретить использование в ОС пакета blender
                или
                    Установить обновление для пакета(ов) blender
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-blender-cve-2022-0545-cve-2022-0546-cve-2022-0544/" type="self" id="ROS-20240826-08" title="ROS-20240826-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0545" type="cve" id="CVE-2022-0545" title="CVE-2022-0545" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0546" type="cve" id="CVE-2022-0546" title="CVE-2022-0546" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0544" type="cve" id="CVE-2022-0544" title="CVE-2022-0544" />
			<reference href="https://bdu.fstec.ru/vul/2022-05849" type="self" id="BDU:2022-05849" title="BDU:2022-05849" />
			<reference href="https://bdu.fstec.ru/vul/2022-05845" type="self" id="BDU:2022-05845" title="BDU:2022-05845" />
			<reference href="https://bdu.fstec.ru/vul/2022-05850" type="self" id="BDU:2022-05850" title="BDU:2022-05850" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="blender" epoch="1" version="2.91.0" release="3.el7" arch="x86_64" src="">
					<filename>blender-1:2.91.0-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240826-23</id>
		<issued date="2024-08-26" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости OpenImageIO </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в OpenImageIO</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-OpenImageIO-cve-2022-0545-cve-2022-0546-cve-2022-05447189/</description>
               <solution>
                    Запретить использование в ОС пакета OpenImageIO
                или
                    Установить обновление для пакета(ов) OpenImageIO
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-OpenImageIO-cve-2022-0545-cve-2022-0546-cve-2022-05447189/" type="self" id="ROS-20240826-23" title="ROS-20240826-23" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0545" type="cve" id="CVE-2022-0545" title="CVE-2022-0545" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0546" type="cve" id="CVE-2022-0546" title="CVE-2022-0546" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0544" type="cve" id="CVE-2022-0544" title="CVE-2022-0544" />
			<reference href="https://bdu.fstec.ru/vul/2022-05849" type="self" id="BDU:2022-05849" title="BDU:2022-05849" />
			<reference href="https://bdu.fstec.ru/vul/2022-05845" type="self" id="BDU:2022-05845" title="BDU:2022-05845" />
			<reference href="https://bdu.fstec.ru/vul/2022-05850" type="self" id="BDU:2022-05850" title="BDU:2022-05850" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="OpenImageIO" epoch="0" version="2.2.8.0" release="5.el7" arch="x86_64" src="">
					<filename>OpenImageIO-0:2.2.8.0-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240826-09</id>
		<issued date="2024-08-26" />
		<updated date="2024-08-26" />
		<title>Множественные уязвимости ruby </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ruby</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-ruby-cve-2023-28756-cve-2023-28755/</description>
               <solution>
                    Запретить использование в ОС пакета ruby
                или
                    Установить обновление для пакета(ов) ruby
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-ruby-cve-2023-28756-cve-2023-28755/" type="self" id="ROS-20240826-09" title="ROS-20240826-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28756" type="cve" id="CVE-2023-28756" title="CVE-2023-28756" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28755" type="cve" id="CVE-2023-28755" title="CVE-2023-28755" />
			<reference href="https://bdu.fstec.ru/vul/2023-02020" type="self" id="BDU:2023-02020" title="BDU:2023-02020" />
			<reference href="https://bdu.fstec.ru/vul/2023-03870" type="self" id="BDU:2023-03870" title="BDU:2023-03870" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ruby" epoch="0" version="2.7.6" release="131.el7" arch="x86_64" src="">
					<filename>ruby-0:2.7.6-131.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240826-10</id>
		<issued date="2024-08-26" />
		<updated date="2024-08-26" />
		<title>Уязвимость python3-pygments </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-pygments</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-pygments-cve-2022-40896/</description>
               <solution>
                    Запретить использование в ОС пакета python3-pygments
                или
                    Установить обновление для пакета(ов) python3-pygments
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-pygments-cve-2022-40896/" type="self" id="ROS-20240826-10" title="ROS-20240826-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40896" type="cve" id="CVE-2022-40896" title="CVE-2022-40896" />
			<reference href="https://bdu.fstec.ru/vul/2024-00830" type="self" id="BDU:2024-00830" title="BDU:2024-00830" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-pygments" epoch="0" version="2.15.1" release="1.el7" arch="noarch" src="">
					<filename>python3-pygments-0:2.15.1-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240826-24</id>
		<issued date="2024-08-26" />
		<updated date="2024-12-23" />
		<title>Уязвимость python3-sphinx </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-sphinx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-sphinx-cve-2022-408964048/</description>
               <solution>
                    Запретить использование в ОС пакета python3-sphinx
                или
                    Установить обновление для пакета(ов) python3-sphinx
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-sphinx-cve-2022-408964048/" type="self" id="ROS-20240826-24" title="ROS-20240826-24" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40896" type="cve" id="CVE-2022-40896" title="CVE-2022-40896" />
			<reference href="https://bdu.fstec.ru/vul/2024-00830" type="self" id="BDU:2024-00830" title="BDU:2024-00830" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-sphinx" epoch="1" version="5.0.2" release="3.el7" arch="noarch" src="">
					<filename>python3-sphinx-1:5.0.2-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240826-11</id>
		<issued date="2024-08-26" />
		<updated date="2024-08-26" />
		<title>Уязвимость mysql-connector-java </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в mysql-connector-java</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mysql-connector-java-cve-2023-22102/</description>
               <solution>
                    Запретить использование в ОС пакета mysql-connector-java
                или
                    Установить обновление для пакета(ов) mysql-connector-java
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mysql-connector-java-cve-2023-22102/" type="self" id="ROS-20240826-11" title="ROS-20240826-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22102" type="cve" id="CVE-2023-22102" title="CVE-2023-22102" />
			<reference href="https://bdu.fstec.ru/vul/2023-07092" type="self" id="BDU:2023-07092" title="BDU:2023-07092" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mysql-connector-java" epoch="0" version="8.4.0" release="1.el7" arch="noarch" src="">
					<filename>mysql-connector-java-0:8.4.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240826-12</id>
		<issued date="2024-08-26" />
		<updated date="2024-08-28" />
		<title>Уязвимость ruby </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в ruby</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ruby-cve-2023-36617/</description>
               <solution>
                    Запретить использование в ОС пакета ruby
                или
                    Установить обновление для пакета(ов) ruby
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ruby-cve-2023-36617/" type="self" id="ROS-20240826-12" title="ROS-20240826-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28755" type="cve" id="CVE-2023-28755" title="CVE-2023-28755" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36617" type="cve" id="CVE-2023-36617" title="CVE-2023-36617" />
			<reference href="https://bdu.fstec.ru/vul/2023-03870" type="self" id="BDU:2023-03870" title="BDU:2023-03870" />
			<reference href="https://bdu.fstec.ru/vul/2024-00198" type="self" id="BDU:2024-00198" title="BDU:2024-00198" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ruby" epoch="0" version="2.7.6" release="131.el7" arch="x86_64" src="">
					<filename>ruby-0:2.7.6-131.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240826-13</id>
		<issued date="2024-08-26" />
		<updated date="2024-08-26" />
		<title>Множественные уязвимости etcd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в etcd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-etcd-cve-2023-47108-cve-2023-45288-cve-2024-24786/</description>
               <solution>
                    Запретить использование в ОС пакета etcd
                или
                    Установить обновление для пакета(ов) etcd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-etcd-cve-2023-47108-cve-2023-45288-cve-2024-24786/" type="self" id="ROS-20240826-13" title="ROS-20240826-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47108" type="cve" id="CVE-2023-47108" title="CVE-2023-47108" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45288" type="cve" id="CVE-2023-45288" title="CVE-2023-45288" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24786" type="cve" id="CVE-2024-24786" title="CVE-2024-24786" />
			<reference href="https://bdu.fstec.ru/vul/2024-06663" type="self" id="BDU:2024-06663" title="BDU:2024-06663" />
			<reference href="https://bdu.fstec.ru/vul/2024-02688" type="self" id="BDU:2024-02688" title="BDU:2024-02688" />
			<reference href="https://bdu.fstec.ru/vul/2024-04111" type="self" id="BDU:2024-04111" title="BDU:2024-04111" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="etcd" epoch="0" version="3.5.15" release="2.el7" arch="x86_64" src="">
					<filename>etcd-0:3.5.15-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240826-14</id>
		<issued date="2024-08-26" />
		<updated date="2024-08-26" />
		<title>Уязвимость graphviz </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в graphviz</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-graphviz-cve-2023-46045/</description>
               <solution>
                    Запретить использование в ОС пакета graphviz
                или
                    Установить обновление для пакета(ов) graphviz
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-graphviz-cve-2023-46045/" type="self" id="ROS-20240826-14" title="ROS-20240826-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46045" type="cve" id="CVE-2023-46045" title="CVE-2023-46045" />
			<reference href="https://bdu.fstec.ru/vul/2024-05040" type="self" id="BDU:2024-05040" title="BDU:2024-05040" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="graphviz" epoch="0" version="5.0.0" release="7.el7" arch="x86_64" src="">
					<filename>graphviz-0:5.0.0-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240826-15</id>
		<issued date="2024-08-26" />
		<updated date="2024-08-26" />
		<title>Уязвимость unixODBC </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в unixODBC</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-unixodbc-cve-2024-1013/</description>
               <solution>
                    Запретить использование в ОС пакета unixODBC
                или
                    Установить обновление для пакета(ов) unixODBC
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-unixodbc-cve-2024-1013/" type="self" id="ROS-20240826-15" title="ROS-20240826-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1013" type="cve" id="CVE-2024-1013" title="CVE-2024-1013" />
			<reference href="https://bdu.fstec.ru/vul/2024-04824" type="self" id="BDU:2024-04824" title="BDU:2024-04824" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="unixODBC" epoch="0" version="2.3.7" release="13.el7" arch="x86_64" src="">
					<filename>unixODBC-0:2.3.7-13.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240826-16</id>
		<issued date="2024-08-26" />
		<updated date="2024-08-26" />
		<title>Множественные уязвимости java-1.8.0-openjdk-portable</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-1.8.0-openjdk-portable</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-1-8-0-openjdk-portable/</description>
               <solution>
                    Запретить использование в ОС пакета java-1.8.0-openjdk-portable
                или
                    Установить обновление для пакета(ов) java-1.8.0-openjdk-portable
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-1-8-0-openjdk-portable/" type="self" id="ROS-20240826-16" title="ROS-20240826-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147" type="cve" id="CVE-2024-21147" title="CVE-2024-21147" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144" type="cve" id="CVE-2024-21144" title="CVE-2024-21144" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145" type="cve" id="CVE-2024-21145" title="CVE-2024-21145" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140" type="cve" id="CVE-2024-21140" title="CVE-2024-21140" />
			<reference href="https://bdu.fstec.ru/vul/2024-06285" type="self" id="BDU:2024-06285" title="BDU:2024-06285" />
			<reference href="https://bdu.fstec.ru/vul/2024-06287" type="self" id="BDU:2024-06287" title="BDU:2024-06287" />
			<reference href="https://bdu.fstec.ru/vul/2024-06283" type="self" id="BDU:2024-06283" title="BDU:2024-06283" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-1.8.0-openjdk-portable" epoch="1" version="1.8.0.422.b06" release="2.el7" arch="x86_64" src="">
					<filename>java-1.8.0-openjdk-portable-1:1.8.0.422.b06-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240826-25</id>
		<issued date="2024-08-26" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости java-11-openjdk-portable</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-11-openjdk-portable</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-11-openjdk-portable/</description>
               <solution>
                    Запретить использование в ОС пакета java-11-openjdk-portable
                или
                    Установить обновление для пакета(ов) java-11-openjdk-portable
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-11-openjdk-portable/" type="self" id="ROS-20240826-25" title="ROS-20240826-25" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147" type="cve" id="CVE-2024-21147" title="CVE-2024-21147" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144" type="cve" id="CVE-2024-21144" title="CVE-2024-21144" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145" type="cve" id="CVE-2024-21145" title="CVE-2024-21145" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140" type="cve" id="CVE-2024-21140" title="CVE-2024-21140" />
			<reference href="https://bdu.fstec.ru/vul/2024-06285" type="self" id="BDU:2024-06285" title="BDU:2024-06285" />
			<reference href="https://bdu.fstec.ru/vul/2024-06287" type="self" id="BDU:2024-06287" title="BDU:2024-06287" />
			<reference href="https://bdu.fstec.ru/vul/2024-06283" type="self" id="BDU:2024-06283" title="BDU:2024-06283" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-11-openjdk-portable" epoch="1" version="11.0.24.0.8" release="2.el7" arch="x86_64" src="">
					<filename>java-11-openjdk-portable-1:11.0.24.0.8-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240826-26</id>
		<issued date="2024-08-26" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости java-17-openjdk-portable</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-17-openjdk-portable</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-17-openjdk-portable5896/</description>
               <solution>
                    Запретить использование в ОС пакета java-17-openjdk-portable
                или
                    Установить обновление для пакета(ов) java-17-openjdk-portable
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-17-openjdk-portable5896/" type="self" id="ROS-20240826-26" title="ROS-20240826-26" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147" type="cve" id="CVE-2024-21147" title="CVE-2024-21147" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144" type="cve" id="CVE-2024-21144" title="CVE-2024-21144" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145" type="cve" id="CVE-2024-21145" title="CVE-2024-21145" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140" type="cve" id="CVE-2024-21140" title="CVE-2024-21140" />
			<reference href="https://bdu.fstec.ru/vul/2024-06285" type="self" id="BDU:2024-06285" title="BDU:2024-06285" />
			<reference href="https://bdu.fstec.ru/vul/2024-06287" type="self" id="BDU:2024-06287" title="BDU:2024-06287" />
			<reference href="https://bdu.fstec.ru/vul/2024-06283" type="self" id="BDU:2024-06283" title="BDU:2024-06283" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-17-openjdk-portable" epoch="1" version="17.0.12.0.7" release="1.el7" arch="x86_64" src="">
					<filename>java-17-openjdk-portable-1:17.0.12.0.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240826-27</id>
		<issued date="2024-08-26" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости java-21-openjdk-portable</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-21-openjdk-portable</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-21-openjdk-portable1642/</description>
               <solution>
                    Запретить использование в ОС пакета java-21-openjdk-portable
                или
                    Установить обновление для пакета(ов) java-21-openjdk-portable
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-21-openjdk-portable1642/" type="self" id="ROS-20240826-27" title="ROS-20240826-27" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147" type="cve" id="CVE-2024-21147" title="CVE-2024-21147" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144" type="cve" id="CVE-2024-21144" title="CVE-2024-21144" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145" type="cve" id="CVE-2024-21145" title="CVE-2024-21145" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140" type="cve" id="CVE-2024-21140" title="CVE-2024-21140" />
			<reference href="https://bdu.fstec.ru/vul/2024-06285" type="self" id="BDU:2024-06285" title="BDU:2024-06285" />
			<reference href="https://bdu.fstec.ru/vul/2024-06287" type="self" id="BDU:2024-06287" title="BDU:2024-06287" />
			<reference href="https://bdu.fstec.ru/vul/2024-06283" type="self" id="BDU:2024-06283" title="BDU:2024-06283" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-21-openjdk-portable" epoch="1" version="21.0.2.0.13" release="2.el7" arch="x86_64" src="">
					<filename>java-21-openjdk-portable-1:21.0.2.0.13-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240826-17</id>
		<issued date="2024-08-26" />
		<updated date="2024-08-26" />
		<title>Множественные уязвимости roundcubemail </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в roundcubemail</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-roundcubemail-cve-2024-42010-cve-2024-42009-cve-2024-42008/</description>
               <solution>
                    Запретить использование в ОС пакета roundcubemail
                или
                    Установить обновление для пакета(ов) roundcubemail
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-roundcubemail-cve-2024-42010-cve-2024-42009-cve-2024-42008/" type="self" id="ROS-20240826-17" title="ROS-20240826-17" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42010" type="cve" id="CVE-2024-42010" title="CVE-2024-42010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42009" type="cve" id="CVE-2024-42009" title="CVE-2024-42009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42008" type="cve" id="CVE-2024-42008" title="CVE-2024-42008" />
			<reference href="https://bdu.fstec.ru/vul/2024-06665" type="self" id="BDU:2024-06665" title="BDU:2024-06665" />
			<reference href="https://bdu.fstec.ru/vul/2024-06146" type="self" id="BDU:2024-06146" title="BDU:2024-06146" />
			<reference href="https://bdu.fstec.ru/vul/2024-06254" type="self" id="BDU:2024-06254" title="BDU:2024-06254" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="roundcubemail" epoch="0" version="1.5.8" release="1.el7" arch="noarch" src="">
					<filename>roundcubemail-0:1.5.8-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240826-18</id>
		<issued date="2024-08-26" />
		<updated date="2024-08-26" />
		<title>Множественные уязвимости dotnet </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dotnet</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-dotnet-cve-2024-38168-cve-2024-38167/</description>
               <solution>
                    Запретить использование в ОС пакета dotnet
                или
                    Установить обновление для пакета(ов) dotnet
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-dotnet-cve-2024-38168-cve-2024-38167/" type="self" id="ROS-20240826-18" title="ROS-20240826-18" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38168" type="cve" id="CVE-2024-38168" title="CVE-2024-38168" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38167" type="cve" id="CVE-2024-38167" title="CVE-2024-38167" />
			<reference href="https://bdu.fstec.ru/vul/2024-06427" type="self" id="BDU:2024-06427" title="BDU:2024-06427" />
			<reference href="https://bdu.fstec.ru/vul/2024-06413" type="self" id="BDU:2024-06413" title="BDU:2024-06413" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dotnet" epoch="0" version="8.0.108" release="1.el7" arch="x86_64" src="">
					<filename>dotnet-0:8.0.108-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240826-19</id>
		<issued date="2024-08-26" />
		<updated date="2024-08-26" />
		<title>Уязвимость python3-wheel </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-wheel</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-wheel-cve-2022-40898/</description>
               <solution>
                    Запретить использование в ОС пакета python3-wheel
                или
                    Установить обновление для пакета(ов) python3-wheel
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-wheel-cve-2022-40898/" type="self" id="ROS-20240826-19" title="ROS-20240826-19" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40898" type="cve" id="CVE-2022-40898" title="CVE-2022-40898" />
			<reference href="https://bdu.fstec.ru/vul/2023-08101" type="self" id="BDU:2023-08101" title="BDU:2023-08101" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-wheel" epoch="1" version="0.37.1" release="5.el7" arch="noarch" src="">
					<filename>python3-wheel-1:0.37.1-5.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240826-20</id>
		<issued date="2024-08-26" />
		<updated date="2024-08-26" />
		<title>Множественные уязвимости stolon</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в stolon</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-stolon/</description>
               <solution>
                    Запретить использование в ОС пакета stolon
                или
                    Установить обновление для пакета(ов) stolon
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-stolon/" type="self" id="ROS-20240826-20" title="ROS-20240826-20" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24791" type="cve" id="CVE-2024-24791" title="CVE-2024-24791" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24790" type="cve" id="CVE-2024-24790" title="CVE-2024-24790" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45288" type="cve" id="CVE-2023-45288" title="CVE-2023-45288" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24789" type="cve" id="CVE-2024-24789" title="CVE-2024-24789" />
			<reference href="https://bdu.fstec.ru/vul/2024-06680" type="self" id="BDU:2024-06680" title="BDU:2024-06680" />
			<reference href="https://bdu.fstec.ru/vul/2024-04486" type="self" id="BDU:2024-04486" title="BDU:2024-04486" />
			<reference href="https://bdu.fstec.ru/vul/2024-02688" type="self" id="BDU:2024-02688" title="BDU:2024-02688" />
			<reference href="https://bdu.fstec.ru/vul/2024-04485" type="self" id="BDU:2024-04485" title="BDU:2024-04485" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="stolon" epoch="0" version="0.17.0" release="3.el7" arch="x86_64" src="">
					<filename>stolon-0:0.17.0-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240827-01</id>
		<issued date="2024-08-28" />
		<updated date="2024-08-28" />
		<title>Уязвимость python3-mod_wsgi </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-mod_wsgi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-mod-wsgi-cve-2022-2255/</description>
               <solution>
                    Запретить использование в ОС пакета python3-mod_wsgi
                или
                    Установить обновление для пакета(ов) python3-mod_wsgi
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-mod-wsgi-cve-2022-2255/" type="self" id="ROS-20240827-01" title="ROS-20240827-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2255" type="cve" id="CVE-2022-2255" title="CVE-2022-2255" />
			<reference href="https://bdu.fstec.ru/vul/2022-05209" type="self" id="BDU:2022-05209" title="BDU:2022-05209" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-mod_wsgi" epoch="0" version="4.6.6" release="14.el7" arch="x86_64" src="">
					<filename>python3-mod_wsgi-0:4.6.6-14.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240827-02</id>
		<issued date="2024-08-28" />
		<updated date="2024-08-28" />
		<title>Уязвимость libvncserver </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libvncserver</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libvncserver-cve-2020-29260/</description>
               <solution>
                    Запретить использование в ОС пакета libvncserver
                или
                    Установить обновление для пакета(ов) libvncserver
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libvncserver-cve-2020-29260/" type="self" id="ROS-20240827-02" title="ROS-20240827-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29260" type="cve" id="CVE-2020-29260" title="CVE-2020-29260" />
			<reference href="https://bdu.fstec.ru/vul/2024-06666" type="self" id="BDU:2024-06666" title="BDU:2024-06666" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libvncserver" epoch="0" version="0.9.13" release="17.el7" arch="x86_64" src="">
					<filename>libvncserver-0:0.9.13-17.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240827-03</id>
		<issued date="2024-08-28" />
		<updated date="2024-08-28" />
		<title>Уязвимость ruby </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в ruby</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ruby-cve-2022-3704/</description>
               <solution>
                    Запретить использование в ОС пакета ruby
                или
                    Установить обновление для пакета(ов) ruby
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ruby-cve-2022-3704/" type="self" id="ROS-20240827-03" title="ROS-20240827-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3704" type="cve" id="CVE-2022-3704" title="CVE-2022-3704" />
			<reference href="https://bdu.fstec.ru/vul/2024-06602" type="self" id="BDU:2024-06602" title="BDU:2024-06602" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ruby" epoch="0" version="2.7.6" release="131.el7" arch="x86_64" src="">
					<filename>ruby-0:2.7.6-131.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240827-18</id>
		<issued date="2024-08-28" />
		<updated date="2024-12-23" />
		<title>Уязвимость rubygem-actionpack </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в rubygem-actionpack</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-actionpack-cve-2022-37044507/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-actionpack
                или
                    Установить обновление для пакета(ов) rubygem-actionpack
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-actionpack-cve-2022-37044507/" type="self" id="ROS-20240827-18" title="ROS-20240827-18" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3704" type="cve" id="CVE-2022-3704" title="CVE-2022-3704" />
			<reference href="https://bdu.fstec.ru/vul/2024-06602" type="self" id="BDU:2024-06602" title="BDU:2024-06602" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-actionpack" epoch="2" version="6.1.6.1" release="3.el7" arch="noarch" src="">
					<filename>rubygem-actionpack-2:6.1.6.1-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240827-04</id>
		<issued date="2024-08-28" />
		<updated date="2024-08-28" />
		<title>Уязвимость ruby </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ruby</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ruby-cve-2021-33621/</description>
               <solution>
                    Запретить использование в ОС пакета ruby
                или
                    Установить обновление для пакета(ов) ruby
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ruby-cve-2021-33621/" type="self" id="ROS-20240827-04" title="ROS-20240827-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33621" type="cve" id="CVE-2021-33621" title="CVE-2021-33621" />
			<reference href="https://bdu.fstec.ru/vul/2023-03834" type="self" id="BDU:2023-03834" title="BDU:2023-03834" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ruby" epoch="0" version="2.7.6" release="131.el7" arch="x86_64" src="">
					<filename>ruby-0:2.7.6-131.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240827-05</id>
		<issued date="2024-08-28" />
		<updated date="2024-08-28" />
		<title>Уязвимость unbound </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в unbound</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-unbound-cve-2024-1488/</description>
               <solution>
                    Запретить использование в ОС пакета Unbound
                или
                    Установить обновление для пакета(ов) Unbound
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-unbound-cve-2024-1488/" type="self" id="ROS-20240827-05" title="ROS-20240827-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1488" type="cve" id="CVE-2024-1488" title="CVE-2024-1488" />
			<reference href="https://bdu.fstec.ru/vul/2024-06601" type="self" id="BDU:2024-06601" title="BDU:2024-06601" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="unbound" epoch="0" version="1.19.2" release="4.el7" arch="x86_64" src="">
					<filename>unbound-0:1.19.2-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240827-06</id>
		<issued date="2024-08-28" />
		<updated date="2024-08-28" />
		<title>Множественные уязвимости ruby </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в ruby</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-ruby-cve-2024-26143-cve-2024-26144/</description>
               <solution>
                    Запретить использование в ОС пакета Ruby
                или
                    Установить обновление для пакета(ов) Ruby
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-ruby-cve-2024-26143-cve-2024-26144/" type="self" id="ROS-20240827-06" title="ROS-20240827-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26143" type="cve" id="CVE-2024-26143" title="CVE-2024-26143" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26144" type="cve" id="CVE-2024-26144" title="CVE-2024-26144" />
			<reference href="https://bdu.fstec.ru/vul/2024-06653" type="self" id="BDU:2024-06653" title="BDU:2024-06653" />
			<reference href="https://bdu.fstec.ru/vul/2024-06652" type="self" id="BDU:2024-06652" title="BDU:2024-06652" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ruby" epoch="0" version="2.7.6" release="131.el7" arch="x86_64" src="">
					<filename>ruby-0:2.7.6-131.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240827-19</id>
		<issued date="2024-08-28" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости rubygem-activestorage </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в rubygem-activestorage</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rubygem-activestorage-cve-2024-26143-cve-2024-261441315/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-activestorage
                или
                    Установить обновление для пакета(ов) rubygem-activestorage
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rubygem-activestorage-cve-2024-26143-cve-2024-261441315/" type="self" id="ROS-20240827-19" title="ROS-20240827-19" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26143" type="cve" id="CVE-2024-26143" title="CVE-2024-26143" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26144" type="cve" id="CVE-2024-26144" title="CVE-2024-26144" />
			<reference href="https://bdu.fstec.ru/vul/2024-06653" type="self" id="BDU:2024-06653" title="BDU:2024-06653" />
			<reference href="https://bdu.fstec.ru/vul/2024-06652" type="self" id="BDU:2024-06652" title="BDU:2024-06652" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-activestorage" epoch="2" version="6.1.6.1" release="3.el7" arch="noarch" src="">
					<filename>rubygem-activestorage-2:6.1.6.1-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240827-20</id>
		<issued date="2024-08-28" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости rubygem-actionpack </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в rubygem-actionpack</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rubygem-actionpack-cve-2024-26143-cve-2024-261443482/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-actionpack
                или
                    Установить обновление для пакета(ов) rubygem-actionpack
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rubygem-actionpack-cve-2024-26143-cve-2024-261443482/" type="self" id="ROS-20240827-20" title="ROS-20240827-20" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26143" type="cve" id="CVE-2024-26143" title="CVE-2024-26143" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26144" type="cve" id="CVE-2024-26144" title="CVE-2024-26144" />
			<reference href="https://bdu.fstec.ru/vul/2024-06653" type="self" id="BDU:2024-06653" title="BDU:2024-06653" />
			<reference href="https://bdu.fstec.ru/vul/2024-06652" type="self" id="BDU:2024-06652" title="BDU:2024-06652" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-actionpack" epoch="2" version="6.1.6.1" release="3.el7" arch="noarch" src="">
					<filename>rubygem-actionpack-2:6.1.6.1-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240827-07</id>
		<issued date="2024-08-28" />
		<updated date="2024-09-02" />
		<title>Множественные уязвимости mediawiki </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mediawiki</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mediawiki-cve-2024-34500-cve-2024-34502/</description>
               <solution>
                    Запретить использование в ОС пакета mediawiki
                или
                    Установить обновление для пакета(ов) mediawiki
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mediawiki-cve-2024-34500-cve-2024-34502/" type="self" id="ROS-20240827-07" title="ROS-20240827-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34500" type="cve" id="CVE-2024-34500" title="CVE-2024-34500" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34502" type="cve" id="CVE-2024-34502" title="CVE-2024-34502" />
			<reference href="https://bdu.fstec.ru/vul/2024-03498" type="self" id="BDU:2024-03498" title="BDU:2024-03498" />
			<reference href="https://bdu.fstec.ru/vul/2024-03520" type="self" id="BDU:2024-03520" title="BDU:2024-03520" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mediawiki" epoch="0" version="1.40.2" release="1.el7" arch="noarch" src="">
					<filename>mediawiki-0:1.40.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240827-08</id>
		<issued date="2024-08-28" />
		<updated date="2024-08-28" />
		<title>Уязвимость fontforge </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в fontforge</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-fontforge-cve-2024-25082/</description>
               <solution>
                    Запретить использование в ОС пакета fontforge
                или
                    Установить обновление для пакета(ов) fontforge
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-fontforge-cve-2024-25082/" type="self" id="ROS-20240827-08" title="ROS-20240827-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25082" type="cve" id="CVE-2024-25082" title="CVE-2024-25082" />
			<reference href="https://bdu.fstec.ru/vul/2024-01608" type="self" id="BDU:2024-01608" title="BDU:2024-01608" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="fontforge" epoch="0" version="20190801" release="9.el7" arch="x86_64" src="">
					<filename>fontforge-0:20190801-9.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240827-09</id>
		<issued date="2024-08-28" />
		<updated date="2024-08-28" />
		<title>Множественные уязвимости glpi </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-glpi-cve-2024-37147-cve-2024-37148-cve-2024-37149/</description>
               <solution>
                    Запретить использование в ОС пакета GLPI
                или
                    Установить обновление для пакета(ов) GLPI
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-glpi-cve-2024-37147-cve-2024-37148-cve-2024-37149/" type="self" id="ROS-20240827-09" title="ROS-20240827-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37147" type="cve" id="CVE-2024-37147" title="CVE-2024-37147" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37148" type="cve" id="CVE-2024-37148" title="CVE-2024-37148" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37149" type="cve" id="CVE-2024-37149" title="CVE-2024-37149" />
			<reference href="https://bdu.fstec.ru/vul/2024-06608" type="self" id="BDU:2024-06608" title="BDU:2024-06608" />
			<reference href="https://bdu.fstec.ru/vul/2024-06607" type="self" id="BDU:2024-06607" title="BDU:2024-06607" />
			<reference href="https://bdu.fstec.ru/vul/2024-06606" type="self" id="BDU:2024-06606" title="BDU:2024-06606" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi" epoch="0" version="10.0.16" release="1.el7" arch="noarch" src="">
					<filename>glpi-0:10.0.16-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240827-10</id>
		<issued date="2024-08-28" />
		<updated date="2024-08-28" />
		<title>Множественные уязвимости vim </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в vim-X11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim-cve-2024-41965-cve-2024-41957/</description>
               <solution>
                    Запретить использование в ОС пакета vim-X11
                или
                    Установить обновление для пакета(ов) vim-X11
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim-cve-2024-41965-cve-2024-41957/" type="self" id="ROS-20240827-10" title="ROS-20240827-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41965" type="cve" id="CVE-2024-41965" title="CVE-2024-41965" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41957" type="cve" id="CVE-2024-41957" title="CVE-2024-41957" />
			<reference href="https://bdu.fstec.ru/vul/2024-06299" type="self" id="BDU:2024-06299" title="BDU:2024-06299" />
			<reference href="https://bdu.fstec.ru/vul/2024-06478" type="self" id="BDU:2024-06478" title="BDU:2024-06478" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-X11" epoch="2" version="9.1.660" release="1.el7" arch="x86_64" src="">
					<filename>vim-X11-2:9.1.660-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240827-11</id>
		<issued date="2024-08-28" />
		<updated date="2024-08-28" />
		<title>Уязвимость tomcat </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2024-34750/</description>
               <solution>
                    Запретить использование в ОС пакета tomcat
                или
                    Установить обновление для пакета(ов) tomcat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2024-34750/" type="self" id="ROS-20240827-11" title="ROS-20240827-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34750" type="cve" id="CVE-2024-34750" title="CVE-2024-34750" />
			<reference href="https://bdu.fstec.ru/vul/2024-06407" type="self" id="BDU:2024-06407" title="BDU:2024-06407" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat" epoch="1" version="9.0.93" release="1.el7" arch="noarch" src="">
					<filename>tomcat-1:9.0.93-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240827-12</id>
		<issued date="2024-08-28" />
		<updated date="2024-08-28" />
		<title>Множественные уязвимости python3-unbound </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-unbound</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-unbound-cve-2024-43168-cve-2024-43167/</description>
               <solution>
                    Запретить использование в ОС пакета python3-unbound
                или
                    Установить обновление для пакета(ов) python3-unbound
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-unbound-cve-2024-43168-cve-2024-43167/" type="self" id="ROS-20240827-12" title="ROS-20240827-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43168" type="cve" id="CVE-2024-43168" title="CVE-2024-43168" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43167" type="cve" id="CVE-2024-43167" title="CVE-2024-43167" />
			<reference href="https://bdu.fstec.ru/vul/2024-06649" type="self" id="BDU:2024-06649" title="BDU:2024-06649" />
			<reference href="https://bdu.fstec.ru/vul/2024-06648" type="self" id="BDU:2024-06648" title="BDU:2024-06648" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-unbound" epoch="0" version="1.19.2" release="3.el7" arch="x86_64" src="">
					<filename>python3-unbound-0:1.19.2-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240827-13</id>
		<issued date="2024-08-28" />
		<updated date="2024-08-28" />
		<title>Уязвимость python3-ujson </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в python3-ujson</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-ujson-cve-2022-31116/</description>
               <solution>
                    Запретить использование в ОС пакета python3-ujson
                или
                    Установить обновление для пакета(ов) python3-ujson
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-ujson-cve-2022-31116/" type="self" id="ROS-20240827-13" title="ROS-20240827-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31116" type="cve" id="CVE-2022-31116" title="CVE-2022-31116" />
			<reference href="https://bdu.fstec.ru/vul/2022-04296" type="self" id="BDU:2022-04296" title="BDU:2022-04296" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-ujson" epoch="0" version="5.9.0" release="1.el7" arch="x86_64" src="">
					<filename>python3-ujson-0:5.9.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240827-14</id>
		<issued date="2024-08-28" />
		<updated date="2024-08-28" />
		<title>Уязвимость python3-pydantic </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-pydantic</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-pydantic-cve-2024-3772/</description>
               <solution>
                    Запретить использование в ОС пакета python3-pydantic
                или
                    Установить обновление для пакета(ов) python3-pydantic
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-pydantic-cve-2024-3772/" type="self" id="ROS-20240827-14" title="ROS-20240827-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3772" type="cve" id="CVE-2024-3772" title="CVE-2024-3772" />
			<reference href="https://bdu.fstec.ru/vul/2024-06603" type="self" id="BDU:2024-06603" title="BDU:2024-06603" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-pydantic" epoch="0" version="1.10.14" release="1.el7" arch="noarch" src="">
					<filename>python3-pydantic-0:1.10.14-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240827-15</id>
		<issued date="2024-08-28" />
		<updated date="2024-08-28" />
		<title>Уязвимость nginx </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nginx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nginx-cve-2024-7347/</description>
               <solution>
                    Запретить использование в ОС пакета nginx
                или
                    Установить обновление для пакета(ов) nginx
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nginx-cve-2024-7347/" type="self" id="ROS-20240827-15" title="ROS-20240827-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7347" type="cve" id="CVE-2024-7347" title="CVE-2024-7347" />
			<reference href="https://bdu.fstec.ru/vul/2024-06605" type="self" id="BDU:2024-06605" title="BDU:2024-06605" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nginx" epoch="1" version="1.26.2" release="1.el7" arch="x86_64" src="">
					<filename>nginx-1:1.26.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240827-16</id>
		<issued date="2024-08-28" />
		<updated date="2024-08-28" />
		<title>Уязвимость c-ares </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в c-ares</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-c-ares-cve-2023-32067/</description>
               <solution>
                    Запретить использование в ОС пакета c-ares
                или
                    Установить обновление для пакета(ов) c-ares
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-c-ares-cve-2023-32067/" type="self" id="ROS-20240827-16" title="ROS-20240827-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32067" type="cve" id="CVE-2023-32067" title="CVE-2023-32067" />
			<reference href="https://bdu.fstec.ru/vul/2023-07649" type="self" id="BDU:2023-07649" title="BDU:2023-07649" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="c-ares" epoch="0" version="1.17.2" release="6.el7" arch="x86_64" src="">
					<filename>c-ares-0:1.17.2-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240827-17</id>
		<issued date="2024-08-28" />
		<updated date="2024-08-28" />
		<title>Уязвимость golang-github-prometheus-alertmanager </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang-github-prometheus-alertmanager</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-github-prometheus-alertmanager-cve-2023-40577/</description>
               <solution>
                    Запретить использование в ОС пакета golang-github-prometheus-alertmanager
                или
                    Установить обновление для пакета(ов) golang-github-prometheus-alertmanager
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-github-prometheus-alertmanager-cve-2023-40577/" type="self" id="ROS-20240827-17" title="ROS-20240827-17" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40577" type="cve" id="CVE-2023-40577" title="CVE-2023-40577" />
			<reference href="https://bdu.fstec.ru/vul/2024-06600" type="self" id="BDU:2024-06600" title="BDU:2024-06600" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang-github-prometheus-alertmanager" epoch="0" version="0.27.0" release="1.el7" arch="x86_64" src="">
					<filename>golang-github-prometheus-alertmanager-0:0.27.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240828-01</id>
		<issued date="2024-08-28" />
		<updated date="2024-08-28" />
		<title>Уязвимость koji </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в koji</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-koji-cve-2020-15856/</description>
               <solution>
                    Запретить использование в ОС пакета Koji
                или
                    Установить обновление для пакета(ов) Koji
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-koji-cve-2020-15856/" type="self" id="ROS-20240828-01" title="ROS-20240828-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15856" type="cve" id="CVE-2020-15856" title="CVE-2020-15856" />
			<reference href="https://bdu.fstec.ru/vul/2024-06609" type="self" id="BDU:2024-06609" title="BDU:2024-06609" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="koji" epoch="0" version="1.25.1" release="1.el7" arch="noarch" src="">
					<filename>koji-0:1.25.1-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240828-02</id>
		<issued date="2024-08-28" />
		<updated date="2024-08-28" />
		<title>Уязвимость glpi </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2024-27756/</description>
               <solution>
                    Запретить использование в ОС пакета glpi
                или
                    Установить обновление для пакета(ов) glpi
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2024-27756/" type="self" id="ROS-20240828-02" title="ROS-20240828-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27756" type="cve" id="CVE-2024-27756" title="CVE-2024-27756" />
			<reference href="https://bdu.fstec.ru/vul/2024-06664" type="self" id="BDU:2024-06664" title="BDU:2024-06664" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi" epoch="0" version="10.0.13" release="1.el7" arch="noarch" src="">
					<filename>glpi-0:10.0.13-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240828-03</id>
		<issued date="2024-08-28" />
		<updated date="2024-08-28" />
		<title>Множественные уязвимости firefox</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-28-08-24/</description>
               <solution>
                    Запретить использование в ОС пакета Firefox
                или
                    Установить обновление для пакета(ов) Firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-28-08-24/" type="self" id="ROS-20240828-03" title="ROS-20240828-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521" type="cve" id="CVE-2024-7521" title="CVE-2024-7521" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519" type="cve" id="CVE-2024-7519" title="CVE-2024-7519" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522" type="cve" id="CVE-2024-7522" title="CVE-2024-7522" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524" type="cve" id="CVE-2024-7524" title="CVE-2024-7524" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525" type="cve" id="CVE-2024-7525" title="CVE-2024-7525" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526" type="cve" id="CVE-2024-7526" title="CVE-2024-7526" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527" type="cve" id="CVE-2024-7527" title="CVE-2024-7527" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529" type="cve" id="CVE-2024-7529" title="CVE-2024-7529" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531" type="cve" id="CVE-2024-7531" title="CVE-2024-7531" />
			<reference href="https://bdu.fstec.ru/vul/2024-06289" type="self" id="BDU:2024-06289" title="BDU:2024-06289" />
			<reference href="https://bdu.fstec.ru/vul/2024-06481" type="self" id="BDU:2024-06481" title="BDU:2024-06481" />
			<reference href="https://bdu.fstec.ru/vul/2024-06464" type="self" id="BDU:2024-06464" title="BDU:2024-06464" />
			<reference href="https://bdu.fstec.ru/vul/2024-06482" type="self" id="BDU:2024-06482" title="BDU:2024-06482" />
			<reference href="https://bdu.fstec.ru/vul/2024-06469" type="self" id="BDU:2024-06469" title="BDU:2024-06469" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.14.0" release="1.el7" arch="x86_64" src="">
					<filename>firefox-0:115.14.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240828-08</id>
		<issued date="2024-08-28" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости thunderbird</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-28-08-243525/</description>
               <solution>
                    Запретить использование в ОС пакета thunderbird
                или
                    Установить обновление для пакета(ов) thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-28-08-243525/" type="self" id="ROS-20240828-08" title="ROS-20240828-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521" type="cve" id="CVE-2024-7521" title="CVE-2024-7521" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519" type="cve" id="CVE-2024-7519" title="CVE-2024-7519" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522" type="cve" id="CVE-2024-7522" title="CVE-2024-7522" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524" type="cve" id="CVE-2024-7524" title="CVE-2024-7524" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525" type="cve" id="CVE-2024-7525" title="CVE-2024-7525" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526" type="cve" id="CVE-2024-7526" title="CVE-2024-7526" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527" type="cve" id="CVE-2024-7527" title="CVE-2024-7527" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529" type="cve" id="CVE-2024-7529" title="CVE-2024-7529" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531" type="cve" id="CVE-2024-7531" title="CVE-2024-7531" />
			<reference href="https://bdu.fstec.ru/vul/2024-06289" type="self" id="BDU:2024-06289" title="BDU:2024-06289" />
			<reference href="https://bdu.fstec.ru/vul/2024-06481" type="self" id="BDU:2024-06481" title="BDU:2024-06481" />
			<reference href="https://bdu.fstec.ru/vul/2024-06464" type="self" id="BDU:2024-06464" title="BDU:2024-06464" />
			<reference href="https://bdu.fstec.ru/vul/2024-06482" type="self" id="BDU:2024-06482" title="BDU:2024-06482" />
			<reference href="https://bdu.fstec.ru/vul/2024-06469" type="self" id="BDU:2024-06469" title="BDU:2024-06469" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="115.14.0" release="1.el7" arch="x86_64" src="">
					<filename>thunderbird-0:115.14.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240828-04</id>
		<issued date="2024-08-28" />
		<updated date="2024-08-28" />
		<title>Уязвимость openvpn </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в openvpn</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openvpn-cve-2024-5594/</description>
               <solution>
                    Запретить использование в ОС пакета OpenVPN
                или
                    Установить обновление для пакета(ов) OpenVPN
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openvpn-cve-2024-5594/" type="self" id="ROS-20240828-04" title="ROS-20240828-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5594" type="cve" id="CVE-2024-5594" title="CVE-2024-5594" />
			<reference href="https://bdu.fstec.ru/vul/2024-06604" type="self" id="BDU:2024-06604" title="BDU:2024-06604" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openvpn" epoch="0" version="2.6.11" release="1.el7" arch="x86_64" src="">
					<filename>openvpn-0:2.6.11-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240828-05</id>
		<issued date="2024-08-28" />
		<updated date="2024-08-28" />
		<title>Уязвимость mysql-connector-java </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mysql-connector-java</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mysql-connector-java-cve-2023-21971/</description>
               <solution>
                    Запретить использование в ОС пакета mysql-connector-java
                или
                    Установить обновление для пакета(ов) mysql-connector-java
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mysql-connector-java-cve-2023-21971/" type="self" id="ROS-20240828-05" title="ROS-20240828-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21971" type="cve" id="CVE-2023-21971" title="CVE-2023-21971" />
			<reference href="https://bdu.fstec.ru/vul/2023-02508" type="self" id="BDU:2023-02508" title="BDU:2023-02508" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mysql-connector-java" epoch="0" version="8.4.0" release="1.el7" arch="noarch" src="">
					<filename>mysql-connector-java-0:8.4.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240828-06</id>
		<issued date="2024-08-28" />
		<updated date="2024-08-28" />
		<title>Уязвимость libtiff </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libtiff</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libtiff-cve-2024-7006/</description>
               <solution>
                    Запретить использование в ОС пакета libtiff
                или
                    Установить обновление для пакета(ов) libtiff
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libtiff-cve-2024-7006/" type="self" id="ROS-20240828-06" title="ROS-20240828-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7006" type="cve" id="CVE-2024-7006" title="CVE-2024-7006" />
			<reference href="https://bdu.fstec.ru/vul/2024-06610" type="self" id="BDU:2024-06610" title="BDU:2024-06610" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libtiff" epoch="0" version="4.5.1" release="10.el7" arch="x86_64" src="">
					<filename>libtiff-0:4.5.1-10.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240828-07</id>
		<issued date="2024-08-28" />
		<updated date="2024-08-29" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-28-08-24/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-28-08-24/" type="self" id="ROS-20240828-07" title="ROS-20240828-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31085" type="cve" id="CVE-2023-31085" title="CVE-2023-31085" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084" type="cve" id="CVE-2023-31084" title="CVE-2023-31084" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48943" type="cve" id="CVE-2022-48943" title="CVE-2022-48943" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48942" type="cve" id="CVE-2022-48942" title="CVE-2022-48942" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48941" type="cve" id="CVE-2022-48941" title="CVE-2022-48941" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48940" type="cve" id="CVE-2022-48940" title="CVE-2022-48940" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48939" type="cve" id="CVE-2022-48939" title="CVE-2022-48939" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48938" type="cve" id="CVE-2022-48938" title="CVE-2022-48938" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48937" type="cve" id="CVE-2022-48937" title="CVE-2022-48937" />
			<reference href="https://bdu.fstec.ru/vul/2023-02516" type="self" id="BDU:2023-02516" title="BDU:2023-02516" />
			<reference href="https://bdu.fstec.ru/vul/2023-02518" type="self" id="BDU:2023-02518" title="BDU:2023-02518" />
			<reference href="https://bdu.fstec.ru/vul/2024-06660" type="self" id="BDU:2024-06660" title="BDU:2024-06660" />
			<reference href="https://bdu.fstec.ru/vul/2024-06659" type="self" id="BDU:2024-06659" title="BDU:2024-06659" />
			<reference href="https://bdu.fstec.ru/vul/2024-06658" type="self" id="BDU:2024-06658" title="BDU:2024-06658" />
			<reference href="https://bdu.fstec.ru/vul/2024-06657" type="self" id="BDU:2024-06657" title="BDU:2024-06657" />
			<reference href="https://bdu.fstec.ru/vul/2024-06656" type="self" id="BDU:2024-06656" title="BDU:2024-06656" />
			<reference href="https://bdu.fstec.ru/vul/2024-06655" type="self" id="BDU:2024-06655" title="BDU:2024-06655" />
			<reference href="https://bdu.fstec.ru/vul/2024-06654" type="self" id="BDU:2024-06654" title="BDU:2024-06654" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240829-01</id>
		<issued date="2024-08-29" />
		<updated date="2024-08-29" />
		<title>Множественные уязвимости VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-virtualbox-cve-2024-21161-cve-2024-21164-cve-2024-21141/</description>
               <solution>
                    Запретить использование в ОС пакета VirtualBox
                или
                    Установить обновление для пакета(ов) VirtualBox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-virtualbox-cve-2024-21161-cve-2024-21164-cve-2024-21141/" type="self" id="ROS-20240829-01" title="ROS-20240829-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21161" type="cve" id="CVE-2024-21161" title="CVE-2024-21161" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21164" type="cve" id="CVE-2024-21164" title="CVE-2024-21164" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21141" type="cve" id="CVE-2024-21141" title="CVE-2024-21141" />
			<reference href="https://bdu.fstec.ru/vul/2024-06651" type="self" id="BDU:2024-06651" title="BDU:2024-06651" />
			<reference href="https://bdu.fstec.ru/vul/2024-06650" type="self" id="BDU:2024-06650" title="BDU:2024-06650" />
			<reference href="https://bdu.fstec.ru/vul/2024-06577" type="self" id="BDU:2024-06577" title="BDU:2024-06577" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox" epoch="0" version="7.0.20" release="1.el7" arch="x86_64" src="">
					<filename>VirtualBox-0:7.0.20-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240829-02</id>
		<issued date="2024-08-29" />
		<updated date="2024-08-29" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-29-08-24/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-29-08-24/" type="self" id="ROS-20240829-02" title="ROS-20240829-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48888" type="cve" id="CVE-2022-48888" title="CVE-2022-48888" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48882" type="cve" id="CVE-2022-48882" title="CVE-2022-48882" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48881" type="cve" id="CVE-2022-48881" title="CVE-2022-48881" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48876" type="cve" id="CVE-2022-48876" title="CVE-2022-48876" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48874" type="cve" id="CVE-2022-48874" title="CVE-2022-48874" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48854" type="cve" id="CVE-2022-48854" title="CVE-2022-48854" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48936" type="cve" id="CVE-2022-48936" title="CVE-2022-48936" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48935" type="cve" id="CVE-2022-48935" title="CVE-2022-48935" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48934" type="cve" id="CVE-2022-48934" title="CVE-2022-48934" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48933" type="cve" id="CVE-2022-48933" title="CVE-2022-48933" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48932" type="cve" id="CVE-2022-48932" title="CVE-2022-48932" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48931" type="cve" id="CVE-2022-48931" title="CVE-2022-48931" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48930" type="cve" id="CVE-2022-48930" title="CVE-2022-48930" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48929" type="cve" id="CVE-2022-48929" title="CVE-2022-48929" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48928" type="cve" id="CVE-2022-48928" title="CVE-2022-48928" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48927" type="cve" id="CVE-2022-48927" title="CVE-2022-48927" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48926" type="cve" id="CVE-2022-48926" title="CVE-2022-48926" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48925" type="cve" id="CVE-2022-48925" title="CVE-2022-48925" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48924" type="cve" id="CVE-2022-48924" title="CVE-2022-48924" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48919" type="cve" id="CVE-2022-48919" title="CVE-2022-48919" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48918" type="cve" id="CVE-2022-48918" title="CVE-2022-48918" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48915" type="cve" id="CVE-2022-48915" title="CVE-2022-48915" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48913" type="cve" id="CVE-2022-48913" title="CVE-2022-48913" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48912" type="cve" id="CVE-2022-48912" title="CVE-2022-48912" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48892" type="cve" id="CVE-2022-48892" title="CVE-2022-48892" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48879" type="cve" id="CVE-2022-48879" title="CVE-2022-48879" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48878" type="cve" id="CVE-2022-48878" title="CVE-2022-48878" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48866" type="cve" id="CVE-2022-48866" title="CVE-2022-48866" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48865" type="cve" id="CVE-2022-48865" title="CVE-2022-48865" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48864" type="cve" id="CVE-2022-48864" title="CVE-2022-48864" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48863" type="cve" id="CVE-2022-48863" title="CVE-2022-48863" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48862" type="cve" id="CVE-2022-48862" title="CVE-2022-48862" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48861" type="cve" id="CVE-2022-48861" title="CVE-2022-48861" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48860" type="cve" id="CVE-2022-48860" title="CVE-2022-48860" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48859" type="cve" id="CVE-2022-48859" title="CVE-2022-48859" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48858" type="cve" id="CVE-2022-48858" title="CVE-2022-48858" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48855" type="cve" id="CVE-2022-48855" title="CVE-2022-48855" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48853" type="cve" id="CVE-2022-48853" title="CVE-2022-48853" />
			<reference href="https://bdu.fstec.ru/vul/2024-06647" type="self" id="BDU:2024-06647" title="BDU:2024-06647" />
			<reference href="https://bdu.fstec.ru/vul/2024-06646" type="self" id="BDU:2024-06646" title="BDU:2024-06646" />
			<reference href="https://bdu.fstec.ru/vul/2024-06645" type="self" id="BDU:2024-06645" title="BDU:2024-06645" />
			<reference href="https://bdu.fstec.ru/vul/2024-06644" type="self" id="BDU:2024-06644" title="BDU:2024-06644" />
			<reference href="https://bdu.fstec.ru/vul/2024-06643" type="self" id="BDU:2024-06643" title="BDU:2024-06643" />
			<reference href="https://bdu.fstec.ru/vul/2024-06642" type="self" id="BDU:2024-06642" title="BDU:2024-06642" />
			<reference href="https://bdu.fstec.ru/vul/2024-06641" type="self" id="BDU:2024-06641" title="BDU:2024-06641" />
			<reference href="https://bdu.fstec.ru/vul/2024-06640" type="self" id="BDU:2024-06640" title="BDU:2024-06640" />
			<reference href="https://bdu.fstec.ru/vul/2024-06639" type="self" id="BDU:2024-06639" title="BDU:2024-06639" />
			<reference href="https://bdu.fstec.ru/vul/2024-06638" type="self" id="BDU:2024-06638" title="BDU:2024-06638" />
			<reference href="https://bdu.fstec.ru/vul/2024-06637" type="self" id="BDU:2024-06637" title="BDU:2024-06637" />
			<reference href="https://bdu.fstec.ru/vul/2024-06636" type="self" id="BDU:2024-06636" title="BDU:2024-06636" />
			<reference href="https://bdu.fstec.ru/vul/2024-06635" type="self" id="BDU:2024-06635" title="BDU:2024-06635" />
			<reference href="https://bdu.fstec.ru/vul/2024-06634" type="self" id="BDU:2024-06634" title="BDU:2024-06634" />
			<reference href="https://bdu.fstec.ru/vul/2024-06633" type="self" id="BDU:2024-06633" title="BDU:2024-06633" />
			<reference href="https://bdu.fstec.ru/vul/2024-06632" type="self" id="BDU:2024-06632" title="BDU:2024-06632" />
			<reference href="https://bdu.fstec.ru/vul/2024-06631" type="self" id="BDU:2024-06631" title="BDU:2024-06631" />
			<reference href="https://bdu.fstec.ru/vul/2024-06630" type="self" id="BDU:2024-06630" title="BDU:2024-06630" />
			<reference href="https://bdu.fstec.ru/vul/2024-06629" type="self" id="BDU:2024-06629" title="BDU:2024-06629" />
			<reference href="https://bdu.fstec.ru/vul/2024-06628" type="self" id="BDU:2024-06628" title="BDU:2024-06628" />
			<reference href="https://bdu.fstec.ru/vul/2024-06661" type="self" id="BDU:2024-06661" title="BDU:2024-06661" />
			<reference href="https://bdu.fstec.ru/vul/2024-06627" type="self" id="BDU:2024-06627" title="BDU:2024-06627" />
			<reference href="https://bdu.fstec.ru/vul/2024-06626" type="self" id="BDU:2024-06626" title="BDU:2024-06626" />
			<reference href="https://bdu.fstec.ru/vul/2024-06625" type="self" id="BDU:2024-06625" title="BDU:2024-06625" />
			<reference href="https://bdu.fstec.ru/vul/2024-06624" type="self" id="BDU:2024-06624" title="BDU:2024-06624" />
			<reference href="https://bdu.fstec.ru/vul/2024-06623" type="self" id="BDU:2024-06623" title="BDU:2024-06623" />
			<reference href="https://bdu.fstec.ru/vul/2024-06622" type="self" id="BDU:2024-06622" title="BDU:2024-06622" />
			<reference href="https://bdu.fstec.ru/vul/2024-06621" type="self" id="BDU:2024-06621" title="BDU:2024-06621" />
			<reference href="https://bdu.fstec.ru/vul/2024-06620" type="self" id="BDU:2024-06620" title="BDU:2024-06620" />
			<reference href="https://bdu.fstec.ru/vul/2024-06619" type="self" id="BDU:2024-06619" title="BDU:2024-06619" />
			<reference href="https://bdu.fstec.ru/vul/2024-06618" type="self" id="BDU:2024-06618" title="BDU:2024-06618" />
			<reference href="https://bdu.fstec.ru/vul/2024-06617" type="self" id="BDU:2024-06617" title="BDU:2024-06617" />
			<reference href="https://bdu.fstec.ru/vul/2024-06616" type="self" id="BDU:2024-06616" title="BDU:2024-06616" />
			<reference href="https://bdu.fstec.ru/vul/2024-06615" type="self" id="BDU:2024-06615" title="BDU:2024-06615" />
			<reference href="https://bdu.fstec.ru/vul/2024-06614" type="self" id="BDU:2024-06614" title="BDU:2024-06614" />
			<reference href="https://bdu.fstec.ru/vul/2024-06613" type="self" id="BDU:2024-06613" title="BDU:2024-06613" />
			<reference href="https://bdu.fstec.ru/vul/2024-06612" type="self" id="BDU:2024-06612" title="BDU:2024-06612" />
			<reference href="https://bdu.fstec.ru/vul/2024-06611" type="self" id="BDU:2024-06611" title="BDU:2024-06611" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240830-01</id>
		<issued date="2024-08-30" />
		<updated date="2024-08-30" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-30-08-24/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-30-08-24/" type="self" id="ROS-20240830-01" title="ROS-20240830-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48843" type="cve" id="CVE-2022-48843" title="CVE-2022-48843" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48842" type="cve" id="CVE-2022-48842" title="CVE-2022-48842" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48839" type="cve" id="CVE-2022-48839" title="CVE-2022-48839" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48838" type="cve" id="CVE-2022-48838" title="CVE-2022-48838" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48837" type="cve" id="CVE-2022-48837" title="CVE-2022-48837" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48835" type="cve" id="CVE-2022-48835" title="CVE-2022-48835" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48848" type="cve" id="CVE-2022-48848" title="CVE-2022-48848" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48841" type="cve" id="CVE-2022-48841" title="CVE-2022-48841" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48800" type="cve" id="CVE-2022-48800" title="CVE-2022-48800" />
			<reference href="https://bdu.fstec.ru/vul/2024-06691" type="self" id="BDU:2024-06691" title="BDU:2024-06691" />
			<reference href="https://bdu.fstec.ru/vul/2024-06690" type="self" id="BDU:2024-06690" title="BDU:2024-06690" />
			<reference href="https://bdu.fstec.ru/vul/2024-06689" type="self" id="BDU:2024-06689" title="BDU:2024-06689" />
			<reference href="https://bdu.fstec.ru/vul/2024-06688" type="self" id="BDU:2024-06688" title="BDU:2024-06688" />
			<reference href="https://bdu.fstec.ru/vul/2024-06687" type="self" id="BDU:2024-06687" title="BDU:2024-06687" />
			<reference href="https://bdu.fstec.ru/vul/2024-06686" type="self" id="BDU:2024-06686" title="BDU:2024-06686" />
			<reference href="https://bdu.fstec.ru/vul/2024-06685" type="self" id="BDU:2024-06685" title="BDU:2024-06685" />
			<reference href="https://bdu.fstec.ru/vul/2024-06684" type="self" id="BDU:2024-06684" title="BDU:2024-06684" />
			<reference href="https://bdu.fstec.ru/vul/2024-06683" type="self" id="BDU:2024-06683" title="BDU:2024-06683" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240902-01</id>
		<issued date="2024-09-02" />
		<updated date="2024-09-02" />
		<title>Уязвимость linux-firmware </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в linux-firmware</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-linux-firmware-cve-2023-23908/</description>
               <solution>
                    Запретить использование в ОС пакета linux-firmware
                или
                    Установить обновление для пакета(ов) linux-firmware
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-linux-firmware-cve-2023-23908/" type="self" id="ROS-20240902-01" title="ROS-20240902-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23908" type="cve" id="CVE-2023-23908" title="CVE-2023-23908" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41804" type="cve" id="CVE-2022-41804" title="CVE-2022-41804" />
			<reference href="https://bdu.fstec.ru/vul/2023-07639" type="self" id="BDU:2023-07639" title="BDU:2023-07639" />
			<reference href="https://bdu.fstec.ru/vul/2023-07603" type="self" id="BDU:2023-07603" title="BDU:2023-07603" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="linux-firmware" epoch="0" version="20240709" release="1.el7.3" arch="noarch" src="">
					<filename>linux-firmware-0:20240709-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240902-02</id>
		<issued date="2024-09-02" />
		<updated date="2024-09-02" />
		<title>Уязвимость linux-firmware </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в linux-firmware</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-linux-firmware-cve-2023-20592/</description>
               <solution>
                    Запретить использование в ОС пакета linux-firmware
                или
                    Установить обновление для пакета(ов) linux-firmware
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-linux-firmware-cve-2023-20592/" type="self" id="ROS-20240902-02" title="ROS-20240902-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20592" type="cve" id="CVE-2023-20592" title="CVE-2023-20592" />
			<reference href="https://bdu.fstec.ru/vul/2023-08449" type="self" id="BDU:2023-08449" title="BDU:2023-08449" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="linux-firmware" epoch="0" version="20240709" release="1.el7.3" arch="noarch" src="">
					<filename>linux-firmware-0:20240709-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240902-03</id>
		<issued date="2024-09-02" />
		<updated date="2024-09-02" />
		<title>Уязвимость linux-firmware </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в linux-firmware</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-linux-firmware-cve-2023-23583/</description>
               <solution>
                    Запретить использование в ОС пакета linux-firmware
                или
                    Установить обновление для пакета(ов) linux-firmware
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-linux-firmware-cve-2023-23583/" type="self" id="ROS-20240902-03" title="ROS-20240902-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23583" type="cve" id="CVE-2023-23583" title="CVE-2023-23583" />
			<reference href="https://bdu.fstec.ru/vul/2023-07325" type="self" id="BDU:2023-07325" title="BDU:2023-07325" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="linux-firmware" epoch="0" version="20240709" release="1.el7.3" arch="noarch" src="">
					<filename>linux-firmware-0:20240709-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240902-04</id>
		<issued date="2024-09-02" />
		<updated date="2024-09-02" />
		<title>Уязвимость python3-jinja2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-jinja2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-jinja2-cve-2024-22195/</description>
               <solution>
                    Запретить использование в ОС пакета python3-jinja2
                или
                    Установить обновление для пакета(ов) python3-jinja2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-jinja2-cve-2024-22195/" type="self" id="ROS-20240902-04" title="ROS-20240902-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22195" type="cve" id="CVE-2024-22195" title="CVE-2024-22195" />
			<reference href="https://bdu.fstec.ru/vul/2024-00884" type="self" id="BDU:2024-00884" title="BDU:2024-00884" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-jinja2" epoch="0" version="3.1.3" release="0.1.el7" arch="noarch" src="">
					<filename>python3-jinja2-0:3.1.3-0.1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240902-05</id>
		<issued date="2024-09-02" />
		<updated date="2024-09-02" />
		<title>Уязвимость ncurses </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в ncurses</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ncurses-cve-2023-45918/</description>
               <solution>
                    Запретить использование в ОС пакета ncurses
                или
                    Установить обновление для пакета(ов) ncurses
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ncurses-cve-2023-45918/" type="self" id="ROS-20240902-05" title="ROS-20240902-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45918" type="cve" id="CVE-2023-45918" title="CVE-2023-45918" />
			<reference href="https://bdu.fstec.ru/vul/2024-06678" type="self" id="BDU:2024-06678" title="BDU:2024-06678" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ncurses" epoch="0" version="6.5" release="1.20240629.el7" arch="x86_64" src="">
					<filename>ncurses-0:6.5-1.20240629.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240902-06</id>
		<issued date="2024-09-02" />
		<updated date="2024-09-02" />
		<title>Множественные уязвимости gpac </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gpac</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gpac-cve-2024-28318-cve-2024-28319/</description>
               <solution>
                    Запретить использование в ОС пакета GPAC
                или
                    Установить обновление для пакета(ов) GPAC
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gpac-cve-2024-28318-cve-2024-28319/" type="self" id="ROS-20240902-06" title="ROS-20240902-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28318" type="cve" id="CVE-2024-28318" title="CVE-2024-28318" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28319" type="cve" id="CVE-2024-28319" title="CVE-2024-28319" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gpac" epoch="0" version="2.4.0" release="1.el7" arch="x86_64" src="">
					<filename>gpac-0:2.4.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240902-07</id>
		<issued date="2024-09-02" />
		<updated date="2024-09-02" />
		<title>Уязвимость cpio </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в cpio</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cpio-cve-2023-7207/</description>
               <solution>
                    Запретить использование в ОС пакета cpio
                или
                    Установить обновление для пакета(ов) cpio
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cpio-cve-2023-7207/" type="self" id="ROS-20240902-07" title="ROS-20240902-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7207" type="cve" id="CVE-2023-7207" title="CVE-2023-7207" />
			<reference href="https://bdu.fstec.ru/vul/2024-06679" type="self" id="BDU:2024-06679" title="BDU:2024-06679" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cpio" epoch="0" version="2.15" release="1.el7" arch="x86_64" src="">
					<filename>cpio-0:2.15-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240902-08</id>
		<issued date="2024-09-02" />
		<updated date="2024-09-02" />
		<title>Множественные уязвимости linux-firmware </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в linux-firmware</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-linux-firmware-cve-2023-43490-cve-2023-39368-cve-2023-38575-cve-2023-2265/</description>
               <solution>
                    Запретить использование в ОС пакета linux-firmware
                или
                    Установить обновление для пакета(ов) linux-firmware
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-linux-firmware-cve-2023-43490-cve-2023-39368-cve-2023-38575-cve-2023-2265/" type="self" id="ROS-20240902-08" title="ROS-20240902-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43490" type="cve" id="CVE-2023-43490" title="CVE-2023-43490" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39368" type="cve" id="CVE-2023-39368" title="CVE-2023-39368" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38575" type="cve" id="CVE-2023-38575" title="CVE-2023-38575" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22655" type="cve" id="CVE-2023-22655" title="CVE-2023-22655" />
			<reference href="https://bdu.fstec.ru/vul/2024-02607" type="self" id="BDU:2024-02607" title="BDU:2024-02607" />
			<reference href="https://bdu.fstec.ru/vul/2024-06692" type="self" id="BDU:2024-06692" title="BDU:2024-06692" />
			<reference href="https://bdu.fstec.ru/vul/2024-02524" type="self" id="BDU:2024-02524" title="BDU:2024-02524" />
			<reference href="https://bdu.fstec.ru/vul/2024-02527" type="self" id="BDU:2024-02527" title="BDU:2024-02527" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="linux-firmware" epoch="0" version="20240709" release="1.el7.3" arch="noarch" src="">
					<filename>linux-firmware-0:20240709-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240902-09</id>
		<issued date="2024-09-02" />
		<updated date="2024-09-04" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2024-4777/</description>
               <solution>
                    Запретить использование в ОС пакета Firefox
                или
                    Установить обновление для пакета(ов) Firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2024-4777/" type="self" id="ROS-20240902-09" title="ROS-20240902-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4777" type="cve" id="CVE-2024-4777" title="CVE-2024-4777" />
			<reference href="https://bdu.fstec.ru/vul/2024-06672" type="self" id="BDU:2024-06672" title="BDU:2024-06672" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.12.0" release="1.el7" arch="x86_64" src="">
					<filename>firefox-0:115.12.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240902-21</id>
		<issued date="2024-09-02" />
		<updated date="2024-12-23" />
		<title>Уязвимость thunderbird </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-thunderbird-cve-2024-47778487/</description>
               <solution>
                    Запретить использование в ОС пакета thunderbird
                или
                    Установить обновление для пакета(ов) thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-thunderbird-cve-2024-47778487/" type="self" id="ROS-20240902-21" title="ROS-20240902-21" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4777" type="cve" id="CVE-2024-4777" title="CVE-2024-4777" />
			<reference href="https://bdu.fstec.ru/vul/2024-06672" type="self" id="BDU:2024-06672" title="BDU:2024-06672" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="115.12.1" release="1.el7" arch="x86_6" src="">
					<filename>thunderbird-0:115.12.1-1.el7.x86_6.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240902-10</id>
		<issued date="2024-09-02" />
		<updated date="2024-09-02" />
		<title>Уязвимость gdk-pixbuf2 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gdk-pixbuf2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gdk-pixbuf2-cve-2022-48622/</description>
               <solution>
                    Запретить использование в ОС пакета gdk-pixbuf2
                или
                    Установить обновление для пакета(ов) gdk-pixbuf2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gdk-pixbuf2-cve-2022-48622/" type="self" id="ROS-20240902-10" title="ROS-20240902-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48622" type="cve" id="CVE-2022-48622" title="CVE-2022-48622" />
			<reference href="https://bdu.fstec.ru/vul/2024-06670" type="self" id="BDU:2024-06670" title="BDU:2024-06670" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gdk-pixbuf2" epoch="0" version="2.40.0" release="10.el7" arch="x86_64" src="">
					<filename>gdk-pixbuf2-0:2.40.0-10.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240902-11</id>
		<issued date="2024-09-02" />
		<updated date="2024-09-04" />
		<title>Множественные уязвимости firefox</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-02-09-24/</description>
               <solution>
                    Запретить использование в ОС пакета Firefox
                или
                    Установить обновление для пакета(ов) Firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-02-09-24/" type="self" id="ROS-20240902-11" title="ROS-20240902-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6600" type="cve" id="CVE-2024-6600" title="CVE-2024-6600" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601" type="cve" id="CVE-2024-6601" title="CVE-2024-6601" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602" type="cve" id="CVE-2024-6602" title="CVE-2024-6602" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603" type="cve" id="CVE-2024-6603" title="CVE-2024-6603" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604" type="cve" id="CVE-2024-6604" title="CVE-2024-6604" />
			<reference href="https://bdu.fstec.ru/vul/2024-06677" type="self" id="BDU:2024-06677" title="BDU:2024-06677" />
			<reference href="https://bdu.fstec.ru/vul/2024-06676" type="self" id="BDU:2024-06676" title="BDU:2024-06676" />
			<reference href="https://bdu.fstec.ru/vul/2024-06675" type="self" id="BDU:2024-06675" title="BDU:2024-06675" />
			<reference href="https://bdu.fstec.ru/vul/2024-06674" type="self" id="BDU:2024-06674" title="BDU:2024-06674" />
			<reference href="https://bdu.fstec.ru/vul/2024-06673" type="self" id="BDU:2024-06673" title="BDU:2024-06673" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.13.0" release="1.el7" arch="x86_64" src="">
					<filename>firefox-0:115.13.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240902-22</id>
		<issued date="2024-09-02" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости thunderbird</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-02-09-248346/</description>
               <solution>
                    Запретить использование в ОС пакета thunderbird
                или
                    Установить обновление для пакета(ов) thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-02-09-248346/" type="self" id="ROS-20240902-22" title="ROS-20240902-22" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6600" type="cve" id="CVE-2024-6600" title="CVE-2024-6600" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601" type="cve" id="CVE-2024-6601" title="CVE-2024-6601" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602" type="cve" id="CVE-2024-6602" title="CVE-2024-6602" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603" type="cve" id="CVE-2024-6603" title="CVE-2024-6603" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604" type="cve" id="CVE-2024-6604" title="CVE-2024-6604" />
			<reference href="https://bdu.fstec.ru/vul/2024-06677" type="self" id="BDU:2024-06677" title="BDU:2024-06677" />
			<reference href="https://bdu.fstec.ru/vul/2024-06676" type="self" id="BDU:2024-06676" title="BDU:2024-06676" />
			<reference href="https://bdu.fstec.ru/vul/2024-06675" type="self" id="BDU:2024-06675" title="BDU:2024-06675" />
			<reference href="https://bdu.fstec.ru/vul/2024-06674" type="self" id="BDU:2024-06674" title="BDU:2024-06674" />
			<reference href="https://bdu.fstec.ru/vul/2024-06673" type="self" id="BDU:2024-06673" title="BDU:2024-06673" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="115.13.0" release="1.el7" arch="x86_64" src="">
					<filename>thunderbird-0:115.13.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240902-12</id>
		<issued date="2024-09-02" />
		<updated date="2024-09-02" />
		<title>Уязвимость python3-pansi </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-pansi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-pansi-cve-2024-6104/</description>
               <solution>
                    Запретить использование в ОС пакета python3-pansi
                или
                    Установить обновление для пакета(ов) python3-pansi
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-pansi-cve-2024-6104/" type="self" id="ROS-20240902-12" title="ROS-20240902-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6104" type="cve" id="CVE-2024-6104" title="CVE-2024-6104" />
			<reference href="https://bdu.fstec.ru/vul/2024-06681" type="self" id="BDU:2024-06681" title="BDU:2024-06681" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-pansi" epoch="0" version="2020.7.3" release="1.el7" arch="noarch" src="">
					<filename>python3-pansi-0:2020.7.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240902-13</id>
		<issued date="2024-09-02" />
		<updated date="2024-09-02" />
		<title>Уязвимость terraform </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в terraform</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-terraform-cve-2024-6257/</description>
               <solution>
                    Запретить использование в ОС пакета terraform
                или
                    Установить обновление для пакета(ов) terraform
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-terraform-cve-2024-6257/" type="self" id="ROS-20240902-13" title="ROS-20240902-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6257" type="cve" id="CVE-2024-6257" title="CVE-2024-6257" />
			<reference href="https://bdu.fstec.ru/vul/2024-06668" type="self" id="BDU:2024-06668" title="BDU:2024-06668" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="terraform" epoch="0" version="1.9.5" release="1.el7" arch="x86_64" src="">
					<filename>terraform-0:1.9.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240902-14</id>
		<issued date="2024-09-02" />
		<updated date="2024-09-02" />
		<title>Уязвимость vault </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в vault</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vault-cve-2024-6468/</description>
               <solution>
                    Запретить использование в ОС пакета Vault
                или
                    Установить обновление для пакета(ов) Vault
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vault-cve-2024-6468/" type="self" id="ROS-20240902-14" title="ROS-20240902-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6468" type="cve" id="CVE-2024-6468" title="CVE-2024-6468" />
			<reference href="https://bdu.fstec.ru/vul/2024-06667" type="self" id="BDU:2024-06667" title="BDU:2024-06667" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vault" epoch="0" version="1.17.2" release="1.el7" arch="x86_64" src="">
					<filename>vault-0:1.17.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240902-15</id>
		<issued date="2024-09-02" />
		<updated date="2024-09-02" />
		<title>Уязвимость nomad </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nomad</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nomad-cve-2024-24791/</description>
               <solution>
                    Запретить использование в ОС пакета nomad
                или
                    Установить обновление для пакета(ов) nomad
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nomad-cve-2024-24791/" type="self" id="ROS-20240902-15" title="ROS-20240902-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24791" type="cve" id="CVE-2024-24791" title="CVE-2024-24791" />
			<reference href="https://bdu.fstec.ru/vul/2024-06680" type="self" id="BDU:2024-06680" title="BDU:2024-06680" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nomad" epoch="0" version="1.8.2" release="1.el7" arch="x86_64" src="">
					<filename>nomad-0:1.8.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240902-16</id>
		<issued date="2024-09-02" />
		<updated date="2024-09-02" />
		<title>Множественные уязвимости consul </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в consul</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-consul-cve-2024-24791-cve-2024-39305-cve-2024-6104/</description>
               <solution>
                    Запретить использование в ОС пакета consul
                или
                    Установить обновление для пакета(ов) consul
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-consul-cve-2024-24791-cve-2024-39305-cve-2024-6104/" type="self" id="ROS-20240902-16" title="ROS-20240902-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24791" type="cve" id="CVE-2024-24791" title="CVE-2024-24791" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39305" type="cve" id="CVE-2024-39305" title="CVE-2024-39305" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6104" type="cve" id="CVE-2024-6104" title="CVE-2024-6104" />
			<reference href="https://bdu.fstec.ru/vul/2024-06680" type="self" id="BDU:2024-06680" title="BDU:2024-06680" />
			<reference href="https://bdu.fstec.ru/vul/2024-06682" type="self" id="BDU:2024-06682" title="BDU:2024-06682" />
			<reference href="https://bdu.fstec.ru/vul/2024-06681" type="self" id="BDU:2024-06681" title="BDU:2024-06681" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="consul" epoch="0" version="1.19.1" release="1.el7" arch="x86_64" src="">
					<filename>consul-0:1.19.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240902-17</id>
		<issued date="2024-09-02" />
		<updated date="2025-06-03" />
		<title>Уязвимость orc </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в orc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-orc-cve-2024-40897/</description>
               <solution>
                    Запретить использование в ОС пакета ORC
                или
                    Установить обновление для пакета(ов) ORC
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-orc-cve-2024-40897/" type="self" id="ROS-20240902-17" title="ROS-20240902-17" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40897" type="cve" id="CVE-2024-40897" title="CVE-2024-40897" />
			<reference href="https://bdu.fstec.ru/vul/2024-06669" type="self" id="BDU:2024-06669" title="BDU:2024-06669" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="orc" epoch="0" version="0.4.39" release="12.el7" arch="x86_64" src="">
					<filename>orc-0:0.4.39-12.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240902-18</id>
		<issued date="2024-09-02" />
		<updated date="2024-09-02" />
		<title>Уязвимость flatpak </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в flatpak</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-flatpak-cve-2024-42472/</description>
               <solution>
                    Запретить использование в ОС пакета flatpak
                или
                    Установить обновление для пакета(ов) flatpak
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-flatpak-cve-2024-42472/" type="self" id="ROS-20240902-18" title="ROS-20240902-18" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42472" type="cve" id="CVE-2024-42472" title="CVE-2024-42472" />
			<reference href="https://bdu.fstec.ru/vul/2024-06671" type="self" id="BDU:2024-06671" title="BDU:2024-06671" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="flatpak" epoch="0" version="1.10.9" release="2.el7" arch="x86_64" src="">
					<filename>flatpak-0:1.10.9-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240902-23</id>
		<issued date="2024-09-02" />
		<updated date="2024-12-23" />
		<title>Уязвимость bubblewrap </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в bubblewrap</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-bubblewrap-cve-2024-424729228/</description>
               <solution>
                    Запретить использование в ОС пакета bubblewrap
                или
                    Установить обновление для пакета(ов) bubblewrap
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-bubblewrap-cve-2024-424729228/" type="self" id="ROS-20240902-23" title="ROS-20240902-23" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42472" type="cve" id="CVE-2024-42472" title="CVE-2024-42472" />
			<reference href="https://bdu.fstec.ru/vul/2024-06671" type="self" id="BDU:2024-06671" title="BDU:2024-06671" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="bubblewrap" epoch="0" version="0.6.3" release="1.el7" arch="x86_64" src="">
					<filename>bubblewrap-0:0.6.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240902-19</id>
		<issued date="2024-09-02" />
		<updated date="2024-09-02" />
		<title>Уязвимость phpMyAdmin </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в phpMyAdmin</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-phpmyadmin-cve-2023-25727/</description>
               <solution>
                    Запретить использование в ОС пакета phpMyAdmin
                или
                    Установить обновление для пакета(ов) phpMyAdmin
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-phpmyadmin-cve-2023-25727/" type="self" id="ROS-20240902-19" title="ROS-20240902-19" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25727" type="cve" id="CVE-2023-25727" title="CVE-2023-25727" />
			<reference href="https://bdu.fstec.ru/vul/2023-07577" type="self" id="BDU:2023-07577" title="BDU:2023-07577" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="phpMyAdmin" epoch="0" version="5.1.3" release="2.el7" arch="noarch" src="">
					<filename>phpMyAdmin-0:5.1.3-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240902-20</id>
		<issued date="2024-09-02" />
		<updated date="2024-09-02" />
		<title>Уязвимость KeePass </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в keepass</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-keepass-cve-2023-24055/</description>
               <solution>
                    Запретить использование в ОС пакета keepass
                или
                    Установить обновление для пакета(ов) keepass
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-keepass-cve-2023-24055/" type="self" id="ROS-20240902-20" title="ROS-20240902-20" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24055" type="cve" id="CVE-2023-24055" title="CVE-2023-24055" />
			<reference href="https://bdu.fstec.ru/vul/2023-07674" type="self" id="BDU:2023-07674" title="BDU:2023-07674" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="keepass" epoch="0" version="2.54" release="1.el7" arch="x86_64" src="">
					<filename>keepass-0:2.54-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240904-01</id>
		<issued date="2024-09-04" />
		<updated date="2024-09-04" />
		<title>Множественные уязвимости frr </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в frr</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-frr-cve-2024-31948-cve-2024-31949-cve-2024-31950-cve-2024-34088-cve-2024-/</description>
               <solution>
                    Запретить использование в ОС пакета frr
                или
                    Установить обновление для пакета(ов) frr
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-frr-cve-2024-31948-cve-2024-31949-cve-2024-31950-cve-2024-34088-cve-2024-/" type="self" id="ROS-20240904-01" title="ROS-20240904-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31948" type="cve" id="CVE-2024-31948" title="CVE-2024-31948" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31949" type="cve" id="CVE-2024-31949" title="CVE-2024-31949" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31950" type="cve" id="CVE-2024-31950" title="CVE-2024-31950" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34088" type="cve" id="CVE-2024-34088" title="CVE-2024-34088" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31951" type="cve" id="CVE-2024-31951" title="CVE-2024-31951" />
			<reference href="https://bdu.fstec.ru/vul/2024-06850" type="self" id="BDU:2024-06850" title="BDU:2024-06850" />
			<reference href="https://bdu.fstec.ru/vul/2024-06851" type="self" id="BDU:2024-06851" title="BDU:2024-06851" />
			<reference href="https://bdu.fstec.ru/vul/2024-06852" type="self" id="BDU:2024-06852" title="BDU:2024-06852" />
			<reference href="https://bdu.fstec.ru/vul/2024-06853" type="self" id="BDU:2024-06853" title="BDU:2024-06853" />
			<reference href="https://bdu.fstec.ru/vul/2024-06854" type="self" id="BDU:2024-06854" title="BDU:2024-06854" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="frr" epoch="0" version="10.1" release="1.el7" arch="x86_64" src="">
					<filename>frr-0:10.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240904-02</id>
		<issued date="2024-09-04" />
		<updated date="2024-09-04" />
		<title>Уязвимость dotnet </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в dotnet</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet-cve-2024-30045/</description>
               <solution>
                    Запретить использование в ОС пакета dotnet
                или
                    Установить обновление для пакета(ов) dotnet
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet-cve-2024-30045/" type="self" id="ROS-20240904-02" title="ROS-20240904-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30045" type="cve" id="CVE-2024-30045" title="CVE-2024-30045" />
			<reference href="https://bdu.fstec.ru/vul/2024-03969" type="self" id="BDU:2024-03969" title="BDU:2024-03969" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dotnet" epoch="0" version="8.0.107" release="1.el7" arch="x86_64" src="">
					<filename>dotnet-0:8.0.107-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240904-03</id>
		<issued date="2024-09-04" />
		<updated date="2024-09-04" />
		<title>Уязвимость gstreamer1-plugins-base </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gstreamer1-plugins-base</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gstreamer1-plugins-base-cve-2024-4453/</description>
               <solution>
                    Запретить использование в ОС пакета gstreamer1-plugins-base
                или
                    Установить обновление для пакета(ов) gstreamer1-plugins-base
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gstreamer1-plugins-base-cve-2024-4453/" type="self" id="ROS-20240904-03" title="ROS-20240904-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4453" type="cve" id="CVE-2024-4453" title="CVE-2024-4453" />
			<reference href="https://bdu.fstec.ru/vul/2024-04000" type="self" id="BDU:2024-04000" title="BDU:2024-04000" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gstreamer1-plugins-base" epoch="0" version="1.16.3" release="3.el7" arch="x86_64" src="">
					<filename>gstreamer1-plugins-base-0:1.16.3-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240904-04</id>
		<issued date="2024-09-04" />
		<updated date="2024-09-04" />
		<title>Уязвимость libndp </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libndp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libndp-cve-2024-5564/</description>
               <solution>
                    Запретить использование в ОС пакета libndp
                или
                    Установить обновление для пакета(ов) libndp
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libndp-cve-2024-5564/" type="self" id="ROS-20240904-04" title="ROS-20240904-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5564" type="cve" id="CVE-2024-5564" title="CVE-2024-5564" />
			<reference href="https://bdu.fstec.ru/vul/2024-04337" type="self" id="BDU:2024-04337" title="BDU:2024-04337" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libndp" epoch="0" version="1.7" release="12.el7" arch="x86_64" src="">
					<filename>libndp-0:1.7-12.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240904-05</id>
		<issued date="2024-09-04" />
		<updated date="2024-09-04" />
		<title>Уязвимость nodejs </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nodejs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-cve-2024-22020/</description>
               <solution>
                    Запретить использование в ОС пакета nodejs
                или
                    Установить обновление для пакета(ов) nodejs
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-cve-2024-22020/" type="self" id="ROS-20240904-05" title="ROS-20240904-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22020" type="cve" id="CVE-2024-22020" title="CVE-2024-22020" />
			<reference href="https://bdu.fstec.ru/vul/2024-06867" type="self" id="BDU:2024-06867" title="BDU:2024-06867" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs" epoch="1" version="18.20.4" release="1.el7" arch="x86_64" src="">
					<filename>nodejs-1:18.20.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240904-06</id>
		<issued date="2024-09-04" />
		<updated date="2024-09-04" />
		<title>Уязвимость yasm </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в yasm</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-yasm-cve-2023-31975/</description>
               <solution>
                    Запретить использование в ОС пакета yasm
                или
                    Установить обновление для пакета(ов) yasm
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-yasm-cve-2023-31975/" type="self" id="ROS-20240904-06" title="ROS-20240904-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31975" type="cve" id="CVE-2023-31975" title="CVE-2023-31975" />
			<reference href="https://bdu.fstec.ru/vul/2024-06865" type="self" id="BDU:2024-06865" title="BDU:2024-06865" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="yasm" epoch="0" version="1.3.0" release="6.el7" arch="x86_64" src="">
					<filename>yasm-0:1.3.0-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240904-07</id>
		<issued date="2024-09-04" />
		<updated date="2024-09-04" />
		<title>Уязвимость python3 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2024-8088/</description>
               <solution>
                    Запретить использование в ОС пакета python3
                или
                    Установить обновление для пакета(ов) python3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2024-8088/" type="self" id="ROS-20240904-07" title="ROS-20240904-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8088" type="cve" id="CVE-2024-8088" title="CVE-2024-8088" />
			<reference href="https://bdu.fstec.ru/vul/2024-06863" type="self" id="BDU:2024-06863" title="BDU:2024-06863" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3" epoch="0" version="3.8.19" release="6.el7" arch="x86_64" src="">
					<filename>python3-0:3.8.19-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240904-08</id>
		<issued date="2024-09-04" />
		<updated date="2024-09-04" />
		<title>Уязвимость libmicrohttpd </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libmicrohttpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libmicrohttpd-cve-2023-27371/</description>
               <solution>
                    Запретить использование в ОС пакета libmicrohttpd
                или
                    Установить обновление для пакета(ов) libmicrohttpd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libmicrohttpd-cve-2023-27371/" type="self" id="ROS-20240904-08" title="ROS-20240904-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27371" type="cve" id="CVE-2023-27371" title="CVE-2023-27371" />
			<reference href="https://bdu.fstec.ru/vul/2024-06864" type="self" id="BDU:2024-06864" title="BDU:2024-06864" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libmicrohttpd" epoch="1" version="0.9.71" release="12.el7" arch="x86_64" src="">
					<filename>libmicrohttpd-1:0.9.71-12.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240904-09</id>
		<issued date="2024-09-04" />
		<updated date="2024-09-04" />
		<title>Уязвимость linux-firmware </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в linux-firmware</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-linux-firmware-cve-2023-20593/</description>
               <solution>
                    Запретить использование в ОС пакета linux-firmware
                или
                    Установить обновление для пакета(ов) linux-firmware
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-linux-firmware-cve-2023-20593/" type="self" id="ROS-20240904-09" title="ROS-20240904-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20593" type="cve" id="CVE-2023-20593" title="CVE-2023-20593" />
			<reference href="https://bdu.fstec.ru/vul/2023-03992" type="self" id="BDU:2023-03992" title="BDU:2023-03992" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="linux-firmware" epoch="0" version="20240709" release="1.el7.3" arch="noarch" src="">
					<filename>linux-firmware-0:20240709-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240904-10</id>
		<issued date="2024-09-04" />
		<updated date="2024-09-04" />
		<title>Множественные уязвимости clojure </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в clojure</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-clojure-cve-2017-20189-cve-2024-22871/</description>
               <solution>
                    Запретить использование в ОС пакета clojure
                или
                    Установить обновление для пакета(ов) clojure
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-clojure-cve-2017-20189-cve-2024-22871/" type="self" id="ROS-20240904-10" title="ROS-20240904-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-20189" type="cve" id="CVE-2017-20189" title="CVE-2017-20189" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22871" type="cve" id="CVE-2024-22871" title="CVE-2024-22871" />
			<reference href="https://bdu.fstec.ru/vul/2024-06870" type="self" id="BDU:2024-06870" title="BDU:2024-06870" />
			<reference href="https://bdu.fstec.ru/vul/2024-06869" type="self" id="BDU:2024-06869" title="BDU:2024-06869" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="clojure" epoch="1" version="1.11.4" release="1.el7" arch="noarch" src="">
					<filename>clojure-1:1.11.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240904-11</id>
		<issued date="2024-09-04" />
		<updated date="2024-09-04" />
		<title>Уязвимость wpa_supplicant </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в wpa_supplicant</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-wpa-supplicant-cve-2023-52160/</description>
               <solution>
                    Запретить использование в ОС пакета wpa_supplicant
                или
                    Установить обновление для пакета(ов) wpa_supplicant
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-wpa-supplicant-cve-2023-52160/" type="self" id="ROS-20240904-11" title="ROS-20240904-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52160" type="cve" id="CVE-2023-52160" title="CVE-2023-52160" />
			<reference href="https://bdu.fstec.ru/vul/2024-01426" type="self" id="BDU:2024-01426" title="BDU:2024-01426" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="wpa_supplicant" epoch="1" version="2.10" release="2.el7" arch="x86_64" src="">
					<filename>wpa_supplicant-1:2.10-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240904-12</id>
		<issued date="2024-09-04" />
		<updated date="2024-09-04" />
		<title>Уязвимость nodejs-es5-ext </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в nodejs-es5-ext</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-es5-ext-cve-2024-27088/</description>
               <solution>
                    Запретить использование в ОС пакета nodejs-es5-ext
                или
                    Установить обновление для пакета(ов) nodejs-es5-ext
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-es5-ext-cve-2024-27088/" type="self" id="ROS-20240904-12" title="ROS-20240904-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27088" type="cve" id="CVE-2024-27088" title="CVE-2024-27088" />
			<reference href="https://bdu.fstec.ru/vul/2024-06866" type="self" id="BDU:2024-06866" title="BDU:2024-06866" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs-es5-ext" epoch="0" version="0.10.63" release="1.el7" arch="noarch" src="">
					<filename>nodejs-es5-ext-0:0.10.63-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240904-13</id>
		<issued date="2024-09-05" />
		<updated date="2024-09-05" />
		<title>Уязвимость pgadmin4 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в pgadmin4</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pgadmin4-cve-2024-2044/</description>
               <solution>
                    Запретить использование в ОС пакета pgadmin4
                или
                    Установить обновление для пакета(ов) pgadmin4
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pgadmin4-cve-2024-2044/" type="self" id="ROS-20240904-13" title="ROS-20240904-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2044" type="cve" id="CVE-2024-2044" title="CVE-2024-2044" />
			<reference href="https://bdu.fstec.ru/vul/2024-01869" type="self" id="BDU:2024-01869" title="BDU:2024-01869" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pgadmin4" epoch="0" version="6.19" release="4.el7" arch="x86_64" src="">
					<filename>pgadmin4-0:6.19-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240904-14</id>
		<issued date="2024-09-05" />
		<updated date="2024-09-05" />
		<title>Множественные уязвимости pcp </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в pcp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-pcp-cve-2023-6917-cve-2024-3019/</description>
               <solution>
                    Запретить использование в ОС пакета pcp
                или
                    Установить обновление для пакета(ов) pcp
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-pcp-cve-2023-6917-cve-2024-3019/" type="self" id="ROS-20240904-14" title="ROS-20240904-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6917" type="cve" id="CVE-2023-6917" title="CVE-2023-6917" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3019" type="cve" id="CVE-2024-3019" title="CVE-2024-3019" />
			<reference href="https://bdu.fstec.ru/vul/2024-06871" type="self" id="BDU:2024-06871" title="BDU:2024-06871" />
			<reference href="https://bdu.fstec.ru/vul/2024-02823" type="self" id="BDU:2024-02823" title="BDU:2024-02823" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pcp" epoch="0" version="6.2.0" release="1.el7" arch="x86_64" src="">
					<filename>pcp-0:6.2.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240904-15</id>
		<issued date="2024-09-05" />
		<updated date="2024-09-05" />
		<title>Уязвимость samba </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в samba</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-samba-cve-2022-37967/</description>
               <solution>
                    Запретить использование в ОС пакета samba
                или
                    Установить обновление для пакета(ов) samba
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-samba-cve-2022-37967/" type="self" id="ROS-20240904-15" title="ROS-20240904-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37967" type="cve" id="CVE-2022-37967" title="CVE-2022-37967" />
			<reference href="https://bdu.fstec.ru/vul/2022-06787" type="self" id="BDU:2022-06787" title="BDU:2022-06787" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="samba" epoch="0" version="4.17.5" release="2h.el7.3" arch="x86_64" src="">
					<filename>samba-0:4.17.5-2h.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240904-16</id>
		<issued date="2024-09-05" />
		<updated date="2024-09-05" />
		<title>Множественные уязвимости libcaca </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в libcaca</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libcaca-cve-2021-30499-cve-2021-30498/</description>
               <solution>
                    Запретить использование в ОС пакета libcaca
                или
                    Установить обновление для пакета(ов) libcaca
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libcaca-cve-2021-30499-cve-2021-30498/" type="self" id="ROS-20240904-16" title="ROS-20240904-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30499" type="cve" id="CVE-2021-30499" title="CVE-2021-30499" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30498" type="cve" id="CVE-2021-30498" title="CVE-2021-30498" />
			<reference href="https://bdu.fstec.ru/vul/2021-05484" type="self" id="BDU:2021-05484" title="BDU:2021-05484" />
			<reference href="https://bdu.fstec.ru/vul/2021-05510" type="self" id="BDU:2021-05510" title="BDU:2021-05510" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libcaca" epoch="0" version="0.99" release="0.47.beta19.el7" arch="x86_64" src="">
					<filename>libcaca-0:0.99-0.47.beta19.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240905-01</id>
		<issued date="2024-09-05" />
		<updated date="2024-09-05" />
		<title>Уязвимость frr </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в frr</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-frr-cve-2024-44070/</description>
               <solution>
                    Запретить использование в ОС пакета frr
                или
                    Установить обновление для пакета(ов) frr
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-frr-cve-2024-44070/" type="self" id="ROS-20240905-01" title="ROS-20240905-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44070" type="cve" id="CVE-2024-44070" title="CVE-2024-44070" />
			<reference href="https://bdu.fstec.ru/vul/2024-06868" type="self" id="BDU:2024-06868" title="BDU:2024-06868" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="frr" epoch="0" version="10.1" release="1.el7" arch="x86_64" src="">
					<filename>frr-0:10.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240905-02</id>
		<issued date="2024-09-05" />
		<updated date="2024-09-05" />
		<title>Уязвимость python3 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2024-6923/</description>
               <solution>
                    Запретить использование в ОС пакета python3
                или
                    Установить обновление для пакета(ов) python3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2024-6923/" type="self" id="ROS-20240905-02" title="ROS-20240905-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6923" type="cve" id="CVE-2024-6923" title="CVE-2024-6923" />
			<reference href="https://bdu.fstec.ru/vul/2025-12325" type="self" id="BDU:2025-12325" title="BDU:2025-12325" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3" epoch="0" version="3.8.19" release="6.el7" arch="x86_64" src="">
					<filename>python3-0:3.8.19-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240905-03</id>
		<issued date="2024-09-05" />
		<updated date="2024-09-05" />
		<title>Уязвимость gtk3 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gtk3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gtk3-cve-2024-6655/</description>
               <solution>
                    Запретить использование в ОС пакета gtk3
                или
                    Установить обновление для пакета(ов) gtk3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gtk3-cve-2024-6655/" type="self" id="ROS-20240905-03" title="ROS-20240905-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6655" type="cve" id="CVE-2024-6655" title="CVE-2024-6655" />
			<reference href="https://bdu.fstec.ru/vul/2024-06447" type="self" id="BDU:2024-06447" title="BDU:2024-06447" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gtk3" epoch="0" version="3.24.43" release="2.el7" arch="x86_64" src="">
					<filename>gtk3-0:3.24.43-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240905-04</id>
		<issued date="2024-09-05" />
		<updated date="2024-09-05" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-05-09-24/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-05-09-24/" type="self" id="ROS-20240905-04" title="ROS-20240905-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48875" type="cve" id="CVE-2022-48875" title="CVE-2022-48875" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48868" type="cve" id="CVE-2022-48868" title="CVE-2022-48868" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38571" type="cve" id="CVE-2024-38571" title="CVE-2024-38571" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38555" type="cve" id="CVE-2024-38555" title="CVE-2024-38555" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38552" type="cve" id="CVE-2024-38552" title="CVE-2024-38552" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38547" type="cve" id="CVE-2024-38547" title="CVE-2024-38547" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38546" type="cve" id="CVE-2024-38546" title="CVE-2024-38546" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36975" type="cve" id="CVE-2024-36975" title="CVE-2024-36975" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36972" type="cve" id="CVE-2024-36972" title="CVE-2024-36972" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36938" type="cve" id="CVE-2024-36938" title="CVE-2024-36938" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36904" type="cve" id="CVE-2024-36904" title="CVE-2024-36904" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36886" type="cve" id="CVE-2024-36886" title="CVE-2024-36886" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36883" type="cve" id="CVE-2024-36883" title="CVE-2024-36883" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36017" type="cve" id="CVE-2024-36017" title="CVE-2024-36017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36015" type="cve" id="CVE-2024-36015" title="CVE-2024-36015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36014" type="cve" id="CVE-2024-36014" title="CVE-2024-36014" />
			<reference href="https://bdu.fstec.ru/vul/2024-06855" type="self" id="BDU:2024-06855" title="BDU:2024-06855" />
			<reference href="https://bdu.fstec.ru/vul/2024-06856" type="self" id="BDU:2024-06856" title="BDU:2024-06856" />
			<reference href="https://bdu.fstec.ru/vul/2024-06857" type="self" id="BDU:2024-06857" title="BDU:2024-06857" />
			<reference href="https://bdu.fstec.ru/vul/2024-06858" type="self" id="BDU:2024-06858" title="BDU:2024-06858" />
			<reference href="https://bdu.fstec.ru/vul/2024-06861" type="self" id="BDU:2024-06861" title="BDU:2024-06861" />
			<reference href="https://bdu.fstec.ru/vul/2024-06859" type="self" id="BDU:2024-06859" title="BDU:2024-06859" />
			<reference href="https://bdu.fstec.ru/vul/2024-06860" type="self" id="BDU:2024-06860" title="BDU:2024-06860" />
			<reference href="https://bdu.fstec.ru/vul/2024-06045" type="self" id="BDU:2024-06045" title="BDU:2024-06045" />
			<reference href="https://bdu.fstec.ru/vul/2024-04563" type="self" id="BDU:2024-04563" title="BDU:2024-04563" />
			<reference href="https://bdu.fstec.ru/vul/2024-04561" type="self" id="BDU:2024-04561" title="BDU:2024-04561" />
			<reference href="https://bdu.fstec.ru/vul/2024-04557" type="self" id="BDU:2024-04557" title="BDU:2024-04557" />
			<reference href="https://bdu.fstec.ru/vul/2024-04552" type="self" id="BDU:2024-04552" title="BDU:2024-04552" />
			<reference href="https://bdu.fstec.ru/vul/2024-04551" type="self" id="BDU:2024-04551" title="BDU:2024-04551" />
			<reference href="https://bdu.fstec.ru/vul/2024-04546" type="self" id="BDU:2024-04546" title="BDU:2024-04546" />
			<reference href="https://bdu.fstec.ru/vul/2024-04542" type="self" id="BDU:2024-04542" title="BDU:2024-04542" />
			<reference href="https://bdu.fstec.ru/vul/2024-04543" type="self" id="BDU:2024-04543" title="BDU:2024-04543" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240906-01</id>
		<issued date="2024-09-06" />
		<updated date="2024-09-06" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-06-09-24-1/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-06-09-24-1/" type="self" id="ROS-20240906-01" title="ROS-20240906-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622" type="cve" id="CVE-2024-26622" title="CVE-2024-26622" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52581" type="cve" id="CVE-2023-52581" title="CVE-2023-52581" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52580" type="cve" id="CVE-2023-52580" title="CVE-2023-52580" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52578" type="cve" id="CVE-2023-52578" title="CVE-2023-52578" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52577" type="cve" id="CVE-2023-52577" title="CVE-2023-52577" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52575" type="cve" id="CVE-2023-52575" title="CVE-2023-52575" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52574" type="cve" id="CVE-2023-52574" title="CVE-2023-52574" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52573" type="cve" id="CVE-2023-52573" title="CVE-2023-52573" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52567" type="cve" id="CVE-2023-52567" title="CVE-2023-52567" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52566" type="cve" id="CVE-2023-52566" title="CVE-2023-52566" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52564" type="cve" id="CVE-2023-52564" title="CVE-2023-52564" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52563" type="cve" id="CVE-2023-52563" title="CVE-2023-52563" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641" type="cve" id="CVE-2024-26641" title="CVE-2024-26641" />
			<reference href="https://bdu.fstec.ru/vul/2024-04137" type="self" id="BDU:2024-04137" title="BDU:2024-04137" />
			<reference href="https://bdu.fstec.ru/vul/2024-01803" type="self" id="BDU:2024-01803" title="BDU:2024-01803" />
			<reference href="https://bdu.fstec.ru/vul/2024-01805" type="self" id="BDU:2024-01805" title="BDU:2024-01805" />
			<reference href="https://bdu.fstec.ru/vul/2024-01783" type="self" id="BDU:2024-01783" title="BDU:2024-01783" />
			<reference href="https://bdu.fstec.ru/vul/2024-01753" type="self" id="BDU:2024-01753" title="BDU:2024-01753" />
			<reference href="https://bdu.fstec.ru/vul/2024-01774" type="self" id="BDU:2024-01774" title="BDU:2024-01774" />
			<reference href="https://bdu.fstec.ru/vul/2024-01765" type="self" id="BDU:2024-01765" title="BDU:2024-01765" />
			<reference href="https://bdu.fstec.ru/vul/2024-01756" type="self" id="BDU:2024-01756" title="BDU:2024-01756" />
			<reference href="https://bdu.fstec.ru/vul/2024-01939" type="self" id="BDU:2024-01939" title="BDU:2024-01939" />
			<reference href="https://bdu.fstec.ru/vul/2024-01938" type="self" id="BDU:2024-01938" title="BDU:2024-01938" />
			<reference href="https://bdu.fstec.ru/vul/2024-01931" type="self" id="BDU:2024-01931" title="BDU:2024-01931" />
			<reference href="https://bdu.fstec.ru/vul/2024-01935" type="self" id="BDU:2024-01935" title="BDU:2024-01935" />
			<reference href="https://bdu.fstec.ru/vul/2024-03651" type="self" id="BDU:2024-03651" title="BDU:2024-03651" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240906-02</id>
		<issued date="2024-09-06" />
		<updated date="2024-09-06" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-06-09-24-2/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-06-09-24-2/" type="self" id="ROS-20240906-02" title="ROS-20240906-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52571" type="cve" id="CVE-2023-52571" title="CVE-2023-52571" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52570" type="cve" id="CVE-2023-52570" title="CVE-2023-52570" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52568" type="cve" id="CVE-2023-52568" title="CVE-2023-52568" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52565" type="cve" id="CVE-2023-52565" title="CVE-2023-52565" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52562" type="cve" id="CVE-2023-52562" title="CVE-2023-52562" />
			<reference href="https://bdu.fstec.ru/vul/2024-01934" type="self" id="BDU:2024-01934" title="BDU:2024-01934" />
			<reference href="https://bdu.fstec.ru/vul/2024-01933" type="self" id="BDU:2024-01933" title="BDU:2024-01933" />
			<reference href="https://bdu.fstec.ru/vul/2024-01937" type="self" id="BDU:2024-01937" title="BDU:2024-01937" />
			<reference href="https://bdu.fstec.ru/vul/2024-01930" type="self" id="BDU:2024-01930" title="BDU:2024-01930" />
			<reference href="https://bdu.fstec.ru/vul/2024-01932" type="self" id="BDU:2024-01932" title="BDU:2024-01932" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240909-01</id>
		<issued date="2024-09-09" />
		<updated date="2024-09-09" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2024-7652/</description>
               <solution>
                    Запретить использование в ОС пакета Firefox
                или
                    Установить обновление для пакета(ов) Firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2024-7652/" type="self" id="ROS-20240909-01" title="ROS-20240909-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652" type="cve" id="CVE-2024-7652" title="CVE-2024-7652" />
			<reference href="https://bdu.fstec.ru/vul/2024-06862" type="self" id="BDU:2024-06862" title="BDU:2024-06862" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.13.0" release="1.el7" arch="x86_64" src="">
					<filename>firefox-0:115.13.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240909-04</id>
		<issued date="2024-09-09" />
		<updated date="2024-12-23" />
		<title>Уязвимость thunderbird </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-thunderbird-cve-2024-76522944/</description>
               <solution>
                    Запретить использование в ОС пакета thunderbird
                или
                    Установить обновление для пакета(ов) thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-thunderbird-cve-2024-76522944/" type="self" id="ROS-20240909-04" title="ROS-20240909-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652" type="cve" id="CVE-2024-7652" title="CVE-2024-7652" />
			<reference href="https://bdu.fstec.ru/vul/2024-06862" type="self" id="BDU:2024-06862" title="BDU:2024-06862" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="115.13.0" release="1.el7" arch="x86_64" src="">
					<filename>thunderbird-0:115.13.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240909-02</id>
		<issued date="2024-09-09" />
		<updated date="2024-09-09" />
		<title>Уязвимость python3-cryptography </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-cryptography</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cryptography-cve-2023-38325/</description>
               <solution>
                    Запретить использование в ОС пакета python3-cryptography
                или
                    Установить обновление для пакета(ов) python3-cryptography
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cryptography-cve-2023-38325/" type="self" id="ROS-20240909-02" title="ROS-20240909-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38325" type="cve" id="CVE-2023-38325" title="CVE-2023-38325" />
			<reference href="https://bdu.fstec.ru/vul/2023-05436" type="self" id="BDU:2023-05436" title="BDU:2023-05436" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-cryptography" epoch="0" version="42.0.5" release="2.el7" arch="x86_64" src="">
					<filename>python3-cryptography-0:42.0.5-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240909-03</id>
		<issued date="2024-09-09" />
		<updated date="2024-09-09" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-09-09-24/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-09-09-24/" type="self" id="ROS-20240909-03" title="ROS-20240909-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27028" type="cve" id="CVE-2024-27028" title="CVE-2024-27028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35791" type="cve" id="CVE-2024-35791" title="CVE-2024-35791" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35785" type="cve" id="CVE-2024-35785" title="CVE-2024-35785" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26882" type="cve" id="CVE-2024-26882" title="CVE-2024-26882" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859" type="cve" id="CVE-2024-26859" title="CVE-2024-26859" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26856" type="cve" id="CVE-2024-26856" title="CVE-2024-26856" />
			<reference href="https://bdu.fstec.ru/vul/2024-03642" type="self" id="BDU:2024-03642" title="BDU:2024-03642" />
			<reference href="https://bdu.fstec.ru/vul/2024-04232" type="self" id="BDU:2024-04232" title="BDU:2024-04232" />
			<reference href="https://bdu.fstec.ru/vul/2024-04233" type="self" id="BDU:2024-04233" title="BDU:2024-04233" />
			<reference href="https://bdu.fstec.ru/vul/2024-03708" type="self" id="BDU:2024-03708" title="BDU:2024-03708" />
			<reference href="https://bdu.fstec.ru/vul/2024-03697" type="self" id="BDU:2024-03697" title="BDU:2024-03697" />
			<reference href="https://bdu.fstec.ru/vul/2024-03696" type="self" id="BDU:2024-03696" title="BDU:2024-03696" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240910-01</id>
		<issued date="2024-09-10" />
		<updated date="2024-09-10" />
		<title>Уязвимость haproxy </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в haproxy</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-haproxy-cve-2024-45506/</description>
               <solution>
                    Запретить использование в ОС пакета haproxy
                или
                    Установить обновление для пакета(ов) haproxy
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-haproxy-cve-2024-45506/" type="self" id="ROS-20240910-01" title="ROS-20240910-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45506" type="cve" id="CVE-2024-45506" title="CVE-2024-45506" />
			<reference href="https://bdu.fstec.ru/vul/2024-06744" type="self" id="BDU:2024-06744" title="BDU:2024-06744" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="haproxy" epoch="0" version="3.0.4" release="1.el7" arch="x86_64" src="">
					<filename>haproxy-0:3.0.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240910-02</id>
		<issued date="2024-09-10" />
		<updated date="2024-09-10" />
		<title>Множественные уязвимости avahi </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в avahi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-avahi-cve-2023-38471-cve-2023-38472-cve-2023-38470-cve-2023-38469/</description>
               <solution>
                    Запретить использование в ОС пакета avahi
                или
                    Установить обновление для пакета(ов) avahi
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-avahi-cve-2023-38471-cve-2023-38472-cve-2023-38470-cve-2023-38469/" type="self" id="ROS-20240910-02" title="ROS-20240910-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38471" type="cve" id="CVE-2023-38471" title="CVE-2023-38471" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38472" type="cve" id="CVE-2023-38472" title="CVE-2023-38472" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38470" type="cve" id="CVE-2023-38470" title="CVE-2023-38470" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38469" type="cve" id="CVE-2023-38469" title="CVE-2023-38469" />
			<reference href="https://bdu.fstec.ru/vul/2024-07013" type="self" id="BDU:2024-07013" title="BDU:2024-07013" />
			<reference href="https://bdu.fstec.ru/vul/2023-08473" type="self" id="BDU:2023-08473" title="BDU:2023-08473" />
			<reference href="https://bdu.fstec.ru/vul/2024-07011" type="self" id="BDU:2024-07011" title="BDU:2024-07011" />
			<reference href="https://bdu.fstec.ru/vul/2024-06999" type="self" id="BDU:2024-06999" title="BDU:2024-06999" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="avahi" epoch="0" version="0.8" release="7.el7" arch="x86_64" src="">
					<filename>avahi-0:0.8-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240910-03</id>
		<issued date="2024-09-10" />
		<updated date="2024-09-10" />
		<title>Уязвимость expat </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в expat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-expat-cve-2024-45490/</description>
               <solution>
                    Запретить использование в ОС пакета expat
                или
                    Установить обновление для пакета(ов) expat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-expat-cve-2024-45490/" type="self" id="ROS-20240910-03" title="ROS-20240910-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45490" type="cve" id="CVE-2024-45490" title="CVE-2024-45490" />
			<reference href="https://bdu.fstec.ru/vul/2024-07004" type="self" id="BDU:2024-07004" title="BDU:2024-07004" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="expat" epoch="0" version="2.6.3" release="1.el7" arch="x86_64" src="">
					<filename>expat-0:2.6.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240910-04</id>
		<issued date="2024-09-10" />
		<updated date="2024-09-10" />
		<title>Уязвимость libpcap </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libpcap</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpcap-cve-2024-8006/</description>
               <solution>
                    Запретить использование в ОС пакета libpcap
                или
                    Установить обновление для пакета(ов) libpcap
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpcap-cve-2024-8006/" type="self" id="ROS-20240910-04" title="ROS-20240910-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8006" type="cve" id="CVE-2024-8006" title="CVE-2024-8006" />
			<reference href="https://bdu.fstec.ru/vul/2024-07003" type="self" id="BDU:2024-07003" title="BDU:2024-07003" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libpcap" epoch="14" version="1.10.1" release="2.el7" arch="x86_64" src="">
					<filename>libpcap-14:1.10.1-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240910-05</id>
		<issued date="2024-09-10" />
		<updated date="2024-09-10" />
		<title>Уязвимость nomad </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nomad</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nomad-cve-2024-7625/</description>
               <solution>
                    Запретить использование в ОС пакета Nomad
                или
                    Установить обновление для пакета(ов) Nomad
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nomad-cve-2024-7625/" type="self" id="ROS-20240910-05" title="ROS-20240910-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7625" type="cve" id="CVE-2024-7625" title="CVE-2024-7625" />
			<reference href="https://bdu.fstec.ru/vul/2024-07001" type="self" id="BDU:2024-07001" title="BDU:2024-07001" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nomad" epoch="0" version="1.8.3" release="1.el7" arch="x86_64" src="">
					<filename>nomad-0:1.8.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240910-06</id>
		<issued date="2024-09-10" />
		<updated date="2024-09-10" />
		<title>Множественные уязвимости zabbix</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в zabbix</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix-10-09-24/</description>
               <solution>
                    Запретить использование в ОС пакета zabbix
                или
                    Установить обновление для пакета(ов) zabbix
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix-10-09-24/" type="self" id="ROS-20240910-06" title="ROS-20240910-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36461" type="cve" id="CVE-2024-36461" title="CVE-2024-36461" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22123" type="cve" id="CVE-2024-22123" title="CVE-2024-22123" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36460" type="cve" id="CVE-2024-36460" title="CVE-2024-36460" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22122" type="cve" id="CVE-2024-22122" title="CVE-2024-22122" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36462" type="cve" id="CVE-2024-36462" title="CVE-2024-36462" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22121" type="cve" id="CVE-2024-22121" title="CVE-2024-22121" />
			<reference href="https://bdu.fstec.ru/vul/2024-07010" type="self" id="BDU:2024-07010" title="BDU:2024-07010" />
			<reference href="https://bdu.fstec.ru/vul/2024-07009" type="self" id="BDU:2024-07009" title="BDU:2024-07009" />
			<reference href="https://bdu.fstec.ru/vul/2024-07008" type="self" id="BDU:2024-07008" title="BDU:2024-07008" />
			<reference href="https://bdu.fstec.ru/vul/2024-07007" type="self" id="BDU:2024-07007" title="BDU:2024-07007" />
			<reference href="https://bdu.fstec.ru/vul/2024-06996" type="self" id="BDU:2024-06996" title="BDU:2024-06996" />
			<reference href="https://bdu.fstec.ru/vul/2024-06995" type="self" id="BDU:2024-06995" title="BDU:2024-06995" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix" epoch="1" version="6.4.18" release="1.el7" arch="x86_64" src="">
					<filename>zabbix-1:6.4.18-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240910-07</id>
		<issued date="2024-09-10" />
		<updated date="2024-09-10" />
		<title>Множественные уязвимости snapd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в snapd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-snapd-cve-2024-5138-cve-2024-29068-cve-2024-29069/</description>
               <solution>
                    Запретить использование в ОС пакета snapd
                или
                    Установить обновление для пакета(ов) snapd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-snapd-cve-2024-5138-cve-2024-29068-cve-2024-29069/" type="self" id="ROS-20240910-07" title="ROS-20240910-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5138" type="cve" id="CVE-2024-5138" title="CVE-2024-5138" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29068" type="cve" id="CVE-2024-29068" title="CVE-2024-29068" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29069" type="cve" id="CVE-2024-29069" title="CVE-2024-29069" />
			<reference href="https://bdu.fstec.ru/vul/2024-06998" type="self" id="BDU:2024-06998" title="BDU:2024-06998" />
			<reference href="https://bdu.fstec.ru/vul/2024-07012" type="self" id="BDU:2024-07012" title="BDU:2024-07012" />
			<reference href="https://bdu.fstec.ru/vul/2024-06997" type="self" id="BDU:2024-06997" title="BDU:2024-06997" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="snapd" epoch="0" version="2.65.1" release="1.el7" arch="x86_64" src="">
					<filename>snapd-0:2.65.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240910-08</id>
		<issued date="2024-09-10" />
		<updated date="2024-09-10" />
		<title>Множественные уязвимости gstreamer1-plugins-good</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gstreamer1-plugins-good</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gstreamer1-plugins-good-10-09-24/</description>
               <solution>
                    Запретить использование в ОС пакета gstreamer1-plugins-good
                или
                    Установить обновление для пакета(ов) gstreamer1-plugins-good
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gstreamer1-plugins-good-10-09-24/" type="self" id="ROS-20240910-08" title="ROS-20240910-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37327" type="cve" id="CVE-2023-37327" title="CVE-2023-37327" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920" type="cve" id="CVE-2022-1920" title="CVE-2022-1920" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122" type="cve" id="CVE-2022-2122" title="CVE-2022-2122" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922" type="cve" id="CVE-2022-1922" title="CVE-2022-1922" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925" type="cve" id="CVE-2022-1925" title="CVE-2022-1925" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921" type="cve" id="CVE-2022-1921" title="CVE-2022-1921" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924" type="cve" id="CVE-2022-1924" title="CVE-2022-1924" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923" type="cve" id="CVE-2022-1923" title="CVE-2022-1923" />
			<reference href="https://bdu.fstec.ru/vul/2024-07000" type="self" id="BDU:2024-07000" title="BDU:2024-07000" />
			<reference href="https://bdu.fstec.ru/vul/2022-06450" type="self" id="BDU:2022-06450" title="BDU:2022-06450" />
			<reference href="https://bdu.fstec.ru/vul/2022-06453" type="self" id="BDU:2022-06453" title="BDU:2022-06453" />
			<reference href="https://bdu.fstec.ru/vul/2022-06462" type="self" id="BDU:2022-06462" title="BDU:2022-06462" />
			<reference href="https://bdu.fstec.ru/vul/2022-06448" type="self" id="BDU:2022-06448" title="BDU:2022-06448" />
			<reference href="https://bdu.fstec.ru/vul/2022-06449" type="self" id="BDU:2022-06449" title="BDU:2022-06449" />
			<reference href="https://bdu.fstec.ru/vul/2023-04784" type="self" id="BDU:2023-04784" title="BDU:2023-04784" />
			<reference href="https://bdu.fstec.ru/vul/2023-04783" type="self" id="BDU:2023-04783" title="BDU:2023-04783" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gstreamer1-plugins-good" epoch="0" version="1.16.3" release="2.el7" arch="x86_64" src="">
					<filename>gstreamer1-plugins-good-0:1.16.3-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240911-01</id>
		<issued date="2024-09-11" />
		<updated date="2024-09-11" />
		<title>Уязвимость libvirt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libvirt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libvirt-cve-2024-8235/</description>
               <solution>
                    Запретить использование в ОС пакета libvirt
                или
                    Установить обновление для пакета(ов) libvirt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libvirt-cve-2024-8235/" type="self" id="ROS-20240911-01" title="ROS-20240911-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8235" type="cve" id="CVE-2024-8235" title="CVE-2024-8235" />
			<reference href="https://bdu.fstec.ru/vul/2024-07002" type="self" id="BDU:2024-07002" title="BDU:2024-07002" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libvirt" epoch="0" version="7.6.0" release="9.el7" arch="x86_64" src="">
					<filename>libvirt-0:7.6.0-9.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240911-02</id>
		<issued date="2024-09-11" />
		<updated date="2024-09-11" />
		<title>Уязвимость postgresql </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-cve-2024-7348/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql
                или
                    Установить обновление для пакета(ов) postgresql
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-cve-2024-7348/" type="self" id="ROS-20240911-02" title="ROS-20240911-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7348" type="cve" id="CVE-2024-7348" title="CVE-2024-7348" />
			<reference href="https://bdu.fstec.ru/vul/2024-06153" type="self" id="BDU:2024-06153" title="BDU:2024-06153" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql" epoch="0" version="12.20" release="1.el7" arch="x86_64" src="">
					<filename>postgresql-0:12.20-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240911-22</id>
		<issued date="2024-09-11" />
		<updated date="2024-12-23" />
		<title>Уязвимость postgresql13 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql13</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-cve-2024-73482943/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql13
                или
                    Установить обновление для пакета(ов) postgresql13
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-cve-2024-73482943/" type="self" id="ROS-20240911-22" title="ROS-20240911-22" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7348" type="cve" id="CVE-2024-7348" title="CVE-2024-7348" />
			<reference href="https://bdu.fstec.ru/vul/2024-06153" type="self" id="BDU:2024-06153" title="BDU:2024-06153" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql13" epoch="0" version="13.16" release="1.el7" arch="x86_64" src="">
					<filename>postgresql13-0:13.16-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240911-21</id>
		<issued date="2024-09-11" />
		<updated date="2024-12-23" />
		<title>Уязвимость postgresql14 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql14</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-cve-2024-7348478/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql14
                или
                    Установить обновление для пакета(ов) postgresql14
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-cve-2024-7348478/" type="self" id="ROS-20240911-21" title="ROS-20240911-21" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7348" type="cve" id="CVE-2024-7348" title="CVE-2024-7348" />
			<reference href="https://bdu.fstec.ru/vul/2024-06153" type="self" id="BDU:2024-06153" title="BDU:2024-06153" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql14" epoch="0" version="14.13" release="1.el7" arch="x86_64" src="">
					<filename>postgresql14-0:14.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240911-20</id>
		<issued date="2024-09-11" />
		<updated date="2024-12-23" />
		<title>Уязвимость postgresql15 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql15</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-cve-2024-73484085/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql15
                или
                    Установить обновление для пакета(ов) postgresql15
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-cve-2024-73484085/" type="self" id="ROS-20240911-20" title="ROS-20240911-20" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7348" type="cve" id="CVE-2024-7348" title="CVE-2024-7348" />
			<reference href="https://bdu.fstec.ru/vul/2024-06153" type="self" id="BDU:2024-06153" title="BDU:2024-06153" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql15" epoch="0" version="15.8" release="1.el7" arch="x86_64" src="">
					<filename>postgresql15-0:15.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240911-19</id>
		<issued date="2024-09-11" />
		<updated date="2024-12-23" />
		<title>Уязвимость postgresql16 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql16</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-cve-2024-73487730/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql16
                или
                    Установить обновление для пакета(ов) postgresql16
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-cve-2024-73487730/" type="self" id="ROS-20240911-19" title="ROS-20240911-19" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7348" type="cve" id="CVE-2024-7348" title="CVE-2024-7348" />
			<reference href="https://bdu.fstec.ru/vul/2024-06153" type="self" id="BDU:2024-06153" title="BDU:2024-06153" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql16" epoch="0" version="16.4" release="1.el7" arch="x86_64" src="">
					<filename>postgresql16-0:16.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240911-18</id>
		<issued date="2024-09-11" />
		<updated date="2024-12-23" />
		<title>Уязвимость postgresql-1c </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-cve-2024-73485656/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql-1c
                или
                    Установить обновление для пакета(ов) postgresql-1c
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-cve-2024-73485656/" type="self" id="ROS-20240911-18" title="ROS-20240911-18" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7348" type="cve" id="CVE-2024-7348" title="CVE-2024-7348" />
			<reference href="https://bdu.fstec.ru/vul/2024-06153" type="self" id="BDU:2024-06153" title="BDU:2024-06153" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql-1c" epoch="0" version="14.13" release="1.el7" arch="x86_64" src="">
					<filename>postgresql-1c-0:14.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240911-17</id>
		<issued date="2024-09-11" />
		<updated date="2024-12-23" />
		<title>Уязвимость postgresql15-1c </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql15-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-cve-2024-7348504/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql15-1c
                или
                    Установить обновление для пакета(ов) postgresql15-1c
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-cve-2024-7348504/" type="self" id="ROS-20240911-17" title="ROS-20240911-17" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7348" type="cve" id="CVE-2024-7348" title="CVE-2024-7348" />
			<reference href="https://bdu.fstec.ru/vul/2024-06153" type="self" id="BDU:2024-06153" title="BDU:2024-06153" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql15-1c" epoch="0" version="15.8" release="1.el7" arch="x86_64" src="">
					<filename>postgresql15-1c-0:15.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240911-03</id>
		<issued date="2024-09-11" />
		<updated date="2024-09-11" />
		<title>Уязвимость python3-requests </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-requests</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-requests-cve-2024-35195/</description>
               <solution>
                    Запретить использование в ОС пакета python3-requests 
                или
                    Установить обновление для пакета(ов) python3-requests 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-requests-cve-2024-35195/" type="self" id="ROS-20240911-03" title="ROS-20240911-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35195" type="cve" id="CVE-2024-35195" title="CVE-2024-35195" />
			<reference href="https://bdu.fstec.ru/vul/2024-07014" type="self" id="BDU:2024-07014" title="BDU:2024-07014" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-requests" epoch="0" version="2.26.0" release="5.el7" arch="noarch" src="">
					<filename>python3-requests-0:2.26.0-5.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240911-04</id>
		<issued date="2024-09-11" />
		<updated date="2024-09-11" />
		<title>Множественные уязвимости krb5-server </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в krb5-server</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-krb5-server-cve-2024-37370-cve-2024-37371/</description>
               <solution>
                    Запретить использование в ОС пакета krb5
                или
                    Установить обновление для пакета(ов) krb5
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-krb5-server-cve-2024-37370-cve-2024-37371/" type="self" id="ROS-20240911-04" title="ROS-20240911-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37370" type="cve" id="CVE-2024-37370" title="CVE-2024-37370" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37371" type="cve" id="CVE-2024-37371" title="CVE-2024-37371" />
			<reference href="https://bdu.fstec.ru/vul/2024-07016" type="self" id="BDU:2024-07016" title="BDU:2024-07016" />
			<reference href="https://bdu.fstec.ru/vul/2024-07005" type="self" id="BDU:2024-07005" title="BDU:2024-07005" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="krb5-server" epoch="0" version="1.20.1" release="4.el7" arch="x86_64" src="">
					<filename>krb5-server-0:1.20.1-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240911-05</id>
		<issued date="2024-09-11" />
		<updated date="2024-09-11" />
		<title>Уязвимость libspf2 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libspf2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libspf2-cve-2023-42118/</description>
               <solution>
                    Запретить использование в ОС пакета libspf2
                или
                    Установить обновление для пакета(ов) libspf2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libspf2-cve-2023-42118/" type="self" id="ROS-20240911-05" title="ROS-20240911-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42118" type="cve" id="CVE-2023-42118" title="CVE-2023-42118" />
			<reference href="https://bdu.fstec.ru/vul/2023-06275" type="self" id="BDU:2023-06275" title="BDU:2023-06275" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libspf2" epoch="0" version="1.2.11" release="1.20210922git4915c308.el7" arch="x86_64" src="">
					<filename>libspf2-0:1.2.11-1.20210922git4915c308.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240911-06</id>
		<issued date="2024-09-11" />
		<updated date="2024-09-11" />
		<title>Уязвимость cross-gcc </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в cross-gcc-common</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cross-gcc-cve-2023-4039/</description>
               <solution>
                    Запретить использование в ОС пакета cross-gcc-common
                или
                    Установить обновление для пакета(ов) cross-gcc-common
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cross-gcc-cve-2023-4039/" type="self" id="ROS-20240911-06" title="ROS-20240911-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4039" type="cve" id="CVE-2023-4039" title="CVE-2023-4039" />
			<reference href="https://bdu.fstec.ru/vul/2023-05920" type="self" id="BDU:2023-05920" title="BDU:2023-05920" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cross-gcc-common" epoch="0" version="11.5.0" release="1.el7" arch="noarch" src="">
					<filename>cross-gcc-common-0:11.5.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240911-07</id>
		<issued date="2024-09-11" />
		<updated date="2024-09-11" />
		<title>Уязвимость vim </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в vim-X11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-cve-2023-4751/</description>
               <solution>
                    Запретить использование в ОС пакета vim
                или
                    Установить обновление для пакета(ов) vim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-cve-2023-4751/" type="self" id="ROS-20240911-07" title="ROS-20240911-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4751" type="cve" id="CVE-2023-4751" title="CVE-2023-4751" />
			<reference href="https://bdu.fstec.ru/vul/2023-05153" type="self" id="BDU:2023-05153" title="BDU:2023-05153" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-X11" epoch="2" version="9.0.1385" release="1.el7.3" arch="x86_64" src="">
					<filename>vim-X11-2:9.0.1385-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240911-08</id>
		<issued date="2024-09-11" />
		<updated date="2024-09-11" />
		<title>Уязвимость python3-configobj </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-configobj</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-configobj-cve-2023-26112/</description>
               <solution>
                    Запретить использование в ОС пакета python3-configobj
                или
                    Установить обновление для пакета(ов) python3-configobj
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-configobj-cve-2023-26112/" type="self" id="ROS-20240911-08" title="ROS-20240911-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26112" type="cve" id="CVE-2023-26112" title="CVE-2023-26112" />
			<reference href="https://bdu.fstec.ru/vul/2024-07015" type="self" id="BDU:2024-07015" title="BDU:2024-07015" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-configobj" epoch="0" version="5.0.8" release="1.el7" arch="noarch" src="">
					<filename>python3-configobj-0:5.0.8-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240911-09</id>
		<issued date="2024-09-11" />
		<updated date="2024-09-11" />
		<title>Уязвимость pkgconf </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в pkgconf</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pkgconf-cve-2023-24056/</description>
               <solution>
                    Запретить использование в ОС пакета pkgconf
                или
                    Установить обновление для пакета(ов) pkgconf
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pkgconf-cve-2023-24056/" type="self" id="ROS-20240911-09" title="ROS-20240911-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24056" type="cve" id="CVE-2023-24056" title="CVE-2023-24056" />
			<reference href="https://bdu.fstec.ru/vul/2023-02340" type="self" id="BDU:2023-02340" title="BDU:2023-02340" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pkgconf" epoch="0" version="1.7.3" release="3.el7" arch="x86_64" src="">
					<filename>pkgconf-0:1.7.3-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240911-10</id>
		<issued date="2024-09-11" />
		<updated date="2024-09-11" />
		<title>Уязвимость python3-jwt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-jwt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-jwt-cve-2022-29217/</description>
               <solution>
                    Запретить использование в ОС пакета python3-jwt
                или
                    Установить обновление для пакета(ов) python3-jwt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-jwt-cve-2022-29217/" type="self" id="ROS-20240911-10" title="ROS-20240911-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29217" type="cve" id="CVE-2022-29217" title="CVE-2022-29217" />
			<reference href="https://bdu.fstec.ru/vul/2023-07829" type="self" id="BDU:2023-07829" title="BDU:2023-07829" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-jwt" epoch="0" version="2.4.0" release="1.el7" arch="noarch" src="">
					<filename>python3-jwt-0:2.4.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240911-11</id>
		<issued date="2024-09-11" />
		<updated date="2024-10-16" />
		<title>Множественные уязвимости xen</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в xen</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-xen-11-09-24/</description>
               <solution>
                    Запретить использование в ОС пакета xen
                или
                    Установить обновление для пакета(ов) xen
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-xen-11-09-24/" type="self" id="ROS-20240911-11" title="ROS-20240911-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745" type="cve" id="CVE-2022-33745" title="CVE-2022-33745" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825" type="cve" id="CVE-2022-23825" title="CVE-2022-23825" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900" type="cve" id="CVE-2022-29900" title="CVE-2022-29900" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365" type="cve" id="CVE-2022-26365" title="CVE-2022-26365" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740" type="cve" id="CVE-2022-33740" title="CVE-2022-33740" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741" type="cve" id="CVE-2022-33741" title="CVE-2022-33741" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742" type="cve" id="CVE-2022-33742" title="CVE-2022-33742" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34325" type="cve" id="CVE-2023-34325" title="CVE-2023-34325" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46839" type="cve" id="CVE-2023-46839" title="CVE-2023-46839" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746" type="cve" id="CVE-2023-28746" title="CVE-2023-28746" />
			<reference href="https://bdu.fstec.ru/vul/2024-07017" type="self" id="BDU:2024-07017" title="BDU:2024-07017" />
			<reference href="https://bdu.fstec.ru/vul/2023-01494" type="self" id="BDU:2023-01494" title="BDU:2023-01494" />
			<reference href="https://bdu.fstec.ru/vul/2022-04387" type="self" id="BDU:2022-04387" title="BDU:2022-04387" />
			<reference href="https://bdu.fstec.ru/vul/2022-04270" type="self" id="BDU:2022-04270" title="BDU:2022-04270" />
			<reference href="https://bdu.fstec.ru/vul/2022-04876" type="self" id="BDU:2022-04876" title="BDU:2022-04876" />
			<reference href="https://bdu.fstec.ru/vul/2022-04269" type="self" id="BDU:2022-04269" title="BDU:2022-04269" />
			<reference href="https://bdu.fstec.ru/vul/2022-04272" type="self" id="BDU:2022-04272" title="BDU:2022-04272" />
			<reference href="https://bdu.fstec.ru/vul/2024-07006" type="self" id="BDU:2024-07006" title="BDU:2024-07006" />
			<reference href="https://bdu.fstec.ru/vul/2024-01016" type="self" id="BDU:2024-01016" title="BDU:2024-01016" />
			<reference href="https://bdu.fstec.ru/vul/2024-02258" type="self" id="BDU:2024-02258" title="BDU:2024-02258" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="xen" epoch="0" version="4.19.0" release="1.el7" arch="x86_64" src="">
					<filename>xen-0:4.19.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240912-01</id>
		<issued date="2024-09-12" />
		<updated date="2024-09-12" />
		<title>Множественные уязвимости hdf5</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в hdf5</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-hdf5-12-09-24/</description>
               <solution>
                    Запретить использование в ОС пакета HDF5
                или
                    Установить обновление для пакета(ов) HDF5
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-hdf5-12-09-24/" type="self" id="ROS-20240912-01" title="ROS-20240912-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33877" type="cve" id="CVE-2024-33877" title="CVE-2024-33877" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33876" type="cve" id="CVE-2024-33876" title="CVE-2024-33876" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33875" type="cve" id="CVE-2024-33875" title="CVE-2024-33875" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33874" type="cve" id="CVE-2024-33874" title="CVE-2024-33874" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33873" type="cve" id="CVE-2024-33873" title="CVE-2024-33873" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32624" type="cve" id="CVE-2024-32624" title="CVE-2024-32624" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32623" type="cve" id="CVE-2024-32623" title="CVE-2024-32623" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32622" type="cve" id="CVE-2024-32622" title="CVE-2024-32622" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32621" type="cve" id="CVE-2024-32621" title="CVE-2024-32621" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32620" type="cve" id="CVE-2024-32620" title="CVE-2024-32620" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32619" type="cve" id="CVE-2024-32619" title="CVE-2024-32619" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32618" type="cve" id="CVE-2024-32618" title="CVE-2024-32618" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32617" type="cve" id="CVE-2024-32617" title="CVE-2024-32617" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32616" type="cve" id="CVE-2024-32616" title="CVE-2024-32616" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32615" type="cve" id="CVE-2024-32615" title="CVE-2024-32615" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32614" type="cve" id="CVE-2024-32614" title="CVE-2024-32614" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32613" type="cve" id="CVE-2024-32613" title="CVE-2024-32613" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32612" type="cve" id="CVE-2024-32612" title="CVE-2024-32612" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32611" type="cve" id="CVE-2024-32611" title="CVE-2024-32611" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32610" type="cve" id="CVE-2024-32610" title="CVE-2024-32610" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32609" type="cve" id="CVE-2024-32609" title="CVE-2024-32609" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32608" type="cve" id="CVE-2024-32608" title="CVE-2024-32608" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32607" type="cve" id="CVE-2024-32607" title="CVE-2024-32607" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32606" type="cve" id="CVE-2024-32606" title="CVE-2024-32606" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32605" type="cve" id="CVE-2024-32605" title="CVE-2024-32605" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29166" type="cve" id="CVE-2024-29166" title="CVE-2024-29166" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29165" type="cve" id="CVE-2024-29165" title="CVE-2024-29165" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29164" type="cve" id="CVE-2024-29164" title="CVE-2024-29164" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29163" type="cve" id="CVE-2024-29163" title="CVE-2024-29163" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29162" type="cve" id="CVE-2024-29162" title="CVE-2024-29162" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29161" type="cve" id="CVE-2024-29161" title="CVE-2024-29161" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29159" type="cve" id="CVE-2024-29159" title="CVE-2024-29159" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29158" type="cve" id="CVE-2024-29158" title="CVE-2024-29158" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29157" type="cve" id="CVE-2024-29157" title="CVE-2024-29157" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26061" type="cve" id="CVE-2022-26061" title="CVE-2022-26061" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25972" type="cve" id="CVE-2022-25972" title="CVE-2022-25972" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25942" type="cve" id="CVE-2022-25942" title="CVE-2022-25942" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46244" type="cve" id="CVE-2021-46244" title="CVE-2021-46244" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46243" type="cve" id="CVE-2021-46243" title="CVE-2021-46243" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46242" type="cve" id="CVE-2021-46242" title="CVE-2021-46242" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45833" type="cve" id="CVE-2021-45833" title="CVE-2021-45833" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45832" type="cve" id="CVE-2021-45832" title="CVE-2021-45832" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45830" type="cve" id="CVE-2021-45830" title="CVE-2021-45830" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45829" type="cve" id="CVE-2021-45829" title="CVE-2021-45829" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37501" type="cve" id="CVE-2021-37501" title="CVE-2021-37501" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10812" type="cve" id="CVE-2020-10812" title="CVE-2020-10812" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10811" type="cve" id="CVE-2020-10811" title="CVE-2020-10811" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10810" type="cve" id="CVE-2020-10810" title="CVE-2020-10810" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10809" type="cve" id="CVE-2020-10809" title="CVE-2020-10809" />
			<reference href="https://bdu.fstec.ru/vul/2024-07109" type="self" id="BDU:2024-07109" title="BDU:2024-07109" />
			<reference href="https://bdu.fstec.ru/vul/2024-07120" type="self" id="BDU:2024-07120" title="BDU:2024-07120" />
			<reference href="https://bdu.fstec.ru/vul/2024-07121" type="self" id="BDU:2024-07121" title="BDU:2024-07121" />
			<reference href="https://bdu.fstec.ru/vul/2024-07122" type="self" id="BDU:2024-07122" title="BDU:2024-07122" />
			<reference href="https://bdu.fstec.ru/vul/2024-07123" type="self" id="BDU:2024-07123" title="BDU:2024-07123" />
			<reference href="https://bdu.fstec.ru/vul/2024-07124" type="self" id="BDU:2024-07124" title="BDU:2024-07124" />
			<reference href="https://bdu.fstec.ru/vul/2024-07125" type="self" id="BDU:2024-07125" title="BDU:2024-07125" />
			<reference href="https://bdu.fstec.ru/vul/2024-07126" type="self" id="BDU:2024-07126" title="BDU:2024-07126" />
			<reference href="https://bdu.fstec.ru/vul/2024-07127" type="self" id="BDU:2024-07127" title="BDU:2024-07127" />
			<reference href="https://bdu.fstec.ru/vul/2024-07128" type="self" id="BDU:2024-07128" title="BDU:2024-07128" />
			<reference href="https://bdu.fstec.ru/vul/2024-07129" type="self" id="BDU:2024-07129" title="BDU:2024-07129" />
			<reference href="https://bdu.fstec.ru/vul/2024-07130" type="self" id="BDU:2024-07130" title="BDU:2024-07130" />
			<reference href="https://bdu.fstec.ru/vul/2024-07131" type="self" id="BDU:2024-07131" title="BDU:2024-07131" />
			<reference href="https://bdu.fstec.ru/vul/2024-07132" type="self" id="BDU:2024-07132" title="BDU:2024-07132" />
			<reference href="https://bdu.fstec.ru/vul/2024-07133" type="self" id="BDU:2024-07133" title="BDU:2024-07133" />
			<reference href="https://bdu.fstec.ru/vul/2024-07134" type="self" id="BDU:2024-07134" title="BDU:2024-07134" />
			<reference href="https://bdu.fstec.ru/vul/2024-07135" type="self" id="BDU:2024-07135" title="BDU:2024-07135" />
			<reference href="https://bdu.fstec.ru/vul/2024-07136" type="self" id="BDU:2024-07136" title="BDU:2024-07136" />
			<reference href="https://bdu.fstec.ru/vul/2024-07137" type="self" id="BDU:2024-07137" title="BDU:2024-07137" />
			<reference href="https://bdu.fstec.ru/vul/2024-07138" type="self" id="BDU:2024-07138" title="BDU:2024-07138" />
			<reference href="https://bdu.fstec.ru/vul/2024-07139" type="self" id="BDU:2024-07139" title="BDU:2024-07139" />
			<reference href="https://bdu.fstec.ru/vul/2024-07140" type="self" id="BDU:2024-07140" title="BDU:2024-07140" />
			<reference href="https://bdu.fstec.ru/vul/2024-07141" type="self" id="BDU:2024-07141" title="BDU:2024-07141" />
			<reference href="https://bdu.fstec.ru/vul/2024-07142" type="self" id="BDU:2024-07142" title="BDU:2024-07142" />
			<reference href="https://bdu.fstec.ru/vul/2024-07143" type="self" id="BDU:2024-07143" title="BDU:2024-07143" />
			<reference href="https://bdu.fstec.ru/vul/2024-07144" type="self" id="BDU:2024-07144" title="BDU:2024-07144" />
			<reference href="https://bdu.fstec.ru/vul/2024-07145" type="self" id="BDU:2024-07145" title="BDU:2024-07145" />
			<reference href="https://bdu.fstec.ru/vul/2024-07146" type="self" id="BDU:2024-07146" title="BDU:2024-07146" />
			<reference href="https://bdu.fstec.ru/vul/2024-07147" type="self" id="BDU:2024-07147" title="BDU:2024-07147" />
			<reference href="https://bdu.fstec.ru/vul/2024-07110" type="self" id="BDU:2024-07110" title="BDU:2024-07110" />
			<reference href="https://bdu.fstec.ru/vul/2024-07148" type="self" id="BDU:2024-07148" title="BDU:2024-07148" />
			<reference href="https://bdu.fstec.ru/vul/2024-07111" type="self" id="BDU:2024-07111" title="BDU:2024-07111" />
			<reference href="https://bdu.fstec.ru/vul/2024-07112" type="self" id="BDU:2024-07112" title="BDU:2024-07112" />
			<reference href="https://bdu.fstec.ru/vul/2024-07113" type="self" id="BDU:2024-07113" title="BDU:2024-07113" />
			<reference href="https://bdu.fstec.ru/vul/2022-05219" type="self" id="BDU:2022-05219" title="BDU:2022-05219" />
			<reference href="https://bdu.fstec.ru/vul/2022-05221" type="self" id="BDU:2022-05221" title="BDU:2022-05221" />
			<reference href="https://bdu.fstec.ru/vul/2022-05220" type="self" id="BDU:2022-05220" title="BDU:2022-05220" />
			<reference href="https://bdu.fstec.ru/vul/2024-07114" type="self" id="BDU:2024-07114" title="BDU:2024-07114" />
			<reference href="https://bdu.fstec.ru/vul/2024-07149" type="self" id="BDU:2024-07149" title="BDU:2024-07149" />
			<reference href="https://bdu.fstec.ru/vul/2024-07115" type="self" id="BDU:2024-07115" title="BDU:2024-07115" />
			<reference href="https://bdu.fstec.ru/vul/2024-07116" type="self" id="BDU:2024-07116" title="BDU:2024-07116" />
			<reference href="https://bdu.fstec.ru/vul/2024-07150" type="self" id="BDU:2024-07150" title="BDU:2024-07150" />
			<reference href="https://bdu.fstec.ru/vul/2024-07117" type="self" id="BDU:2024-07117" title="BDU:2024-07117" />
			<reference href="https://bdu.fstec.ru/vul/2024-07151" type="self" id="BDU:2024-07151" title="BDU:2024-07151" />
			<reference href="https://bdu.fstec.ru/vul/2023-02008" type="self" id="BDU:2023-02008" title="BDU:2023-02008" />
			<reference href="https://bdu.fstec.ru/vul/2024-07152" type="self" id="BDU:2024-07152" title="BDU:2024-07152" />
			<reference href="https://bdu.fstec.ru/vul/2024-07118" type="self" id="BDU:2024-07118" title="BDU:2024-07118" />
			<reference href="https://bdu.fstec.ru/vul/2024-07153" type="self" id="BDU:2024-07153" title="BDU:2024-07153" />
			<reference href="https://bdu.fstec.ru/vul/2024-07119" type="self" id="BDU:2024-07119" title="BDU:2024-07119" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="hdf5" epoch="0" version="1.14.4" release="1.el7" arch="x86_64" src="">
					<filename>hdf5-0:1.14.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240916-02</id>
		<issued date="2024-09-16" />
		<updated date="2024-09-16" />
		<title>Множественные уязвимости mariadb</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в mariadb</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mariadb-16-09-24/</description>
               <solution>
                    Запретить использование в ОС пакета mariadb
                или
                    Установить обновление для пакета(ов) mariadb
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mariadb-16-09-24/" type="self" id="ROS-20240916-02" title="ROS-20240916-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27387" type="cve" id="CVE-2022-27387" title="CVE-2022-27387" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27376" type="cve" id="CVE-2022-27376" title="CVE-2022-27376" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27377" type="cve" id="CVE-2022-27377" title="CVE-2022-27377" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27378" type="cve" id="CVE-2022-27378" title="CVE-2022-27378" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27379" type="cve" id="CVE-2022-27379" title="CVE-2022-27379" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27380" type="cve" id="CVE-2022-27380" title="CVE-2022-27380" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27381" type="cve" id="CVE-2022-27381" title="CVE-2022-27381" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27382" type="cve" id="CVE-2022-27382" title="CVE-2022-27382" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27383" type="cve" id="CVE-2022-27383" title="CVE-2022-27383" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27384" type="cve" id="CVE-2022-27384" title="CVE-2022-27384" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27386" type="cve" id="CVE-2022-27386" title="CVE-2022-27386" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27444" type="cve" id="CVE-2022-27444" title="CVE-2022-27444" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27445" type="cve" id="CVE-2022-27445" title="CVE-2022-27445" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27446" type="cve" id="CVE-2022-27446" title="CVE-2022-27446" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27447" type="cve" id="CVE-2022-27447" title="CVE-2022-27447" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27448" type="cve" id="CVE-2022-27448" title="CVE-2022-27448" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27449" type="cve" id="CVE-2022-27449" title="CVE-2022-27449" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27457" type="cve" id="CVE-2022-27457" title="CVE-2022-27457" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27456" type="cve" id="CVE-2022-27456" title="CVE-2022-27456" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27455" type="cve" id="CVE-2022-27455" title="CVE-2022-27455" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27451" type="cve" id="CVE-2022-27451" title="CVE-2022-27451" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27452" type="cve" id="CVE-2022-27452" title="CVE-2022-27452" />
			<reference href="https://bdu.fstec.ru/vul/2022-02593" type="self" id="BDU:2022-02593" title="BDU:2022-02593" />
			<reference href="https://bdu.fstec.ru/vul/2022-06922" type="self" id="BDU:2022-06922" title="BDU:2022-06922" />
			<reference href="https://bdu.fstec.ru/vul/2022-06927" type="self" id="BDU:2022-06927" title="BDU:2022-06927" />
			<reference href="https://bdu.fstec.ru/vul/2022-06915" type="self" id="BDU:2022-06915" title="BDU:2022-06915" />
			<reference href="https://bdu.fstec.ru/vul/2022-06923" type="self" id="BDU:2022-06923" title="BDU:2022-06923" />
			<reference href="https://bdu.fstec.ru/vul/2022-06924" type="self" id="BDU:2022-06924" title="BDU:2022-06924" />
			<reference href="https://bdu.fstec.ru/vul/2022-06916" type="self" id="BDU:2022-06916" title="BDU:2022-06916" />
			<reference href="https://bdu.fstec.ru/vul/2023-05661" type="self" id="BDU:2023-05661" title="BDU:2023-05661" />
			<reference href="https://bdu.fstec.ru/vul/2022-06904" type="self" id="BDU:2022-06904" title="BDU:2022-06904" />
			<reference href="https://bdu.fstec.ru/vul/2022-06906" type="self" id="BDU:2022-06906" title="BDU:2022-06906" />
			<reference href="https://bdu.fstec.ru/vul/2022-02594" type="self" id="BDU:2022-02594" title="BDU:2022-02594" />
			<reference href="https://bdu.fstec.ru/vul/2023-05685" type="self" id="BDU:2023-05685" title="BDU:2023-05685" />
			<reference href="https://bdu.fstec.ru/vul/2022-03726" type="self" id="BDU:2022-03726" title="BDU:2022-03726" />
			<reference href="https://bdu.fstec.ru/vul/2023-05684" type="self" id="BDU:2023-05684" title="BDU:2023-05684" />
			<reference href="https://bdu.fstec.ru/vul/2022-06909" type="self" id="BDU:2022-06909" title="BDU:2022-06909" />
			<reference href="https://bdu.fstec.ru/vul/2022-06913" type="self" id="BDU:2022-06913" title="BDU:2022-06913" />
			<reference href="https://bdu.fstec.ru/vul/2022-06919" type="self" id="BDU:2022-06919" title="BDU:2022-06919" />
			<reference href="https://bdu.fstec.ru/vul/2023-05676" type="self" id="BDU:2023-05676" title="BDU:2023-05676" />
			<reference href="https://bdu.fstec.ru/vul/2022-06914" type="self" id="BDU:2022-06914" title="BDU:2022-06914" />
			<reference href="https://bdu.fstec.ru/vul/2023-05677" type="self" id="BDU:2023-05677" title="BDU:2023-05677" />
			<reference href="https://bdu.fstec.ru/vul/2023-05683" type="self" id="BDU:2023-05683" title="BDU:2023-05683" />
			<reference href="https://bdu.fstec.ru/vul/2022-06907" type="self" id="BDU:2022-06907" title="BDU:2022-06907" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mariadb" epoch="3" version="10.5.15" release="1.el7" arch="x86_64" src="">
					<filename>mariadb-3:10.5.15-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240916-03</id>
		<issued date="2024-09-16" />
		<updated date="2024-09-17" />
		<title>Множественные уязвимости nodejs</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nodejs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nodejs-16-09-24/</description>
               <solution>
                    Запретить использование в ОС пакета nodejs
                или
                    Установить обновление для пакета(ов) nodejs
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nodejs-16-09-24/" type="self" id="ROS-20240916-03" title="ROS-20240916-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23920" type="cve" id="CVE-2023-23920" title="CVE-2023-23920" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23919" type="cve" id="CVE-2023-23919" title="CVE-2023-23919" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23918" type="cve" id="CVE-2023-23918" title="CVE-2023-23918" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32002" type="cve" id="CVE-2023-32002" title="CVE-2023-32002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32559" type="cve" id="CVE-2023-32559" title="CVE-2023-32559" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32006" type="cve" id="CVE-2023-32006" title="CVE-2023-32006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38552" type="cve" id="CVE-2023-38552" title="CVE-2023-38552" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39333" type="cve" id="CVE-2023-39333" title="CVE-2023-39333" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30590" type="cve" id="CVE-2023-30590" title="CVE-2023-30590" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45143" type="cve" id="CVE-2023-45143" title="CVE-2023-45143" />
			<reference href="https://bdu.fstec.ru/vul/2023-02655" type="self" id="BDU:2023-02655" title="BDU:2023-02655" />
			<reference href="https://bdu.fstec.ru/vul/2023-01626" type="self" id="BDU:2023-01626" title="BDU:2023-01626" />
			<reference href="https://bdu.fstec.ru/vul/2023-01627" type="self" id="BDU:2023-01627" title="BDU:2023-01627" />
			<reference href="https://bdu.fstec.ru/vul/2023-04953" type="self" id="BDU:2023-04953" title="BDU:2023-04953" />
			<reference href="https://bdu.fstec.ru/vul/2023-04955" type="self" id="BDU:2023-04955" title="BDU:2023-04955" />
			<reference href="https://bdu.fstec.ru/vul/2023-04954" type="self" id="BDU:2023-04954" title="BDU:2023-04954" />
			<reference href="https://bdu.fstec.ru/vul/2023-07176" type="self" id="BDU:2023-07176" title="BDU:2023-07176" />
			<reference href="https://bdu.fstec.ru/vul/2023-08046" type="self" id="BDU:2023-08046" title="BDU:2023-08046" />
			<reference href="https://bdu.fstec.ru/vul/2023-04930" type="self" id="BDU:2023-04930" title="BDU:2023-04930" />
			<reference href="https://bdu.fstec.ru/vul/2023-07356" type="self" id="BDU:2023-07356" title="BDU:2023-07356" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs" epoch="1" version="18.18.2" release="1.el7" arch="x86_64" src="">
					<filename>nodejs-1:18.18.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240916-04</id>
		<issued date="2024-09-16" />
		<updated date="2024-09-16" />
		<title>Уязвимость nodejs </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nodejs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-cve-2023-46809/</description>
               <solution>
                    Запретить использование в ОС пакета nodejs
                или
                    Установить обновление для пакета(ов) nodejs
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-cve-2023-46809/" type="self" id="ROS-20240916-04" title="ROS-20240916-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46809" type="cve" id="CVE-2023-46809" title="CVE-2023-46809" />
			<reference href="https://bdu.fstec.ru/vul/2024-02819" type="self" id="BDU:2024-02819" title="BDU:2024-02819" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs" epoch="1" version="18.19.1" release="1.el7" arch="x86_64" src="">
					<filename>nodejs-1:18.19.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240916-05</id>
		<issued date="2024-09-16" />
		<updated date="2024-09-16" />
		<title>Уязвимость python3 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2023-27043/</description>
               <solution>
                    Запретить использование в ОС пакета python3
                или
                    Установить обновление для пакета(ов) python3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2023-27043/" type="self" id="ROS-20240916-05" title="ROS-20240916-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27043" type="cve" id="CVE-2023-27043" title="CVE-2023-27043" />
			<reference href="https://bdu.fstec.ru/vul/2023-04980" type="self" id="BDU:2023-04980" title="BDU:2023-04980" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3" epoch="0" version="3.8.19" release="2.el7" arch="x86_64" src="">
					<filename>python3-0:3.8.19-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240916-06</id>
		<issued date="2024-09-16" />
		<updated date="2024-09-16" />
		<title>Уязвимость xen </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в xen</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-xen-cve-2023-46840/</description>
               <solution>
                    Запретить использование в ОС пакета xen
                или
                    Установить обновление для пакета(ов) xen
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-xen-cve-2023-46840/" type="self" id="ROS-20240916-06" title="ROS-20240916-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46840" type="cve" id="CVE-2023-46840" title="CVE-2023-46840" />
			<reference href="https://bdu.fstec.ru/vul/2024-07258" type="self" id="BDU:2024-07258" title="BDU:2024-07258" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="xen" epoch="0" version="4.19.0" release="1.el7" arch="x86_64" src="">
					<filename>xen-0:4.19.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240916-07</id>
		<issued date="2024-09-16" />
		<updated date="2024-09-16" />
		<title>Уязвимость nodejs </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nodejs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-cve-2024-22025/</description>
               <solution>
                    Запретить использование в ОС пакета nodejs
                или
                    Установить обновление для пакета(ов) nodejs
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-cve-2024-22025/" type="self" id="ROS-20240916-07" title="ROS-20240916-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22025" type="cve" id="CVE-2024-22025" title="CVE-2024-22025" />
			<reference href="https://bdu.fstec.ru/vul/2024-02698" type="self" id="BDU:2024-02698" title="BDU:2024-02698" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs" epoch="1" version="18.19.1" release="1.el7" arch="x86_64" src="">
					<filename>nodejs-1:18.19.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240916-08</id>
		<issued date="2024-09-16" />
		<updated date="2024-09-16" />
		<title>Уязвимость mongodb-org </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2024-1351/</description>
               <solution>
                    Запретить использование в ОС пакета mongodb-org
                или
                    Установить обновление для пакета(ов) mongodb-org
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2024-1351/" type="self" id="ROS-20240916-08" title="ROS-20240916-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1351" type="cve" id="CVE-2024-1351" title="CVE-2024-1351" />
			<reference href="https://bdu.fstec.ru/vul/2024-01947" type="self" id="BDU:2024-01947" title="BDU:2024-01947" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mongodb-org" epoch="0" version="6.0.15" release="1.el7" arch="x86_64" src="">
					<filename>mongodb-org-0:6.0.15-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240916-09</id>
		<issued date="2024-09-16" />
		<updated date="2024-09-16" />
		<title>Уязвимость xen </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в xen</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-xen-cve-2023-46842/</description>
               <solution>
                    Запретить использование в ОС пакета xen
                или
                    Установить обновление для пакета(ов) xen
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-xen-cve-2023-46842/" type="self" id="ROS-20240916-09" title="ROS-20240916-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46842" type="cve" id="CVE-2023-46842" title="CVE-2023-46842" />
			<reference href="https://bdu.fstec.ru/vul/2024-07257" type="self" id="BDU:2024-07257" title="BDU:2024-07257" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="xen" epoch="0" version="4.19.0" release="1.el7" arch="x86_64" src="">
					<filename>xen-0:4.19.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240916-10</id>
		<issued date="2024-09-16" />
		<updated date="2024-09-16" />
		<title>Уязвимость ncurses </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в ncurses</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ncurses-cve-2023-50495/</description>
               <solution>
                    Запретить использование в ОС пакета ncurses
                или
                    Установить обновление для пакета(ов) ncurses
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ncurses-cve-2023-50495/" type="self" id="ROS-20240916-10" title="ROS-20240916-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50495" type="cve" id="CVE-2023-50495" title="CVE-2023-50495" />
			<reference href="https://bdu.fstec.ru/vul/2024-07256" type="self" id="BDU:2024-07256" title="BDU:2024-07256" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ncurses" epoch="0" version="6.5" release="1.20240629.el7" arch="x86_64" src="">
					<filename>ncurses-0:6.5-1.20240629.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240916-11</id>
		<issued date="2024-09-16" />
		<updated date="2024-09-16" />
		<title>Уязвимость sssd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в sssd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sssd-cve-2021-3621/</description>
               <solution>
                    Запретить использование в ОС пакета sssd
                или
                    Установить обновление для пакета(ов) sssd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sssd-cve-2021-3621/" type="self" id="ROS-20240916-11" title="ROS-20240916-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3621" type="cve" id="CVE-2021-3621" title="CVE-2021-3621" />
			<reference href="https://bdu.fstec.ru/vul/2023-07637" type="self" id="BDU:2023-07637" title="BDU:2023-07637" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="sssd" epoch="0" version="2.8.2" release="1.el7" arch="x86_64" src="">
					<filename>sssd-0:2.8.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240916-12</id>
		<issued date="2024-09-16" />
		<updated date="2024-09-16" />
		<title>Уязвимость nodejs </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nodejs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-cve-2023-30586/</description>
               <solution>
                    Запретить использование в ОС пакета nodejs
                или
                    Установить обновление для пакета(ов) nodejs
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-cve-2023-30586/" type="self" id="ROS-20240916-12" title="ROS-20240916-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30586" type="cve" id="CVE-2023-30586" title="CVE-2023-30586" />
			<reference href="https://bdu.fstec.ru/vul/2023-04912" type="self" id="BDU:2023-04912" title="BDU:2023-04912" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs" epoch="1" version="18.18.2" release="1.el7" arch="x86_64" src="">
					<filename>nodejs-1:18.18.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240917-01</id>
		<issued date="2024-09-17" />
		<updated date="2024-09-18" />
		<title>Множественные уязвимости chromium</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-17-09-24/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-17-09-24/" type="self" id="ROS-20240917-01" title="ROS-20240917-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8362" type="cve" id="CVE-2024-8362" title="CVE-2024-8362" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7970" type="cve" id="CVE-2024-7970" title="CVE-2024-7970" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8198" type="cve" id="CVE-2024-8198" title="CVE-2024-8198" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8194" type="cve" id="CVE-2024-8194" title="CVE-2024-8194" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8193" type="cve" id="CVE-2024-8193" title="CVE-2024-8193" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7981" type="cve" id="CVE-2024-7981" title="CVE-2024-7981" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7978" type="cve" id="CVE-2024-7978" title="CVE-2024-7978" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7976" type="cve" id="CVE-2024-7976" title="CVE-2024-7976" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7975" type="cve" id="CVE-2024-7975" title="CVE-2024-7975" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7974" type="cve" id="CVE-2024-7974" title="CVE-2024-7974" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7973" type="cve" id="CVE-2024-7973" title="CVE-2024-7973" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7972" type="cve" id="CVE-2024-7972" title="CVE-2024-7972" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7971" type="cve" id="CVE-2024-7971" title="CVE-2024-7971" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7969" type="cve" id="CVE-2024-7969" title="CVE-2024-7969" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7968" type="cve" id="CVE-2024-7968" title="CVE-2024-7968" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7967" type="cve" id="CVE-2024-7967" title="CVE-2024-7967" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7966" type="cve" id="CVE-2024-7966" title="CVE-2024-7966" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7965" type="cve" id="CVE-2024-7965" title="CVE-2024-7965" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7964" type="cve" id="CVE-2024-7964" title="CVE-2024-7964" />
			<reference href="https://bdu.fstec.ru/vul/2024-07375" type="self" id="BDU:2024-07375" title="BDU:2024-07375" />
			<reference href="https://bdu.fstec.ru/vul/2024-07379" type="self" id="BDU:2024-07379" title="BDU:2024-07379" />
			<reference href="https://bdu.fstec.ru/vul/2024-06725" type="self" id="BDU:2024-06725" title="BDU:2024-06725" />
			<reference href="https://bdu.fstec.ru/vul/2024-06723" type="self" id="BDU:2024-06723" title="BDU:2024-06723" />
			<reference href="https://bdu.fstec.ru/vul/2024-07374" type="self" id="BDU:2024-07374" title="BDU:2024-07374" />
			<reference href="https://bdu.fstec.ru/vul/2024-06709" type="self" id="BDU:2024-06709" title="BDU:2024-06709" />
			<reference href="https://bdu.fstec.ru/vul/2024-07238" type="self" id="BDU:2024-07238" title="BDU:2024-07238" />
			<reference href="https://bdu.fstec.ru/vul/2024-06709" type="self" id="BDU:2024-06709" title="BDU:2024-06709" />
			<reference href="https://bdu.fstec.ru/vul/2024-07381" type="self" id="BDU:2024-07381" title="BDU:2024-07381" />
			<reference href="https://bdu.fstec.ru/vul/2024-07382" type="self" id="BDU:2024-07382" title="BDU:2024-07382" />
			<reference href="https://bdu.fstec.ru/vul/2024-07237" type="self" id="BDU:2024-07237" title="BDU:2024-07237" />
			<reference href="https://bdu.fstec.ru/vul/2024-06711" type="self" id="BDU:2024-06711" title="BDU:2024-06711" />
			<reference href="https://bdu.fstec.ru/vul/2024-06562" type="self" id="BDU:2024-06562" title="BDU:2024-06562" />
			<reference href="https://bdu.fstec.ru/vul/2024-07436" type="self" id="BDU:2024-07436" title="BDU:2024-07436" />
			<reference href="https://bdu.fstec.ru/vul/2024-06585" type="self" id="BDU:2024-06585" title="BDU:2024-06585" />
			<reference href="https://bdu.fstec.ru/vul/2024-06553" type="self" id="BDU:2024-06553" title="BDU:2024-06553" />
			<reference href="https://bdu.fstec.ru/vul/2024-06567" type="self" id="BDU:2024-06567" title="BDU:2024-06567" />
			<reference href="https://bdu.fstec.ru/vul/2024-07084" type="self" id="BDU:2024-07084" title="BDU:2024-07084" />
			<reference href="https://bdu.fstec.ru/vul/2024-06710" type="self" id="BDU:2024-06710" title="BDU:2024-06710" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="128.0.6613.119" release="1.el7" arch="x86_64" src="">
					<filename>chromium-0:128.0.6613.119-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240917-02</id>
		<issued date="2024-09-17" />
		<updated date="2024-09-17" />
		<title>Множественные уязвимости python3-scipy </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в python3-scipy</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-scipy-cve-2023-25399-cve-2023-29824/</description>
               <solution>
                    Запретить использование в ОС пакета python3-scipy
                или
                    Установить обновление для пакета(ов) python3-scipy
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-scipy-cve-2023-25399-cve-2023-29824/" type="self" id="ROS-20240917-02" title="ROS-20240917-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25399" type="cve" id="CVE-2023-25399" title="CVE-2023-25399" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29824" type="cve" id="CVE-2023-29824" title="CVE-2023-29824" />
			<reference href="https://bdu.fstec.ru/vul/2024-07433" type="self" id="BDU:2024-07433" title="BDU:2024-07433" />
			<reference href="https://bdu.fstec.ru/vul/2024-07432" type="self" id="BDU:2024-07432" title="BDU:2024-07432" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-scipy" epoch="0" version="1.5.0" release="3.el7" arch="x86_64" src="">
					<filename>python3-scipy-0:1.5.0-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240917-03</id>
		<issued date="2024-09-17" />
		<updated date="2025-10-09" />
		<title>Уязвимость qemu </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в qemu-common</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qemu-cve-2024-4467/</description>
               <solution>
                    Запретить использование в ОС пакета qemu-common
                или
                    Установить обновление для пакета(ов) qemu-common
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qemu-cve-2024-4467/" type="self" id="ROS-20240917-03" title="ROS-20240917-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4467" type="cve" id="CVE-2024-4467" title="CVE-2024-4467" />
			<reference href="https://bdu.fstec.ru/vul/2024-06923" type="self" id="BDU:2024-06923" title="BDU:2024-06923" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="qemu-common" epoch="15" version="7.2.13" release="1.el7" arch="x86_64" src="">
					<filename>qemu-common-15:7.2.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240917-04</id>
		<issued date="2024-09-17" />
		<updated date="2024-09-17" />
		<title>Уязвимость nodejs </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nodejs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-cve-2023-30588/</description>
               <solution>
                    Запретить использование в ОС пакета nodejs
                или
                    Установить обновление для пакета(ов) nodejs
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-cve-2023-30588/" type="self" id="ROS-20240917-04" title="ROS-20240917-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30588" type="cve" id="CVE-2023-30588" title="CVE-2023-30588" />
			<reference href="https://bdu.fstec.ru/vul/2023-04951" type="self" id="BDU:2023-04951" title="BDU:2023-04951" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs" epoch="1" version="18.18.2" release="1.el7" arch="x86_64" src="">
					<filename>nodejs-1:18.18.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240917-05</id>
		<issued date="2024-09-17" />
		<updated date="2024-09-17" />
		<title>Уязвимость webmin </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в webmin</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-webmin-cve-2024-36450/</description>
               <solution>
                    Запретить использование в ОС пакета webmin
                или
                    Установить обновление для пакета(ов) webmin
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-webmin-cve-2024-36450/" type="self" id="ROS-20240917-05" title="ROS-20240917-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36450" type="cve" id="CVE-2024-36450" title="CVE-2024-36450" />
			<reference href="https://bdu.fstec.ru/vul/2024-06274" type="self" id="BDU:2024-06274" title="BDU:2024-06274" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="webmin" epoch="0" version="1.941" release="2" arch="noarch" src="">
					<filename>webmin-0:1.941-2.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240917-06</id>
		<issued date="2024-09-17" />
		<updated date="2024-09-17" />
		<title>Уязвимость webmin </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в webmin</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-webmin-cve-2024-36453/</description>
               <solution>
                    Запретить использование в ОС пакета webmin
                или
                    Установить обновление для пакета(ов) webmin
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-webmin-cve-2024-36453/" type="self" id="ROS-20240917-06" title="ROS-20240917-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36453" type="cve" id="CVE-2024-36453" title="CVE-2024-36453" />
			<reference href="https://bdu.fstec.ru/vul/2024-06440" type="self" id="BDU:2024-06440" title="BDU:2024-06440" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="webmin" epoch="0" version="1.981" release="4.el7" arch="noarch" src="">
					<filename>webmin-0:1.981-4.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240917-07</id>
		<issued date="2024-09-17" />
		<updated date="2024-09-17" />
		<title>Множественные уязвимости xen </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в xen</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-xen-cve-2024-31145-cve-2024-31146/</description>
               <solution>
                    Запретить использование в ОС пакета xen
                или
                    Установить обновление для пакета(ов) xen
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-xen-cve-2024-31145-cve-2024-31146/" type="self" id="ROS-20240917-07" title="ROS-20240917-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31145" type="cve" id="CVE-2024-31145" title="CVE-2024-31145" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31146" type="cve" id="CVE-2024-31146" title="CVE-2024-31146" />
			<reference href="https://bdu.fstec.ru/vul/2024-07435" type="self" id="BDU:2024-07435" title="BDU:2024-07435" />
			<reference href="https://bdu.fstec.ru/vul/2024-07434" type="self" id="BDU:2024-07434" title="BDU:2024-07434" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="xen" epoch="0" version="4.19.0" release="1.el7" arch="x86_64" src="">
					<filename>xen-0:4.19.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240917-08</id>
		<issued date="2024-09-17" />
		<updated date="2024-09-17" />
		<title>Уязвимость python3 </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в python3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2024-4032/</description>
               <solution>
                    Запретить использование в ОС пакета python3
                или
                    Установить обновление для пакета(ов) python3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2024-4032/" type="self" id="ROS-20240917-08" title="ROS-20240917-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4032" type="cve" id="CVE-2024-4032" title="CVE-2024-4032" />
			<reference href="https://bdu.fstec.ru/vul/2024-05196" type="self" id="BDU:2024-05196" title="BDU:2024-05196" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3" epoch="0" version="3.8.19" release="6.el7" arch="x86_64" src="">
					<filename>python3-0:3.8.19-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240917-09</id>
		<issued date="2024-09-17" />
		<updated date="2024-09-17" />
		<title>Уязвимость netty </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в netty</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-netty-cve-2023-44487/</description>
               <solution>
                    Запретить использование в ОС пакета netty
                или
                    Установить обновление для пакета(ов) netty
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-netty-cve-2023-44487/" type="self" id="ROS-20240917-09" title="ROS-20240917-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487" type="cve" id="CVE-2023-44487" title="CVE-2023-44487" />
			<reference href="https://bdu.fstec.ru/vul/2023-06559" type="self" id="BDU:2023-06559" title="BDU:2023-06559" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="netty" epoch="0" version="4.1.108" release="1.el7" arch="x86_64" src="">
					<filename>netty-0:4.1.108-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240829-10</id>
		<issued date="2024-09-17" />
		<updated date="2024-09-17" />
		<title>Множественные уязвимости expat </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в expat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-expat-cve-2024-45491-cve-2024-45492/</description>
               <solution>
                    Запретить использование в ОС пакета expat
                или
                    Установить обновление для пакета(ов) expat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-expat-cve-2024-45491-cve-2024-45492/" type="self" id="ROS-20240829-10" title="ROS-20240829-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45491" type="cve" id="CVE-2024-45491" title="CVE-2024-45491" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45492" type="cve" id="CVE-2024-45492" title="CVE-2024-45492" />
			<reference href="https://bdu.fstec.ru/vul/2024-07377" type="self" id="BDU:2024-07377" title="BDU:2024-07377" />
			<reference href="https://bdu.fstec.ru/vul/2024-07376" type="self" id="BDU:2024-07376" title="BDU:2024-07376" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="expat" epoch="0" version="2.6.3" release="1.el7" arch="x86_64" src="">
					<filename>expat-0:2.6.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240918-01</id>
		<issued date="2024-09-18" />
		<updated date="2024-09-18" />
		<title>Множественные уязвимости ruby </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в ruby</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-ruby-cve-2021-41817-cve-2021-41816-cve-2021-41819/</description>
               <solution>
                    Запретить использование в ОС пакета ruby
                или
                    Установить обновление для пакета(ов) ruby
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-ruby-cve-2021-41817-cve-2021-41816-cve-2021-41819/" type="self" id="ROS-20240918-01" title="ROS-20240918-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41817" type="cve" id="CVE-2021-41817" title="CVE-2021-41817" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41816" type="cve" id="CVE-2021-41816" title="CVE-2021-41816" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41819" type="cve" id="CVE-2021-41819" title="CVE-2021-41819" />
			<reference href="https://bdu.fstec.ru/vul/2022-05714" type="self" id="BDU:2022-05714" title="BDU:2022-05714" />
			<reference href="https://bdu.fstec.ru/vul/2021-06123" type="self" id="BDU:2021-06123" title="BDU:2021-06123" />
			<reference href="https://bdu.fstec.ru/vul/2022-05837" type="self" id="BDU:2022-05837" title="BDU:2022-05837" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ruby" epoch="0" version="2.7.6" release="129.el7" arch="x86_64" src="">
					<filename>ruby-0:2.7.6-129.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240918-02</id>
		<issued date="2024-09-18" />
		<updated date="2024-09-18" />
		<title>Уязвимость webkit2gtk3 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в webkit2gtk3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-webkit2gtk3-cve-2022-22662/</description>
               <solution>
                    Запретить использование в ОС пакета webkit2gtk3
                или
                    Установить обновление для пакета(ов) webkit2gtk3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-webkit2gtk3-cve-2022-22662/" type="self" id="ROS-20240918-02" title="ROS-20240918-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22662" type="cve" id="CVE-2022-22662" title="CVE-2022-22662" />
			<reference href="https://bdu.fstec.ru/vul/2022-05789" type="self" id="BDU:2022-05789" title="BDU:2022-05789" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="webkit2gtk3" epoch="1" version="2.36.8" release="1.el7" arch="x86_64" src="">
					<filename>webkit2gtk3-1:2.36.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240918-03</id>
		<issued date="2024-09-18" />
		<updated date="2024-09-18" />
		<title>Множественные уязвимости webkit2gtk3</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в webkit2gtk3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-webkit2gtk3-18-09-24/</description>
               <solution>
                    Запретить использование в ОС пакета webkit2gtk3
                или
                    Установить обновление для пакета(ов) webkit2gtk3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-webkit2gtk3-18-09-24/" type="self" id="ROS-20240918-03" title="ROS-20240918-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362" type="cve" id="CVE-2023-25362" title="CVE-2023-25362" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363" type="cve" id="CVE-2023-25363" title="CVE-2023-25363" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361" type="cve" id="CVE-2023-25361" title="CVE-2023-25361" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360" type="cve" id="CVE-2023-25360" title="CVE-2023-25360" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358" type="cve" id="CVE-2023-25358" title="CVE-2023-25358" />
			<reference href="https://bdu.fstec.ru/vul/2024-07421" type="self" id="BDU:2024-07421" title="BDU:2024-07421" />
			<reference href="https://bdu.fstec.ru/vul/2024-06942" type="self" id="BDU:2024-06942" title="BDU:2024-06942" />
			<reference href="https://bdu.fstec.ru/vul/2024-07418" type="self" id="BDU:2024-07418" title="BDU:2024-07418" />
			<reference href="https://bdu.fstec.ru/vul/2024-07423" type="self" id="BDU:2024-07423" title="BDU:2024-07423" />
			<reference href="https://bdu.fstec.ru/vul/2024-07422" type="self" id="BDU:2024-07422" title="BDU:2024-07422" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="webkit2gtk3" epoch="1" version="2.36.8" release="1.el7" arch="x86_64" src="">
					<filename>webkit2gtk3-1:2.36.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240918-04</id>
		<issued date="2024-09-18" />
		<updated date="2024-09-18" />
		<title>Множественные уязвимости webmin</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в webmin</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-webmin-18-09-24/</description>
               <solution>
                    Запретить использование в ОС пакета webmin
                или
                    Установить обновление для пакета(ов) webmin
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-webmin-18-09-24/" type="self" id="ROS-20240918-04" title="ROS-20240918-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38303" type="cve" id="CVE-2023-38303" title="CVE-2023-38303" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38310" type="cve" id="CVE-2023-38310" title="CVE-2023-38310" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38309" type="cve" id="CVE-2023-38309" title="CVE-2023-38309" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38308" type="cve" id="CVE-2023-38308" title="CVE-2023-38308" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38307" type="cve" id="CVE-2023-38307" title="CVE-2023-38307" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38306" type="cve" id="CVE-2023-38306" title="CVE-2023-38306" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38305" type="cve" id="CVE-2023-38305" title="CVE-2023-38305" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38304" type="cve" id="CVE-2023-38304" title="CVE-2023-38304" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43309" type="cve" id="CVE-2023-43309" title="CVE-2023-43309" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36451" type="cve" id="CVE-2024-36451" title="CVE-2024-36451" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36452" type="cve" id="CVE-2024-36452" title="CVE-2024-36452" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45692" type="cve" id="CVE-2024-45692" title="CVE-2024-45692" />
			<reference href="https://bdu.fstec.ru/vul/2023-04474" type="self" id="BDU:2023-04474" title="BDU:2023-04474" />
			<reference href="https://bdu.fstec.ru/vul/2023-04468" type="self" id="BDU:2023-04468" title="BDU:2023-04468" />
			<reference href="https://bdu.fstec.ru/vul/2023-04470" type="self" id="BDU:2023-04470" title="BDU:2023-04470" />
			<reference href="https://bdu.fstec.ru/vul/2023-04467" type="self" id="BDU:2023-04467" title="BDU:2023-04467" />
			<reference href="https://bdu.fstec.ru/vul/2023-04475" type="self" id="BDU:2023-04475" title="BDU:2023-04475" />
			<reference href="https://bdu.fstec.ru/vul/2023-04472" type="self" id="BDU:2023-04472" title="BDU:2023-04472" />
			<reference href="https://bdu.fstec.ru/vul/2023-04471" type="self" id="BDU:2023-04471" title="BDU:2023-04471" />
			<reference href="https://bdu.fstec.ru/vul/2023-04473" type="self" id="BDU:2023-04473" title="BDU:2023-04473" />
			<reference href="https://bdu.fstec.ru/vul/2024-07425" type="self" id="BDU:2024-07425" title="BDU:2024-07425" />
			<reference href="https://bdu.fstec.ru/vul/2024-0524" type="self" id="BDU:2024-0524" title="BDU:2024-0524" />
			<reference href="https://bdu.fstec.ru/vul/2024-06448" type="self" id="BDU:2024-06448" title="BDU:2024-06448" />
			<reference href="https://bdu.fstec.ru/vul/2024-07424" type="self" id="BDU:2024-07424" title="BDU:2024-07424" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="webmin" epoch="0" version="2.202" release="1.el7" arch="noarch" src="">
					<filename>webmin-0:2.202-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240918-05</id>
		<issued date="2024-09-18" />
		<updated date="2024-09-18" />
		<title>Уязвимость consul </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в consul</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-consul-cve-2024-24788/</description>
               <solution>
                    Запретить использование в ОС пакета consul
                или
                    Установить обновление для пакета(ов) consul
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-consul-cve-2024-24788/" type="self" id="ROS-20240918-05" title="ROS-20240918-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24788" type="cve" id="CVE-2024-24788" title="CVE-2024-24788" />
			<reference href="https://bdu.fstec.ru/vul/2024-07420" type="self" id="BDU:2024-07420" title="BDU:2024-07420" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="consul" epoch="0" version="1.19.1" release="1.el7" arch="x86_64" src="">
					<filename>consul-0:1.19.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240918-06</id>
		<issued date="2024-09-19" />
		<updated date="2024-09-19" />
		<title>Уязвимость unbound </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в unbound</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-unbound-cve-2024-33655/</description>
               <solution>
                    Запретить использование в ОС пакета unbound
                или
                    Установить обновление для пакета(ов) unbound
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-unbound-cve-2024-33655/" type="self" id="ROS-20240918-06" title="ROS-20240918-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33655" type="cve" id="CVE-2024-33655" title="CVE-2024-33655" />
			<reference href="https://bdu.fstec.ru/vul/2024-04004" type="self" id="BDU:2024-04004" title="BDU:2024-04004" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="unbound" epoch="0" version="1.19.2" release="5.el7" arch="x86_64" src="">
					<filename>unbound-0:1.19.2-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240918-07</id>
		<issued date="2024-09-19" />
		<updated date="2024-09-19" />
		<title>Уязвимость bluez </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в bluez</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-bluez-cve-2023-27349/</description>
               <solution>
                    Запретить использование в ОС пакета BlueZ
                или
                    Установить обновление для пакета(ов) BlueZ
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-bluez-cve-2023-27349/" type="self" id="ROS-20240918-07" title="ROS-20240918-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27349" type="cve" id="CVE-2023-27349" title="CVE-2023-27349" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="bluez" epoch="0" version="5.75" release="1.el7" arch="x86_64" src="">
					<filename>bluez-0:5.75-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240918-08</id>
		<issued date="2024-09-19" />
		<updated date="2024-09-19" />
		<title>Уязвимость ipa-server </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ipa-server</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ipa-server-cve-2024-3183/</description>
               <solution>
                    Запретить использование в ОС пакета ipa-server
                или
                    Установить обновление для пакета(ов) ipa-server
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ipa-server-cve-2024-3183/" type="self" id="ROS-20240918-08" title="ROS-20240918-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3183" type="cve" id="CVE-2024-3183" title="CVE-2024-3183" />
			<reference href="https://bdu.fstec.ru/vul/2024-06544" type="self" id="BDU:2024-06544" title="BDU:2024-06544" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ipa-server" epoch="0" version="4.10.3" release="7.el7" arch="x86_64" src="">
					<filename>ipa-server-0:4.10.3-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240918-09</id>
		<issued date="2024-09-19" />
		<updated date="2024-09-19" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2023-7013/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2023-7013/" type="self" id="ROS-20240918-09" title="ROS-20240918-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7013" type="cve" id="CVE-2023-7013" title="CVE-2023-7013" />
			<reference href="https://bdu.fstec.ru/vul/2024-07426" type="self" id="BDU:2024-07426" title="BDU:2024-07426" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="120.0.6099.224" release="1.el7" arch="x86_64" src="">
					<filename>chromium-0:120.0.6099.224-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240918-10</id>
		<issued date="2024-09-19" />
		<updated date="2024-09-19" />
		<title>Множественные уязвимости jenkins </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в jenkins</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-jenkins-cve-2024-43045-cve-2024-43044/</description>
               <solution>
                    Запретить использование в ОС пакета jenkins
                или
                    Установить обновление для пакета(ов) jenkins
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-jenkins-cve-2024-43045-cve-2024-43044/" type="self" id="ROS-20240918-10" title="ROS-20240918-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43045" type="cve" id="CVE-2024-43045" title="CVE-2024-43045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43044" type="cve" id="CVE-2024-43044" title="CVE-2024-43044" />
			<reference href="https://bdu.fstec.ru/vul/2024-06145" type="self" id="BDU:2024-06145" title="BDU:2024-06145" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jenkins" epoch="0" version="2.462.1" release="1.el7" arch="noarch" src="">
					<filename>jenkins-0:2.462.1-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240918-11</id>
		<issued date="2024-09-19" />
		<updated date="2024-09-19" />
		<title>Уязвимость libpcap </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libpcap</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpcap-cve-2023-7256/</description>
               <solution>
                    Запретить использование в ОС пакета libpcap
                или
                    Установить обновление для пакета(ов) libpcap
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpcap-cve-2023-7256/" type="self" id="ROS-20240918-11" title="ROS-20240918-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7256" type="cve" id="CVE-2023-7256" title="CVE-2023-7256" />
			<reference href="https://bdu.fstec.ru/vul/2024-07427" type="self" id="BDU:2024-07427" title="BDU:2024-07427" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libpcap" epoch="14" version="1.10.1" release="2.el7" arch="x86_64" src="">
					<filename>libpcap-14:1.10.1-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240918-12</id>
		<issued date="2024-09-19" />
		<updated date="2024-09-19" />
		<title>Множественные уязвимости rubygem-rexml </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в rubygem-rexml</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rubygem-rexml-cve-2024-43398-cve-2024-41123-cve-2024-41946/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-rexml
                или
                    Установить обновление для пакета(ов) rubygem-rexml
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rubygem-rexml-cve-2024-43398-cve-2024-41123-cve-2024-41946/" type="self" id="ROS-20240918-12" title="ROS-20240918-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43398" type="cve" id="CVE-2024-43398" title="CVE-2024-43398" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41123" type="cve" id="CVE-2024-41123" title="CVE-2024-41123" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41946" type="cve" id="CVE-2024-41946" title="CVE-2024-41946" />
			<reference href="https://bdu.fstec.ru/vul/2024-07430" type="self" id="BDU:2024-07430" title="BDU:2024-07430" />
			<reference href="https://bdu.fstec.ru/vul/2024-07429" type="self" id="BDU:2024-07429" title="BDU:2024-07429" />
			<reference href="https://bdu.fstec.ru/vul/2024-07419" type="self" id="BDU:2024-07419" title="BDU:2024-07419" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-rexml" epoch="0" version="3.3.6" release="1.el7" arch="noarch" src="">
					<filename>rubygem-rexml-0:3.3.6-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240918-13</id>
		<issued date="2024-09-19" />
		<updated date="2024-09-19" />
		<title>Уязвимость vault </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в vault</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vault-cve-2024-8365/</description>
               <solution>
                    Запретить использование в ОС пакета vault
                или
                    Установить обновление для пакета(ов) vault
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vault-cve-2024-8365/" type="self" id="ROS-20240918-13" title="ROS-20240918-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8365" type="cve" id="CVE-2024-8365" title="CVE-2024-8365" />
			<reference href="https://bdu.fstec.ru/vul/2024-07431" type="self" id="BDU:2024-07431" title="BDU:2024-07431" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vault" epoch="0" version="1.17.5" release="1.el7" arch="x86_64" src="">
					<filename>vault-0:1.17.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240918-14</id>
		<issued date="2024-09-19" />
		<updated date="2024-09-19" />
		<title>Уязвимость asterisk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в asterisk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-asterisk-cve-2024-42491/</description>
               <solution>
                    Запретить использование в ОС пакета asterisk
                или
                    Установить обновление для пакета(ов) asterisk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-asterisk-cve-2024-42491/" type="self" id="ROS-20240918-14" title="ROS-20240918-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42491" type="cve" id="CVE-2024-42491" title="CVE-2024-42491" />
			<reference href="https://bdu.fstec.ru/vul/2024-06734" type="self" id="BDU:2024-06734" title="BDU:2024-06734" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="asterisk" epoch="0" version="18.4.0" release="7.el7" arch="x86_64" src="">
					<filename>asterisk-0:18.4.0-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240918-15</id>
		<issued date="2024-09-19" />
		<updated date="2024-09-19" />
		<title>Уязвимость mbedtls </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mbedtls</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mbedtls-cve-2024-45157/</description>
               <solution>
                    Запретить использование в ОС пакета mbedtls
                или
                    Установить обновление для пакета(ов) mbedtls
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mbedtls-cve-2024-45157/" type="self" id="ROS-20240918-15" title="ROS-20240918-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45157" type="cve" id="CVE-2024-45157" title="CVE-2024-45157" />
			<reference href="https://bdu.fstec.ru/vul/2024-07428" type="self" id="BDU:2024-07428" title="BDU:2024-07428" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mbedtls" epoch="0" version="2.28.9" release="2.el7" arch="x86_64" src="">
					<filename>mbedtls-0:2.28.9-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240918-16</id>
		<issued date="2024-09-19" />
		<updated date="2024-09-19" />
		<title>Уязвимость python3-jwcrypto </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-jwcrypto</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-jwcrypto-cve-2024-28102/</description>
               <solution>
                    Запретить использование в ОС пакета python3-jwcrypto
                или
                    Установить обновление для пакета(ов) python3-jwcrypto
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-jwcrypto-cve-2024-28102/" type="self" id="ROS-20240918-16" title="ROS-20240918-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28102" type="cve" id="CVE-2024-28102" title="CVE-2024-28102" />
			<reference href="https://bdu.fstec.ru/vul/2024-01978" type="self" id="BDU:2024-01978" title="BDU:2024-01978" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-jwcrypto" epoch="0" version="1.5.6" release="1.el7" arch="noarch" src="">
					<filename>python3-jwcrypto-0:1.5.6-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240919-01</id>
		<issued date="2024-09-19" />
		<updated date="2024-09-19" />
		<title>Уязвимость dotnet </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dotnet</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet-cve-2024-38081/</description>
               <solution>
                    Запретить использование в ОС пакета dotnet
                или
                    Установить обновление для пакета(ов) dotnet
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet-cve-2024-38081/" type="self" id="ROS-20240919-01" title="ROS-20240919-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38081" type="cve" id="CVE-2024-38081" title="CVE-2024-38081" />
			<reference href="https://bdu.fstec.ru/vul/2024-05994" type="self" id="BDU:2024-05994" title="BDU:2024-05994" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dotnet" epoch="0" version="6.0.133" release="1.el7" arch="x86_64" src="">
					<filename>dotnet-0:6.0.133-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240919-02</id>
		<issued date="2024-09-19" />
		<updated date="2024-09-19" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-19-09-24-1/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-19-09-24-1/" type="self" id="ROS-20240919-02" title="ROS-20240919-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52915" type="cve" id="CVE-2023-52915" title="CVE-2023-52915" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48944" type="cve" id="CVE-2022-48944" title="CVE-2022-48944" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48923" type="cve" id="CVE-2022-48923" title="CVE-2022-48923" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48922" type="cve" id="CVE-2022-48922" title="CVE-2022-48922" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48921" type="cve" id="CVE-2022-48921" title="CVE-2022-48921" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48920" type="cve" id="CVE-2022-48920" title="CVE-2022-48920" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48917" type="cve" id="CVE-2022-48917" title="CVE-2022-48917" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48916" type="cve" id="CVE-2022-48916" title="CVE-2022-48916" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48914" type="cve" id="CVE-2022-48914" title="CVE-2022-48914" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48911" type="cve" id="CVE-2022-48911" title="CVE-2022-48911" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48910" type="cve" id="CVE-2022-48910" title="CVE-2022-48910" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48909" type="cve" id="CVE-2022-48909" title="CVE-2022-48909" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48908" type="cve" id="CVE-2022-48908" title="CVE-2022-48908" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48907" type="cve" id="CVE-2022-48907" title="CVE-2022-48907" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48906" type="cve" id="CVE-2022-48906" title="CVE-2022-48906" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48905" type="cve" id="CVE-2022-48905" title="CVE-2022-48905" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48904" type="cve" id="CVE-2022-48904" title="CVE-2022-48904" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48903" type="cve" id="CVE-2022-48903" title="CVE-2022-48903" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48902" type="cve" id="CVE-2022-48902" title="CVE-2022-48902" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48901" type="cve" id="CVE-2022-48901" title="CVE-2022-48901" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4441" type="cve" id="CVE-2021-4441" title="CVE-2021-4441" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52910" type="cve" id="CVE-2023-52910" title="CVE-2023-52910" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52909" type="cve" id="CVE-2023-52909" title="CVE-2023-52909" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52907" type="cve" id="CVE-2023-52907" title="CVE-2023-52907" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52906" type="cve" id="CVE-2023-52906" title="CVE-2023-52906" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52903" type="cve" id="CVE-2023-52903" title="CVE-2023-52903" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52901" type="cve" id="CVE-2023-52901" title="CVE-2023-52901" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52900" type="cve" id="CVE-2023-52900" title="CVE-2023-52900" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52899" type="cve" id="CVE-2023-52899" title="CVE-2023-52899" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52898" type="cve" id="CVE-2023-52898" title="CVE-2023-52898" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52896" type="cve" id="CVE-2023-52896" title="CVE-2023-52896" />
			<reference href="https://bdu.fstec.ru/vul/2024-07476" type="self" id="BDU:2024-07476" title="BDU:2024-07476" />
			<reference href="https://bdu.fstec.ru/vul/2024-07477" type="self" id="BDU:2024-07477" title="BDU:2024-07477" />
			<reference href="https://bdu.fstec.ru/vul/2024-07475" type="self" id="BDU:2024-07475" title="BDU:2024-07475" />
			<reference href="https://bdu.fstec.ru/vul/2024-07474" type="self" id="BDU:2024-07474" title="BDU:2024-07474" />
			<reference href="https://bdu.fstec.ru/vul/2024-07473" type="self" id="BDU:2024-07473" title="BDU:2024-07473" />
			<reference href="https://bdu.fstec.ru/vul/2024-07472" type="self" id="BDU:2024-07472" title="BDU:2024-07472" />
			<reference href="https://bdu.fstec.ru/vul/2024-07471" type="self" id="BDU:2024-07471" title="BDU:2024-07471" />
			<reference href="https://bdu.fstec.ru/vul/2024-07470" type="self" id="BDU:2024-07470" title="BDU:2024-07470" />
			<reference href="https://bdu.fstec.ru/vul/2024-07469" type="self" id="BDU:2024-07469" title="BDU:2024-07469" />
			<reference href="https://bdu.fstec.ru/vul/2024-07468" type="self" id="BDU:2024-07468" title="BDU:2024-07468" />
			<reference href="https://bdu.fstec.ru/vul/2024-07467" type="self" id="BDU:2024-07467" title="BDU:2024-07467" />
			<reference href="https://bdu.fstec.ru/vul/2024-07466" type="self" id="BDU:2024-07466" title="BDU:2024-07466" />
			<reference href="https://bdu.fstec.ru/vul/2024-07465" type="self" id="BDU:2024-07465" title="BDU:2024-07465" />
			<reference href="https://bdu.fstec.ru/vul/2024-07464" type="self" id="BDU:2024-07464" title="BDU:2024-07464" />
			<reference href="https://bdu.fstec.ru/vul/2024-07463" type="self" id="BDU:2024-07463" title="BDU:2024-07463" />
			<reference href="https://bdu.fstec.ru/vul/2024-07462" type="self" id="BDU:2024-07462" title="BDU:2024-07462" />
			<reference href="https://bdu.fstec.ru/vul/2024-07461" type="self" id="BDU:2024-07461" title="BDU:2024-07461" />
			<reference href="https://bdu.fstec.ru/vul/2024-07460" type="self" id="BDU:2024-07460" title="BDU:2024-07460" />
			<reference href="https://bdu.fstec.ru/vul/2024-07459" type="self" id="BDU:2024-07459" title="BDU:2024-07459" />
			<reference href="https://bdu.fstec.ru/vul/2024-07458" type="self" id="BDU:2024-07458" title="BDU:2024-07458" />
			<reference href="https://bdu.fstec.ru/vul/2024-07457" type="self" id="BDU:2024-07457" title="BDU:2024-07457" />
			<reference href="https://bdu.fstec.ru/vul/2024-07456" type="self" id="BDU:2024-07456" title="BDU:2024-07456" />
			<reference href="https://bdu.fstec.ru/vul/2024-07455" type="self" id="BDU:2024-07455" title="BDU:2024-07455" />
			<reference href="https://bdu.fstec.ru/vul/2024-07454" type="self" id="BDU:2024-07454" title="BDU:2024-07454" />
			<reference href="https://bdu.fstec.ru/vul/2024-07453" type="self" id="BDU:2024-07453" title="BDU:2024-07453" />
			<reference href="https://bdu.fstec.ru/vul/2024-07452" type="self" id="BDU:2024-07452" title="BDU:2024-07452" />
			<reference href="https://bdu.fstec.ru/vul/2024-07451" type="self" id="BDU:2024-07451" title="BDU:2024-07451" />
			<reference href="https://bdu.fstec.ru/vul/2024-07450" type="self" id="BDU:2024-07450" title="BDU:2024-07450" />
			<reference href="https://bdu.fstec.ru/vul/2024-07448" type="self" id="BDU:2024-07448" title="BDU:2024-07448" />
			<reference href="https://bdu.fstec.ru/vul/2024-07449" type="self" id="BDU:2024-07449" title="BDU:2024-07449" />
			<reference href="https://bdu.fstec.ru/vul/2024-07447" type="self" id="BDU:2024-07447" title="BDU:2024-07447" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240919-03</id>
		<issued date="2024-09-19" />
		<updated date="2024-09-19" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-19-09-24-2/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-19-09-24-2/" type="self" id="ROS-20240919-03" title="ROS-20240919-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52914" type="cve" id="CVE-2023-52914" title="CVE-2023-52914" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52911" type="cve" id="CVE-2023-52911" title="CVE-2023-52911" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52908" type="cve" id="CVE-2023-52908" title="CVE-2023-52908" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52902" type="cve" id="CVE-2023-52902" title="CVE-2023-52902" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52897" type="cve" id="CVE-2023-52897" title="CVE-2023-52897" />
			<reference href="https://bdu.fstec.ru/vul/2024-07443" type="self" id="BDU:2024-07443" title="BDU:2024-07443" />
			<reference href="https://bdu.fstec.ru/vul/2024-07442" type="self" id="BDU:2024-07442" title="BDU:2024-07442" />
			<reference href="https://bdu.fstec.ru/vul/2024-07441" type="self" id="BDU:2024-07441" title="BDU:2024-07441" />
			<reference href="https://bdu.fstec.ru/vul/2024-07478" type="self" id="BDU:2024-07478" title="BDU:2024-07478" />
			<reference href="https://bdu.fstec.ru/vul/2024-07440" type="self" id="BDU:2024-07440" title="BDU:2024-07440" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240923-01</id>
		<issued date="2024-09-23" />
		<updated date="2024-09-23" />
		<title>Уязвимость webkit2gtk3 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в webkit2gtk3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-webkit2gtk3-cve-2022-26710/</description>
               <solution>
                    Запретить использование в ОС пакета webkit2gtk3
                или
                    Установить обновление для пакета(ов) webkit2gtk3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-webkit2gtk3-cve-2022-26710/" type="self" id="ROS-20240923-01" title="ROS-20240923-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26710" type="cve" id="CVE-2022-26710" title="CVE-2022-26710" />
			<reference href="https://bdu.fstec.ru/vul/2023-06310" type="self" id="BDU:2023-06310" title="BDU:2023-06310" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="webkit2gtk3" epoch="1" version="2.36.8" release="1.el7" arch="x86_64" src="">
					<filename>webkit2gtk3-1:2.36.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240923-02</id>
		<issued date="2024-09-23" />
		<updated date="2024-09-23" />
		<title>Множественные уязвимости firefox</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-23-09-24/</description>
               <solution>
                    Запретить использование в ОС пакета firefox
                или
                    Установить обновление для пакета(ов) firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-23-09-24/" type="self" id="ROS-20240923-02" title="ROS-20240923-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755" type="cve" id="CVE-2024-0755" title="CVE-2024-0755" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753" type="cve" id="CVE-2024-0753" title="CVE-2024-0753" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741" type="cve" id="CVE-2024-0741" title="CVE-2024-0741" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742" type="cve" id="CVE-2024-0742" title="CVE-2024-0742" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746" type="cve" id="CVE-2024-0746" title="CVE-2024-0746" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747" type="cve" id="CVE-2024-0747" title="CVE-2024-0747" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749" type="cve" id="CVE-2024-0749" title="CVE-2024-0749" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750" type="cve" id="CVE-2024-0750" title="CVE-2024-0750" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751" type="cve" id="CVE-2024-0751" title="CVE-2024-0751" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614" type="cve" id="CVE-2024-2614" title="CVE-2024-2614" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1547" type="cve" id="CVE-2024-1547" title="CVE-2024-1547" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1548" type="cve" id="CVE-2024-1548" title="CVE-2024-1548" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1549" type="cve" id="CVE-2024-1549" title="CVE-2024-1549" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1550" type="cve" id="CVE-2024-1550" title="CVE-2024-1550" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1551" type="cve" id="CVE-2024-1551" title="CVE-2024-1551" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1552" type="cve" id="CVE-2024-1552" title="CVE-2024-1552" />
			<reference href="https://bdu.fstec.ru/vul/2024-00803" type="self" id="BDU:2024-00803" title="BDU:2024-00803" />
			<reference href="https://bdu.fstec.ru/vul/2024-00730" type="self" id="BDU:2024-00730" title="BDU:2024-00730" />
			<reference href="https://bdu.fstec.ru/vul/2024-00808" type="self" id="BDU:2024-00808" title="BDU:2024-00808" />
			<reference href="https://bdu.fstec.ru/vul/2024-00807" type="self" id="BDU:2024-00807" title="BDU:2024-00807" />
			<reference href="https://bdu.fstec.ru/vul/2024-00810" type="self" id="BDU:2024-00810" title="BDU:2024-00810" />
			<reference href="https://bdu.fstec.ru/vul/2024-00812" type="self" id="BDU:2024-00812" title="BDU:2024-00812" />
			<reference href="https://bdu.fstec.ru/vul/2024-00814" type="self" id="BDU:2024-00814" title="BDU:2024-00814" />
			<reference href="https://bdu.fstec.ru/vul/2024-00813" type="self" id="BDU:2024-00813" title="BDU:2024-00813" />
			<reference href="https://bdu.fstec.ru/vul/2024-00805" type="self" id="BDU:2024-00805" title="BDU:2024-00805" />
			<reference href="https://bdu.fstec.ru/vul/2024-01661" type="self" id="BDU:2024-01661" title="BDU:2024-01661" />
			<reference href="https://bdu.fstec.ru/vul/2024-01619" type="self" id="BDU:2024-01619" title="BDU:2024-01619" />
			<reference href="https://bdu.fstec.ru/vul/2024-01660" type="self" id="BDU:2024-01660" title="BDU:2024-01660" />
			<reference href="https://bdu.fstec.ru/vul/2024-01659" type="self" id="BDU:2024-01659" title="BDU:2024-01659" />
			<reference href="https://bdu.fstec.ru/vul/2024-01663" type="self" id="BDU:2024-01663" title="BDU:2024-01663" />
			<reference href="https://bdu.fstec.ru/vul/2024-01664" type="self" id="BDU:2024-01664" title="BDU:2024-01664" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.12.0" release="1.el7" arch="x86_64" src="">
					<filename>firefox-0:115.12.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240923-08</id>
		<issued date="2024-09-23" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости thunderbird</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-23-09-245180/</description>
               <solution>
                    Запретить использование в ОС пакета thunderbird
                или
                    Установить обновление для пакета(ов) thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-23-09-245180/" type="self" id="ROS-20240923-08" title="ROS-20240923-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755" type="cve" id="CVE-2024-0755" title="CVE-2024-0755" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753" type="cve" id="CVE-2024-0753" title="CVE-2024-0753" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741" type="cve" id="CVE-2024-0741" title="CVE-2024-0741" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742" type="cve" id="CVE-2024-0742" title="CVE-2024-0742" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746" type="cve" id="CVE-2024-0746" title="CVE-2024-0746" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747" type="cve" id="CVE-2024-0747" title="CVE-2024-0747" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749" type="cve" id="CVE-2024-0749" title="CVE-2024-0749" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750" type="cve" id="CVE-2024-0750" title="CVE-2024-0750" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751" type="cve" id="CVE-2024-0751" title="CVE-2024-0751" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614" type="cve" id="CVE-2024-2614" title="CVE-2024-2614" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1547" type="cve" id="CVE-2024-1547" title="CVE-2024-1547" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1548" type="cve" id="CVE-2024-1548" title="CVE-2024-1548" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1549" type="cve" id="CVE-2024-1549" title="CVE-2024-1549" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1550" type="cve" id="CVE-2024-1550" title="CVE-2024-1550" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1551" type="cve" id="CVE-2024-1551" title="CVE-2024-1551" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1552" type="cve" id="CVE-2024-1552" title="CVE-2024-1552" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936" type="cve" id="CVE-2024-1936" title="CVE-2024-1936" />
			<reference href="https://bdu.fstec.ru/vul/2024-00803" type="self" id="BDU:2024-00803" title="BDU:2024-00803" />
			<reference href="https://bdu.fstec.ru/vul/2024-00730" type="self" id="BDU:2024-00730" title="BDU:2024-00730" />
			<reference href="https://bdu.fstec.ru/vul/2024-00808" type="self" id="BDU:2024-00808" title="BDU:2024-00808" />
			<reference href="https://bdu.fstec.ru/vul/2024-00807" type="self" id="BDU:2024-00807" title="BDU:2024-00807" />
			<reference href="https://bdu.fstec.ru/vul/2024-00810" type="self" id="BDU:2024-00810" title="BDU:2024-00810" />
			<reference href="https://bdu.fstec.ru/vul/2024-00812" type="self" id="BDU:2024-00812" title="BDU:2024-00812" />
			<reference href="https://bdu.fstec.ru/vul/2024-00814" type="self" id="BDU:2024-00814" title="BDU:2024-00814" />
			<reference href="https://bdu.fstec.ru/vul/2024-00813" type="self" id="BDU:2024-00813" title="BDU:2024-00813" />
			<reference href="https://bdu.fstec.ru/vul/2024-00805" type="self" id="BDU:2024-00805" title="BDU:2024-00805" />
			<reference href="https://bdu.fstec.ru/vul/2024-01661" type="self" id="BDU:2024-01661" title="BDU:2024-01661" />
			<reference href="https://bdu.fstec.ru/vul/2024-01619" type="self" id="BDU:2024-01619" title="BDU:2024-01619" />
			<reference href="https://bdu.fstec.ru/vul/2024-01660" type="self" id="BDU:2024-01660" title="BDU:2024-01660" />
			<reference href="https://bdu.fstec.ru/vul/2024-01659" type="self" id="BDU:2024-01659" title="BDU:2024-01659" />
			<reference href="https://bdu.fstec.ru/vul/2024-01663" type="self" id="BDU:2024-01663" title="BDU:2024-01663" />
			<reference href="https://bdu.fstec.ru/vul/2024-01664" type="self" id="BDU:2024-01664" title="BDU:2024-01664" />
			<reference href="https://bdu.fstec.ru/vul/2024-02159" type="self" id="BDU:2024-02159" title="BDU:2024-02159" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="115.12.1" release="1.el7" arch="x86_64" src="">
					<filename>thunderbird-0:115.12.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240923-03</id>
		<issued date="2024-09-23" />
		<updated date="2024-09-23" />
		<title>Множественные уязвимости gpac </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gpac</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gpac-cve-2024-24267-cve-2024-24266-cve-2024-24265/</description>
               <solution>
                    Запретить использование в ОС пакета gpac
                или
                    Установить обновление для пакета(ов) gpac
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gpac-cve-2024-24267-cve-2024-24266-cve-2024-24265/" type="self" id="ROS-20240923-03" title="ROS-20240923-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24267" type="cve" id="CVE-2024-24267" title="CVE-2024-24267" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24266" type="cve" id="CVE-2024-24266" title="CVE-2024-24266" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24265" type="cve" id="CVE-2024-24265" title="CVE-2024-24265" />
			<reference href="https://bdu.fstec.ru/vul/2024-07446" type="self" id="BDU:2024-07446" title="BDU:2024-07446" />
			<reference href="https://bdu.fstec.ru/vul/2024-07445" type="self" id="BDU:2024-07445" title="BDU:2024-07445" />
			<reference href="https://bdu.fstec.ru/vul/2024-07444" type="self" id="BDU:2024-07444" title="BDU:2024-07444" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gpac" epoch="0" version="2.4.0" release="1.el7" arch="x86_64" src="">
					<filename>gpac-0:2.4.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240923-04</id>
		<issued date="2024-09-23" />
		<updated date="2024-09-23" />
		<title>Уязвимость nodejs </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nodejs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-cve-2024-27982/</description>
               <solution>
                    Запретить использование в ОС пакета nodejs
                или
                    Установить обновление для пакета(ов) nodejs
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-cve-2024-27982/" type="self" id="ROS-20240923-04" title="ROS-20240923-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27982" type="cve" id="CVE-2024-27982" title="CVE-2024-27982" />
			<reference href="https://bdu.fstec.ru/vul/2024-03125" type="self" id="BDU:2024-03125" title="BDU:2024-03125" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs" epoch="1" version="18.20.1" release="1.el7" arch="x86_64" src="">
					<filename>nodejs-1:18.20.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240923-05</id>
		<issued date="2024-09-23" />
		<updated date="2024-09-23" />
		<title>Множественные уязвимости ghostscript</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ghostscript</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-ghostscript-23-09-24/</description>
               <solution>
                    Запретить использование в ОС пакета ghostscript
                или
                    Установить обновление для пакета(ов) ghostscript
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-ghostscript-23-09-24/" type="self" id="ROS-20240923-05" title="ROS-20240923-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52722" type="cve" id="CVE-2023-52722" title="CVE-2023-52722" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29510" type="cve" id="CVE-2024-29510" title="CVE-2024-29510" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33869" type="cve" id="CVE-2024-33869" title="CVE-2024-33869" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33870" type="cve" id="CVE-2024-33870" title="CVE-2024-33870" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33871" type="cve" id="CVE-2024-33871" title="CVE-2024-33871" />
			<reference href="https://bdu.fstec.ru/vul/2024-07479" type="self" id="BDU:2024-07479" title="BDU:2024-07479" />
			<reference href="https://bdu.fstec.ru/vul/2024-05062" type="self" id="BDU:2024-05062" title="BDU:2024-05062" />
			<reference href="https://bdu.fstec.ru/vul/2024-07480" type="self" id="BDU:2024-07480" title="BDU:2024-07480" />
			<reference href="https://bdu.fstec.ru/vul/2024-05063" type="self" id="BDU:2024-05063" title="BDU:2024-05063" />
			<reference href="https://bdu.fstec.ru/vul/2024-05064" type="self" id="BDU:2024-05064" title="BDU:2024-05064" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ghostscript" epoch="0" version="9.52" release="10.el7" arch="x86_64" src="">
					<filename>ghostscript-0:9.52-10.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240923-06</id>
		<issued date="2024-09-23" />
		<updated date="2024-09-23" />
		<title>Уязвимость consul </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в consul</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-consul-cve-2023-45288/</description>
               <solution>
                    Запретить использование в ОС пакета consul
                или
                    Установить обновление для пакета(ов) consul
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-consul-cve-2023-45288/" type="self" id="ROS-20240923-06" title="ROS-20240923-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45288" type="cve" id="CVE-2023-45288" title="CVE-2023-45288" />
			<reference href="https://bdu.fstec.ru/vul/2024-02688" type="self" id="BDU:2024-02688" title="BDU:2024-02688" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="consul" epoch="0" version="1.18.2" release="1.el7" arch="x86_64" src="">
					<filename>consul-0:1.18.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240923-07</id>
		<issued date="2024-09-23" />
		<updated date="2024-09-23" />
		<title>Уязвимость libnbd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libnbd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libnbd-cve-2024-7383/</description>
               <solution>
                    Запретить использование в ОС пакета libnbd
                или
                    Установить обновление для пакета(ов) libnbd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libnbd-cve-2024-7383/" type="self" id="ROS-20240923-07" title="ROS-20240923-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7383" type="cve" id="CVE-2024-7383" title="CVE-2024-7383" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libnbd" epoch="0" version="1.21.3" release="2.el7" arch="x86_64" src="">
					<filename>libnbd-0:1.21.3-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240924-01</id>
		<issued date="2024-09-24" />
		<updated date="2024-09-24" />
		<title>Множественные уязвимости firefox</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-24-09-24-1/</description>
               <solution>
                    Запретить использование в ОС пакета firefox
                или
                    Установить обновление для пакета(ов) firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-24-09-24-1/" type="self" id="ROS-20240924-01" title="ROS-20240924-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730" type="cve" id="CVE-2023-5730" title="CVE-2023-5730" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721" type="cve" id="CVE-2023-5721" title="CVE-2023-5721" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732" type="cve" id="CVE-2023-5732" title="CVE-2023-5732" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724" type="cve" id="CVE-2023-5724" title="CVE-2023-5724" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725" type="cve" id="CVE-2023-5725" title="CVE-2023-5725" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728" type="cve" id="CVE-2023-5728" title="CVE-2023-5728" />
			<reference href="https://bdu.fstec.ru/vul/2023-07281" type="self" id="BDU:2023-07281" title="BDU:2023-07281" />
			<reference href="https://bdu.fstec.ru/vul/2023-07280" type="self" id="BDU:2023-07280" title="BDU:2023-07280" />
			<reference href="https://bdu.fstec.ru/vul/2023-07285" type="self" id="BDU:2023-07285" title="BDU:2023-07285" />
			<reference href="https://bdu.fstec.ru/vul/2023-07278" type="self" id="BDU:2023-07278" title="BDU:2023-07278" />
			<reference href="https://bdu.fstec.ru/vul/2023-07279" type="self" id="BDU:2023-07279" title="BDU:2023-07279" />
			<reference href="https://bdu.fstec.ru/vul/2023-07283" type="self" id="BDU:2023-07283" title="BDU:2023-07283" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.12.0" release="1.el7" arch="x86_64" src="">
					<filename>firefox-0:115.12.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240924-06</id>
		<issued date="2024-09-24" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости thunderbird</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-24-09-24-18339/</description>
               <solution>
                    Запретить использование в ОС пакета thunderbird
                или
                    Установить обновление для пакета(ов) thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-24-09-24-18339/" type="self" id="ROS-20240924-06" title="ROS-20240924-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730" type="cve" id="CVE-2023-5730" title="CVE-2023-5730" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721" type="cve" id="CVE-2023-5721" title="CVE-2023-5721" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732" type="cve" id="CVE-2023-5732" title="CVE-2023-5732" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724" type="cve" id="CVE-2023-5724" title="CVE-2023-5724" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725" type="cve" id="CVE-2023-5725" title="CVE-2023-5725" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728" type="cve" id="CVE-2023-5728" title="CVE-2023-5728" />
			<reference href="https://bdu.fstec.ru/vul/2023-07281" type="self" id="BDU:2023-07281" title="BDU:2023-07281" />
			<reference href="https://bdu.fstec.ru/vul/2023-07280" type="self" id="BDU:2023-07280" title="BDU:2023-07280" />
			<reference href="https://bdu.fstec.ru/vul/2023-07285" type="self" id="BDU:2023-07285" title="BDU:2023-07285" />
			<reference href="https://bdu.fstec.ru/vul/2023-07278" type="self" id="BDU:2023-07278" title="BDU:2023-07278" />
			<reference href="https://bdu.fstec.ru/vul/2023-07279" type="self" id="BDU:2023-07279" title="BDU:2023-07279" />
			<reference href="https://bdu.fstec.ru/vul/2023-07283" type="self" id="BDU:2023-07283" title="BDU:2023-07283" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="115.12.1" release="1.el7" arch="x86_64" src="">
					<filename>thunderbird-0:115.12.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240924-02</id>
		<issued date="2024-09-24" />
		<updated date="2024-09-24" />
		<title>Множественные уязвимости firefox</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-24-09-24-2/</description>
               <solution>
                    Запретить использование в ОС пакета firefox
                или
                    Установить обновление для пакета(ов) firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-24-09-24-2/" type="self" id="ROS-20240924-02" title="ROS-20240924-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5176" type="cve" id="CVE-2023-5176" title="CVE-2023-5176" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5169" type="cve" id="CVE-2023-5169" title="CVE-2023-5169" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5171" type="cve" id="CVE-2023-5171" title="CVE-2023-5171" />
			<reference href="https://bdu.fstec.ru/vul/2023-07235" type="self" id="BDU:2023-07235" title="BDU:2023-07235" />
			<reference href="https://bdu.fstec.ru/vul/2023-07665" type="self" id="BDU:2023-07665" title="BDU:2023-07665" />
			<reference href="https://bdu.fstec.ru/vul/2023-07671" type="self" id="BDU:2023-07671" title="BDU:2023-07671" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.12.0" release="1.el7" arch="x86_64" src="">
					<filename>firefox-0:115.12.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240924-05</id>
		<issued date="2024-09-24" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости thunderbird</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-24-09-24-29870/</description>
               <solution>
                    Запретить использование в ОС пакета thunderbird
                или
                    Установить обновление для пакета(ов) thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-24-09-24-29870/" type="self" id="ROS-20240924-05" title="ROS-20240924-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5176" type="cve" id="CVE-2023-5176" title="CVE-2023-5176" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5169" type="cve" id="CVE-2023-5169" title="CVE-2023-5169" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5171" type="cve" id="CVE-2023-5171" title="CVE-2023-5171" />
			<reference href="https://bdu.fstec.ru/vul/2023-07235" type="self" id="BDU:2023-07235" title="BDU:2023-07235" />
			<reference href="https://bdu.fstec.ru/vul/2023-07665" type="self" id="BDU:2023-07665" title="BDU:2023-07665" />
			<reference href="https://bdu.fstec.ru/vul/2023-07671" type="self" id="BDU:2023-07671" title="BDU:2023-07671" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="115.12.1" release="1.el7" arch="x86_64" src="">
					<filename>thunderbird-0:115.12.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240924-03</id>
		<issued date="2024-09-24" />
		<updated date="2024-09-24" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-24-09-24-1/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-24-09-24-1/" type="self" id="ROS-20240924-03" title="ROS-20240924-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52895" type="cve" id="CVE-2023-52895" title="CVE-2023-52895" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48897" type="cve" id="CVE-2022-48897" title="CVE-2022-48897" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48895" type="cve" id="CVE-2022-48895" title="CVE-2022-48895" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48894" type="cve" id="CVE-2022-48894" title="CVE-2022-48894" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48890" type="cve" id="CVE-2022-48890" title="CVE-2022-48890" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48889" type="cve" id="CVE-2022-48889" title="CVE-2022-48889" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48886" type="cve" id="CVE-2022-48886" title="CVE-2022-48886" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48885" type="cve" id="CVE-2022-48885" title="CVE-2022-48885" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48867" type="cve" id="CVE-2022-48867" title="CVE-2022-48867" />
			<reference href="https://bdu.fstec.ru/vul/2024-07588" type="self" id="BDU:2024-07588" title="BDU:2024-07588" />
			<reference href="https://bdu.fstec.ru/vul/2024-07589" type="self" id="BDU:2024-07589" title="BDU:2024-07589" />
			<reference href="https://bdu.fstec.ru/vul/2024-07590" type="self" id="BDU:2024-07590" title="BDU:2024-07590" />
			<reference href="https://bdu.fstec.ru/vul/2024-07591" type="self" id="BDU:2024-07591" title="BDU:2024-07591" />
			<reference href="https://bdu.fstec.ru/vul/2024-07592" type="self" id="BDU:2024-07592" title="BDU:2024-07592" />
			<reference href="https://bdu.fstec.ru/vul/2024-07593" type="self" id="BDU:2024-07593" title="BDU:2024-07593" />
			<reference href="https://bdu.fstec.ru/vul/2024-07594" type="self" id="BDU:2024-07594" title="BDU:2024-07594" />
			<reference href="https://bdu.fstec.ru/vul/2024-07597" type="self" id="BDU:2024-07597" title="BDU:2024-07597" />
			<reference href="https://bdu.fstec.ru/vul/2024-07600" type="self" id="BDU:2024-07600" title="BDU:2024-07600" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240924-04</id>
		<issued date="2024-09-24" />
		<updated date="2024-09-24" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-24-09-24-2/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-24-09-24-2/" type="self" id="ROS-20240924-04" title="ROS-20240924-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52894" type="cve" id="CVE-2023-52894" title="CVE-2023-52894" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52893" type="cve" id="CVE-2023-52893" title="CVE-2023-52893" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48911" type="cve" id="CVE-2022-48911" title="CVE-2022-48911" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48899" type="cve" id="CVE-2022-48899" title="CVE-2022-48899" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48898" type="cve" id="CVE-2022-48898" title="CVE-2022-48898" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48896" type="cve" id="CVE-2022-48896" title="CVE-2022-48896" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48891" type="cve" id="CVE-2022-48891" title="CVE-2022-48891" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48877" type="cve" id="CVE-2022-48877" title="CVE-2022-48877" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48873" type="cve" id="CVE-2022-48873" title="CVE-2022-48873" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48872" type="cve" id="CVE-2022-48872" title="CVE-2022-48872" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48871" type="cve" id="CVE-2022-48871" title="CVE-2022-48871" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48870" type="cve" id="CVE-2022-48870" title="CVE-2022-48870" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48869" type="cve" id="CVE-2022-48869" title="CVE-2022-48869" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48852" type="cve" id="CVE-2022-48852" title="CVE-2022-48852" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48845" type="cve" id="CVE-2022-48845" title="CVE-2022-48845" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48836" type="cve" id="CVE-2022-48836" title="CVE-2022-48836" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48834" type="cve" id="CVE-2022-48834" title="CVE-2022-48834" />
			<reference href="https://bdu.fstec.ru/vul/2024-07607" type="self" id="BDU:2024-07607" title="BDU:2024-07607" />
			<reference href="https://bdu.fstec.ru/vul/2024-07613" type="self" id="BDU:2024-07613" title="BDU:2024-07613" />
			<reference href="https://bdu.fstec.ru/vul/2024-07468" type="self" id="BDU:2024-07468" title="BDU:2024-07468" />
			<reference href="https://bdu.fstec.ru/vul/2024-07617" type="self" id="BDU:2024-07617" title="BDU:2024-07617" />
			<reference href="https://bdu.fstec.ru/vul/2024-07620" type="self" id="BDU:2024-07620" title="BDU:2024-07620" />
			<reference href="https://bdu.fstec.ru/vul/2024-07626" type="self" id="BDU:2024-07626" title="BDU:2024-07626" />
			<reference href="https://bdu.fstec.ru/vul/2024-07627" type="self" id="BDU:2024-07627" title="BDU:2024-07627" />
			<reference href="https://bdu.fstec.ru/vul/2024-07628" type="self" id="BDU:2024-07628" title="BDU:2024-07628" />
			<reference href="https://bdu.fstec.ru/vul/2024-07629" type="self" id="BDU:2024-07629" title="BDU:2024-07629" />
			<reference href="https://bdu.fstec.ru/vul/2024-07630" type="self" id="BDU:2024-07630" title="BDU:2024-07630" />
			<reference href="https://bdu.fstec.ru/vul/2024-07587" type="self" id="BDU:2024-07587" title="BDU:2024-07587" />
			<reference href="https://bdu.fstec.ru/vul/2024-07631" type="self" id="BDU:2024-07631" title="BDU:2024-07631" />
			<reference href="https://bdu.fstec.ru/vul/2024-07632" type="self" id="BDU:2024-07632" title="BDU:2024-07632" />
			<reference href="https://bdu.fstec.ru/vul/2024-07633" type="self" id="BDU:2024-07633" title="BDU:2024-07633" />
			<reference href="https://bdu.fstec.ru/vul/2024-07634" type="self" id="BDU:2024-07634" title="BDU:2024-07634" />
			<reference href="https://bdu.fstec.ru/vul/2024-07635" type="self" id="BDU:2024-07635" title="BDU:2024-07635" />
			<reference href="https://bdu.fstec.ru/vul/2024-07586" type="self" id="BDU:2024-07586" title="BDU:2024-07586" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240925-01</id>
		<issued date="2024-09-25" />
		<updated date="2024-09-25" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-25-09-24/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-25-09-24/" type="self" id="ROS-20240925-01" title="ROS-20240925-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48781" type="cve" id="CVE-2022-48781" title="CVE-2022-48781" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48782" type="cve" id="CVE-2022-48782" title="CVE-2022-48782" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48779" type="cve" id="CVE-2022-48779" title="CVE-2022-48779" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48764" type="cve" id="CVE-2022-48764" title="CVE-2022-48764" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48753" type="cve" id="CVE-2022-48753" title="CVE-2022-48753" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48750" type="cve" id="CVE-2022-48750" title="CVE-2022-48750" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48729" type="cve" id="CVE-2022-48729" title="CVE-2022-48729" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48826" type="cve" id="CVE-2022-48826" title="CVE-2022-48826" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48820" type="cve" id="CVE-2022-48820" title="CVE-2022-48820" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48804" type="cve" id="CVE-2022-48804" title="CVE-2022-48804" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39471" type="cve" id="CVE-2024-39471" title="CVE-2024-39471" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39301" type="cve" id="CVE-2024-39301" title="CVE-2024-39301" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38661" type="cve" id="CVE-2024-38661" title="CVE-2024-38661" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48772" type="cve" id="CVE-2022-48772" title="CVE-2022-48772" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38633" type="cve" id="CVE-2024-38633" title="CVE-2024-38633" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38381" type="cve" id="CVE-2024-38381" title="CVE-2024-38381" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36489" type="cve" id="CVE-2024-36489" title="CVE-2024-36489" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36270" type="cve" id="CVE-2024-36270" title="CVE-2024-36270" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48769" type="cve" id="CVE-2022-48769" title="CVE-2022-48769" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48768" type="cve" id="CVE-2022-48768" title="CVE-2022-48768" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48765" type="cve" id="CVE-2022-48765" title="CVE-2022-48765" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48763" type="cve" id="CVE-2022-48763" title="CVE-2022-48763" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48756" type="cve" id="CVE-2022-48756" title="CVE-2022-48756" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48755" type="cve" id="CVE-2022-48755" title="CVE-2022-48755" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48751" type="cve" id="CVE-2022-48751" title="CVE-2022-48751" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48749" type="cve" id="CVE-2022-48749" title="CVE-2022-48749" />
			<reference href="https://bdu.fstec.ru/vul/2025-14259" type="self" id="BDU:2025-14259" title="BDU:2025-14259" />
			<reference href="https://bdu.fstec.ru/vul/2024-06077" type="self" id="BDU:2024-06077" title="BDU:2024-06077" />
			<reference href="https://bdu.fstec.ru/vul/2024-06078" type="self" id="BDU:2024-06078" title="BDU:2024-06078" />
			<reference href="https://bdu.fstec.ru/vul/2024-07039" type="self" id="BDU:2024-07039" title="BDU:2024-07039" />
			<reference href="https://bdu.fstec.ru/vul/2025-04354" type="self" id="BDU:2025-04354" title="BDU:2025-04354" />
			<reference href="https://bdu.fstec.ru/vul/2025-14256" type="self" id="BDU:2025-14256" title="BDU:2025-14256" />
			<reference href="https://bdu.fstec.ru/vul/2025-14252" type="self" id="BDU:2025-14252" title="BDU:2025-14252" />
			<reference href="https://bdu.fstec.ru/vul/2025-13744" type="self" id="BDU:2025-13744" title="BDU:2025-13744" />
			<reference href="https://bdu.fstec.ru/vul/2025-04353" type="self" id="BDU:2025-04353" title="BDU:2025-04353" />
			<reference href="https://bdu.fstec.ru/vul/2024-08330" type="self" id="BDU:2024-08330" title="BDU:2024-08330" />
			<reference href="https://bdu.fstec.ru/vul/2025-03200" type="self" id="BDU:2025-03200" title="BDU:2025-03200" />
			<reference href="https://bdu.fstec.ru/vul/2025-04349" type="self" id="BDU:2025-04349" title="BDU:2025-04349" />
			<reference href="https://bdu.fstec.ru/vul/2024-08332" type="self" id="BDU:2024-08332" title="BDU:2024-08332" />
			<reference href="https://bdu.fstec.ru/vul/2024-07040" type="self" id="BDU:2024-07040" title="BDU:2024-07040" />
			<reference href="https://bdu.fstec.ru/vul/2025-04443" type="self" id="BDU:2025-04443" title="BDU:2025-04443" />
			<reference href="https://bdu.fstec.ru/vul/2024-06800" type="self" id="BDU:2024-06800" title="BDU:2024-06800" />
			<reference href="https://bdu.fstec.ru/vul/2024-07163" type="self" id="BDU:2024-07163" title="BDU:2024-07163" />
			<reference href="https://bdu.fstec.ru/vul/2025-04445" type="self" id="BDU:2025-04445" title="BDU:2025-04445" />
			<reference href="https://bdu.fstec.ru/vul/2024-07046" type="self" id="BDU:2024-07046" title="BDU:2024-07046" />
			<reference href="https://bdu.fstec.ru/vul/2024-06994" type="self" id="BDU:2024-06994" title="BDU:2024-06994" />
			<reference href="https://bdu.fstec.ru/vul/2025-14255" type="self" id="BDU:2025-14255" title="BDU:2025-14255" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240927-01</id>
		<issued date="2024-09-27" />
		<updated date="2024-09-27" />
		<title>Множественные уязвимости ffmpeg </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ffmpeg</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-ffmpeg-cve-2023-51794-cve-2024-32230-cve-2023-51798/</description>
               <solution>
                    Запретить использование в ОС пакета Ffmpeg
                или
                    Установить обновление для пакета(ов) Ffmpeg
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-ffmpeg-cve-2023-51794-cve-2024-32230-cve-2023-51798/" type="self" id="ROS-20240927-01" title="ROS-20240927-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51794" type="cve" id="CVE-2023-51794" title="CVE-2023-51794" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32230" type="cve" id="CVE-2024-32230" title="CVE-2024-32230" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51798" type="cve" id="CVE-2023-51798" title="CVE-2023-51798" />
			<reference href="https://bdu.fstec.ru/vul/2024-07582" type="self" id="BDU:2024-07582" title="BDU:2024-07582" />
			<reference href="https://bdu.fstec.ru/vul/2024-07240" type="self" id="BDU:2024-07240" title="BDU:2024-07240" />
			<reference href="https://bdu.fstec.ru/vul/2024-05023" type="self" id="BDU:2024-05023" title="BDU:2024-05023" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ffmpeg" epoch="0" version="4.4.3" release="4.el7" arch="x86_64" src="">
					<filename>ffmpeg-0:4.4.3-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240927-02</id>
		<issued date="2024-09-27" />
		<updated date="2024-09-27" />
		<title>Множественные уязвимости chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-cve-2024-7018-cve-2024-7019-cve-2024-7020/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-cve-2024-7018-cve-2024-7019-cve-2024-7020/" type="self" id="ROS-20240927-02" title="ROS-20240927-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7018" type="cve" id="CVE-2024-7018" title="CVE-2024-7018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7019" type="cve" id="CVE-2024-7019" title="CVE-2024-7019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7020" type="cve" id="CVE-2024-7020" title="CVE-2024-7020" />
			<reference href="https://bdu.fstec.ru/vul/2024-07561" type="self" id="BDU:2024-07561" title="BDU:2024-07561" />
			<reference href="https://bdu.fstec.ru/vul/2024-07566" type="self" id="BDU:2024-07566" title="BDU:2024-07566" />
			<reference href="https://bdu.fstec.ru/vul/2024-07568" type="self" id="BDU:2024-07568" title="BDU:2024-07568" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="124.0.6367.78" release="1.el7" arch="x86_64" src="">
					<filename>chromium-0:124.0.6367.78-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240927-03</id>
		<issued date="2024-09-27" />
		<updated date="2024-09-27" />
		<title>Уязвимость java-11-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в java-11-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-11-openjdk-cve-2024-21085/</description>
               <solution>
                    Запретить использование в ОС пакета java-11-openjdk
                или
                    Установить обновление для пакета(ов) java-11-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-11-openjdk-cve-2024-21085/" type="self" id="ROS-20240927-03" title="ROS-20240927-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085" type="cve" id="CVE-2024-21085" title="CVE-2024-21085" />
			<reference href="https://bdu.fstec.ru/vul/2024-05405" type="self" id="BDU:2024-05405" title="BDU:2024-05405" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-11-openjdk" epoch="1" version="11.0.24.0.8" release="2.el7" arch="x86_64" src="">
					<filename>java-11-openjdk-1:11.0.24.0.8-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240927-04</id>
		<issued date="2024-09-27" />
		<updated date="2024-09-27" />
		<title>Уязвимость java-11-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в java-11-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-11-openjdk-cve-2024-21094/</description>
               <solution>
                    Запретить использование в ОС пакета java-11-openjdk
                или
                    Установить обновление для пакета(ов) java-11-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-11-openjdk-cve-2024-21094/" type="self" id="ROS-20240927-04" title="ROS-20240927-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094" type="cve" id="CVE-2024-21094" title="CVE-2024-21094" />
			<reference href="https://bdu.fstec.ru/vul/2024-03427" type="self" id="BDU:2024-03427" title="BDU:2024-03427" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-11-openjdk" epoch="1" version="11.0.22.0.7" release="1.el7" arch="x86_64" src="">
					<filename>java-11-openjdk-1:11.0.22.0.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240927-15</id>
		<issued date="2024-09-27" />
		<updated date="2024-12-23" />
		<title>Уязвимость java-17-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в java-17-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-17-openjdk-cve-2024-210946645/</description>
               <solution>
                    Запретить использование в ОС пакета java-17-openjdk
                или
                    Установить обновление для пакета(ов) java-17-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-17-openjdk-cve-2024-210946645/" type="self" id="ROS-20240927-15" title="ROS-20240927-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094" type="cve" id="CVE-2024-21094" title="CVE-2024-21094" />
			<reference href="https://bdu.fstec.ru/vul/2024-03427" type="self" id="BDU:2024-03427" title="BDU:2024-03427" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-17-openjdk" epoch="1" version="17.0.12.0.7" release="1.el7" arch="x86_64" src="">
					<filename>java-17-openjdk-1:17.0.12.0.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240927-14</id>
		<issued date="2024-09-27" />
		<updated date="2024-12-23" />
		<title>Уязвимость java-21-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в java-21-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-21-openjdk-cve-2024-2109466457095/</description>
               <solution>
                    Запретить использование в ОС пакета java-21-openjdk
                или
                    Установить обновление для пакета(ов) java-21-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-21-openjdk-cve-2024-2109466457095/" type="self" id="ROS-20240927-14" title="ROS-20240927-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094" type="cve" id="CVE-2024-21094" title="CVE-2024-21094" />
			<reference href="https://bdu.fstec.ru/vul/2024-03427" type="self" id="BDU:2024-03427" title="BDU:2024-03427" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-21-openjdk" epoch="1" version="21.0.2.0.13" release="1.el7" arch="x86_64" src="">
					<filename>java-21-openjdk-1:21.0.2.0.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240927-05</id>
		<issued date="2024-09-27" />
		<updated date="2024-09-27" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-27-09-24-1/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-27-09-24-1/" type="self" id="ROS-20240927-05" title="ROS-20240927-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52869" type="cve" id="CVE-2023-52869" title="CVE-2023-52869" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52858" type="cve" id="CVE-2023-52858" title="CVE-2023-52858" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52844" type="cve" id="CVE-2023-52844" title="CVE-2023-52844" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52832" type="cve" id="CVE-2023-52832" title="CVE-2023-52832" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52810" type="cve" id="CVE-2023-52810" title="CVE-2023-52810" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52755" type="cve" id="CVE-2023-52755" title="CVE-2023-52755" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52733" type="cve" id="CVE-2023-52733" title="CVE-2023-52733" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38591" type="cve" id="CVE-2024-38591" title="CVE-2024-38591" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38596" type="cve" id="CVE-2024-38596" title="CVE-2024-38596" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38590" type="cve" id="CVE-2024-38590" title="CVE-2024-38590" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38583" type="cve" id="CVE-2024-38583" title="CVE-2024-38583" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38549" type="cve" id="CVE-2024-38549" title="CVE-2024-38549" />
			<reference href="https://bdu.fstec.ru/vul/2024-06983" type="self" id="BDU:2024-06983" title="BDU:2024-06983" />
			<reference href="https://bdu.fstec.ru/vul/2024-06987" type="self" id="BDU:2024-06987" title="BDU:2024-06987" />
			<reference href="https://bdu.fstec.ru/vul/2024-06931" type="self" id="BDU:2024-06931" title="BDU:2024-06931" />
			<reference href="https://bdu.fstec.ru/vul/2024-06927" type="self" id="BDU:2024-06927" title="BDU:2024-06927" />
			<reference href="https://bdu.fstec.ru/vul/2024-06907" type="self" id="BDU:2024-06907" title="BDU:2024-06907" />
			<reference href="https://bdu.fstec.ru/vul/2024-06909" type="self" id="BDU:2024-06909" title="BDU:2024-06909" />
			<reference href="https://bdu.fstec.ru/vul/2024-06930" type="self" id="BDU:2024-06930" title="BDU:2024-06930" />
			<reference href="https://bdu.fstec.ru/vul/2024-07636" type="self" id="BDU:2024-07636" title="BDU:2024-07636" />
			<reference href="https://bdu.fstec.ru/vul/2024-07049" type="self" id="BDU:2024-07049" title="BDU:2024-07049" />
			<reference href="https://bdu.fstec.ru/vul/2024-07637" type="self" id="BDU:2024-07637" title="BDU:2024-07637" />
			<reference href="https://bdu.fstec.ru/vul/2024-07638" type="self" id="BDU:2024-07638" title="BDU:2024-07638" />
			<reference href="https://bdu.fstec.ru/vul/2024-07639" type="self" id="BDU:2024-07639" title="BDU:2024-07639" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240927-06</id>
		<issued date="2024-09-27" />
		<updated date="2024-09-27" />
		<title>Множественные уязвимости firefox</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-27-09-24/</description>
               <solution>
                    Запретить использование в ОС пакета firefox
                или
                    Установить обновление для пакета(ов) firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-27-09-24/" type="self" id="ROS-20240927-06" title="ROS-20240927-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864" type="cve" id="CVE-2023-6864" title="CVE-2023-6864" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856" type="cve" id="CVE-2023-6856" title="CVE-2023-6856" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865" type="cve" id="CVE-2023-6865" title="CVE-2023-6865" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857" type="cve" id="CVE-2023-6857" title="CVE-2023-6857" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858" type="cve" id="CVE-2023-6858" title="CVE-2023-6858" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859" type="cve" id="CVE-2023-6859" title="CVE-2023-6859" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860" type="cve" id="CVE-2023-6860" title="CVE-2023-6860" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867" type="cve" id="CVE-2023-6867" title="CVE-2023-6867" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861" type="cve" id="CVE-2023-6861" title="CVE-2023-6861" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862" type="cve" id="CVE-2023-6862" title="CVE-2023-6862" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863" type="cve" id="CVE-2023-6863" title="CVE-2023-6863" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204" type="cve" id="CVE-2023-6204" title="CVE-2023-6204" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205" type="cve" id="CVE-2023-6205" title="CVE-2023-6205" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206" type="cve" id="CVE-2023-6206" title="CVE-2023-6206" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207" type="cve" id="CVE-2023-6207" title="CVE-2023-6207" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208" type="cve" id="CVE-2023-6208" title="CVE-2023-6208" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209" type="cve" id="CVE-2023-6209" title="CVE-2023-6209" />
			<reference href="https://bdu.fstec.ru/vul/2023-09055" type="self" id="BDU:2023-09055" title="BDU:2023-09055" />
			<reference href="https://bdu.fstec.ru/vul/2023-09119" type="self" id="BDU:2023-09119" title="BDU:2023-09119" />
			<reference href="https://bdu.fstec.ru/vul/2023-09059" type="self" id="BDU:2023-09059" title="BDU:2023-09059" />
			<reference href="https://bdu.fstec.ru/vul/2023-09031" type="self" id="BDU:2023-09031" title="BDU:2023-09031" />
			<reference href="https://bdu.fstec.ru/vul/2023-09115" type="self" id="BDU:2023-09115" title="BDU:2023-09115" />
			<reference href="https://bdu.fstec.ru/vul/2023-09116" type="self" id="BDU:2023-09116" title="BDU:2023-09116" />
			<reference href="https://bdu.fstec.ru/vul/2023-09058" type="self" id="BDU:2023-09058" title="BDU:2023-09058" />
			<reference href="https://bdu.fstec.ru/vul/2023-09018" type="self" id="BDU:2023-09018" title="BDU:2023-09018" />
			<reference href="https://bdu.fstec.ru/vul/2023-09117" type="self" id="BDU:2023-09117" title="BDU:2023-09117" />
			<reference href="https://bdu.fstec.ru/vul/2023-09062" type="self" id="BDU:2023-09062" title="BDU:2023-09062" />
			<reference href="https://bdu.fstec.ru/vul/2023-09118" type="self" id="BDU:2023-09118" title="BDU:2023-09118" />
			<reference href="https://bdu.fstec.ru/vul/2023-08086" type="self" id="BDU:2023-08086" title="BDU:2023-08086" />
			<reference href="https://bdu.fstec.ru/vul/2023-08116" type="self" id="BDU:2023-08116" title="BDU:2023-08116" />
			<reference href="https://bdu.fstec.ru/vul/2023-08087" type="self" id="BDU:2023-08087" title="BDU:2023-08087" />
			<reference href="https://bdu.fstec.ru/vul/2023-08332" type="self" id="BDU:2023-08332" title="BDU:2023-08332" />
			<reference href="https://bdu.fstec.ru/vul/2023-08088" type="self" id="BDU:2023-08088" title="BDU:2023-08088" />
			<reference href="https://bdu.fstec.ru/vul/2023-08322" type="self" id="BDU:2023-08322" title="BDU:2023-08322" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.12.0" release="1.el7" arch="x86_64" src="">
					<filename>firefox-0:115.12.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240927-08</id>
		<issued date="2024-09-27" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости thunderbird</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-27-09-242793/</description>
               <solution>
                    Запретить использование в ОС пакета thunderbird
                или
                    Установить обновление для пакета(ов) thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-27-09-242793/" type="self" id="ROS-20240927-08" title="ROS-20240927-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864" type="cve" id="CVE-2023-6864" title="CVE-2023-6864" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856" type="cve" id="CVE-2023-6856" title="CVE-2023-6856" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865" type="cve" id="CVE-2023-6865" title="CVE-2023-6865" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857" type="cve" id="CVE-2023-6857" title="CVE-2023-6857" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858" type="cve" id="CVE-2023-6858" title="CVE-2023-6858" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859" type="cve" id="CVE-2023-6859" title="CVE-2023-6859" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860" type="cve" id="CVE-2023-6860" title="CVE-2023-6860" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867" type="cve" id="CVE-2023-6867" title="CVE-2023-6867" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861" type="cve" id="CVE-2023-6861" title="CVE-2023-6861" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862" type="cve" id="CVE-2023-6862" title="CVE-2023-6862" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863" type="cve" id="CVE-2023-6863" title="CVE-2023-6863" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204" type="cve" id="CVE-2023-6204" title="CVE-2023-6204" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205" type="cve" id="CVE-2023-6205" title="CVE-2023-6205" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206" type="cve" id="CVE-2023-6206" title="CVE-2023-6206" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207" type="cve" id="CVE-2023-6207" title="CVE-2023-6207" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208" type="cve" id="CVE-2023-6208" title="CVE-2023-6208" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209" type="cve" id="CVE-2023-6209" title="CVE-2023-6209" />
			<reference href="https://bdu.fstec.ru/vul/2023-09055" type="self" id="BDU:2023-09055" title="BDU:2023-09055" />
			<reference href="https://bdu.fstec.ru/vul/2023-09119" type="self" id="BDU:2023-09119" title="BDU:2023-09119" />
			<reference href="https://bdu.fstec.ru/vul/2023-09059" type="self" id="BDU:2023-09059" title="BDU:2023-09059" />
			<reference href="https://bdu.fstec.ru/vul/2023-09031" type="self" id="BDU:2023-09031" title="BDU:2023-09031" />
			<reference href="https://bdu.fstec.ru/vul/2023-09115" type="self" id="BDU:2023-09115" title="BDU:2023-09115" />
			<reference href="https://bdu.fstec.ru/vul/2023-09116" type="self" id="BDU:2023-09116" title="BDU:2023-09116" />
			<reference href="https://bdu.fstec.ru/vul/2023-09058" type="self" id="BDU:2023-09058" title="BDU:2023-09058" />
			<reference href="https://bdu.fstec.ru/vul/2023-09018" type="self" id="BDU:2023-09018" title="BDU:2023-09018" />
			<reference href="https://bdu.fstec.ru/vul/2023-09117" type="self" id="BDU:2023-09117" title="BDU:2023-09117" />
			<reference href="https://bdu.fstec.ru/vul/2023-09062" type="self" id="BDU:2023-09062" title="BDU:2023-09062" />
			<reference href="https://bdu.fstec.ru/vul/2023-09118" type="self" id="BDU:2023-09118" title="BDU:2023-09118" />
			<reference href="https://bdu.fstec.ru/vul/2023-08086" type="self" id="BDU:2023-08086" title="BDU:2023-08086" />
			<reference href="https://bdu.fstec.ru/vul/2023-08116" type="self" id="BDU:2023-08116" title="BDU:2023-08116" />
			<reference href="https://bdu.fstec.ru/vul/2023-08087" type="self" id="BDU:2023-08087" title="BDU:2023-08087" />
			<reference href="https://bdu.fstec.ru/vul/2023-08332" type="self" id="BDU:2023-08332" title="BDU:2023-08332" />
			<reference href="https://bdu.fstec.ru/vul/2023-08088" type="self" id="BDU:2023-08088" title="BDU:2023-08088" />
			<reference href="https://bdu.fstec.ru/vul/2023-08322" type="self" id="BDU:2023-08322" title="BDU:2023-08322" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="115.12.1" release="1.el7" arch="x86_64" src="">
					<filename>thunderbird-0:115.12.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240927-07</id>
		<issued date="2024-09-27" />
		<updated date="2024-09-27" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-27-09-24-2/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-27-09-24-2/" type="self" id="ROS-20240927-07" title="ROS-20240927-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27016" type="cve" id="CVE-2024-27016" title="CVE-2024-27016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27401" type="cve" id="CVE-2024-27401" title="CVE-2024-27401" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27399" type="cve" id="CVE-2024-27399" title="CVE-2024-27399" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27398" type="cve" id="CVE-2024-27398" title="CVE-2024-27398" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27396" type="cve" id="CVE-2024-27396" title="CVE-2024-27396" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27395" type="cve" id="CVE-2024-27395" title="CVE-2024-27395" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27015" type="cve" id="CVE-2024-27015" title="CVE-2024-27015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26996" type="cve" id="CVE-2024-26996" title="CVE-2024-26996" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26980" type="cve" id="CVE-2024-26980" title="CVE-2024-26980" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35845" type="cve" id="CVE-2024-35845" title="CVE-2024-35845" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52696" type="cve" id="CVE-2023-52696" title="CVE-2023-52696" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27405" type="cve" id="CVE-2024-27405" title="CVE-2024-27405" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27393" type="cve" id="CVE-2024-27393" title="CVE-2024-27393" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52655" type="cve" id="CVE-2023-52655" title="CVE-2023-52655" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043" type="cve" id="CVE-2024-27043" title="CVE-2024-27043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961" type="cve" id="CVE-2024-26961" title="CVE-2024-26961" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960" type="cve" id="CVE-2024-26960" title="CVE-2024-26960" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26958" type="cve" id="CVE-2024-26958" title="CVE-2024-26958" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26881" type="cve" id="CVE-2024-26881" title="CVE-2024-26881" />
			<reference href="https://bdu.fstec.ru/vul/2024-07640" type="self" id="BDU:2024-07640" title="BDU:2024-07640" />
			<reference href="https://bdu.fstec.ru/vul/2024-03934" type="self" id="BDU:2024-03934" title="BDU:2024-03934" />
			<reference href="https://bdu.fstec.ru/vul/2024-03936" type="self" id="BDU:2024-03936" title="BDU:2024-03936" />
			<reference href="https://bdu.fstec.ru/vul/2024-03937" type="self" id="BDU:2024-03937" title="BDU:2024-03937" />
			<reference href="https://bdu.fstec.ru/vul/2024-03933" type="self" id="BDU:2024-03933" title="BDU:2024-03933" />
			<reference href="https://bdu.fstec.ru/vul/2024-03932" type="self" id="BDU:2024-03932" title="BDU:2024-03932" />
			<reference href="https://bdu.fstec.ru/vul/2024-07641" type="self" id="BDU:2024-07641" title="BDU:2024-07641" />
			<reference href="https://bdu.fstec.ru/vul/2024-03641" type="self" id="BDU:2024-03641" title="BDU:2024-03641" />
			<reference href="https://bdu.fstec.ru/vul/2024-03640" type="self" id="BDU:2024-03640" title="BDU:2024-03640" />
			<reference href="https://bdu.fstec.ru/vul/2024-06895" type="self" id="BDU:2024-06895" title="BDU:2024-06895" />
			<reference href="https://bdu.fstec.ru/vul/2024-06911" type="self" id="BDU:2024-06911" title="BDU:2024-06911" />
			<reference href="https://bdu.fstec.ru/vul/2024-06899" type="self" id="BDU:2024-06899" title="BDU:2024-06899" />
			<reference href="https://bdu.fstec.ru/vul/2024-03939" type="self" id="BDU:2024-03939" title="BDU:2024-03939" />
			<reference href="https://bdu.fstec.ru/vul/2024-03940" type="self" id="BDU:2024-03940" title="BDU:2024-03940" />
			<reference href="https://bdu.fstec.ru/vul/2024-03643" type="self" id="BDU:2024-03643" title="BDU:2024-03643" />
			<reference href="https://bdu.fstec.ru/vul/2024-03671" type="self" id="BDU:2024-03671" title="BDU:2024-03671" />
			<reference href="https://bdu.fstec.ru/vul/2024-03637" type="self" id="BDU:2024-03637" title="BDU:2024-03637" />
			<reference href="https://bdu.fstec.ru/vul/2024-03636" type="self" id="BDU:2024-03636" title="BDU:2024-03636" />
			<reference href="https://bdu.fstec.ru/vul/2024-07642" type="self" id="BDU:2024-07642" title="BDU:2024-07642" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241001-01</id>
		<issued date="2024-10-01" />
		<updated date="2024-10-01" />
		<title>Уязвимость vlc </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в vlc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vlc-cve-2024-46461/</description>
               <solution>
                    Запретить использование в ОС пакета VLC
                или
                    Установить обновление для пакета(ов) VLC
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vlc-cve-2024-46461/" type="self" id="ROS-20241001-01" title="ROS-20241001-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46461" type="cve" id="CVE-2024-46461" title="CVE-2024-46461" />
			<reference href="https://bdu.fstec.ru/vul/2024-07778" type="self" id="BDU:2024-07778" title="BDU:2024-07778" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vlc" epoch="0" version="3.0.21" release="1.el7.3" arch="x86_64" src="">
					<filename>vlc-0:3.0.21-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241001-02</id>
		<issued date="2024-10-01" />
		<updated date="2024-10-01" />
		<title>Множественные уязвимости golang </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-golang-cve-2023-39321-cve-2023-39318-cve-2023-39319/</description>
               <solution>
                    Запретить использование в ОС пакета go
                или
                    Установить обновление для пакета(ов) go
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-golang-cve-2023-39321-cve-2023-39318-cve-2023-39319/" type="self" id="ROS-20241001-02" title="ROS-20241001-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39319" type="cve" id="CVE-2023-39319" title="CVE-2023-39319" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39318" type="cve" id="CVE-2023-39318" title="CVE-2023-39318" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39321" type="cve" id="CVE-2023-39321" title="CVE-2023-39321" />
			<reference href="https://bdu.fstec.ru/vul/2024-07763" type="self" id="BDU:2024-07763" title="BDU:2024-07763" />
			<reference href="https://bdu.fstec.ru/vul/2024-07762" type="self" id="BDU:2024-07762" title="BDU:2024-07762" />
			<reference href="https://bdu.fstec.ru/vul/2024-07759" type="self" id="BDU:2024-07759" title="BDU:2024-07759" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.21.6" release="1.el7" arch="x86_64" src="">
					<filename>golang-0:1.21.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241001-03</id>
		<issued date="2024-10-01" />
		<updated date="2024-10-01" />
		<title>Множественные уязвимости rubygem-puma</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в rubygem-puma</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rubygem-puma/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-puma
                или
                    Установить обновление для пакета(ов) rubygem-puma
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rubygem-puma/" type="self" id="ROS-20241001-03" title="ROS-20241001-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24790" type="cve" id="CVE-2022-24790" title="CVE-2022-24790" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41136" type="cve" id="CVE-2021-41136" title="CVE-2021-41136" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23634" type="cve" id="CVE-2022-23634" title="CVE-2022-23634" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40175" type="cve" id="CVE-2023-40175" title="CVE-2023-40175" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21647" type="cve" id="CVE-2024-21647" title="CVE-2024-21647" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45614" type="cve" id="CVE-2024-45614" title="CVE-2024-45614" />
			<reference href="https://bdu.fstec.ru/vul/2024-07776" type="self" id="BDU:2024-07776" title="BDU:2024-07776" />
			<reference href="https://bdu.fstec.ru/vul/2024-07772" type="self" id="BDU:2024-07772" title="BDU:2024-07772" />
			<reference href="https://bdu.fstec.ru/vul/2024-07773" type="self" id="BDU:2024-07773" title="BDU:2024-07773" />
			<reference href="https://bdu.fstec.ru/vul/2023-06847" type="self" id="BDU:2023-06847" title="BDU:2023-06847" />
			<reference href="https://bdu.fstec.ru/vul/2024-00328" type="self" id="BDU:2024-00328" title="BDU:2024-00328" />
			<reference href="https://bdu.fstec.ru/vul/2024-07777" type="self" id="BDU:2024-07777" title="BDU:2024-07777" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-puma" epoch="0" version="5.6.9" release="1.el7" arch="x86_64" src="">
					<filename>rubygem-puma-0:5.6.9-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241001-04</id>
		<issued date="2024-10-01" />
		<updated date="2024-10-01" />
		<title>Уязвимость quagga </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в quagga</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-quagga-cve-2024-44070/</description>
               <solution>
                    Запретить использование в ОС пакета quagga
                или
                    Установить обновление для пакета(ов) quagga
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-quagga-cve-2024-44070/" type="self" id="ROS-20241001-04" title="ROS-20241001-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44070" type="cve" id="CVE-2024-44070" title="CVE-2024-44070" />
			<reference href="https://bdu.fstec.ru/vul/2024-06868" type="self" id="BDU:2024-06868" title="BDU:2024-06868" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="quagga" epoch="0" version="1.2.4" release="15.el7" arch="x86_64" src="">
					<filename>quagga-0:1.2.4-15.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241001-05</id>
		<issued date="2024-10-01" />
		<updated date="2024-10-01" />
		<title>Множественные уязвимости openssl3 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в openssl3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-openssl3-cve-2024-6119-cve-2024-5535/</description>
               <solution>
                    Запретить использование в ОС пакета openssl3
                или
                    Установить обновление для пакета(ов) openssl3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-openssl3-cve-2024-6119-cve-2024-5535/" type="self" id="ROS-20241001-05" title="ROS-20241001-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6119" type="cve" id="CVE-2024-6119" title="CVE-2024-6119" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5535" type="cve" id="CVE-2024-5535" title="CVE-2024-5535" />
			<reference href="https://bdu.fstec.ru/vul/2024-06735" type="self" id="BDU:2024-06735" title="BDU:2024-06735" />
			<reference href="https://bdu.fstec.ru/vul/2024-06988" type="self" id="BDU:2024-06988" title="BDU:2024-06988" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl3" epoch="0" version="3.2.2" release="1.el7" arch="x86_64" src="">
					<filename>openssl3-0:3.2.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241001-06</id>
		<issued date="2024-10-01" />
		<updated date="2024-10-01" />
		<title>Уязвимость runc </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в runc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-runc-cve-2024-45310/</description>
               <solution>
                    Запретить использование в ОС пакета runc
                или
                    Установить обновление для пакета(ов) runc
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-runc-cve-2024-45310/" type="self" id="ROS-20241001-06" title="ROS-20241001-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45310" type="cve" id="CVE-2024-45310" title="CVE-2024-45310" />
			<reference href="https://bdu.fstec.ru/vul/2024-06891" type="self" id="BDU:2024-06891" title="BDU:2024-06891" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="runc" epoch="2" version="1.1.14" release="1.el7" arch="x86_64" src="">
					<filename>runc-2:1.1.14-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241001-07</id>
		<issued date="2024-10-01" />
		<updated date="2024-12-11" />
		<title>Уязвимость python3-webob </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-webob</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-webob-cve-2024-42353/</description>
               <solution>
                    Запретить использование в ОС пакета python3-webob
                или
                    Установить обновление для пакета(ов) python3-webob
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-webob-cve-2024-42353/" type="self" id="ROS-20241001-07" title="ROS-20241001-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42353" type="cve" id="CVE-2024-42353" title="CVE-2024-42353" />
			<reference href="https://bdu.fstec.ru/vul/2024-07761" type="self" id="BDU:2024-07761" title="BDU:2024-07761" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-webob" epoch="0" version="1.8.8" release="1.el7" arch="noarch" src="">
					<filename>python3-webob-0:1.8.8-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241001-08</id>
		<issued date="2024-10-01" />
		<updated date="2024-10-01" />
		<title>Множественные уязвимости wireshark </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в wireshark</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-wireshark-cve-2024-8250-cve-2024-8645/</description>
               <solution>
                    Запретить использование в ОС пакета wireshark
                или
                    Установить обновление для пакета(ов) wireshark
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-wireshark-cve-2024-8250-cve-2024-8645/" type="self" id="ROS-20241001-08" title="ROS-20241001-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8250" type="cve" id="CVE-2024-8250" title="CVE-2024-8250" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8645" type="cve" id="CVE-2024-8645" title="CVE-2024-8645" />
			<reference href="https://bdu.fstec.ru/vul/2024-06592" type="self" id="BDU:2024-06592" title="BDU:2024-06592" />
			<reference href="https://bdu.fstec.ru/vul/2024-07760" type="self" id="BDU:2024-07760" title="BDU:2024-07760" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="wireshark" epoch="1" version="4.2.7" release="1.el7" arch="x86_64" src="">
					<filename>wireshark-1:4.2.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241001-09</id>
		<issued date="2024-10-02" />
		<updated date="2024-10-02" />
		<title>Уязвимость curl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2024-8096/</description>
               <solution>
                    Запретить использование в ОС пакета cURL 
                или
                    Установить обновление для пакета(ов) cURL 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2024-8096/" type="self" id="ROS-20241001-09" title="ROS-20241001-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8096" type="cve" id="CVE-2024-8096" title="CVE-2024-8096" />
			<reference href="https://bdu.fstec.ru/vul/2024-07774" type="self" id="BDU:2024-07774" title="BDU:2024-07774" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="curl" epoch="0" version="7.85.0" release="22.el7.3" arch="x86_64" src="">
					<filename>curl-0:7.85.0-22.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241001-10</id>
		<issued date="2024-10-02" />
		<updated date="2024-10-02" />
		<title>Множественные уязвимости golang </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-golang-cve-2024-34156-cve-2024-34155-cve-2024-34158/</description>
               <solution>
                    Запретить использование в ОС пакета golang
                или
                    Установить обновление для пакета(ов) golang
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-golang-cve-2024-34156-cve-2024-34155-cve-2024-34158/" type="self" id="ROS-20241001-10" title="ROS-20241001-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34156" type="cve" id="CVE-2024-34156" title="CVE-2024-34156" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34155" type="cve" id="CVE-2024-34155" title="CVE-2024-34155" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34158" type="cve" id="CVE-2024-34158" title="CVE-2024-34158" />
			<reference href="https://bdu.fstec.ru/vul/2024-07025" type="self" id="BDU:2024-07025" title="BDU:2024-07025" />
			<reference href="https://bdu.fstec.ru/vul/2024-07020" type="self" id="BDU:2024-07020" title="BDU:2024-07020" />
			<reference href="https://bdu.fstec.ru/vul/2024-07026" type="self" id="BDU:2024-07026" title="BDU:2024-07026" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.22.7" release="1.el7" arch="x86_64" src="">
					<filename>golang-0:1.22.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241001-11</id>
		<issued date="2024-10-02" />
		<updated date="2024-10-08" />
		<title>Уязвимость ca-certificates </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ca-certificates</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ca-certificates-cve-2024-39689/</description>
               <solution>
                    Запретить использование в ОС пакета ca-certificates
                или
                    Установить обновление для пакета(ов) ca-certificates
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ca-certificates-cve-2024-39689/" type="self" id="ROS-20241001-11" title="ROS-20241001-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39689" type="cve" id="CVE-2024-39689" title="CVE-2024-39689" />
			<reference href="https://bdu.fstec.ru/vul/2024-07771" type="self" id="BDU:2024-07771" title="BDU:2024-07771" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ca-certificates" epoch="0" version="2024.2.68_v8.0.302" release="2.el7" arch="noarch" src="">
					<filename>ca-certificates-0:2024.2.68_v8.0.302-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241001-12</id>
		<issued date="2024-10-02" />
		<updated date="2025-10-09" />
		<title>Уязвимость qemu </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в qemu-common</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qemu-cve-2024-7409/</description>
               <solution>
                    Запретить использование в ОС пакета qemu-common
                или
                    Установить обновление для пакета(ов) qemu-common
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qemu-cve-2024-7409/" type="self" id="ROS-20241001-12" title="ROS-20241001-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7409" type="cve" id="CVE-2024-7409" title="CVE-2024-7409" />
			<reference href="https://bdu.fstec.ru/vul/2024-06925" type="self" id="BDU:2024-06925" title="BDU:2024-06925" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="qemu-common" epoch="15" version="7.2.14" release="1.el7" arch="x86_64" src="">
					<filename>qemu-common-15:7.2.14-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241001-13</id>
		<issued date="2024-10-02" />
		<updated date="2024-10-02" />
		<title>Множественные уязвимости botan2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в botan2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-botan2-cve-2024-34702-cve-2024-39312/</description>
               <solution>
                    Запретить использование в ОС пакета botan2
                или
                    Установить обновление для пакета(ов) botan2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-botan2-cve-2024-34702-cve-2024-39312/" type="self" id="ROS-20241001-13" title="ROS-20241001-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34702" type="cve" id="CVE-2024-34702" title="CVE-2024-34702" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39312" type="cve" id="CVE-2024-39312" title="CVE-2024-39312" />
			<reference href="https://bdu.fstec.ru/vul/2024-07764" type="self" id="BDU:2024-07764" title="BDU:2024-07764" />
			<reference href="https://bdu.fstec.ru/vul/2024-07775" type="self" id="BDU:2024-07775" title="BDU:2024-07775" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="botan2" epoch="0" version="2.19.5" release="1.el7" arch="x86_64" src="">
					<filename>botan2-0:2.19.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241001-14</id>
		<issued date="2024-10-02" />
		<updated date="2024-10-02" />
		<title>Уязвимость rubygem-nokogiri </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в rubygem-nokogiri</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-nokogiri-cve-2022-24836/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-nokogiri
                или
                    Установить обновление для пакета(ов) rubygem-nokogiri
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-nokogiri-cve-2022-24836/" type="self" id="ROS-20241001-14" title="ROS-20241001-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24836" type="cve" id="CVE-2022-24836" title="CVE-2022-24836" />
			<reference href="https://bdu.fstec.ru/vul/2022-06047" type="self" id="BDU:2022-06047" title="BDU:2022-06047" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-nokogiri" epoch="0" version="1.16.7" release="2.el7" arch="x86_64" src="">
					<filename>rubygem-nokogiri-0:1.16.7-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241001-15</id>
		<issued date="2024-10-02" />
		<updated date="2024-10-02" />
		<title>Уязвимость rubygem-rails-html-sanitizer </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в rubygem-rails-html-sanitizer</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-rails-html-sanitizer-cve-2022-32209/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-rails-html-sanitizer
                или
                    Установить обновление для пакета(ов) rubygem-rails-html-sanitizer
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-rails-html-sanitizer-cve-2022-32209/" type="self" id="ROS-20241001-15" title="ROS-20241001-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32209" type="cve" id="CVE-2022-32209" title="CVE-2022-32209" />
			<reference href="https://bdu.fstec.ru/vul/2022-06004" type="self" id="BDU:2022-06004" title="BDU:2022-06004" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-rails-html-sanitizer" epoch="0" version="1.6.0" release="1.el7" arch="noarch" src="">
					<filename>rubygem-rails-html-sanitizer-0:1.6.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241001-16</id>
		<issued date="2024-10-02" />
		<updated date="2024-10-02" />
		<title>Уязвимость nodejs-babel-core </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nodejs-babel-core</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-babel-core-cve-2023-45133/</description>
               <solution>
                    Запретить использование в ОС пакета nodejs-babel-core
                или
                    Установить обновление для пакета(ов) nodejs-babel-core
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-babel-core-cve-2023-45133/" type="self" id="ROS-20241001-16" title="ROS-20241001-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45133" type="cve" id="CVE-2023-45133" title="CVE-2023-45133" />
			<reference href="https://bdu.fstec.ru/vul/2024-07770" type="self" id="BDU:2024-07770" title="BDU:2024-07770" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs-babel-core" epoch="0" version="7.23.3" release="1.el7" arch="noarch" src="">
					<filename>nodejs-babel-core-0:7.23.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241002-01</id>
		<issued date="2024-10-02" />
		<updated date="2024-10-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-1989/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-1989/" type="self" id="ROS-20241002-01" title="ROS-20241002-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1989" type="cve" id="CVE-2023-1989" title="CVE-2023-1989" />
			<reference href="https://bdu.fstec.ru/vul/2023-02163" type="self" id="BDU:2023-02163" title="BDU:2023-02163" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241002-02</id>
		<issued date="2024-10-02" />
		<updated date="2024-10-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-1829/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-1829/" type="self" id="ROS-20241002-02" title="ROS-20241002-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1829" type="cve" id="CVE-2023-1829" title="CVE-2023-1829" />
			<reference href="https://bdu.fstec.ru/vul/2023-02165" type="self" id="BDU:2023-02165" title="BDU:2023-02165" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.20" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.20-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241002-03</id>
		<issued date="2024-10-02" />
		<updated date="2024-10-03" />
		<title>Множественные уязвимости kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-cve-2023-4387-cve-2023-4389/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-cve-2023-4387-cve-2023-4389/" type="self" id="ROS-20241002-03" title="ROS-20241002-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4387" type="cve" id="CVE-2023-4387" title="CVE-2023-4387" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4389" type="cve" id="CVE-2023-4389" title="CVE-2023-4389" />
			<reference href="https://bdu.fstec.ru/vul/2023-04900" type="self" id="BDU:2023-04900" title="BDU:2023-04900" />
			<reference href="https://bdu.fstec.ru/vul/2023-04899" type="self" id="BDU:2023-04899" title="BDU:2023-04899" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.20" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.20-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241002-04</id>
		<issued date="2024-10-02" />
		<updated date="2024-10-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-46838/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-46838/" type="self" id="ROS-20241002-04" title="ROS-20241002-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46838" type="cve" id="CVE-2023-46838" title="CVE-2023-46838" />
			<reference href="https://bdu.fstec.ru/vul/2024-00738" type="self" id="BDU:2024-00738" title="BDU:2024-00738" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241002-05</id>
		<issued date="2024-10-02" />
		<updated date="2024-10-03" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-02-10-24-1/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-02-10-24-1/" type="self" id="ROS-20241002-05" title="ROS-20241002-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26582" type="cve" id="CVE-2024-26582" title="CVE-2024-26582" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26585" type="cve" id="CVE-2024-26585" title="CVE-2024-26585" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52446" type="cve" id="CVE-2023-52446" title="CVE-2023-52446" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52450" type="cve" id="CVE-2023-52450" title="CVE-2023-52450" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26587" type="cve" id="CVE-2024-26587" title="CVE-2024-26587" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26588" type="cve" id="CVE-2024-26588" title="CVE-2024-26588" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26590" type="cve" id="CVE-2024-26590" title="CVE-2024-26590" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52453" type="cve" id="CVE-2023-52453" title="CVE-2023-52453" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52455" type="cve" id="CVE-2023-52455" title="CVE-2023-52455" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52459" type="cve" id="CVE-2023-52459" title="CVE-2023-52459" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26599" type="cve" id="CVE-2024-26599" title="CVE-2024-26599" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26604" type="cve" id="CVE-2024-26604" title="CVE-2024-26604" />
			<reference href="https://bdu.fstec.ru/vul/2024-01681" type="self" id="BDU:2024-01681" title="BDU:2024-01681" />
			<reference href="https://bdu.fstec.ru/vul/2024-01601" type="self" id="BDU:2024-01601" title="BDU:2024-01601" />
			<reference href="https://bdu.fstec.ru/vul/2024-01841" type="self" id="BDU:2024-01841" title="BDU:2024-01841" />
			<reference href="https://bdu.fstec.ru/vul/2024-01839" type="self" id="BDU:2024-01839" title="BDU:2024-01839" />
			<reference href="https://bdu.fstec.ru/vul/2024-01847" type="self" id="BDU:2024-01847" title="BDU:2024-01847" />
			<reference href="https://bdu.fstec.ru/vul/2024-01924" type="self" id="BDU:2024-01924" title="BDU:2024-01924" />
			<reference href="https://bdu.fstec.ru/vul/2024-01861" type="self" id="BDU:2024-01861" title="BDU:2024-01861" />
			<reference href="https://bdu.fstec.ru/vul/2024-01859" type="self" id="BDU:2024-01859" title="BDU:2024-01859" />
			<reference href="https://bdu.fstec.ru/vul/2024-01836" type="self" id="BDU:2024-01836" title="BDU:2024-01836" />
			<reference href="https://bdu.fstec.ru/vul/2024-01864" type="self" id="BDU:2024-01864" title="BDU:2024-01864" />
			<reference href="https://bdu.fstec.ru/vul/2024-01835" type="self" id="BDU:2024-01835" title="BDU:2024-01835" />
			<reference href="https://bdu.fstec.ru/vul/2024-01740" type="self" id="BDU:2024-01740" title="BDU:2024-01740" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241002-06</id>
		<issued date="2024-10-02" />
		<updated date="2024-10-03" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-02-10-24-2/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-02-10-24-2/" type="self" id="ROS-20241002-06" title="ROS-20241002-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52475" type="cve" id="CVE-2023-52475" title="CVE-2023-52475" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52482" type="cve" id="CVE-2023-52482" title="CVE-2023-52482" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52476" type="cve" id="CVE-2023-52476" title="CVE-2023-52476" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52477" type="cve" id="CVE-2023-52477" title="CVE-2023-52477" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52480" type="cve" id="CVE-2023-52480" title="CVE-2023-52480" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52483" type="cve" id="CVE-2023-52483" title="CVE-2023-52483" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52484" type="cve" id="CVE-2023-52484" title="CVE-2023-52484" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497" type="cve" id="CVE-2023-52497" title="CVE-2023-52497" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48627" type="cve" id="CVE-2022-48627" title="CVE-2022-48627" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52499" type="cve" id="CVE-2023-52499" title="CVE-2023-52499" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52500" type="cve" id="CVE-2023-52500" title="CVE-2023-52500" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52501" type="cve" id="CVE-2023-52501" title="CVE-2023-52501" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52502" type="cve" id="CVE-2023-52502" title="CVE-2023-52502" />
			<reference href="https://bdu.fstec.ru/vul/2024-07823" type="self" id="BDU:2024-07823" title="BDU:2024-07823" />
			<reference href="https://bdu.fstec.ru/vul/2024-07824" type="self" id="BDU:2024-07824" title="BDU:2024-07824" />
			<reference href="https://bdu.fstec.ru/vul/2024-07822" type="self" id="BDU:2024-07822" title="BDU:2024-07822" />
			<reference href="https://bdu.fstec.ru/vul/2024-07821" type="self" id="BDU:2024-07821" title="BDU:2024-07821" />
			<reference href="https://bdu.fstec.ru/vul/2024-07843" type="self" id="BDU:2024-07843" title="BDU:2024-07843" />
			<reference href="https://bdu.fstec.ru/vul/2024-07842" type="self" id="BDU:2024-07842" title="BDU:2024-07842" />
			<reference href="https://bdu.fstec.ru/vul/2024-07841" type="self" id="BDU:2024-07841" title="BDU:2024-07841" />
			<reference href="https://bdu.fstec.ru/vul/2024-07840" type="self" id="BDU:2024-07840" title="BDU:2024-07840" />
			<reference href="https://bdu.fstec.ru/vul/2024-07839" type="self" id="BDU:2024-07839" title="BDU:2024-07839" />
			<reference href="https://bdu.fstec.ru/vul/2024-07838" type="self" id="BDU:2024-07838" title="BDU:2024-07838" />
			<reference href="https://bdu.fstec.ru/vul/2024-07837" type="self" id="BDU:2024-07837" title="BDU:2024-07837" />
			<reference href="https://bdu.fstec.ru/vul/2024-07836" type="self" id="BDU:2024-07836" title="BDU:2024-07836" />
			<reference href="https://bdu.fstec.ru/vul/2024-07820" type="self" id="BDU:2024-07820" title="BDU:2024-07820" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241003-01</id>
		<issued date="2024-10-03" />
		<updated date="2024-10-03" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-03-10-24/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-03-10-24/" type="self" id="ROS-20241003-01" title="ROS-20241003-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52503" type="cve" id="CVE-2023-52503" title="CVE-2023-52503" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52504" type="cve" id="CVE-2023-52504" title="CVE-2023-52504" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52507" type="cve" id="CVE-2023-52507" title="CVE-2023-52507" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52509" type="cve" id="CVE-2023-52509" title="CVE-2023-52509" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52511" type="cve" id="CVE-2023-52511" title="CVE-2023-52511" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52513" type="cve" id="CVE-2023-52513" title="CVE-2023-52513" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52515" type="cve" id="CVE-2023-52515" title="CVE-2023-52515" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52516" type="cve" id="CVE-2023-52516" title="CVE-2023-52516" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52517" type="cve" id="CVE-2023-52517" title="CVE-2023-52517" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52519" type="cve" id="CVE-2023-52519" title="CVE-2023-52519" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52520" type="cve" id="CVE-2023-52520" title="CVE-2023-52520" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52522" type="cve" id="CVE-2023-52522" title="CVE-2023-52522" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52523" type="cve" id="CVE-2023-52523" title="CVE-2023-52523" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52524" type="cve" id="CVE-2023-52524" title="CVE-2023-52524" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52525" type="cve" id="CVE-2023-52525" title="CVE-2023-52525" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52527" type="cve" id="CVE-2023-52527" title="CVE-2023-52527" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52528" type="cve" id="CVE-2023-52528" title="CVE-2023-52528" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52529" type="cve" id="CVE-2023-52529" title="CVE-2023-52529" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52531" type="cve" id="CVE-2023-52531" title="CVE-2023-52531" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52559" type="cve" id="CVE-2023-52559" title="CVE-2023-52559" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583" type="cve" id="CVE-2023-52583" title="CVE-2023-52583" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587" type="cve" id="CVE-2023-52587" title="CVE-2023-52587" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52505" type="cve" id="CVE-2023-52505" title="CVE-2023-52505" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52512" type="cve" id="CVE-2023-52512" title="CVE-2023-52512" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52518" type="cve" id="CVE-2023-52518" title="CVE-2023-52518" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52526" type="cve" id="CVE-2023-52526" title="CVE-2023-52526" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52560" type="cve" id="CVE-2023-52560" title="CVE-2023-52560" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52585" type="cve" id="CVE-2023-52585" title="CVE-2023-52585" />
			<reference href="https://bdu.fstec.ru/vul/2024-07835" type="self" id="BDU:2024-07835" title="BDU:2024-07835" />
			<reference href="https://bdu.fstec.ru/vul/2024-07834" type="self" id="BDU:2024-07834" title="BDU:2024-07834" />
			<reference href="https://bdu.fstec.ru/vul/2024-07833" type="self" id="BDU:2024-07833" title="BDU:2024-07833" />
			<reference href="https://bdu.fstec.ru/vul/2024-07832" type="self" id="BDU:2024-07832" title="BDU:2024-07832" />
			<reference href="https://bdu.fstec.ru/vul/2024-07831" type="self" id="BDU:2024-07831" title="BDU:2024-07831" />
			<reference href="https://bdu.fstec.ru/vul/2024-07830" type="self" id="BDU:2024-07830" title="BDU:2024-07830" />
			<reference href="https://bdu.fstec.ru/vul/2024-07819" type="self" id="BDU:2024-07819" title="BDU:2024-07819" />
			<reference href="https://bdu.fstec.ru/vul/2024-07828" type="self" id="BDU:2024-07828" title="BDU:2024-07828" />
			<reference href="https://bdu.fstec.ru/vul/2024-07829" type="self" id="BDU:2024-07829" title="BDU:2024-07829" />
			<reference href="https://bdu.fstec.ru/vul/2024-07827" type="self" id="BDU:2024-07827" title="BDU:2024-07827" />
			<reference href="https://bdu.fstec.ru/vul/2024-07826" type="self" id="BDU:2024-07826" title="BDU:2024-07826" />
			<reference href="https://bdu.fstec.ru/vul/2024-07825" type="self" id="BDU:2024-07825" title="BDU:2024-07825" />
			<reference href="https://bdu.fstec.ru/vul/2024-07818" type="self" id="BDU:2024-07818" title="BDU:2024-07818" />
			<reference href="https://bdu.fstec.ru/vul/2024-07794" type="self" id="BDU:2024-07794" title="BDU:2024-07794" />
			<reference href="https://bdu.fstec.ru/vul/2024-07795" type="self" id="BDU:2024-07795" title="BDU:2024-07795" />
			<reference href="https://bdu.fstec.ru/vul/2024-07799" type="self" id="BDU:2024-07799" title="BDU:2024-07799" />
			<reference href="https://bdu.fstec.ru/vul/2024-07800" type="self" id="BDU:2024-07800" title="BDU:2024-07800" />
			<reference href="https://bdu.fstec.ru/vul/2024-07798" type="self" id="BDU:2024-07798" title="BDU:2024-07798" />
			<reference href="https://bdu.fstec.ru/vul/2024-07853" type="self" id="BDU:2024-07853" title="BDU:2024-07853" />
			<reference href="https://bdu.fstec.ru/vul/2024-07849" type="self" id="BDU:2024-07849" title="BDU:2024-07849" />
			<reference href="https://bdu.fstec.ru/vul/2024-07852" type="self" id="BDU:2024-07852" title="BDU:2024-07852" />
			<reference href="https://bdu.fstec.ru/vul/2024-07848" type="self" id="BDU:2024-07848" title="BDU:2024-07848" />
			<reference href="https://bdu.fstec.ru/vul/2024-07847" type="self" id="BDU:2024-07847" title="BDU:2024-07847" />
			<reference href="https://bdu.fstec.ru/vul/2024-07851" type="self" id="BDU:2024-07851" title="BDU:2024-07851" />
			<reference href="https://bdu.fstec.ru/vul/2024-07850" type="self" id="BDU:2024-07850" title="BDU:2024-07850" />
			<reference href="https://bdu.fstec.ru/vul/2024-07845" type="self" id="BDU:2024-07845" title="BDU:2024-07845" />
			<reference href="https://bdu.fstec.ru/vul/2024-07846" type="self" id="BDU:2024-07846" title="BDU:2024-07846" />
			<reference href="https://bdu.fstec.ru/vul/2024-07844" type="self" id="BDU:2024-07844" title="BDU:2024-07844" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241004-01</id>
		<issued date="2024-10-04" />
		<updated date="2024-10-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-0775/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-0775/" type="self" id="ROS-20241004-01" title="ROS-20241004-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0775" type="cve" id="CVE-2024-0775" title="CVE-2024-0775" />
			<reference href="https://bdu.fstec.ru/vul/2024-00776" type="self" id="BDU:2024-00776" title="BDU:2024-00776" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241004-02</id>
		<issued date="2024-10-04" />
		<updated date="2024-10-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-1476/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-1476/" type="self" id="ROS-20241004-02" title="ROS-20241004-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1476" type="cve" id="CVE-2023-1476" title="CVE-2023-1476" />
			<reference href="https://bdu.fstec.ru/vul/2023-08149" type="self" id="BDU:2023-08149" title="BDU:2023-08149" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241004-03</id>
		<issued date="2024-10-04" />
		<updated date="2024-10-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-44466/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-44466/" type="self" id="ROS-20241004-03" title="ROS-20241004-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44466" type="cve" id="CVE-2023-44466" title="CVE-2023-44466" />
			<reference href="https://bdu.fstec.ru/vul/2023-06336" type="self" id="BDU:2023-06336" title="BDU:2023-06336" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241004-04</id>
		<issued date="2024-10-04" />
		<updated date="2024-10-04" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-04-10-24-1/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-04-10-24-1/" type="self" id="ROS-20241004-04" title="ROS-20241004-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26623" type="cve" id="CVE-2024-26623" title="CVE-2024-26623" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26626" type="cve" id="CVE-2024-26626" title="CVE-2024-26626" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26611" type="cve" id="CVE-2024-26611" title="CVE-2024-26611" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26612" type="cve" id="CVE-2024-26612" title="CVE-2024-26612" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26616" type="cve" id="CVE-2024-26616" title="CVE-2024-26616" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26620" type="cve" id="CVE-2024-26620" title="CVE-2024-26620" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26630" type="cve" id="CVE-2024-26630" title="CVE-2024-26630" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52611" type="cve" id="CVE-2023-52611" title="CVE-2023-52611" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52613" type="cve" id="CVE-2023-52613" title="CVE-2023-52613" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26632" type="cve" id="CVE-2024-26632" title="CVE-2024-26632" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26634" type="cve" id="CVE-2024-26634" title="CVE-2024-26634" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26638" type="cve" id="CVE-2024-26638" title="CVE-2024-26638" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52626" type="cve" id="CVE-2023-52626" title="CVE-2023-52626" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26649" type="cve" id="CVE-2024-26649" title="CVE-2024-26649" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26650" type="cve" id="CVE-2024-26650" title="CVE-2024-26650" />
			<reference href="https://bdu.fstec.ru/vul/2024-03617" type="self" id="BDU:2024-03617" title="BDU:2024-03617" />
			<reference href="https://bdu.fstec.ru/vul/2024-03768" type="self" id="BDU:2024-03768" title="BDU:2024-03768" />
			<reference href="https://bdu.fstec.ru/vul/2024-04148" type="self" id="BDU:2024-04148" title="BDU:2024-04148" />
			<reference href="https://bdu.fstec.ru/vul/2024-03657" type="self" id="BDU:2024-03657" title="BDU:2024-03657" />
			<reference href="https://bdu.fstec.ru/vul/2024-04140" type="self" id="BDU:2024-04140" title="BDU:2024-04140" />
			<reference href="https://bdu.fstec.ru/vul/2024-04138" type="self" id="BDU:2024-04138" title="BDU:2024-04138" />
			<reference href="https://bdu.fstec.ru/vul/2024-03757" type="self" id="BDU:2024-03757" title="BDU:2024-03757" />
			<reference href="https://bdu.fstec.ru/vul/2025-15082" type="self" id="BDU:2025-15082" title="BDU:2025-15082" />
			<reference href="https://bdu.fstec.ru/vul/2025-14285" type="self" id="BDU:2025-14285" title="BDU:2025-14285" />
			<reference href="https://bdu.fstec.ru/vul/2024-03658" type="self" id="BDU:2024-03658" title="BDU:2024-03658" />
			<reference href="https://bdu.fstec.ru/vul/2024-03654" type="self" id="BDU:2024-03654" title="BDU:2024-03654" />
			<reference href="https://bdu.fstec.ru/vul/2024-03653" type="self" id="BDU:2024-03653" title="BDU:2024-03653" />
			<reference href="https://bdu.fstec.ru/vul/2025-14282" type="self" id="BDU:2025-14282" title="BDU:2025-14282" />
			<reference href="https://bdu.fstec.ru/vul/2024-03618" type="self" id="BDU:2024-03618" title="BDU:2024-03618" />
			<reference href="https://bdu.fstec.ru/vul/2024-03619" type="self" id="BDU:2024-03619" title="BDU:2024-03619" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241004-05</id>
		<issued date="2024-10-04" />
		<updated date="2024-10-04" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-04-10-24-2/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-04-10-24-2/" type="self" id="ROS-20241004-05" title="ROS-20241004-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52588" type="cve" id="CVE-2023-52588" title="CVE-2023-52588" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52594" type="cve" id="CVE-2023-52594" title="CVE-2023-52594" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595" type="cve" id="CVE-2023-52595" title="CVE-2023-52595" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597" type="cve" id="CVE-2023-52597" title="CVE-2023-52597" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598" type="cve" id="CVE-2023-52598" title="CVE-2023-52598" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52599" type="cve" id="CVE-2023-52599" title="CVE-2023-52599" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52600" type="cve" id="CVE-2023-52600" title="CVE-2023-52600" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52601" type="cve" id="CVE-2023-52601" title="CVE-2023-52601" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52602" type="cve" id="CVE-2023-52602" title="CVE-2023-52602" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52603" type="cve" id="CVE-2023-52603" title="CVE-2023-52603" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52604" type="cve" id="CVE-2023-52604" title="CVE-2023-52604" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52606" type="cve" id="CVE-2023-52606" title="CVE-2023-52606" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607" type="cve" id="CVE-2023-52607" title="CVE-2023-52607" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26627" type="cve" id="CVE-2024-26627" title="CVE-2024-26627" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486" type="cve" id="CVE-2023-52486" title="CVE-2023-52486" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488" type="cve" id="CVE-2023-52488" title="CVE-2023-52488" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52489" type="cve" id="CVE-2023-52489" title="CVE-2023-52489" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52608" type="cve" id="CVE-2023-52608" title="CVE-2023-52608" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52609" type="cve" id="CVE-2023-52609" title="CVE-2023-52609" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52610" type="cve" id="CVE-2023-52610" title="CVE-2023-52610" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52612" type="cve" id="CVE-2023-52612" title="CVE-2023-52612" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614" type="cve" id="CVE-2023-52614" title="CVE-2023-52614" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615" type="cve" id="CVE-2023-52615" title="CVE-2023-52615" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616" type="cve" id="CVE-2023-52616" title="CVE-2023-52616" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52617" type="cve" id="CVE-2023-52617" title="CVE-2023-52617" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52618" type="cve" id="CVE-2023-52618" title="CVE-2023-52618" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52619" type="cve" id="CVE-2023-52619" title="CVE-2023-52619" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620" type="cve" id="CVE-2023-52620" title="CVE-2023-52620" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642" type="cve" id="CVE-2024-26642" title="CVE-2024-26642" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26645" type="cve" id="CVE-2024-26645" title="CVE-2024-26645" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52622" type="cve" id="CVE-2023-52622" title="CVE-2023-52622" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52623" type="cve" id="CVE-2023-52623" title="CVE-2023-52623" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52627" type="cve" id="CVE-2023-52627" title="CVE-2023-52627" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52628" type="cve" id="CVE-2023-52628" title="CVE-2023-52628" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565" type="cve" id="CVE-2024-0565" title="CVE-2024-0565" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5090" type="cve" id="CVE-2023-5090" title="CVE-2023-5090" />
			<reference href="https://bdu.fstec.ru/vul/2025-07509" type="self" id="BDU:2025-07509" title="BDU:2025-07509" />
			<reference href="https://bdu.fstec.ru/vul/2025-07474" type="self" id="BDU:2025-07474" title="BDU:2025-07474" />
			<reference href="https://bdu.fstec.ru/vul/2025-03818" type="self" id="BDU:2025-03818" title="BDU:2025-03818" />
			<reference href="https://bdu.fstec.ru/vul/2025-15038" type="self" id="BDU:2025-15038" title="BDU:2025-15038" />
			<reference href="https://bdu.fstec.ru/vul/2025-07510" type="self" id="BDU:2025-07510" title="BDU:2025-07510" />
			<reference href="https://bdu.fstec.ru/vul/2025-07475" type="self" id="BDU:2025-07475" title="BDU:2025-07475" />
			<reference href="https://bdu.fstec.ru/vul/2025-00163" type="self" id="BDU:2025-00163" title="BDU:2025-00163" />
			<reference href="https://bdu.fstec.ru/vul/2025-07476" type="self" id="BDU:2025-07476" title="BDU:2025-07476" />
			<reference href="https://bdu.fstec.ru/vul/2024-06912" type="self" id="BDU:2024-06912" title="BDU:2024-06912" />
			<reference href="https://bdu.fstec.ru/vul/2025-07477" type="self" id="BDU:2025-07477" title="BDU:2025-07477" />
			<reference href="https://bdu.fstec.ru/vul/2025-07478" type="self" id="BDU:2025-07478" title="BDU:2025-07478" />
			<reference href="https://bdu.fstec.ru/vul/2025-03817" type="self" id="BDU:2025-03817" title="BDU:2025-03817" />
			<reference href="https://bdu.fstec.ru/vul/2024-09455" type="self" id="BDU:2024-09455" title="BDU:2024-09455" />
			<reference href="https://bdu.fstec.ru/vul/2024-09030" type="self" id="BDU:2024-09030" title="BDU:2024-09030" />
			<reference href="https://bdu.fstec.ru/vul/2025-08237" type="self" id="BDU:2025-08237" title="BDU:2025-08237" />
			<reference href="https://bdu.fstec.ru/vul/2025-03938" type="self" id="BDU:2025-03938" title="BDU:2025-03938" />
			<reference href="https://bdu.fstec.ru/vul/2025-03821" type="self" id="BDU:2025-03821" title="BDU:2025-03821" />
			<reference href="https://bdu.fstec.ru/vul/2025-08238" type="self" id="BDU:2025-08238" title="BDU:2025-08238" />
			<reference href="https://bdu.fstec.ru/vul/2025-14584" type="self" id="BDU:2025-14584" title="BDU:2025-14584" />
			<reference href="https://bdu.fstec.ru/vul/2025-14281" type="self" id="BDU:2025-14281" title="BDU:2025-14281" />
			<reference href="https://bdu.fstec.ru/vul/2025-08239" type="self" id="BDU:2025-08239" title="BDU:2025-08239" />
			<reference href="https://bdu.fstec.ru/vul/2025-04548" type="self" id="BDU:2025-04548" title="BDU:2025-04548" />
			<reference href="https://bdu.fstec.ru/vul/2025-07532" type="self" id="BDU:2025-07532" title="BDU:2025-07532" />
			<reference href="https://bdu.fstec.ru/vul/2025-14286" type="self" id="BDU:2025-14286" title="BDU:2025-14286" />
			<reference href="https://bdu.fstec.ru/vul/2024-09032" type="self" id="BDU:2024-09032" title="BDU:2024-09032" />
			<reference href="https://bdu.fstec.ru/vul/2025-14602" type="self" id="BDU:2025-14602" title="BDU:2025-14602" />
			<reference href="https://bdu.fstec.ru/vul/2025-14287" type="self" id="BDU:2025-14287" title="BDU:2025-14287" />
			<reference href="https://bdu.fstec.ru/vul/2025-00024" type="self" id="BDU:2025-00024" title="BDU:2025-00024" />
			<reference href="https://bdu.fstec.ru/vul/2025-15042" type="self" id="BDU:2025-15042" title="BDU:2025-15042" />
			<reference href="https://bdu.fstec.ru/vul/2025-14288" type="self" id="BDU:2025-14288" title="BDU:2025-14288" />
			<reference href="https://bdu.fstec.ru/vul/2024-09454" type="self" id="BDU:2024-09454" title="BDU:2024-09454" />
			<reference href="https://bdu.fstec.ru/vul/2024-09453" type="self" id="BDU:2024-09453" title="BDU:2024-09453" />
			<reference href="https://bdu.fstec.ru/vul/2025-15304" type="self" id="BDU:2025-15304" title="BDU:2025-15304" />
			<reference href="https://bdu.fstec.ru/vul/2024-00581" type="self" id="BDU:2024-00581" title="BDU:2024-00581" />
			<reference href="https://bdu.fstec.ru/vul/2023-07317" type="self" id="BDU:2023-07317" title="BDU:2023-07317" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241004-06</id>
		<issued date="2024-10-04" />
		<updated date="2024-10-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-52479/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-52479/" type="self" id="ROS-20241004-06" title="ROS-20241004-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52479" type="cve" id="CVE-2023-52479" title="CVE-2023-52479" />
			<reference href="https://bdu.fstec.ru/vul/2025-07508" type="self" id="BDU:2025-07508" title="BDU:2025-07508" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241004-07</id>
		<issued date="2024-10-04" />
		<updated date="2024-10-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-6531/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-6531/" type="self" id="ROS-20241004-07" title="ROS-20241004-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531" type="cve" id="CVE-2023-6531" title="CVE-2023-6531" />
			<reference href="https://bdu.fstec.ru/vul/2024-00098" type="self" id="BDU:2024-00098" title="BDU:2024-00098" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241004-08</id>
		<issued date="2024-10-04" />
		<updated date="2024-10-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-52478/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-52478/" type="self" id="ROS-20241004-08" title="ROS-20241004-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52478" type="cve" id="CVE-2023-52478" title="CVE-2023-52478" />
			<reference href="https://bdu.fstec.ru/vul/2025-10573" type="self" id="BDU:2025-10573" title="BDU:2025-10573" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241004-09</id>
		<issued date="2024-10-04" />
		<updated date="2024-10-04" />
		<title>Множественные уязвимости kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-cve-2023-39193-cve-2023-39191-cve-2023-39192/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-cve-2023-39193-cve-2023-39191-cve-2023-39192/" type="self" id="ROS-20241004-09" title="ROS-20241004-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39193" type="cve" id="CVE-2023-39193" title="CVE-2023-39193" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39191" type="cve" id="CVE-2023-39191" title="CVE-2023-39191" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39192" type="cve" id="CVE-2023-39192" title="CVE-2023-39192" />
			<reference href="https://bdu.fstec.ru/vul/2023-06340" type="self" id="BDU:2023-06340" title="BDU:2023-06340" />
			<reference href="https://bdu.fstec.ru/vul/2023-06203" type="self" id="BDU:2023-06203" title="BDU:2023-06203" />
			<reference href="https://bdu.fstec.ru/vul/2023-06271" type="self" id="BDU:2023-06271" title="BDU:2023-06271" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241008-01</id>
		<issued date="2024-10-08" />
		<updated date="2024-10-08" />
		<title>Уязвимость libdwarf </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libdwarf</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libdwarf-cve-2024-2002/</description>
               <solution>
                    Запретить использование в ОС пакета libdwarf
                или
                    Установить обновление для пакета(ов) libdwarf
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libdwarf-cve-2024-2002/" type="self" id="ROS-20241008-01" title="ROS-20241008-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2002" type="cve" id="CVE-2024-2002" title="CVE-2024-2002" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libdwarf" epoch="1" version="0.9.2" release="1.el7" arch="x86_64" src="">
					<filename>libdwarf-1:0.9.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241008-02</id>
		<issued date="2024-10-08" />
		<updated date="2024-10-08" />
		<title>Уязвимость portainer-ce </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в portainer-ce</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-portainer-ce-cve-2024-33662/</description>
               <solution>
                    Запретить использование в ОС пакета portainer-ce
                или
                    Установить обновление для пакета(ов) portainer-ce
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-portainer-ce-cve-2024-33662/" type="self" id="ROS-20241008-02" title="ROS-20241008-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33662" type="cve" id="CVE-2024-33662" title="CVE-2024-33662" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="portainer-ce" epoch="0" version="2.20.2" release="1.el7" arch="x86_64" src="">
					<filename>portainer-ce-0:2.20.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241008-03</id>
		<issued date="2024-10-08" />
		<updated date="2024-10-08" />
		<title>Уязвимость tomcat </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2024-38286/</description>
               <solution>
                    Запретить использование в ОС пакета tomcat
                или
                    Установить обновление для пакета(ов) tomcat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2024-38286/" type="self" id="ROS-20241008-03" title="ROS-20241008-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38286" type="cve" id="CVE-2024-38286" title="CVE-2024-38286" />
			<reference href="https://bdu.fstec.ru/vul/2024-07738" type="self" id="BDU:2024-07738" title="BDU:2024-07738" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat" epoch="1" version="9.0.93" release="1.el7" arch="noarch" src="">
					<filename>tomcat-1:9.0.93-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241008-04</id>
		<issued date="2024-10-08" />
		<updated date="2025-10-09" />
		<title>Уязвимость qemu </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в qemu-common</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qemu-cve-2024-6505/</description>
               <solution>
                    Запретить использование в ОС пакета qemu-common
                или
                    Установить обновление для пакета(ов) qemu-common
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qemu-cve-2024-6505/" type="self" id="ROS-20241008-04" title="ROS-20241008-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6505" type="cve" id="CVE-2024-6505" title="CVE-2024-6505" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="qemu-common" epoch="15" version="7.2.14" release="1.el7" arch="x86_64" src="">
					<filename>qemu-common-15:7.2.14-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241008-05</id>
		<issued date="2024-10-08" />
		<updated date="2024-10-08" />
		<title>Множественные уязвимости xorg-x11-server-Xorg </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в xorg-x11-server-Xorg</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-xorg-x11-server-xorg-cve-2022-3551-cve-2022-3550/</description>
               <solution>
                    Запретить использование в ОС пакета xorg-x11-server-Xorg
                или
                    Установить обновление для пакета(ов) xorg-x11-server-Xorg
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-xorg-x11-server-xorg-cve-2022-3551-cve-2022-3550/" type="self" id="ROS-20241008-05" title="ROS-20241008-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3551" type="cve" id="CVE-2022-3551" title="CVE-2022-3551" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3550" type="cve" id="CVE-2022-3550" title="CVE-2022-3550" />
			<reference href="https://bdu.fstec.ru/vul/2023-07831" type="self" id="BDU:2023-07831" title="BDU:2023-07831" />
			<reference href="https://bdu.fstec.ru/vul/2023-07830" type="self" id="BDU:2023-07830" title="BDU:2023-07830" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="xorg-x11-server-Xorg" epoch="0" version="1.20.14" release="13.el7.3" arch="x86_64" src="">
					<filename>xorg-x11-server-Xorg-0:1.20.14-13.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241008-06</id>
		<issued date="2024-10-08" />
		<updated date="2024-10-08" />
		<title>Множественные уязвимости xorg-x11-server-Xorg</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в xorg-x11-server-Xorg</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-xorg-x11-server-xorg-08-10-24/</description>
               <solution>
                    Запретить использование в ОС пакета xorg-x11-server-Xorg
                или
                    Установить обновление для пакета(ов) xorg-x11-server-Xorg
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-xorg-x11-server-xorg-08-10-24/" type="self" id="ROS-20241008-06" title="ROS-20241008-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46283" type="cve" id="CVE-2022-46283" title="CVE-2022-46283" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340" type="cve" id="CVE-2022-46340" title="CVE-2022-46340" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341" type="cve" id="CVE-2022-46341" title="CVE-2022-46341" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342" type="cve" id="CVE-2022-46342" title="CVE-2022-46342" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343" type="cve" id="CVE-2022-46343" title="CVE-2022-46343" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344" type="cve" id="CVE-2022-46344" title="CVE-2022-46344" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283" type="cve" id="CVE-2022-4283" title="CVE-2022-4283" />
			<reference href="https://bdu.fstec.ru/vul/2023-07835" type="self" id="BDU:2023-07835" title="BDU:2023-07835" />
			<reference href="https://bdu.fstec.ru/vul/2023-07836" type="self" id="BDU:2023-07836" title="BDU:2023-07836" />
			<reference href="https://bdu.fstec.ru/vul/2023-07837" type="self" id="BDU:2023-07837" title="BDU:2023-07837" />
			<reference href="https://bdu.fstec.ru/vul/2023-07838" type="self" id="BDU:2023-07838" title="BDU:2023-07838" />
			<reference href="https://bdu.fstec.ru/vul/2023-07839" type="self" id="BDU:2023-07839" title="BDU:2023-07839" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="xorg-x11-server-Xorg" epoch="0" version="1.20.14" release="13.el7.3" arch="x86_64" src="">
					<filename>xorg-x11-server-Xorg-0:1.20.14-13.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241008-07</id>
		<issued date="2024-10-08" />
		<updated date="2024-10-08" />
		<title>Множественные уязвимости glpi </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-glpi-cve-2023-46727-cve-2023-43813-cve-2023-46726/</description>
               <solution>
                    Запретить использование в ОС пакета glpi
                или
                    Установить обновление для пакета(ов) glpi
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-glpi-cve-2023-46727-cve-2023-43813-cve-2023-46726/" type="self" id="ROS-20241008-07" title="ROS-20241008-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46727" type="cve" id="CVE-2023-46727" title="CVE-2023-46727" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43813" type="cve" id="CVE-2023-43813" title="CVE-2023-43813" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46726" type="cve" id="CVE-2023-46726" title="CVE-2023-46726" />
			<reference href="https://bdu.fstec.ru/vul/2023-09029" type="self" id="BDU:2023-09029" title="BDU:2023-09029" />
			<reference href="https://bdu.fstec.ru/vul/2024-02266" type="self" id="BDU:2024-02266" title="BDU:2024-02266" />
			<reference href="https://bdu.fstec.ru/vul/2023-09030" type="self" id="BDU:2023-09030" title="BDU:2023-09030" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi" epoch="0" version="10.0.13" release="1.el7" arch="noarch" src="">
					<filename>glpi-0:10.0.13-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241008-08</id>
		<issued date="2024-10-08" />
		<updated date="2024-10-08" />
		<title>Уязвимость linux-firmware </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в linux-firmware</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-linux-firmware-cve-2023-28746/</description>
               <solution>
                    Запретить использование в ОС пакета linux-firmware
                или
                    Установить обновление для пакета(ов) linux-firmware
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-linux-firmware-cve-2023-28746/" type="self" id="ROS-20241008-08" title="ROS-20241008-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746" type="cve" id="CVE-2023-28746" title="CVE-2023-28746" />
			<reference href="https://bdu.fstec.ru/vul/2024-02258" type="self" id="BDU:2024-02258" title="BDU:2024-02258" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="linux-firmware" epoch="0" version="20240709" release="1.el7.3" arch="noarch" src="">
					<filename>linux-firmware-0:20240709-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241008-09</id>
		<issued date="2024-10-08" />
		<updated date="2024-10-08" />
		<title>Уязвимость zfs </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в zfs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zfs-cve-2023-49298/</description>
               <solution>
                    Запретить использование в ОС пакета zfs
                или
                    Установить обновление для пакета(ов) zfs
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zfs-cve-2023-49298/" type="self" id="ROS-20241008-09" title="ROS-20241008-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49298" type="cve" id="CVE-2023-49298" title="CVE-2023-49298" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zfs" epoch="0" version="2.1.14" release="1.el7" arch="x86_64" src="">
					<filename>zfs-0:2.1.14-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241008-10</id>
		<issued date="2024-10-08" />
		<updated date="2024-10-08" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-08-10-24/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-08-10-24/" type="self" id="ROS-20241008-10" title="ROS-20241008-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4244" type="cve" id="CVE-2023-4244" title="CVE-2023-4244" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3777" type="cve" id="CVE-2023-3777" title="CVE-2023-3777" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4015" type="cve" id="CVE-2023-4015" title="CVE-2023-4015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4206" type="cve" id="CVE-2023-4206" title="CVE-2023-4206" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4207" type="cve" id="CVE-2023-4207" title="CVE-2023-4207" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4208" type="cve" id="CVE-2023-4208" title="CVE-2023-4208" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4623" type="cve" id="CVE-2023-4623" title="CVE-2023-4623" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4622" type="cve" id="CVE-2023-4622" title="CVE-2023-4622" />
			<reference href="https://bdu.fstec.ru/vul/2023-05481" type="self" id="BDU:2023-05481" title="BDU:2023-05481" />
			<reference href="https://bdu.fstec.ru/vul/2023-04651" type="self" id="BDU:2023-04651" title="BDU:2023-04651" />
			<reference href="https://bdu.fstec.ru/vul/2023-04653" type="self" id="BDU:2023-04653" title="BDU:2023-04653" />
			<reference href="https://bdu.fstec.ru/vul/2023-05391" type="self" id="BDU:2023-05391" title="BDU:2023-05391" />
			<reference href="https://bdu.fstec.ru/vul/2023-05369" type="self" id="BDU:2023-05369" title="BDU:2023-05369" />
			<reference href="https://bdu.fstec.ru/vul/2023-05390" type="self" id="BDU:2023-05390" title="BDU:2023-05390" />
			<reference href="https://bdu.fstec.ru/vul/2023-05388" type="self" id="BDU:2023-05388" title="BDU:2023-05388" />
			<reference href="https://bdu.fstec.ru/vul/2023-05389" type="self" id="BDU:2023-05389" title="BDU:2023-05389" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241009-01</id>
		<issued date="2024-10-09" />
		<updated date="2024-10-09" />
		<title>Множественные уязвимости virtuoso-opensource</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в virtuoso-opensource</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-virtuoso-opensource/</description>
               <solution>
                    Запретить использование в ОС пакета virtuoso-opensource
                или
                    Установить обновление для пакета(ов) virtuoso-opensource
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-virtuoso-opensource/" type="self" id="ROS-20241009-01" title="ROS-20241009-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31620" type="cve" id="CVE-2023-31620" title="CVE-2023-31620" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31622" type="cve" id="CVE-2023-31622" title="CVE-2023-31622" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31624" type="cve" id="CVE-2023-31624" title="CVE-2023-31624" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31626" type="cve" id="CVE-2023-31626" title="CVE-2023-31626" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31627" type="cve" id="CVE-2023-31627" title="CVE-2023-31627" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31629" type="cve" id="CVE-2023-31629" title="CVE-2023-31629" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31630" type="cve" id="CVE-2023-31630" title="CVE-2023-31630" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31631" type="cve" id="CVE-2023-31631" title="CVE-2023-31631" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48947" type="cve" id="CVE-2023-48947" title="CVE-2023-48947" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31607" type="cve" id="CVE-2023-31607" title="CVE-2023-31607" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31608" type="cve" id="CVE-2023-31608" title="CVE-2023-31608" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31609" type="cve" id="CVE-2023-31609" title="CVE-2023-31609" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31610" type="cve" id="CVE-2023-31610" title="CVE-2023-31610" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31611" type="cve" id="CVE-2023-31611" title="CVE-2023-31611" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31612" type="cve" id="CVE-2023-31612" title="CVE-2023-31612" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31613" type="cve" id="CVE-2023-31613" title="CVE-2023-31613" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31614" type="cve" id="CVE-2023-31614" title="CVE-2023-31614" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31615" type="cve" id="CVE-2023-31615" title="CVE-2023-31615" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31616" type="cve" id="CVE-2023-31616" title="CVE-2023-31616" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31617" type="cve" id="CVE-2023-31617" title="CVE-2023-31617" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31618" type="cve" id="CVE-2023-31618" title="CVE-2023-31618" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31619" type="cve" id="CVE-2023-31619" title="CVE-2023-31619" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31623" type="cve" id="CVE-2023-31623" title="CVE-2023-31623" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31625" type="cve" id="CVE-2023-31625" title="CVE-2023-31625" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31628" type="cve" id="CVE-2023-31628" title="CVE-2023-31628" />
			<reference href="https://bdu.fstec.ru/vul/2024-08170" type="self" id="BDU:2024-08170" title="BDU:2024-08170" />
			<reference href="https://bdu.fstec.ru/vul/2024-08166" type="self" id="BDU:2024-08166" title="BDU:2024-08166" />
			<reference href="https://bdu.fstec.ru/vul/2024-08167" type="self" id="BDU:2024-08167" title="BDU:2024-08167" />
			<reference href="https://bdu.fstec.ru/vul/2024-08168" type="self" id="BDU:2024-08168" title="BDU:2024-08168" />
			<reference href="https://bdu.fstec.ru/vul/2024-08169" type="self" id="BDU:2024-08169" title="BDU:2024-08169" />
			<reference href="https://bdu.fstec.ru/vul/2024-08171" type="self" id="BDU:2024-08171" title="BDU:2024-08171" />
			<reference href="https://bdu.fstec.ru/vul/2024-08172" type="self" id="BDU:2024-08172" title="BDU:2024-08172" />
			<reference href="https://bdu.fstec.ru/vul/2024-08175" type="self" id="BDU:2024-08175" title="BDU:2024-08175" />
			<reference href="https://bdu.fstec.ru/vul/2024-08173" type="self" id="BDU:2024-08173" title="BDU:2024-08173" />
			<reference href="https://bdu.fstec.ru/vul/2024-08174" type="self" id="BDU:2024-08174" title="BDU:2024-08174" />
			<reference href="https://bdu.fstec.ru/vul/2024-08176" type="self" id="BDU:2024-08176" title="BDU:2024-08176" />
			<reference href="https://bdu.fstec.ru/vul/2024-08177" type="self" id="BDU:2024-08177" title="BDU:2024-08177" />
			<reference href="https://bdu.fstec.ru/vul/2024-08178" type="self" id="BDU:2024-08178" title="BDU:2024-08178" />
			<reference href="https://bdu.fstec.ru/vul/2024-08196" type="self" id="BDU:2024-08196" title="BDU:2024-08196" />
			<reference href="https://bdu.fstec.ru/vul/2024-08179" type="self" id="BDU:2024-08179" title="BDU:2024-08179" />
			<reference href="https://bdu.fstec.ru/vul/2024-08180" type="self" id="BDU:2024-08180" title="BDU:2024-08180" />
			<reference href="https://bdu.fstec.ru/vul/2024-08181" type="self" id="BDU:2024-08181" title="BDU:2024-08181" />
			<reference href="https://bdu.fstec.ru/vul/2024-08182" type="self" id="BDU:2024-08182" title="BDU:2024-08182" />
			<reference href="https://bdu.fstec.ru/vul/2024-08191" type="self" id="BDU:2024-08191" title="BDU:2024-08191" />
			<reference href="https://bdu.fstec.ru/vul/2024-08192" type="self" id="BDU:2024-08192" title="BDU:2024-08192" />
			<reference href="https://bdu.fstec.ru/vul/2024-08193" type="self" id="BDU:2024-08193" title="BDU:2024-08193" />
			<reference href="https://bdu.fstec.ru/vul/2024-08194" type="self" id="BDU:2024-08194" title="BDU:2024-08194" />
			<reference href="https://bdu.fstec.ru/vul/2024-08197" type="self" id="BDU:2024-08197" title="BDU:2024-08197" />
			<reference href="https://bdu.fstec.ru/vul/2024-08195" type="self" id="BDU:2024-08195" title="BDU:2024-08195" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="virtuoso-opensource" epoch="1" version="7.2.11" release="1.el7" arch="x86_64" src="">
					<filename>virtuoso-opensource-1:7.2.11-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241009-02</id>
		<issued date="2024-10-09" />
		<updated date="2024-10-09" />
		<title>Множественные уязвимости firefox </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-cve-2024-8384-cve-2024-8381-cve-2024-8382-cve-2024-8383/</description>
               <solution>
                    Запретить использование в ОС пакета firefox
                или
                    Установить обновление для пакета(ов) firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-cve-2024-8384-cve-2024-8381-cve-2024-8382-cve-2024-8383/" type="self" id="ROS-20241009-02" title="ROS-20241009-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8384" type="cve" id="CVE-2024-8384" title="CVE-2024-8384" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8381" type="cve" id="CVE-2024-8381" title="CVE-2024-8381" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8382" type="cve" id="CVE-2024-8382" title="CVE-2024-8382" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8383" type="cve" id="CVE-2024-8383" title="CVE-2024-8383" />
			<reference href="https://bdu.fstec.ru/vul/2024-06703" type="self" id="BDU:2024-06703" title="BDU:2024-06703" />
			<reference href="https://bdu.fstec.ru/vul/2024-06699" type="self" id="BDU:2024-06699" title="BDU:2024-06699" />
			<reference href="https://bdu.fstec.ru/vul/2024-06698" type="self" id="BDU:2024-06698" title="BDU:2024-06698" />
			<reference href="https://bdu.fstec.ru/vul/2024-06700" type="self" id="BDU:2024-06700" title="BDU:2024-06700" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.15.0" release="1.el7" arch="x86_64" src="">
					<filename>firefox-0:115.15.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241009-03</id>
		<issued date="2024-10-09" />
		<updated date="2024-10-09" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-09-10-24/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-09-10-24/" type="self" id="ROS-20241009-03" title="ROS-20241009-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48848" type="cve" id="CVE-2022-48848" title="CVE-2022-48848" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46845" type="cve" id="CVE-2024-46845" title="CVE-2024-46845" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46838" type="cve" id="CVE-2024-46838" title="CVE-2024-46838" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46831" type="cve" id="CVE-2024-46831" title="CVE-2024-46831" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46800" type="cve" id="CVE-2024-46800" title="CVE-2024-46800" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46798" type="cve" id="CVE-2024-46798" title="CVE-2024-46798" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46797" type="cve" id="CVE-2024-46797" title="CVE-2024-46797" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46796" type="cve" id="CVE-2024-46796" title="CVE-2024-46796" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46795" type="cve" id="CVE-2024-46795" title="CVE-2024-46795" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46794" type="cve" id="CVE-2024-46794" title="CVE-2024-46794" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46791" type="cve" id="CVE-2024-46791" title="CVE-2024-46791" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46788" type="cve" id="CVE-2024-46788" title="CVE-2024-46788" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46785" type="cve" id="CVE-2024-46785" title="CVE-2024-46785" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46783" type="cve" id="CVE-2024-46783" title="CVE-2024-46783" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46782" type="cve" id="CVE-2024-46782" title="CVE-2024-46782" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48945" type="cve" id="CVE-2022-48945" title="CVE-2022-48945" />
			<reference href="https://bdu.fstec.ru/vul/2024-06685" type="self" id="BDU:2024-06685" title="BDU:2024-06685" />
			<reference href="https://bdu.fstec.ru/vul/2024-08299" type="self" id="BDU:2024-08299" title="BDU:2024-08299" />
			<reference href="https://bdu.fstec.ru/vul/2024-08298" type="self" id="BDU:2024-08298" title="BDU:2024-08298" />
			<reference href="https://bdu.fstec.ru/vul/2024-08186" type="self" id="BDU:2024-08186" title="BDU:2024-08186" />
			<reference href="https://bdu.fstec.ru/vul/2024-08164" type="self" id="BDU:2024-08164" title="BDU:2024-08164" />
			<reference href="https://bdu.fstec.ru/vul/2024-08189" type="self" id="BDU:2024-08189" title="BDU:2024-08189" />
			<reference href="https://bdu.fstec.ru/vul/2024-08187" type="self" id="BDU:2024-08187" title="BDU:2024-08187" />
			<reference href="https://bdu.fstec.ru/vul/2025-08020" type="self" id="BDU:2025-08020" title="BDU:2025-08020" />
			<reference href="https://bdu.fstec.ru/vul/2024-08188" type="self" id="BDU:2024-08188" title="BDU:2024-08188" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241011-01</id>
		<issued date="2024-10-11" />
		<updated date="2024-10-11" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-11-10-24-1/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-11-10-24-1/" type="self" id="ROS-20241011-01" title="ROS-20241011-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52510" type="cve" id="CVE-2023-52510" title="CVE-2023-52510" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47082" type="cve" id="CVE-2021-47082" title="CVE-2021-47082" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47083" type="cve" id="CVE-2021-47083" title="CVE-2021-47083" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47086" type="cve" id="CVE-2021-47086" title="CVE-2021-47086" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47087" type="cve" id="CVE-2021-47087" title="CVE-2021-47087" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47088" type="cve" id="CVE-2021-47088" title="CVE-2021-47088" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47089" type="cve" id="CVE-2021-47089" title="CVE-2021-47089" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47090" type="cve" id="CVE-2021-47090" title="CVE-2021-47090" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47091" type="cve" id="CVE-2021-47091" title="CVE-2021-47091" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47092" type="cve" id="CVE-2021-47092" title="CVE-2021-47092" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47093" type="cve" id="CVE-2021-47093" title="CVE-2021-47093" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47094" type="cve" id="CVE-2021-47094" title="CVE-2021-47094" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47095" type="cve" id="CVE-2021-47095" title="CVE-2021-47095" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47096" type="cve" id="CVE-2021-47096" title="CVE-2021-47096" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47097" type="cve" id="CVE-2021-47097" title="CVE-2021-47097" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47098" type="cve" id="CVE-2021-47098" title="CVE-2021-47098" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47099" type="cve" id="CVE-2021-47099" title="CVE-2021-47099" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47100" type="cve" id="CVE-2021-47100" title="CVE-2021-47100" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47101" type="cve" id="CVE-2021-47101" title="CVE-2021-47101" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47102" type="cve" id="CVE-2021-47102" title="CVE-2021-47102" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47103" type="cve" id="CVE-2021-47103" title="CVE-2021-47103" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47104" type="cve" id="CVE-2021-47104" title="CVE-2021-47104" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47105" type="cve" id="CVE-2021-47105" title="CVE-2021-47105" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47106" type="cve" id="CVE-2021-47106" title="CVE-2021-47106" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47107" type="cve" id="CVE-2021-47107" title="CVE-2021-47107" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47108" type="cve" id="CVE-2021-47108" title="CVE-2021-47108" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48629" type="cve" id="CVE-2022-48629" title="CVE-2022-48629" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52491" type="cve" id="CVE-2023-52491" title="CVE-2023-52491" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52492" type="cve" id="CVE-2023-52492" title="CVE-2023-52492" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52493" type="cve" id="CVE-2023-52493" title="CVE-2023-52493" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52494" type="cve" id="CVE-2023-52494" title="CVE-2023-52494" />
			<reference href="https://bdu.fstec.ru/vul/2024-08374" type="self" id="BDU:2024-08374" title="BDU:2024-08374" />
			<reference href="https://bdu.fstec.ru/vul/2024-08406" type="self" id="BDU:2024-08406" title="BDU:2024-08406" />
			<reference href="https://bdu.fstec.ru/vul/2024-08407" type="self" id="BDU:2024-08407" title="BDU:2024-08407" />
			<reference href="https://bdu.fstec.ru/vul/2024-08408" type="self" id="BDU:2024-08408" title="BDU:2024-08408" />
			<reference href="https://bdu.fstec.ru/vul/2024-08387" type="self" id="BDU:2024-08387" title="BDU:2024-08387" />
			<reference href="https://bdu.fstec.ru/vul/2024-08386" type="self" id="BDU:2024-08386" title="BDU:2024-08386" />
			<reference href="https://bdu.fstec.ru/vul/2024-08385" type="self" id="BDU:2024-08385" title="BDU:2024-08385" />
			<reference href="https://bdu.fstec.ru/vul/2024-08384" type="self" id="BDU:2024-08384" title="BDU:2024-08384" />
			<reference href="https://bdu.fstec.ru/vul/2024-08383" type="self" id="BDU:2024-08383" title="BDU:2024-08383" />
			<reference href="https://bdu.fstec.ru/vul/2024-08382" type="self" id="BDU:2024-08382" title="BDU:2024-08382" />
			<reference href="https://bdu.fstec.ru/vul/2024-08380" type="self" id="BDU:2024-08380" title="BDU:2024-08380" />
			<reference href="https://bdu.fstec.ru/vul/2024-08378" type="self" id="BDU:2024-08378" title="BDU:2024-08378" />
			<reference href="https://bdu.fstec.ru/vul/2024-08377" type="self" id="BDU:2024-08377" title="BDU:2024-08377" />
			<reference href="https://bdu.fstec.ru/vul/2024-08415" type="self" id="BDU:2024-08415" title="BDU:2024-08415" />
			<reference href="https://bdu.fstec.ru/vul/2024-08416" type="self" id="BDU:2024-08416" title="BDU:2024-08416" />
			<reference href="https://bdu.fstec.ru/vul/2024-08417" type="self" id="BDU:2024-08417" title="BDU:2024-08417" />
			<reference href="https://bdu.fstec.ru/vul/2024-08418" type="self" id="BDU:2024-08418" title="BDU:2024-08418" />
			<reference href="https://bdu.fstec.ru/vul/2024-08410" type="self" id="BDU:2024-08410" title="BDU:2024-08410" />
			<reference href="https://bdu.fstec.ru/vul/2024-08404" type="self" id="BDU:2024-08404" title="BDU:2024-08404" />
			<reference href="https://bdu.fstec.ru/vul/2024-08411" type="self" id="BDU:2024-08411" title="BDU:2024-08411" />
			<reference href="https://bdu.fstec.ru/vul/2024-08405" type="self" id="BDU:2024-08405" title="BDU:2024-08405" />
			<reference href="https://bdu.fstec.ru/vul/2024-08397" type="self" id="BDU:2024-08397" title="BDU:2024-08397" />
			<reference href="https://bdu.fstec.ru/vul/2024-08396" type="self" id="BDU:2024-08396" title="BDU:2024-08396" />
			<reference href="https://bdu.fstec.ru/vul/2024-08395" type="self" id="BDU:2024-08395" title="BDU:2024-08395" />
			<reference href="https://bdu.fstec.ru/vul/2024-08394" type="self" id="BDU:2024-08394" title="BDU:2024-08394" />
			<reference href="https://bdu.fstec.ru/vul/2024-08393" type="self" id="BDU:2024-08393" title="BDU:2024-08393" />
			<reference href="https://bdu.fstec.ru/vul/2024-08412" type="self" id="BDU:2024-08412" title="BDU:2024-08412" />
			<reference href="https://bdu.fstec.ru/vul/2024-08401" type="self" id="BDU:2024-08401" title="BDU:2024-08401" />
			<reference href="https://bdu.fstec.ru/vul/2024-08402" type="self" id="BDU:2024-08402" title="BDU:2024-08402" />
			<reference href="https://bdu.fstec.ru/vul/2024-08403" type="self" id="BDU:2024-08403" title="BDU:2024-08403" />
			<reference href="https://bdu.fstec.ru/vul/2024-08413" type="self" id="BDU:2024-08413" title="BDU:2024-08413" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241011-02</id>
		<issued date="2024-10-11" />
		<updated date="2024-10-11" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-11-10-24-2/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-11-10-24-2/" type="self" id="ROS-20241011-02" title="ROS-20241011-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52465" type="cve" id="CVE-2023-52465" title="CVE-2023-52465" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52466" type="cve" id="CVE-2023-52466" title="CVE-2023-52466" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52468" type="cve" id="CVE-2023-52468" title="CVE-2023-52468" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52472" type="cve" id="CVE-2023-52472" title="CVE-2023-52472" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52473" type="cve" id="CVE-2023-52473" title="CVE-2023-52473" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52487" type="cve" id="CVE-2023-52487" title="CVE-2023-52487" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52490" type="cve" id="CVE-2023-52490" title="CVE-2023-52490" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52495" type="cve" id="CVE-2023-52495" title="CVE-2023-52495" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319" type="cve" id="CVE-2023-34319" title="CVE-2023-34319" />
			<reference href="https://bdu.fstec.ru/vul/2024-01658" type="self" id="BDU:2024-01658" title="BDU:2024-01658" />
			<reference href="https://bdu.fstec.ru/vul/2024-01666" type="self" id="BDU:2024-01666" title="BDU:2024-01666" />
			<reference href="https://bdu.fstec.ru/vul/2024-01668" type="self" id="BDU:2024-01668" title="BDU:2024-01668" />
			<reference href="https://bdu.fstec.ru/vul/2024-01855" type="self" id="BDU:2024-01855" title="BDU:2024-01855" />
			<reference href="https://bdu.fstec.ru/vul/2024-01693" type="self" id="BDU:2024-01693" title="BDU:2024-01693" />
			<reference href="https://bdu.fstec.ru/vul/2024-08400" type="self" id="BDU:2024-08400" title="BDU:2024-08400" />
			<reference href="https://bdu.fstec.ru/vul/2024-08414" type="self" id="BDU:2024-08414" title="BDU:2024-08414" />
			<reference href="https://bdu.fstec.ru/vul/2024-08398" type="self" id="BDU:2024-08398" title="BDU:2024-08398" />
			<reference href="https://bdu.fstec.ru/vul/2023-04650" type="self" id="BDU:2023-04650" title="BDU:2023-04650" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241015-01</id>
		<issued date="2024-10-15" />
		<updated date="2024-10-15" />
		<title>Множественные уязвимости pandoc </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в pandoc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-pandoc-cve-2023-35936-cve-2023-38745/</description>
               <solution>
                    Запретить использование в ОС пакета pandoc
                или
                    Установить обновление для пакета(ов) pandoc
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-pandoc-cve-2023-35936-cve-2023-38745/" type="self" id="ROS-20241015-01" title="ROS-20241015-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35936" type="cve" id="CVE-2023-35936" title="CVE-2023-35936" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38745" type="cve" id="CVE-2023-38745" title="CVE-2023-38745" />
			<reference href="https://bdu.fstec.ru/vul/2024-08409" type="self" id="BDU:2024-08409" title="BDU:2024-08409" />
			<reference href="https://bdu.fstec.ru/vul/2024-08375" type="self" id="BDU:2024-08375" title="BDU:2024-08375" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pandoc" epoch="0" version="3.0.1" release="17.el7" arch="x86_64" src="">
					<filename>pandoc-0:3.0.1-17.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241015-02</id>
		<issued date="2024-10-15" />
		<updated date="2024-10-15" />
		<title>Уязвимость Xen </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в xen</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-xen-cve-2024-31142/</description>
               <solution>
                    Запретить использование в ОС пакета Xen
                или
                    Установить обновление для пакета(ов) Xen
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-xen-cve-2024-31142/" type="self" id="ROS-20241015-02" title="ROS-20241015-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31142" type="cve" id="CVE-2024-31142" title="CVE-2024-31142" />
			<reference href="https://bdu.fstec.ru/vul/2024-08388" type="self" id="BDU:2024-08388" title="BDU:2024-08388" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="xen" epoch="0" version="4.19.0" release="1.el7" arch="x86_64" src="">
					<filename>xen-0:4.19.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241015-03</id>
		<issued date="2024-10-15" />
		<updated date="2024-10-15" />
		<title>Уязвимость nomad </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nomad</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nomad-cve-2024-1329/</description>
               <solution>
                    Запретить использование в ОС пакета nomad
                или
                    Установить обновление для пакета(ов) nomad
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nomad-cve-2024-1329/" type="self" id="ROS-20241015-03" title="ROS-20241015-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1329" type="cve" id="CVE-2024-1329" title="CVE-2024-1329" />
			<reference href="https://bdu.fstec.ru/vul/2024-08392" type="self" id="BDU:2024-08392" title="BDU:2024-08392" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nomad" epoch="0" version="1.8.3" release="1.el7" arch="x86_64" src="">
					<filename>nomad-0:1.8.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241015-04</id>
		<issued date="2024-10-15" />
		<updated date="2024-10-15" />
		<title>Множественные уязвимости java-11-openjdk</title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в java-11-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-11-openjdk-15-10-24/</description>
               <solution>
                    Запретить использование в ОС пакета java-11-openjdk
                или
                    Установить обновление для пакета(ов) java-11-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-11-openjdk-15-10-24/" type="self" id="ROS-20241015-04" title="ROS-20241015-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012" type="cve" id="CVE-2024-21012" title="CVE-2024-21012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068" type="cve" id="CVE-2024-21068" title="CVE-2024-21068" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20954" type="cve" id="CVE-2024-20954" title="CVE-2024-20954" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21098" type="cve" id="CVE-2024-21098" title="CVE-2024-21098" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011" type="cve" id="CVE-2024-21011" title="CVE-2024-21011" />
			<reference href="https://bdu.fstec.ru/vul/2024-04081" type="self" id="BDU:2024-04081" title="BDU:2024-04081" />
			<reference href="https://bdu.fstec.ru/vul/2024-03835" type="self" id="BDU:2024-03835" title="BDU:2024-03835" />
			<reference href="https://bdu.fstec.ru/vul/2024-04069" type="self" id="BDU:2024-04069" title="BDU:2024-04069" />
			<reference href="https://bdu.fstec.ru/vul/2024-04838" type="self" id="BDU:2024-04838" title="BDU:2024-04838" />
			<reference href="https://bdu.fstec.ru/vul/2024-04072" type="self" id="BDU:2024-04072" title="BDU:2024-04072" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-11-openjdk" epoch="1" version="11.0.24.0.8" release="2.el7" arch="x86_64" src="">
					<filename>java-11-openjdk-1:11.0.24.0.8-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241015-17</id>
		<issued date="2024-10-15" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости java-17-openjdk</title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в java-17-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-17-openjdk-15-10-246021/</description>
               <solution>
                    Запретить использование в ОС пакета java-17-openjdk
                или
                    Установить обновление для пакета(ов) java-17-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-17-openjdk-15-10-246021/" type="self" id="ROS-20241015-17" title="ROS-20241015-17" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012" type="cve" id="CVE-2024-21012" title="CVE-2024-21012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068" type="cve" id="CVE-2024-21068" title="CVE-2024-21068" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20954" type="cve" id="CVE-2024-20954" title="CVE-2024-20954" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21098" type="cve" id="CVE-2024-21098" title="CVE-2024-21098" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011" type="cve" id="CVE-2024-21011" title="CVE-2024-21011" />
			<reference href="https://bdu.fstec.ru/vul/2024-04081" type="self" id="BDU:2024-04081" title="BDU:2024-04081" />
			<reference href="https://bdu.fstec.ru/vul/2024-03835" type="self" id="BDU:2024-03835" title="BDU:2024-03835" />
			<reference href="https://bdu.fstec.ru/vul/2024-04069" type="self" id="BDU:2024-04069" title="BDU:2024-04069" />
			<reference href="https://bdu.fstec.ru/vul/2024-04838" type="self" id="BDU:2024-04838" title="BDU:2024-04838" />
			<reference href="https://bdu.fstec.ru/vul/2024-04072" type="self" id="BDU:2024-04072" title="BDU:2024-04072" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-17-openjdk" epoch="1" version="17.0.12.0.7" release="1.el7" arch="x86_64" src="">
					<filename>java-17-openjdk-1:17.0.12.0.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241015-16</id>
		<issued date="2024-10-15" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости java-21-openjdk</title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в java-21-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-21-openjdk-15-10-246331/</description>
               <solution>
                    Запретить использование в ОС пакета java-21-openjdk
                или
                    Установить обновление для пакета(ов) java-21-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-21-openjdk-15-10-246331/" type="self" id="ROS-20241015-16" title="ROS-20241015-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012" type="cve" id="CVE-2024-21012" title="CVE-2024-21012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068" type="cve" id="CVE-2024-21068" title="CVE-2024-21068" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20954" type="cve" id="CVE-2024-20954" title="CVE-2024-20954" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21098" type="cve" id="CVE-2024-21098" title="CVE-2024-21098" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011" type="cve" id="CVE-2024-21011" title="CVE-2024-21011" />
			<reference href="https://bdu.fstec.ru/vul/2024-04081" type="self" id="BDU:2024-04081" title="BDU:2024-04081" />
			<reference href="https://bdu.fstec.ru/vul/2024-03835" type="self" id="BDU:2024-03835" title="BDU:2024-03835" />
			<reference href="https://bdu.fstec.ru/vul/2024-04069" type="self" id="BDU:2024-04069" title="BDU:2024-04069" />
			<reference href="https://bdu.fstec.ru/vul/2024-04838" type="self" id="BDU:2024-04838" title="BDU:2024-04838" />
			<reference href="https://bdu.fstec.ru/vul/2024-04072" type="self" id="BDU:2024-04072" title="BDU:2024-04072" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-21-openjdk" epoch="1" version="21.0.2.0.13" release="3.el7" arch="x86_64" src="">
					<filename>java-21-openjdk-1:21.0.2.0.13-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241015-05</id>
		<issued date="2024-10-15" />
		<updated date="2024-10-15" />
		<title>Уязвимость nano </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nano</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nano-cve-2024-5742/</description>
               <solution>
                    Запретить использование в ОС пакета nano
                или
                    Установить обновление для пакета(ов) nano
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nano-cve-2024-5742/" type="self" id="ROS-20241015-05" title="ROS-20241015-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5742" type="cve" id="CVE-2024-5742" title="CVE-2024-5742" />
			<reference href="https://bdu.fstec.ru/vul/2024-06879" type="self" id="BDU:2024-06879" title="BDU:2024-06879" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nano" epoch="0" version="8.0" release="1.el7" arch="x86_64" src="">
					<filename>nano-0:8.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241015-06</id>
		<issued date="2024-10-15" />
		<updated date="2024-10-15" />
		<title>Уязвимость openjpeg2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openjpeg2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openjpeg2-cve-2023-39328/</description>
               <solution>
                    Запретить использование в ОС пакета openjpeg2
                или
                    Установить обновление для пакета(ов) openjpeg2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openjpeg2-cve-2023-39328/" type="self" id="ROS-20241015-06" title="ROS-20241015-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39328" type="cve" id="CVE-2023-39328" title="CVE-2023-39328" />
			<reference href="https://bdu.fstec.ru/vul/2024-08389" type="self" id="BDU:2024-08389" title="BDU:2024-08389" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openjpeg2" epoch="0" version="2.4.0" release="5.el7" arch="x86_64" src="">
					<filename>openjpeg2-0:2.4.0-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241015-07</id>
		<issued date="2024-10-15" />
		<updated date="2024-10-15" />
		<title>Уязвимость vault </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в vault</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vault-cve-2023-4680/</description>
               <solution>
                    Запретить использование в ОС пакета vault
                или
                    Установить обновление для пакета(ов) vault
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vault-cve-2023-4680/" type="self" id="ROS-20241015-07" title="ROS-20241015-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4680" type="cve" id="CVE-2023-4680" title="CVE-2023-4680" />
			<reference href="https://bdu.fstec.ru/vul/2024-08718" type="self" id="BDU:2024-08718" title="BDU:2024-08718" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vault" epoch="0" version="1.17.5" release="1.el7" arch="x86_64" src="">
					<filename>vault-0:1.17.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241015-08</id>
		<issued date="2024-10-15" />
		<updated date="2024-10-15" />
		<title>Множественные уязвимости jenkins </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в jenkins</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-jenkins-cve-2024-47803-cve-2024-47804/</description>
               <solution>
                    Запретить использование в ОС пакета jenkins
                или
                    Установить обновление для пакета(ов) Jenkins
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-jenkins-cve-2024-47803-cve-2024-47804/" type="self" id="ROS-20241015-08" title="ROS-20241015-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47803" type="cve" id="CVE-2024-47803" title="CVE-2024-47803" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47804" type="cve" id="CVE-2024-47804" title="CVE-2024-47804" />
			<reference href="https://bdu.fstec.ru/vul/2024-08390" type="self" id="BDU:2024-08390" title="BDU:2024-08390" />
			<reference href="https://bdu.fstec.ru/vul/2024-08496" type="self" id="BDU:2024-08496" title="BDU:2024-08496" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jenkins" epoch="0" version="2.462.3" release="1.el7" arch="noarch" src="">
					<filename>jenkins-0:2.462.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241015-09</id>
		<issued date="2024-10-15" />
		<updated date="2024-10-15" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2023-24531/</description>
               <solution>
                    Запретить использование в ОС пакета golang
                или
                    Установить обновление для пакета(ов) golang
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2023-24531/" type="self" id="ROS-20241015-09" title="ROS-20241015-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24531" type="cve" id="CVE-2023-24531" title="CVE-2023-24531" />
			<reference href="https://bdu.fstec.ru/vul/2024-08391" type="self" id="BDU:2024-08391" title="BDU:2024-08391" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.21.6" release="1.el7" arch="x86_64" src="">
					<filename>golang-0:1.21.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241015-10</id>
		<issued date="2024-10-15" />
		<updated date="2024-10-15" />
		<title>Уязвимость nagios </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в nagios</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nagios-cve-2023-37154/</description>
               <solution>
                    Запретить использование в ОС пакета nagios
                или
                    Установить обновление для пакета(ов) nagios
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nagios-cve-2023-37154/" type="self" id="ROS-20241015-10" title="ROS-20241015-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37154" type="cve" id="CVE-2023-37154" title="CVE-2023-37154" />
			<reference href="https://bdu.fstec.ru/vul/2023-06206" type="self" id="BDU:2023-06206" title="BDU:2023-06206" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nagios" epoch="0" version="4.5.3" release="1.el7" arch="x86_64" src="">
					<filename>nagios-0:4.5.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241015-11</id>
		<issued date="2024-10-15" />
		<updated date="2024-10-15" />
		<title>Множественные уязвимости php </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в php</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-cve-2024-8927-cve-2024-8925-cve-2024-9026-cve-2024-8926/</description>
               <solution>
                    Запретить использование в ОС пакета php
                или
                    Установить обновление для пакета(ов) php
                        
                        Установка и обновление пакетов PHP до версии 8.Х на РЕД ОС производится по инструкции https://redos.red-soft.ru/base/arm/arm-other/php-8-redos-73/
                    
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-cve-2024-8927-cve-2024-8925-cve-2024-9026-cve-2024-8926/" type="self" id="ROS-20241015-11" title="ROS-20241015-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8927" type="cve" id="CVE-2024-8927" title="CVE-2024-8927" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8925" type="cve" id="CVE-2024-8925" title="CVE-2024-8925" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9026" type="cve" id="CVE-2024-9026" title="CVE-2024-9026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8926" type="cve" id="CVE-2024-8926" title="CVE-2024-8926" />
			<reference href="https://bdu.fstec.ru/vul/2024-07679" type="self" id="BDU:2024-07679" title="BDU:2024-07679" />
			<reference href="https://bdu.fstec.ru/vul/2024-07676" type="self" id="BDU:2024-07676" title="BDU:2024-07676" />
			<reference href="https://bdu.fstec.ru/vul/2024-07680" type="self" id="BDU:2024-07680" title="BDU:2024-07680" />
			<reference href="https://bdu.fstec.ru/vul/2024-07677" type="self" id="BDU:2024-07677" title="BDU:2024-07677" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php" epoch="0" version="8.3.12" release="1.el7" arch="x86_64" src="">
					<filename>php-0:8.3.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241015-12</id>
		<issued date="2024-10-15" />
		<updated date="2024-10-15" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-15-10-24/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-15-10-24/" type="self" id="ROS-20241015-12" title="ROS-20241015-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498" type="cve" id="CVE-2023-52498" title="CVE-2023-52498" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52631" type="cve" id="CVE-2023-52631" title="CVE-2023-52631" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52633" type="cve" id="CVE-2023-52633" title="CVE-2023-52633" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635" type="cve" id="CVE-2023-52635" title="CVE-2023-52635" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659" type="cve" id="CVE-2024-26659" title="CVE-2024-26659" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26660" type="cve" id="CVE-2024-26660" title="CVE-2024-26660" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663" type="cve" id="CVE-2024-26663" title="CVE-2024-26663" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26664" type="cve" id="CVE-2024-26664" title="CVE-2024-26664" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665" type="cve" id="CVE-2024-26665" title="CVE-2024-26665" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26668" type="cve" id="CVE-2024-26668" title="CVE-2024-26668" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671" type="cve" id="CVE-2024-26671" title="CVE-2024-26671" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26666" type="cve" id="CVE-2024-26666" title="CVE-2024-26666" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26673" type="cve" id="CVE-2024-26673" title="CVE-2024-26673" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675" type="cve" id="CVE-2024-26675" title="CVE-2024-26675" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26676" type="cve" id="CVE-2024-26676" title="CVE-2024-26676" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26679" type="cve" id="CVE-2024-26679" title="CVE-2024-26679" />
			<reference href="https://bdu.fstec.ru/vul/2025-04570" type="self" id="BDU:2025-04570" title="BDU:2025-04570" />
			<reference href="https://bdu.fstec.ru/vul/2024-09031" type="self" id="BDU:2024-09031" title="BDU:2024-09031" />
			<reference href="https://bdu.fstec.ru/vul/2025-15084" type="self" id="BDU:2025-15084" title="BDU:2025-15084" />
			<reference href="https://bdu.fstec.ru/vul/2025-14591" type="self" id="BDU:2025-14591" title="BDU:2025-14591" />
			<reference href="https://bdu.fstec.ru/vul/2025-15043" type="self" id="BDU:2025-15043" title="BDU:2025-15043" />
			<reference href="https://bdu.fstec.ru/vul/2025-00023" type="self" id="BDU:2025-00023" title="BDU:2025-00023" />
			<reference href="https://bdu.fstec.ru/vul/2025-15058" type="self" id="BDU:2025-15058" title="BDU:2025-15058" />
			<reference href="https://bdu.fstec.ru/vul/2025-14295" type="self" id="BDU:2025-14295" title="BDU:2025-14295" />
			<reference href="https://bdu.fstec.ru/vul/2025-10240" type="self" id="BDU:2025-10240" title="BDU:2025-10240" />
			<reference href="https://bdu.fstec.ru/vul/2025-15029" type="self" id="BDU:2025-15029" title="BDU:2025-15029" />
			<reference href="https://bdu.fstec.ru/vul/2026-03343" type="self" id="BDU:2026-03343" title="BDU:2026-03343" />
			<reference href="https://bdu.fstec.ru/vul/2025-07484" type="self" id="BDU:2025-07484" title="BDU:2025-07484" />
			<reference href="https://bdu.fstec.ru/vul/2025-03617" type="self" id="BDU:2025-03617" title="BDU:2025-03617" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241015-13</id>
		<issued date="2024-10-15" />
		<updated date="2024-10-15" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-15-10-24-2/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-15-10-24-2/" type="self" id="ROS-20241015-13" title="ROS-20241015-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26652" type="cve" id="CVE-2024-26652" title="CVE-2024-26652" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52636" type="cve" id="CVE-2023-52636" title="CVE-2023-52636" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26666" type="cve" id="CVE-2024-26666" title="CVE-2024-26666" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26667" type="cve" id="CVE-2024-26667" title="CVE-2024-26667" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26674" type="cve" id="CVE-2024-26674" title="CVE-2024-26674" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26678" type="cve" id="CVE-2024-26678" title="CVE-2024-26678" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26681" type="cve" id="CVE-2024-26681" title="CVE-2024-26681" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26684" type="cve" id="CVE-2024-26684" title="CVE-2024-26684" />
			<reference href="https://bdu.fstec.ru/vul/2024-03758" type="self" id="BDU:2024-03758" title="BDU:2024-03758" />
			<reference href="https://bdu.fstec.ru/vul/2025-14289" type="self" id="BDU:2025-14289" title="BDU:2025-14289" />
			<reference href="https://bdu.fstec.ru/vul/2025-07484" type="self" id="BDU:2025-07484" title="BDU:2025-07484" />
			<reference href="https://bdu.fstec.ru/vul/2025-15086" type="self" id="BDU:2025-15086" title="BDU:2025-15086" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241016-01</id>
		<issued date="2024-10-16" />
		<updated date="2024-10-16" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-16-10-24-1/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-16-10-24-1/" type="self" id="ROS-20241016-01" title="ROS-20241016-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46736" type="cve" id="CVE-2024-46736" title="CVE-2024-46736" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46737" type="cve" id="CVE-2024-46737" title="CVE-2024-46737" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26690" type="cve" id="CVE-2024-26690" title="CVE-2024-26690" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26692" type="cve" id="CVE-2024-26692" title="CVE-2024-26692" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26693" type="cve" id="CVE-2024-26693" title="CVE-2024-26693" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26694" type="cve" id="CVE-2024-26694" title="CVE-2024-26694" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26703" type="cve" id="CVE-2024-26703" title="CVE-2024-26703" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26705" type="cve" id="CVE-2024-26705" title="CVE-2024-26705" />
			<reference href="https://bdu.fstec.ru/vul/2026-03544" type="self" id="BDU:2026-03544" title="BDU:2026-03544" />
			<reference href="https://bdu.fstec.ru/vul/2025-03689" type="self" id="BDU:2025-03689" title="BDU:2025-03689" />
			<reference href="https://bdu.fstec.ru/vul/2025-04413" type="self" id="BDU:2025-04413" title="BDU:2025-04413" />
			<reference href="https://bdu.fstec.ru/vul/2024-03752" type="self" id="BDU:2024-03752" title="BDU:2024-03752" />
			<reference href="https://bdu.fstec.ru/vul/2025-04409" type="self" id="BDU:2025-04409" title="BDU:2025-04409" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241016-02</id>
		<issued date="2024-10-16" />
		<updated date="2024-10-16" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-16-10-24-2/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-16-10-24-2/" type="self" id="ROS-20241016-02" title="ROS-20241016-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52637" type="cve" id="CVE-2023-52637" title="CVE-2023-52637" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52638" type="cve" id="CVE-2023-52638" title="CVE-2023-52638" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26685" type="cve" id="CVE-2024-26685" title="CVE-2024-26685" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687" type="cve" id="CVE-2024-26687" title="CVE-2024-26687" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26696" type="cve" id="CVE-2024-26696" title="CVE-2024-26696" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26697" type="cve" id="CVE-2024-26697" title="CVE-2024-26697" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26698" type="cve" id="CVE-2024-26698" title="CVE-2024-26698" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26702" type="cve" id="CVE-2024-26702" title="CVE-2024-26702" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26707" type="cve" id="CVE-2024-26707" title="CVE-2024-26707" />
			<reference href="https://bdu.fstec.ru/vul/2025-07479" type="self" id="BDU:2025-07479" title="BDU:2025-07479" />
			<reference href="https://bdu.fstec.ru/vul/2025-14290" type="self" id="BDU:2025-14290" title="BDU:2025-14290" />
			<reference href="https://bdu.fstec.ru/vul/2025-03618" type="self" id="BDU:2025-03618" title="BDU:2025-03618" />
			<reference href="https://bdu.fstec.ru/vul/2025-03932" type="self" id="BDU:2025-03932" title="BDU:2025-03932" />
			<reference href="https://bdu.fstec.ru/vul/2026-01455" type="self" id="BDU:2026-01455" title="BDU:2026-01455" />
			<reference href="https://bdu.fstec.ru/vul/2024-09450" type="self" id="BDU:2024-09450" title="BDU:2024-09450" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241017-01</id>
		<issued date="2024-10-17" />
		<updated date="2024-10-17" />
		<title>Множественные уязвимости golang </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-golang-cve-2023-24538-cve-2023-29406/</description>
               <solution>
                    Запретить использование в ОС пакета golang
                или
                    Установить обновление для пакета(ов) golang
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-golang-cve-2023-24538-cve-2023-29406/" type="self" id="ROS-20241017-01" title="ROS-20241017-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24538" type="cve" id="CVE-2023-24538" title="CVE-2023-24538" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29406" type="cve" id="CVE-2023-29406" title="CVE-2023-29406" />
			<reference href="https://bdu.fstec.ru/vul/2024-01979" type="self" id="BDU:2024-01979" title="BDU:2024-01979" />
			<reference href="https://bdu.fstec.ru/vul/2024-03155" type="self" id="BDU:2024-03155" title="BDU:2024-03155" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.19.13" release="1.el7" arch="x86_64" src="">
					<filename>golang-0:1.19.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241017-02</id>
		<issued date="2024-10-17" />
		<updated date="2024-10-17" />
		<title>Уязвимость mosquitto </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в mosquitto</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mosquitto-cve-2024-8376/</description>
               <solution>
                    Запретить использование в ОС пакета Mosquitto
                или
                    Установить обновление для пакета(ов) Mosquitto
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mosquitto-cve-2024-8376/" type="self" id="ROS-20241017-02" title="ROS-20241017-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8376" type="cve" id="CVE-2024-8376" title="CVE-2024-8376" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mosquitto" epoch="0" version="2.0.19" release="1.el7" arch="x86_64" src="">
					<filename>mosquitto-0:2.0.19-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241017-03</id>
		<issued date="2024-10-17" />
		<updated date="2024-10-17" />
		<title>Уязвимость openssh </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в openssh</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssh-cve-2020-15778/</description>
               <solution>
                    Запретить использование в ОС пакета openssh
                или
                    Установить обновление для пакета(ов) openssh
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssh-cve-2020-15778/" type="self" id="ROS-20241017-03" title="ROS-20241017-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15778" type="cve" id="CVE-2020-15778" title="CVE-2020-15778" />
			<reference href="https://bdu.fstec.ru/vul/2021-03492" type="self" id="BDU:2021-03492" title="BDU:2021-03492" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssh" epoch="0" version="8.9p1" release="5.el7" arch="x86_64" src="">
					<filename>openssh-0:8.9p1-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241017-04</id>
		<issued date="2024-10-17" />
		<updated date="2024-10-17" />
		<title>Множественные уязвимости dotnet </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dotnet</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-dotnet-cve-2024-43485-cve-2024-43484-cve-2024-43483-cve-2024-38229/</description>
               <solution>
                    Запретить использование в ОС пакета dotnet
                или
                    Установить обновление для пакета(ов) dotnet
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-dotnet-cve-2024-43485-cve-2024-43484-cve-2024-43483-cve-2024-38229/" type="self" id="ROS-20241017-04" title="ROS-20241017-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43485" type="cve" id="CVE-2024-43485" title="CVE-2024-43485" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43484" type="cve" id="CVE-2024-43484" title="CVE-2024-43484" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43483" type="cve" id="CVE-2024-43483" title="CVE-2024-43483" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38229" type="cve" id="CVE-2024-38229" title="CVE-2024-38229" />
			<reference href="https://bdu.fstec.ru/vul/2024-08707" type="self" id="BDU:2024-08707" title="BDU:2024-08707" />
			<reference href="https://bdu.fstec.ru/vul/2024-08479" type="self" id="BDU:2024-08479" title="BDU:2024-08479" />
			<reference href="https://bdu.fstec.ru/vul/2024-08478" type="self" id="BDU:2024-08478" title="BDU:2024-08478" />
			<reference href="https://bdu.fstec.ru/vul/2024-08706" type="self" id="BDU:2024-08706" title="BDU:2024-08706" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dotnet" epoch="0" version="8.0.110" release="1.el7" arch="x86_64" src="">
					<filename>dotnet-0:8.0.110-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241017-05</id>
		<issued date="2024-10-17" />
		<updated date="2024-10-17" />
		<title>Множественные уязвимости redis </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в redis</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-redis-cve-2024-31228-cve-2024-31449-cve-2024-31227/</description>
               <solution>
                    Запретить использование в ОС пакета Redis
                или
                    Установить обновление для пакета(ов) Redis
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-redis-cve-2024-31228-cve-2024-31449-cve-2024-31227/" type="self" id="ROS-20241017-05" title="ROS-20241017-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31228" type="cve" id="CVE-2024-31228" title="CVE-2024-31228" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31449" type="cve" id="CVE-2024-31449" title="CVE-2024-31449" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31227" type="cve" id="CVE-2024-31227" title="CVE-2024-31227" />
			<reference href="https://bdu.fstec.ru/vul/2024-07792" type="self" id="BDU:2024-07792" title="BDU:2024-07792" />
			<reference href="https://bdu.fstec.ru/vul/2024-09249" type="self" id="BDU:2024-09249" title="BDU:2024-09249" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="redis" epoch="0" version="7.2.6" release="1.el7" arch="x86_64" src="">
					<filename>redis-0:7.2.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241017-06</id>
		<issued date="2024-10-17" />
		<updated date="2024-10-17" />
		<title>Уязвимость edk2-tools </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в edk2-tools</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-edk2-tools-cve-2024-38796/</description>
               <solution>
                    Запретить использование в ОС пакета EDK2
                или
                    Установить обновление для пакета(ов) EDK2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-edk2-tools-cve-2024-38796/" type="self" id="ROS-20241017-06" title="ROS-20241017-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38796" type="cve" id="CVE-2024-38796" title="CVE-2024-38796" />
			<reference href="https://bdu.fstec.ru/vul/2025-11856" type="self" id="BDU:2025-11856" title="BDU:2025-11856" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="edk2-tools" epoch="0" version="20240524" release="2.el7" arch="x86_64" src="">
					<filename>edk2-tools-0:20240524-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241017-07</id>
		<issued date="2024-10-17" />
		<updated date="2024-10-17" />
		<title>Уязвимость apr </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в apr</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apr-cve-2023-49582/</description>
               <solution>
                    Запретить использование в ОС пакета apr
                или
                    Установить обновление для пакета(ов) apr
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apr-cve-2023-49582/" type="self" id="ROS-20241017-07" title="ROS-20241017-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49582" type="cve" id="CVE-2023-49582" title="CVE-2023-49582" />
			<reference href="https://bdu.fstec.ru/vul/2025-07709" type="self" id="BDU:2025-07709" title="BDU:2025-07709" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="apr" epoch="0" version="1.7.5" release="1.el7" arch="x86_64" src="">
					<filename>apr-0:1.7.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241017-08</id>
		<issued date="2024-10-17" />
		<updated date="2024-10-17" />
		<title>Уязвимость python3 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2024-7592/</description>
               <solution>
                    Запретить использование в ОС пакета python3
                или
                    Установить обновление для пакета(ов) python3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2024-7592/" type="self" id="ROS-20241017-08" title="ROS-20241017-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7592" type="cve" id="CVE-2024-7592" title="CVE-2024-7592" />
			<reference href="https://bdu.fstec.ru/vul/2024-08618" type="self" id="BDU:2024-08618" title="BDU:2024-08618" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3" epoch="0" version="3.8.20" release="1.el7" arch="x86_64" src="">
					<filename>python3-0:3.8.20-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241017-18</id>
		<issued date="2024-10-17" />
		<updated date="2024-12-23" />
		<title>Уязвимость python3.12 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3.12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2024-75925003/</description>
               <solution>
                    Запретить использование в ОС пакета python3.12
                или
                    Установить обновление для пакета(ов) python3.12
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2024-75925003/" type="self" id="ROS-20241017-18" title="ROS-20241017-18" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7592" type="cve" id="CVE-2024-7592" title="CVE-2024-7592" />
			<reference href="https://bdu.fstec.ru/vul/2024-08618" type="self" id="BDU:2024-08618" title="BDU:2024-08618" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.12" epoch="0" version="3.12.6" release="1.el7" arch="x86_64" src="">
					<filename>python3.12-0:3.12.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241017-09</id>
		<issued date="2024-10-18" />
		<updated date="2024-10-18" />
		<title>Множественные уязвимости vim </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в vim-X11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim-cve-2024-45306-cve-2024-43790-cve-2024-43374-cve-2024-43802/</description>
               <solution>
                    Запретить использование в ОС пакета vim
                или
                    Установить обновление для пакета(ов) vim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim-cve-2024-45306-cve-2024-43790-cve-2024-43374-cve-2024-43802/" type="self" id="ROS-20241017-09" title="ROS-20241017-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45306" type="cve" id="CVE-2024-45306" title="CVE-2024-45306" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43790" type="cve" id="CVE-2024-43790" title="CVE-2024-43790" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43374" type="cve" id="CVE-2024-43374" title="CVE-2024-43374" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43802" type="cve" id="CVE-2024-43802" title="CVE-2024-43802" />
			<reference href="https://bdu.fstec.ru/vul/2024-07095" type="self" id="BDU:2024-07095" title="BDU:2024-07095" />
			<reference href="https://bdu.fstec.ru/vul/2024-07097" type="self" id="BDU:2024-07097" title="BDU:2024-07097" />
			<reference href="https://bdu.fstec.ru/vul/2025-11469" type="self" id="BDU:2025-11469" title="BDU:2025-11469" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-X11" epoch="2" version="9.1.774" release="1.el7" arch="x86_64" src="">
					<filename>vim-X11-2:9.1.774-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241017-10</id>
		<issued date="2024-10-18" />
		<updated date="2024-10-18" />
		<title>Уязвимость dovecot </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в dovecot</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dovecot-cve-2024-23184/</description>
               <solution>
                    Запретить использование в ОС пакета dovecot
                или
                    Установить обновление для пакета(ов) dovecot
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dovecot-cve-2024-23184/" type="self" id="ROS-20241017-10" title="ROS-20241017-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23184" type="cve" id="CVE-2024-23184" title="CVE-2024-23184" />
			<reference href="https://bdu.fstec.ru/vul/2024-06559" type="self" id="BDU:2024-06559" title="BDU:2024-06559" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dovecot" epoch="1" version="2.3.21.1" release="1.el7" arch="x86_64" src="">
					<filename>dovecot-1:2.3.21.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241017-11</id>
		<issued date="2024-10-18" />
		<updated date="2024-10-18" />
		<title>Множественные уязвимости java-1.8.0-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в java-1.8.0-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-1-8-0-openjdk-cve-2024-21138-cve-2024-21131/</description>
               <solution>
                    Запретить использование в ОС пакета java-1.8.0-openjdk
                или
                    Установить обновление для пакета(ов) java-1.8.0-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-1-8-0-openjdk-cve-2024-21138-cve-2024-21131/" type="self" id="ROS-20241017-11" title="ROS-20241017-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138" type="cve" id="CVE-2024-21138" title="CVE-2024-21138" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131" type="cve" id="CVE-2024-21131" title="CVE-2024-21131" />
			<reference href="https://bdu.fstec.ru/vul/2024-06288" type="self" id="BDU:2024-06288" title="BDU:2024-06288" />
			<reference href="https://bdu.fstec.ru/vul/2024-05610" type="self" id="BDU:2024-05610" title="BDU:2024-05610" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-1.8.0-openjdk" epoch="1" version="1.8.0.422.b06" release="2.el7" arch="x86_64" src="">
					<filename>java-1.8.0-openjdk-1:1.8.0.422.b06-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241017-16</id>
		<issued date="2024-10-18" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости java-11-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в java-11-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-11-openjdk-cve-2024-21138-cve-2024-211314785/</description>
               <solution>
                    Запретить использование в ОС пакета java-11-openjdk
                или
                    Установить обновление для пакета(ов) java-11-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-11-openjdk-cve-2024-21138-cve-2024-211314785/" type="self" id="ROS-20241017-16" title="ROS-20241017-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138" type="cve" id="CVE-2024-21138" title="CVE-2024-21138" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131" type="cve" id="CVE-2024-21131" title="CVE-2024-21131" />
			<reference href="https://bdu.fstec.ru/vul/2024-06288" type="self" id="BDU:2024-06288" title="BDU:2024-06288" />
			<reference href="https://bdu.fstec.ru/vul/2024-05610" type="self" id="BDU:2024-05610" title="BDU:2024-05610" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-11-openjdk" epoch="1" version="11.0.24.0.8" release="2.el7" arch="x86_64" src="">
					<filename>java-11-openjdk-1:11.0.24.0.8-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241017-15</id>
		<issued date="2024-10-18" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости java-17-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в java-17-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-17-openjdk-cve-2024-21138-cve-2024-2113147852176/</description>
               <solution>
                    Запретить использование в ОС пакета java-17-openjdk
                или
                    Установить обновление для пакета(ов) java-17-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-17-openjdk-cve-2024-21138-cve-2024-2113147852176/" type="self" id="ROS-20241017-15" title="ROS-20241017-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138" type="cve" id="CVE-2024-21138" title="CVE-2024-21138" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131" type="cve" id="CVE-2024-21131" title="CVE-2024-21131" />
			<reference href="https://bdu.fstec.ru/vul/2024-06288" type="self" id="BDU:2024-06288" title="BDU:2024-06288" />
			<reference href="https://bdu.fstec.ru/vul/2024-05610" type="self" id="BDU:2024-05610" title="BDU:2024-05610" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-17-openjdk" epoch="1" version="17.0.12.0.7" release="1.el7" arch="x86_64" src="">
					<filename>java-17-openjdk-1:17.0.12.0.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241017-14</id>
		<issued date="2024-10-18" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости java-21-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в java-21-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-21-openjdk-cve-2024-21138-cve-2024-2113147855601/</description>
               <solution>
                    Запретить использование в ОС пакета java-21-openjdk
                или
                    Установить обновление для пакета(ов) java-21-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-21-openjdk-cve-2024-21138-cve-2024-2113147855601/" type="self" id="ROS-20241017-14" title="ROS-20241017-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138" type="cve" id="CVE-2024-21138" title="CVE-2024-21138" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131" type="cve" id="CVE-2024-21131" title="CVE-2024-21131" />
			<reference href="https://bdu.fstec.ru/vul/2024-06288" type="self" id="BDU:2024-06288" title="BDU:2024-06288" />
			<reference href="https://bdu.fstec.ru/vul/2024-05610" type="self" id="BDU:2024-05610" title="BDU:2024-05610" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-21-openjdk" epoch="1" version="21.0.2.0.13" release="3.el7" arch="x86_64" src="">
					<filename>java-21-openjdk-1:21.0.2.0.13-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241021-01</id>
		<issued date="2024-10-22" />
		<updated date="2024-10-22" />
		<title>Множественные уязвимости rubygem-rexml </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в rubygem-rexml</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rubygem-rexml-cve-2024-35176-cve-2024-39908/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-rexml
                или
                    Установить обновление для пакета(ов) rubygem-rexml
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rubygem-rexml-cve-2024-35176-cve-2024-39908/" type="self" id="ROS-20241021-01" title="ROS-20241021-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35176" type="cve" id="CVE-2024-35176" title="CVE-2024-35176" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39908" type="cve" id="CVE-2024-39908" title="CVE-2024-39908" />
			<reference href="https://bdu.fstec.ru/vul/2024-08622" type="self" id="BDU:2024-08622" title="BDU:2024-08622" />
			<reference href="https://bdu.fstec.ru/vul/2024-08621" type="self" id="BDU:2024-08621" title="BDU:2024-08621" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-rexml" epoch="0" version="3.3.6" release="1.el7" arch="noarch" src="">
					<filename>rubygem-rexml-0:3.3.6-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241021-02</id>
		<issued date="2024-10-22" />
		<updated date="2024-10-22" />
		<title>Множественные уязвимости libgsf </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libgsf</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libgsf-cve-2024-42415-cve-2024-36474/</description>
               <solution>
                    Запретить использование в ОС пакета libgsf
                или
                    Установить обновление для пакета(ов) libgsf
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libgsf-cve-2024-42415-cve-2024-36474/" type="self" id="ROS-20241021-02" title="ROS-20241021-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42415" type="cve" id="CVE-2024-42415" title="CVE-2024-42415" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36474" type="cve" id="CVE-2024-36474" title="CVE-2024-36474" />
			<reference href="https://bdu.fstec.ru/vul/2024-08625" type="self" id="BDU:2024-08625" title="BDU:2024-08625" />
			<reference href="https://bdu.fstec.ru/vul/2024-08615" type="self" id="BDU:2024-08615" title="BDU:2024-08615" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libgsf" epoch="0" version="1.14.47" release="3.el7" arch="x86_64" src="">
					<filename>libgsf-0:1.14.47-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241021-03</id>
		<issued date="2024-10-22" />
		<updated date="2024-10-22" />
		<title>Уязвимость binutils </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в binutils</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-binutils-cve-2020-35342/</description>
               <solution>
                    Запретить использование в ОС пакета binutils
                или
                    Установить обновление для пакета(ов) binutils
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-binutils-cve-2020-35342/" type="self" id="ROS-20241021-03" title="ROS-20241021-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35342" type="cve" id="CVE-2020-35342" title="CVE-2020-35342" />
			<reference href="https://bdu.fstec.ru/vul/2023-07819" type="self" id="BDU:2023-07819" title="BDU:2023-07819" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="binutils" epoch="0" version="2.35" release="3.el7" arch="x86_64" src="">
					<filename>binutils-0:2.35-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241021-04</id>
		<issued date="2024-10-22" />
		<updated date="2024-10-22" />
		<title>Уязвимость dovecot </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dovecot</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dovecot-cve-2024-23185/</description>
               <solution>
                    Запретить использование в ОС пакета dovecot
                или
                    Установить обновление для пакета(ов) dovecot
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dovecot-cve-2024-23185/" type="self" id="ROS-20241021-04" title="ROS-20241021-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23185" type="cve" id="CVE-2024-23185" title="CVE-2024-23185" />
			<reference href="https://bdu.fstec.ru/vul/2024-08624" type="self" id="BDU:2024-08624" title="BDU:2024-08624" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dovecot" epoch="1" version="2.3.21.1" release="1.el7" arch="x86_64" src="">
					<filename>dovecot-1:2.3.21.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241021-05</id>
		<issued date="2024-10-22" />
		<updated date="2024-10-22" />
		<title>Уязвимость python3-sentry-sdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-sentry-sdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-sentry-sdk-cve-2023-28117/</description>
               <solution>
                    Запретить использование в ОС пакета python3-sentry-sdk
                или
                    Установить обновление для пакета(ов) python3-sentry-sdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-sentry-sdk-cve-2023-28117/" type="self" id="ROS-20241021-05" title="ROS-20241021-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28117" type="cve" id="CVE-2023-28117" title="CVE-2023-28117" />
			<reference href="https://bdu.fstec.ru/vul/2024-08616" type="self" id="BDU:2024-08616" title="BDU:2024-08616" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-sentry-sdk" epoch="0" version="1.14.0" release="1.el7" arch="noarch" src="">
					<filename>python3-sentry-sdk-0:1.14.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241021-06</id>
		<issued date="2024-10-22" />
		<updated date="2024-10-22" />
		<title>Уязвимость python3-starlette </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-starlette</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-starlette-cve-2023-29159/</description>
               <solution>
                    Запретить использование в ОС пакета python3-starlette
                или
                    Установить обновление для пакета(ов) python3-starlette
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-starlette-cve-2023-29159/" type="self" id="ROS-20241021-06" title="ROS-20241021-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29159" type="cve" id="CVE-2023-29159" title="CVE-2023-29159" />
			<reference href="https://bdu.fstec.ru/vul/2024-08620" type="self" id="BDU:2024-08620" title="BDU:2024-08620" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-starlette" epoch="0" version="0.23.0" release="2.el7" arch="noarch" src="">
					<filename>python3-starlette-0:0.23.0-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241021-07</id>
		<issued date="2024-10-22" />
		<updated date="2024-10-22" />
		<title>Уязвимость openssh </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в openssh</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssh-cve-2021-28041/</description>
               <solution>
                    Запретить использование в ОС пакета openssh
                или
                    Установить обновление для пакета(ов) openssh
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssh-cve-2021-28041/" type="self" id="ROS-20241021-07" title="ROS-20241021-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28041" type="cve" id="CVE-2021-28041" title="CVE-2021-28041" />
			<reference href="https://bdu.fstec.ru/vul/2021-01836" type="self" id="BDU:2021-01836" title="BDU:2021-01836" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssh" epoch="0" version="8.9p1" release="5.el7" arch="x86_64" src="">
					<filename>openssh-0:8.9p1-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241021-08</id>
		<issued date="2024-10-22" />
		<updated date="2024-10-22" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-21-10-24-1/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-21-10-24-1/" type="self" id="ROS-20241021-08" title="ROS-20241021-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26708" type="cve" id="CVE-2024-26708" title="CVE-2024-26708" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26710" type="cve" id="CVE-2024-26710" title="CVE-2024-26710" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26711" type="cve" id="CVE-2024-26711" title="CVE-2024-26711" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26712" type="cve" id="CVE-2024-26712" title="CVE-2024-26712" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26716" type="cve" id="CVE-2024-26716" title="CVE-2024-26716" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26723" type="cve" id="CVE-2024-26723" title="CVE-2024-26723" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26731" type="cve" id="CVE-2024-26731" title="CVE-2024-26731" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26734" type="cve" id="CVE-2024-26734" title="CVE-2024-26734" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26738" type="cve" id="CVE-2024-26738" title="CVE-2024-26738" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26730" type="cve" id="CVE-2024-26730" title="CVE-2024-26730" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26741" type="cve" id="CVE-2024-26741" title="CVE-2024-26741" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26742" type="cve" id="CVE-2024-26742" title="CVE-2024-26742" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26753" type="cve" id="CVE-2024-26753" title="CVE-2024-26753" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26760" type="cve" id="CVE-2024-26760" title="CVE-2024-26760" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26761" type="cve" id="CVE-2024-26761" title="CVE-2024-26761" />
			<reference href="https://bdu.fstec.ru/vul/2024-08647" type="self" id="BDU:2024-08647" title="BDU:2024-08647" />
			<reference href="https://bdu.fstec.ru/vul/2024-08646" type="self" id="BDU:2024-08646" title="BDU:2024-08646" />
			<reference href="https://bdu.fstec.ru/vul/2024-08645" type="self" id="BDU:2024-08645" title="BDU:2024-08645" />
			<reference href="https://bdu.fstec.ru/vul/2024-08642" type="self" id="BDU:2024-08642" title="BDU:2024-08642" />
			<reference href="https://bdu.fstec.ru/vul/2024-03707" type="self" id="BDU:2024-03707" title="BDU:2024-03707" />
			<reference href="https://bdu.fstec.ru/vul/2024-06901" type="self" id="BDU:2024-06901" title="BDU:2024-06901" />
			<reference href="https://bdu.fstec.ru/vul/2024-03676" type="self" id="BDU:2024-03676" title="BDU:2024-03676" />
			<reference href="https://bdu.fstec.ru/vul/2024-03677" type="self" id="BDU:2024-03677" title="BDU:2024-03677" />
			<reference href="https://bdu.fstec.ru/vul/2024-08641" type="self" id="BDU:2024-08641" title="BDU:2024-08641" />
			<reference href="https://bdu.fstec.ru/vul/2024-08639" type="self" id="BDU:2024-08639" title="BDU:2024-08639" />
			<reference href="https://bdu.fstec.ru/vul/2024-08637" type="self" id="BDU:2024-08637" title="BDU:2024-08637" />
			<reference href="https://bdu.fstec.ru/vul/2024-08636" type="self" id="BDU:2024-08636" title="BDU:2024-08636" />
			<reference href="https://bdu.fstec.ru/vul/2024-08633" type="self" id="BDU:2024-08633" title="BDU:2024-08633" />
			<reference href="https://bdu.fstec.ru/vul/2024-08630" type="self" id="BDU:2024-08630" title="BDU:2024-08630" />
			<reference href="https://bdu.fstec.ru/vul/2024-08626" type="self" id="BDU:2024-08626" title="BDU:2024-08626" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241021-09</id>
		<issued date="2024-10-22" />
		<updated date="2024-10-22" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-21-10-24-2/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-21-10-24-2/" type="self" id="ROS-20241021-09" title="ROS-20241021-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26720" type="cve" id="CVE-2024-26720" title="CVE-2024-26720" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26722" type="cve" id="CVE-2024-26722" title="CVE-2024-26722" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26727" type="cve" id="CVE-2024-26727" title="CVE-2024-26727" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52640" type="cve" id="CVE-2023-52640" title="CVE-2023-52640" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52641" type="cve" id="CVE-2023-52641" title="CVE-2023-52641" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733" type="cve" id="CVE-2024-26733" title="CVE-2024-26733" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26736" type="cve" id="CVE-2024-26736" title="CVE-2024-26736" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26737" type="cve" id="CVE-2024-26737" title="CVE-2024-26737" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743" type="cve" id="CVE-2024-26743" title="CVE-2024-26743" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744" type="cve" id="CVE-2024-26744" title="CVE-2024-26744" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747" type="cve" id="CVE-2024-26747" title="CVE-2024-26747" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26751" type="cve" id="CVE-2024-26751" title="CVE-2024-26751" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26752" type="cve" id="CVE-2024-26752" title="CVE-2024-26752" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763" type="cve" id="CVE-2024-26763" title="CVE-2024-26763" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26742" type="cve" id="CVE-2024-26742" title="CVE-2024-26742" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764" type="cve" id="CVE-2024-26764" title="CVE-2024-26764" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766" type="cve" id="CVE-2024-26766" title="CVE-2024-26766" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26769" type="cve" id="CVE-2024-26769" title="CVE-2024-26769" />
			<reference href="https://bdu.fstec.ru/vul/2024-08680" type="self" id="BDU:2024-08680" title="BDU:2024-08680" />
			<reference href="https://bdu.fstec.ru/vul/2024-08677" type="self" id="BDU:2024-08677" title="BDU:2024-08677" />
			<reference href="https://bdu.fstec.ru/vul/2024-08676" type="self" id="BDU:2024-08676" title="BDU:2024-08676" />
			<reference href="https://bdu.fstec.ru/vul/2024-08674" type="self" id="BDU:2024-08674" title="BDU:2024-08674" />
			<reference href="https://bdu.fstec.ru/vul/2024-08673" type="self" id="BDU:2024-08673" title="BDU:2024-08673" />
			<reference href="https://bdu.fstec.ru/vul/2024-08672" type="self" id="BDU:2024-08672" title="BDU:2024-08672" />
			<reference href="https://bdu.fstec.ru/vul/2024-08671" type="self" id="BDU:2024-08671" title="BDU:2024-08671" />
			<reference href="https://bdu.fstec.ru/vul/2024-08670" type="self" id="BDU:2024-08670" title="BDU:2024-08670" />
			<reference href="https://bdu.fstec.ru/vul/2024-08669" type="self" id="BDU:2024-08669" title="BDU:2024-08669" />
			<reference href="https://bdu.fstec.ru/vul/2024-08668" type="self" id="BDU:2024-08668" title="BDU:2024-08668" />
			<reference href="https://bdu.fstec.ru/vul/2024-08667" type="self" id="BDU:2024-08667" title="BDU:2024-08667" />
			<reference href="https://bdu.fstec.ru/vul/2024-08666" type="self" id="BDU:2024-08666" title="BDU:2024-08666" />
			<reference href="https://bdu.fstec.ru/vul/2024-08665" type="self" id="BDU:2024-08665" title="BDU:2024-08665" />
			<reference href="https://bdu.fstec.ru/vul/2024-08664" type="self" id="BDU:2024-08664" title="BDU:2024-08664" />
			<reference href="https://bdu.fstec.ru/vul/2024-08636" type="self" id="BDU:2024-08636" title="BDU:2024-08636" />
			<reference href="https://bdu.fstec.ru/vul/2024-08681" type="self" id="BDU:2024-08681" title="BDU:2024-08681" />
			<reference href="https://bdu.fstec.ru/vul/2024-08661" type="self" id="BDU:2024-08661" title="BDU:2024-08661" />
			<reference href="https://bdu.fstec.ru/vul/2024-08649" type="self" id="BDU:2024-08649" title="BDU:2024-08649" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241021-10</id>
		<issued date="2024-10-22" />
		<updated date="2024-10-22" />
		<title>Уязвимость c-ares </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в c-ares</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-c-ares-cve-2021-3672/</description>
               <solution>
                    Запретить использование в ОС пакета c-ares
                или
                    Установить обновление для пакета(ов) c-ares
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-c-ares-cve-2021-3672/" type="self" id="ROS-20241021-10" title="ROS-20241021-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3672" type="cve" id="CVE-2021-3672" title="CVE-2021-3672" />
			<reference href="https://bdu.fstec.ru/vul/2022-00342" type="self" id="BDU:2022-00342" title="BDU:2022-00342" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="c-ares" epoch="0" version="1.17.0" release="1.el7" arch="x86_64" src="">
					<filename>c-ares-0:1.17.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241015-15</id>
		<issued date="2024-10-23" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости php </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в php</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-cve-2024-8927-cve-2024-8925-cve-2024-9026-cve-2024-89264752/</description>
               <solution>
                    Запретить использование в ОС пакета php
                или
                    Установить обновление для пакета(ов) php
                        
                        Установка и обновление пакетов PHP до версии 8.Х на РЕД ОС производится по инструкции https://redos.red-soft.ru/base/arm/arm-other/php-8-redos-73/
                    
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-cve-2024-8927-cve-2024-8925-cve-2024-9026-cve-2024-89264752/" type="self" id="ROS-20241015-15" title="ROS-20241015-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8927" type="cve" id="CVE-2024-8927" title="CVE-2024-8927" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8925" type="cve" id="CVE-2024-8925" title="CVE-2024-8925" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9026" type="cve" id="CVE-2024-9026" title="CVE-2024-9026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8926" type="cve" id="CVE-2024-8926" title="CVE-2024-8926" />
			<reference href="https://bdu.fstec.ru/vul/2024-07679" type="self" id="BDU:2024-07679" title="BDU:2024-07679" />
			<reference href="https://bdu.fstec.ru/vul/2024-07676" type="self" id="BDU:2024-07676" title="BDU:2024-07676" />
			<reference href="https://bdu.fstec.ru/vul/2024-07680" type="self" id="BDU:2024-07680" title="BDU:2024-07680" />
			<reference href="https://bdu.fstec.ru/vul/2024-07677" type="self" id="BDU:2024-07677" title="BDU:2024-07677" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php" epoch="0" version="8.1.30" release="1.el7" arch="x86_64" src="">
					<filename>php-0:8.1.30-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241015-14</id>
		<issued date="2024-10-23" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости php </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в php</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-cve-2024-8927-cve-2024-8925-cve-2024-9026-cve-2024-89267008/</description>
               <solution>
                    Запретить использование в ОС пакета php
                или
                    Установить обновление для пакета(ов) php
                        
                        Установка и обновление пакетов PHP до версии 8.Х на РЕД ОС производится по инструкции https://redos.red-soft.ru/base/arm/arm-other/php-8-redos-73/
                    
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-cve-2024-8927-cve-2024-8925-cve-2024-9026-cve-2024-89267008/" type="self" id="ROS-20241015-14" title="ROS-20241015-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8927" type="cve" id="CVE-2024-8927" title="CVE-2024-8927" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8925" type="cve" id="CVE-2024-8925" title="CVE-2024-8925" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9026" type="cve" id="CVE-2024-9026" title="CVE-2024-9026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8926" type="cve" id="CVE-2024-8926" title="CVE-2024-8926" />
			<reference href="https://bdu.fstec.ru/vul/2024-07679" type="self" id="BDU:2024-07679" title="BDU:2024-07679" />
			<reference href="https://bdu.fstec.ru/vul/2024-07676" type="self" id="BDU:2024-07676" title="BDU:2024-07676" />
			<reference href="https://bdu.fstec.ru/vul/2024-07680" type="self" id="BDU:2024-07680" title="BDU:2024-07680" />
			<reference href="https://bdu.fstec.ru/vul/2024-07677" type="self" id="BDU:2024-07677" title="BDU:2024-07677" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php" epoch="0" version="8.2.24" release="1.el7" arch="x86_64" src="">
					<filename>php-0:8.2.24-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241023-01</id>
		<issued date="2024-10-23" />
		<updated date="2024-10-23" />
		<title>Уязвимость haproxy </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в haproxy</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-haproxy-cve-2024-49214/</description>
               <solution>
                    Запретить использование в ОС пакета HAProxy
                или
                    Установить обновление для пакета(ов) HAProxy
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-haproxy-cve-2024-49214/" type="self" id="ROS-20241023-01" title="ROS-20241023-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49214" type="cve" id="CVE-2024-49214" title="CVE-2024-49214" />
			<reference href="https://bdu.fstec.ru/vul/2024-09148" type="self" id="BDU:2024-09148" title="BDU:2024-09148" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="haproxy" epoch="0" version="3.0.5" release="1.el7" arch="x86_64" src="">
					<filename>haproxy-0:3.0.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241023-02</id>
		<issued date="2024-10-23" />
		<updated date="2024-10-23" />
		<title>Уязвимость vim </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в vim-X11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-cve-2024-47814/</description>
               <solution>
                    Запретить использование в ОС пакета Vim
                или
                    Установить обновление для пакета(ов) Vim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-cve-2024-47814/" type="self" id="ROS-20241023-02" title="ROS-20241023-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47814" type="cve" id="CVE-2024-47814" title="CVE-2024-47814" />
			<reference href="https://bdu.fstec.ru/vul/2024-08644" type="self" id="BDU:2024-08644" title="BDU:2024-08644" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-X11" epoch="2" version="9.1.774" release="1.el7" arch="x86_64" src="">
					<filename>vim-X11-2:9.1.774-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241023-03</id>
		<issued date="2024-10-23" />
		<updated date="2024-10-23" />
		<title>Уязвимость vault </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в vault</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vault-cve-2024-9180/</description>
               <solution>
                    Запретить использование в ОС пакета Vault
                или
                    Установить обновление для пакета(ов) Vault
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vault-cve-2024-9180/" type="self" id="ROS-20241023-03" title="ROS-20241023-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9180" type="cve" id="CVE-2024-9180" title="CVE-2024-9180" />
			<reference href="https://bdu.fstec.ru/vul/2024-09147" type="self" id="BDU:2024-09147" title="BDU:2024-09147" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vault" epoch="0" version="1.18.0" release="1.el7" arch="x86_64" src="">
					<filename>vault-0:1.18.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241023-04</id>
		<issued date="2024-10-23" />
		<updated date="2024-10-23" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-23-10-24-1/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-23-10-24-1/" type="self" id="ROS-20241023-04" title="ROS-20241023-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771" type="cve" id="CVE-2024-26771" title="CVE-2024-26771" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772" type="cve" id="CVE-2024-26772" title="CVE-2024-26772" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773" type="cve" id="CVE-2024-26773" title="CVE-2024-26773" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26774" type="cve" id="CVE-2024-26774" title="CVE-2024-26774" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26776" type="cve" id="CVE-2024-26776" title="CVE-2024-26776" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777" type="cve" id="CVE-2024-26777" title="CVE-2024-26777" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778" type="cve" id="CVE-2024-26778" title="CVE-2024-26778" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779" type="cve" id="CVE-2024-26779" title="CVE-2024-26779" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26750" type="cve" id="CVE-2024-26750" title="CVE-2024-26750" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26780" type="cve" id="CVE-2024-26780" title="CVE-2024-26780" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26781" type="cve" id="CVE-2024-26781" title="CVE-2024-26781" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788" type="cve" id="CVE-2024-26788" title="CVE-2024-26788" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26790" type="cve" id="CVE-2024-26790" title="CVE-2024-26790" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791" type="cve" id="CVE-2024-26791" title="CVE-2024-26791" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26795" type="cve" id="CVE-2024-26795" title="CVE-2024-26795" />
			<reference href="https://bdu.fstec.ru/vul/2024-09159" type="self" id="BDU:2024-09159" title="BDU:2024-09159" />
			<reference href="https://bdu.fstec.ru/vul/2024-09016" type="self" id="BDU:2024-09016" title="BDU:2024-09016" />
			<reference href="https://bdu.fstec.ru/vul/2024-09158" type="self" id="BDU:2024-09158" title="BDU:2024-09158" />
			<reference href="https://bdu.fstec.ru/vul/2024-09156" type="self" id="BDU:2024-09156" title="BDU:2024-09156" />
			<reference href="https://bdu.fstec.ru/vul/2024-09155" type="self" id="BDU:2024-09155" title="BDU:2024-09155" />
			<reference href="https://bdu.fstec.ru/vul/2024-09154" type="self" id="BDU:2024-09154" title="BDU:2024-09154" />
			<reference href="https://bdu.fstec.ru/vul/2024-09153" type="self" id="BDU:2024-09153" title="BDU:2024-09153" />
			<reference href="https://bdu.fstec.ru/vul/2024-09152" type="self" id="BDU:2024-09152" title="BDU:2024-09152" />
			<reference href="https://bdu.fstec.ru/vul/2024-09151" type="self" id="BDU:2024-09151" title="BDU:2024-09151" />
			<reference href="https://bdu.fstec.ru/vul/2024-09150" type="self" id="BDU:2024-09150" title="BDU:2024-09150" />
			<reference href="https://bdu.fstec.ru/vul/2024-09217" type="self" id="BDU:2024-09217" title="BDU:2024-09217" />
			<reference href="https://bdu.fstec.ru/vul/2024-09134" type="self" id="BDU:2024-09134" title="BDU:2024-09134" />
			<reference href="https://bdu.fstec.ru/vul/2024-09132" type="self" id="BDU:2024-09132" title="BDU:2024-09132" />
			<reference href="https://bdu.fstec.ru/vul/2024-09130" type="self" id="BDU:2024-09130" title="BDU:2024-09130" />
			<reference href="https://bdu.fstec.ru/vul/2024-09149" type="self" id="BDU:2024-09149" title="BDU:2024-09149" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241023-05</id>
		<issued date="2024-10-23" />
		<updated date="2024-10-23" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-23-10-24-2/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-23-10-24-2/" type="self" id="ROS-20241023-05" title="ROS-20241023-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26745" type="cve" id="CVE-2024-26745" title="CVE-2024-26745" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26786" type="cve" id="CVE-2024-26786" title="CVE-2024-26786" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26789" type="cve" id="CVE-2024-26789" title="CVE-2024-26789" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26794" type="cve" id="CVE-2024-26794" title="CVE-2024-26794" />
			<reference href="https://bdu.fstec.ru/vul/2024-09190" type="self" id="BDU:2024-09190" title="BDU:2024-09190" />
			<reference href="https://bdu.fstec.ru/vul/2024-09216" type="self" id="BDU:2024-09216" title="BDU:2024-09216" />
			<reference href="https://bdu.fstec.ru/vul/2024-09133" type="self" id="BDU:2024-09133" title="BDU:2024-09133" />
			<reference href="https://bdu.fstec.ru/vul/2024-09131" type="self" id="BDU:2024-09131" title="BDU:2024-09131" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241024-01</id>
		<issued date="2024-10-25" />
		<updated date="2024-10-25" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2024-24791/</description>
               <solution>
                    Запретить использование в ОС пакета golang
                или
                    Установить обновление для пакета(ов) golang
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2024-24791/" type="self" id="ROS-20241024-01" title="ROS-20241024-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24791" type="cve" id="CVE-2024-24791" title="CVE-2024-24791" />
			<reference href="https://bdu.fstec.ru/vul/2024-06680" type="self" id="BDU:2024-06680" title="BDU:2024-06680" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.22.5" release="1.el7" arch="x86_64" src="">
					<filename>golang-0:1.22.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241024-02</id>
		<issued date="2024-10-25" />
		<updated date="2024-10-25" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-24-10-24-1/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-24-10-24-1/" type="self" id="ROS-20241024-02" title="ROS-20241024-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787" type="cve" id="CVE-2024-26787" title="CVE-2024-26787" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26798" type="cve" id="CVE-2024-26798" title="CVE-2024-26798" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26802" type="cve" id="CVE-2024-26802" title="CVE-2024-26802" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26803" type="cve" id="CVE-2024-26803" title="CVE-2024-26803" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804" type="cve" id="CVE-2024-26804" title="CVE-2024-26804" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805" type="cve" id="CVE-2024-26805" title="CVE-2024-26805" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26808" type="cve" id="CVE-2024-26808" title="CVE-2024-26808" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809" type="cve" id="CVE-2024-26809" title="CVE-2024-26809" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26810" type="cve" id="CVE-2024-26810" title="CVE-2024-26810" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812" type="cve" id="CVE-2024-26812" title="CVE-2024-26812" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813" type="cve" id="CVE-2024-26813" title="CVE-2024-26813" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814" type="cve" id="CVE-2024-26814" title="CVE-2024-26814" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437" type="cve" id="CVE-2024-27437" title="CVE-2024-27437" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47181" type="cve" id="CVE-2021-47181" title="CVE-2021-47181" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47182" type="cve" id="CVE-2021-47182" title="CVE-2021-47182" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47183" type="cve" id="CVE-2021-47183" title="CVE-2021-47183" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47184" type="cve" id="CVE-2021-47184" title="CVE-2021-47184" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47185" type="cve" id="CVE-2021-47185" title="CVE-2021-47185" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47186" type="cve" id="CVE-2021-47186" title="CVE-2021-47186" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47187" type="cve" id="CVE-2021-47187" title="CVE-2021-47187" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47188" type="cve" id="CVE-2021-47188" title="CVE-2021-47188" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47189" type="cve" id="CVE-2021-47189" title="CVE-2021-47189" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47190" type="cve" id="CVE-2021-47190" title="CVE-2021-47190" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47191" type="cve" id="CVE-2021-47191" title="CVE-2021-47191" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47192" type="cve" id="CVE-2021-47192" title="CVE-2021-47192" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47196" type="cve" id="CVE-2021-47196" title="CVE-2021-47196" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47197" type="cve" id="CVE-2021-47197" title="CVE-2021-47197" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47199" type="cve" id="CVE-2021-47199" title="CVE-2021-47199" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47200" type="cve" id="CVE-2021-47200" title="CVE-2021-47200" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47201" type="cve" id="CVE-2021-47201" title="CVE-2021-47201" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47202" type="cve" id="CVE-2021-47202" title="CVE-2021-47202" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47203" type="cve" id="CVE-2021-47203" title="CVE-2021-47203" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47204" type="cve" id="CVE-2021-47204" title="CVE-2021-47204" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47205" type="cve" id="CVE-2021-47205" title="CVE-2021-47205" />
			<reference href="https://bdu.fstec.ru/vul/2024-09208" type="self" id="BDU:2024-09208" title="BDU:2024-09208" />
			<reference href="https://bdu.fstec.ru/vul/2024-09194" type="self" id="BDU:2024-09194" title="BDU:2024-09194" />
			<reference href="https://bdu.fstec.ru/vul/2024-09196" type="self" id="BDU:2024-09196" title="BDU:2024-09196" />
			<reference href="https://bdu.fstec.ru/vul/2024-09198" type="self" id="BDU:2024-09198" title="BDU:2024-09198" />
			<reference href="https://bdu.fstec.ru/vul/2024-09199" type="self" id="BDU:2024-09199" title="BDU:2024-09199" />
			<reference href="https://bdu.fstec.ru/vul/2024-09201" type="self" id="BDU:2024-09201" title="BDU:2024-09201" />
			<reference href="https://bdu.fstec.ru/vul/2024-07646" type="self" id="BDU:2024-07646" title="BDU:2024-07646" />
			<reference href="https://bdu.fstec.ru/vul/2024-09207" type="self" id="BDU:2024-09207" title="BDU:2024-09207" />
			<reference href="https://bdu.fstec.ru/vul/2024-09206" type="self" id="BDU:2024-09206" title="BDU:2024-09206" />
			<reference href="https://bdu.fstec.ru/vul/2024-09205" type="self" id="BDU:2024-09205" title="BDU:2024-09205" />
			<reference href="https://bdu.fstec.ru/vul/2024-09204" type="self" id="BDU:2024-09204" title="BDU:2024-09204" />
			<reference href="https://bdu.fstec.ru/vul/2024-09203" type="self" id="BDU:2024-09203" title="BDU:2024-09203" />
			<reference href="https://bdu.fstec.ru/vul/2024-09183" type="self" id="BDU:2024-09183" title="BDU:2024-09183" />
			<reference href="https://bdu.fstec.ru/vul/2024-09209" type="self" id="BDU:2024-09209" title="BDU:2024-09209" />
			<reference href="https://bdu.fstec.ru/vul/2024-09142" type="self" id="BDU:2024-09142" title="BDU:2024-09142" />
			<reference href="https://bdu.fstec.ru/vul/2024-09141" type="self" id="BDU:2024-09141" title="BDU:2024-09141" />
			<reference href="https://bdu.fstec.ru/vul/2024-09210" type="self" id="BDU:2024-09210" title="BDU:2024-09210" />
			<reference href="https://bdu.fstec.ru/vul/2024-09211" type="self" id="BDU:2024-09211" title="BDU:2024-09211" />
			<reference href="https://bdu.fstec.ru/vul/2024-09212" type="self" id="BDU:2024-09212" title="BDU:2024-09212" />
			<reference href="https://bdu.fstec.ru/vul/2024-09213" type="self" id="BDU:2024-09213" title="BDU:2024-09213" />
			<reference href="https://bdu.fstec.ru/vul/2024-09140" type="self" id="BDU:2024-09140" title="BDU:2024-09140" />
			<reference href="https://bdu.fstec.ru/vul/2024-09214" type="self" id="BDU:2024-09214" title="BDU:2024-09214" />
			<reference href="https://bdu.fstec.ru/vul/2024-09215" type="self" id="BDU:2024-09215" title="BDU:2024-09215" />
			<reference href="https://bdu.fstec.ru/vul/2024-09218" type="self" id="BDU:2024-09218" title="BDU:2024-09218" />
			<reference href="https://bdu.fstec.ru/vul/2024-09219" type="self" id="BDU:2024-09219" title="BDU:2024-09219" />
			<reference href="https://bdu.fstec.ru/vul/2024-09220" type="self" id="BDU:2024-09220" title="BDU:2024-09220" />
			<reference href="https://bdu.fstec.ru/vul/2024-09221" type="self" id="BDU:2024-09221" title="BDU:2024-09221" />
			<reference href="https://bdu.fstec.ru/vul/2024-09139" type="self" id="BDU:2024-09139" title="BDU:2024-09139" />
			<reference href="https://bdu.fstec.ru/vul/2024-09222" type="self" id="BDU:2024-09222" title="BDU:2024-09222" />
			<reference href="https://bdu.fstec.ru/vul/2024-09223" type="self" id="BDU:2024-09223" title="BDU:2024-09223" />
			<reference href="https://bdu.fstec.ru/vul/2024-09224" type="self" id="BDU:2024-09224" title="BDU:2024-09224" />
			<reference href="https://bdu.fstec.ru/vul/2024-09225" type="self" id="BDU:2024-09225" title="BDU:2024-09225" />
			<reference href="https://bdu.fstec.ru/vul/2024-09226" type="self" id="BDU:2024-09226" title="BDU:2024-09226" />
			<reference href="https://bdu.fstec.ru/vul/2024-09227" type="self" id="BDU:2024-09227" title="BDU:2024-09227" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241024-03</id>
		<issued date="2024-10-25" />
		<updated date="2024-10-25" />
		<title>Множественные уязвимости kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-cve-2024-26746-cve-2024-26796-cve-2024-26815/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-cve-2024-26746-cve-2024-26796-cve-2024-26815/" type="self" id="ROS-20241024-03" title="ROS-20241024-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26746" type="cve" id="CVE-2024-26746" title="CVE-2024-26746" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26796" type="cve" id="CVE-2024-26796" title="CVE-2024-26796" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26815" type="cve" id="CVE-2024-26815" title="CVE-2024-26815" />
			<reference href="https://bdu.fstec.ru/vul/2024-09192" type="self" id="BDU:2024-09192" title="BDU:2024-09192" />
			<reference href="https://bdu.fstec.ru/vul/2024-09193" type="self" id="BDU:2024-09193" title="BDU:2024-09193" />
			<reference href="https://bdu.fstec.ru/vul/2024-03753" type="self" id="BDU:2024-03753" title="BDU:2024-03753" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241025-01</id>
		<issued date="2024-10-25" />
		<updated date="2024-10-25" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-25-10-24-1/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-25-10-24-1/" type="self" id="ROS-20241025-01" title="ROS-20241025-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26796" type="cve" id="CVE-2024-26796" title="CVE-2024-26796" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26818" type="cve" id="CVE-2024-26818" title="CVE-2024-26818" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26823" type="cve" id="CVE-2024-26823" title="CVE-2024-26823" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26824" type="cve" id="CVE-2024-26824" title="CVE-2024-26824" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26832" type="cve" id="CVE-2024-26832" title="CVE-2024-26832" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26847" type="cve" id="CVE-2024-26847" title="CVE-2024-26847" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26849" type="cve" id="CVE-2024-26849" title="CVE-2024-26849" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26850" type="cve" id="CVE-2024-26850" title="CVE-2024-26850" />
			<reference href="https://bdu.fstec.ru/vul/2024-09193" type="self" id="BDU:2024-09193" title="BDU:2024-09193" />
			<reference href="https://bdu.fstec.ru/vul/2024-09202" type="self" id="BDU:2024-09202" title="BDU:2024-09202" />
			<reference href="https://bdu.fstec.ru/vul/2024-09181" type="self" id="BDU:2024-09181" title="BDU:2024-09181" />
			<reference href="https://bdu.fstec.ru/vul/2024-09180" type="self" id="BDU:2024-09180" title="BDU:2024-09180" />
			<reference href="https://bdu.fstec.ru/vul/2024-09179" type="self" id="BDU:2024-09179" title="BDU:2024-09179" />
			<reference href="https://bdu.fstec.ru/vul/2024-09129" type="self" id="BDU:2024-09129" title="BDU:2024-09129" />
			<reference href="https://bdu.fstec.ru/vul/2024-09187" type="self" id="BDU:2024-09187" title="BDU:2024-09187" />
			<reference href="https://bdu.fstec.ru/vul/2024-09185" type="self" id="BDU:2024-09185" title="BDU:2024-09185" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241025-02</id>
		<issued date="2024-10-25" />
		<updated date="2024-10-25" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-25-10-24-2/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-25-10-24-2/" type="self" id="ROS-20241025-02" title="ROS-20241025-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47206" type="cve" id="CVE-2021-47206" title="CVE-2021-47206" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47207" type="cve" id="CVE-2021-47207" title="CVE-2021-47207" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47209" type="cve" id="CVE-2021-47209" title="CVE-2021-47209" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47210" type="cve" id="CVE-2021-47210" title="CVE-2021-47210" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47211" type="cve" id="CVE-2021-47211" title="CVE-2021-47211" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47212" type="cve" id="CVE-2021-47212" title="CVE-2021-47212" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47214" type="cve" id="CVE-2021-47214" title="CVE-2021-47214" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47215" type="cve" id="CVE-2021-47215" title="CVE-2021-47215" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47216" type="cve" id="CVE-2021-47216" title="CVE-2021-47216" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47217" type="cve" id="CVE-2021-47217" title="CVE-2021-47217" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47218" type="cve" id="CVE-2021-47218" title="CVE-2021-47218" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47219" type="cve" id="CVE-2021-47219" title="CVE-2021-47219" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52642" type="cve" id="CVE-2023-52642" title="CVE-2023-52642" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52643" type="cve" id="CVE-2023-52643" title="CVE-2023-52643" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26820" type="cve" id="CVE-2024-26820" title="CVE-2024-26820" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26826" type="cve" id="CVE-2024-26826" title="CVE-2024-26826" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26829" type="cve" id="CVE-2024-26829" title="CVE-2024-26829" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26831" type="cve" id="CVE-2024-26831" title="CVE-2024-26831" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26834" type="cve" id="CVE-2024-26834" title="CVE-2024-26834" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835" type="cve" id="CVE-2024-26835" title="CVE-2024-26835" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26838" type="cve" id="CVE-2024-26838" title="CVE-2024-26838" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839" type="cve" id="CVE-2024-26839" title="CVE-2024-26839" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840" type="cve" id="CVE-2024-26840" title="CVE-2024-26840" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26843" type="cve" id="CVE-2024-26843" title="CVE-2024-26843" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26845" type="cve" id="CVE-2024-26845" title="CVE-2024-26845" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846" type="cve" id="CVE-2024-26846" title="CVE-2024-26846" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644" type="cve" id="CVE-2023-52644" title="CVE-2023-52644" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851" type="cve" id="CVE-2024-26851" title="CVE-2024-26851" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852" type="cve" id="CVE-2024-26852" title="CVE-2024-26852" />
			<reference href="https://bdu.fstec.ru/vul/2024-09228" type="self" id="BDU:2024-09228" title="BDU:2024-09228" />
			<reference href="https://bdu.fstec.ru/vul/2024-09229" type="self" id="BDU:2024-09229" title="BDU:2024-09229" />
			<reference href="https://bdu.fstec.ru/vul/2024-09230" type="self" id="BDU:2024-09230" title="BDU:2024-09230" />
			<reference href="https://bdu.fstec.ru/vul/2024-09231" type="self" id="BDU:2024-09231" title="BDU:2024-09231" />
			<reference href="https://bdu.fstec.ru/vul/2024-09143" type="self" id="BDU:2024-09143" title="BDU:2024-09143" />
			<reference href="https://bdu.fstec.ru/vul/2024-09138" type="self" id="BDU:2024-09138" title="BDU:2024-09138" />
			<reference href="https://bdu.fstec.ru/vul/2024-09137" type="self" id="BDU:2024-09137" title="BDU:2024-09137" />
			<reference href="https://bdu.fstec.ru/vul/2024-09136" type="self" id="BDU:2024-09136" title="BDU:2024-09136" />
			<reference href="https://bdu.fstec.ru/vul/2024-09144" type="self" id="BDU:2024-09144" title="BDU:2024-09144" />
			<reference href="https://bdu.fstec.ru/vul/2024-09232" type="self" id="BDU:2024-09232" title="BDU:2024-09232" />
			<reference href="https://bdu.fstec.ru/vul/2024-09178" type="self" id="BDU:2024-09178" title="BDU:2024-09178" />
			<reference href="https://bdu.fstec.ru/vul/2024-09177" type="self" id="BDU:2024-09177" title="BDU:2024-09177" />
			<reference href="https://bdu.fstec.ru/vul/2024-09189" type="self" id="BDU:2024-09189" title="BDU:2024-09189" />
			<reference href="https://bdu.fstec.ru/vul/2024-09176" type="self" id="BDU:2024-09176" title="BDU:2024-09176" />
			<reference href="https://bdu.fstec.ru/vul/2024-09175" type="self" id="BDU:2024-09175" title="BDU:2024-09175" />
			<reference href="https://bdu.fstec.ru/vul/2024-09173" type="self" id="BDU:2024-09173" title="BDU:2024-09173" />
			<reference href="https://bdu.fstec.ru/vul/2024-09172" type="self" id="BDU:2024-09172" title="BDU:2024-09172" />
			<reference href="https://bdu.fstec.ru/vul/2024-09135" type="self" id="BDU:2024-09135" title="BDU:2024-09135" />
			<reference href="https://bdu.fstec.ru/vul/2024-09171" type="self" id="BDU:2024-09171" title="BDU:2024-09171" />
			<reference href="https://bdu.fstec.ru/vul/2024-09168" type="self" id="BDU:2024-09168" title="BDU:2024-09168" />
			<reference href="https://bdu.fstec.ru/vul/2024-09167" type="self" id="BDU:2024-09167" title="BDU:2024-09167" />
			<reference href="https://bdu.fstec.ru/vul/2024-09166" type="self" id="BDU:2024-09166" title="BDU:2024-09166" />
			<reference href="https://bdu.fstec.ru/vul/2024-09186" type="self" id="BDU:2024-09186" title="BDU:2024-09186" />
			<reference href="https://bdu.fstec.ru/vul/2024-09165" type="self" id="BDU:2024-09165" title="BDU:2024-09165" />
			<reference href="https://bdu.fstec.ru/vul/2024-09164" type="self" id="BDU:2024-09164" title="BDU:2024-09164" />
			<reference href="https://bdu.fstec.ru/vul/2024-09163" type="self" id="BDU:2024-09163" title="BDU:2024-09163" />
			<reference href="https://bdu.fstec.ru/vul/2024-09162" type="self" id="BDU:2024-09162" title="BDU:2024-09162" />
			<reference href="https://bdu.fstec.ru/vul/2024-09184" type="self" id="BDU:2024-09184" title="BDU:2024-09184" />
			<reference href="https://bdu.fstec.ru/vul/2024-09160" type="self" id="BDU:2024-09160" title="BDU:2024-09160" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241028-01</id>
		<issued date="2024-10-28" />
		<updated date="2024-10-28" />
		<title>Уязвимость vault </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в vault</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vault-cve-2023-3462/</description>
               <solution>
                    Запретить использование в ОС пакета Vault
                или
                    Установить обновление для пакета(ов) Vault
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vault-cve-2023-3462/" type="self" id="ROS-20241028-01" title="ROS-20241028-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3462" type="cve" id="CVE-2023-3462" title="CVE-2023-3462" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vault" epoch="0" version="1.18.0" release="1.el7" arch="x86_64" src="">
					<filename>vault-0:1.18.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241028-02</id>
		<issued date="2024-10-28" />
		<updated date="2024-10-28" />
		<title>Уязвимость nomad </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nomad</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nomad-cve-2024-24790/</description>
               <solution>
                    Запретить использование в ОС пакета nomad
                или
                    Установить обновление для пакета(ов) nomad
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nomad-cve-2024-24790/" type="self" id="ROS-20241028-02" title="ROS-20241028-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24790" type="cve" id="CVE-2024-24790" title="CVE-2024-24790" />
			<reference href="https://bdu.fstec.ru/vul/2024-04486" type="self" id="BDU:2024-04486" title="BDU:2024-04486" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nomad" epoch="0" version="1.8.3" release="1.el7" arch="x86_64" src="">
					<filename>nomad-0:1.8.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241028-03</id>
		<issued date="2024-10-28" />
		<updated date="2024-10-28" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-28-10-24-1/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-28-10-24-1/" type="self" id="ROS-20241028-03" title="ROS-20241028-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855" type="cve" id="CVE-2024-26855" title="CVE-2024-26855" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857" type="cve" id="CVE-2024-26857" title="CVE-2024-26857" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26861" type="cve" id="CVE-2024-26861" title="CVE-2024-26861" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862" type="cve" id="CVE-2024-26862" title="CVE-2024-26862" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863" type="cve" id="CVE-2024-26863" title="CVE-2024-26863" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26870" type="cve" id="CVE-2024-26870" title="CVE-2024-26870" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26872" type="cve" id="CVE-2024-26872" title="CVE-2024-26872" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874" type="cve" id="CVE-2024-26874" title="CVE-2024-26874" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26875" type="cve" id="CVE-2024-26875" title="CVE-2024-26875" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877" type="cve" id="CVE-2024-26877" title="CVE-2024-26877" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878" type="cve" id="CVE-2024-26878" title="CVE-2024-26878" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880" type="cve" id="CVE-2024-26880" title="CVE-2024-26880" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889" type="cve" id="CVE-2024-26889" title="CVE-2024-26889" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891" type="cve" id="CVE-2024-26891" title="CVE-2024-26891" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26894" type="cve" id="CVE-2024-26894" title="CVE-2024-26894" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897" type="cve" id="CVE-2024-26897" title="CVE-2024-26897" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906" type="cve" id="CVE-2024-26906" title="CVE-2024-26906" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26915" type="cve" id="CVE-2024-26915" title="CVE-2024-26915" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26916" type="cve" id="CVE-2024-26916" title="CVE-2024-26916" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26917" type="cve" id="CVE-2024-26917" title="CVE-2024-26917" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26920" type="cve" id="CVE-2024-26920" title="CVE-2024-26920" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52646" type="cve" id="CVE-2023-52646" title="CVE-2023-52646" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48631" type="cve" id="CVE-2022-48631" title="CVE-2022-48631" />
			<reference href="https://bdu.fstec.ru/vul/2025-03608" type="self" id="BDU:2025-03608" title="BDU:2025-03608" />
			<reference href="https://bdu.fstec.ru/vul/2025-04258" type="self" id="BDU:2025-04258" title="BDU:2025-04258" />
			<reference href="https://bdu.fstec.ru/vul/2025-03931" type="self" id="BDU:2025-03931" title="BDU:2025-03931" />
			<reference href="https://bdu.fstec.ru/vul/2025-03930" type="self" id="BDU:2025-03930" title="BDU:2025-03930" />
			<reference href="https://bdu.fstec.ru/vul/2025-04260" type="self" id="BDU:2025-04260" title="BDU:2025-04260" />
			<reference href="https://bdu.fstec.ru/vul/2025-03929" type="self" id="BDU:2025-03929" title="BDU:2025-03929" />
			<reference href="https://bdu.fstec.ru/vul/2025-03928" type="self" id="BDU:2025-03928" title="BDU:2025-03928" />
			<reference href="https://bdu.fstec.ru/vul/2025-03615" type="self" id="BDU:2025-03615" title="BDU:2025-03615" />
			<reference href="https://bdu.fstec.ru/vul/2025-03912" type="self" id="BDU:2025-03912" title="BDU:2025-03912" />
			<reference href="https://bdu.fstec.ru/vul/2025-03911" type="self" id="BDU:2025-03911" title="BDU:2025-03911" />
			<reference href="https://bdu.fstec.ru/vul/2025-04401" type="self" id="BDU:2025-04401" title="BDU:2025-04401" />
			<reference href="https://bdu.fstec.ru/vul/2025-02907" type="self" id="BDU:2025-02907" title="BDU:2025-02907" />
			<reference href="https://bdu.fstec.ru/vul/2025-03909" type="self" id="BDU:2025-03909" title="BDU:2025-03909" />
			<reference href="https://bdu.fstec.ru/vul/2025-03613" type="self" id="BDU:2025-03613" title="BDU:2025-03613" />
			<reference href="https://bdu.fstec.ru/vul/2026-01440" type="self" id="BDU:2026-01440" title="BDU:2026-01440" />
			<reference href="https://bdu.fstec.ru/vul/2025-03927" type="self" id="BDU:2025-03927" title="BDU:2025-03927" />
			<reference href="https://bdu.fstec.ru/vul/2025-07831" type="self" id="BDU:2025-07831" title="BDU:2025-07831" />
			<reference href="https://bdu.fstec.ru/vul/2025-14291" type="self" id="BDU:2025-14291" title="BDU:2025-14291" />
			<reference href="https://bdu.fstec.ru/vul/2025-14249" type="self" id="BDU:2025-14249" title="BDU:2025-14249" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241028-04</id>
		<issued date="2024-10-28" />
		<updated date="2024-10-28" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-28-10-24-2/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-28-10-24-2/" type="self" id="ROS-20241028-04" title="ROS-20241028-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26858" type="cve" id="CVE-2024-26858" title="CVE-2024-26858" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26860" type="cve" id="CVE-2024-26860" title="CVE-2024-26860" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26864" type="cve" id="CVE-2024-26864" title="CVE-2024-26864" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26868" type="cve" id="CVE-2024-26868" title="CVE-2024-26868" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26871" type="cve" id="CVE-2024-26871" title="CVE-2024-26871" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26887" type="cve" id="CVE-2024-26887" title="CVE-2024-26887" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26888" type="cve" id="CVE-2024-26888" title="CVE-2024-26888" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26890" type="cve" id="CVE-2024-26890" title="CVE-2024-26890" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26892" type="cve" id="CVE-2024-26892" title="CVE-2024-26892" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26909" type="cve" id="CVE-2024-26909" title="CVE-2024-26909" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26918" type="cve" id="CVE-2024-26918" title="CVE-2024-26918" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26919" type="cve" id="CVE-2024-26919" title="CVE-2024-26919" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26927" type="cve" id="CVE-2024-26927" title="CVE-2024-26927" />
			<reference href="https://bdu.fstec.ru/vul/2025-03605" type="self" id="BDU:2025-03605" title="BDU:2025-03605" />
			<reference href="https://bdu.fstec.ru/vul/2025-04400" type="self" id="BDU:2025-04400" title="BDU:2025-04400" />
			<reference href="https://bdu.fstec.ru/vul/2025-03606" type="self" id="BDU:2025-03606" title="BDU:2025-03606" />
			<reference href="https://bdu.fstec.ru/vul/2025-03607" type="self" id="BDU:2025-03607" title="BDU:2025-03607" />
			<reference href="https://bdu.fstec.ru/vul/2025-04403" type="self" id="BDU:2025-04403" title="BDU:2025-04403" />
			<reference href="https://bdu.fstec.ru/vul/2024-03699" type="self" id="BDU:2024-03699" title="BDU:2024-03699" />
			<reference href="https://bdu.fstec.ru/vul/2024-03670" type="self" id="BDU:2024-03670" title="BDU:2024-03670" />
			<reference href="https://bdu.fstec.ru/vul/2025-04474" type="self" id="BDU:2025-04474" title="BDU:2025-04474" />
			<reference href="https://bdu.fstec.ru/vul/2024-03667" type="self" id="BDU:2024-03667" title="BDU:2024-03667" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241029-01</id>
		<issued date="2024-10-29" />
		<updated date="2024-10-29" />
		<title>Уязвимость NetworkManager-libreswan </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в NetworkManager-libreswan</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-networkmanager-libreswan-cve-2024-9050/</description>
               <solution>
                    Запретить использование в ОС пакета NetworkManager-libreswan
                или
                    Установить обновление для пакета(ов) NetworkManager-libreswan
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-networkmanager-libreswan-cve-2024-9050/" type="self" id="ROS-20241029-01" title="ROS-20241029-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9050" type="cve" id="CVE-2024-9050" title="CVE-2024-9050" />
			<reference href="https://bdu.fstec.ru/vul/2024-09459" type="self" id="BDU:2024-09459" title="BDU:2024-09459" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="NetworkManager-libreswan" epoch="0" version="1.2.24" release="1.el7" arch="x86_64" src="">
					<filename>NetworkManager-libreswan-0:1.2.24-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241029-02</id>
		<issued date="2024-10-29" />
		<updated date="2024-10-29" />
		<title>Множественные уязвимости rubygem-actionpack </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в rubygem-actionpack</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rubygem-actionpack-cve-2024-47888-cve-2024-47889-cve-2024-41128-cve-2024-/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-actionpack
                или
                    Установить обновление для пакета(ов) rubygem-actionpack
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rubygem-actionpack-cve-2024-47888-cve-2024-47889-cve-2024-41128-cve-2024-/" type="self" id="ROS-20241029-02" title="ROS-20241029-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47888" type="cve" id="CVE-2024-47888" title="CVE-2024-47888" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47889" type="cve" id="CVE-2024-47889" title="CVE-2024-47889" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41128" type="cve" id="CVE-2024-41128" title="CVE-2024-41128" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47887" type="cve" id="CVE-2024-47887" title="CVE-2024-47887" />
			<reference href="https://bdu.fstec.ru/vul/2024-09437" type="self" id="BDU:2024-09437" title="BDU:2024-09437" />
			<reference href="https://bdu.fstec.ru/vul/2024-09435" type="self" id="BDU:2024-09435" title="BDU:2024-09435" />
			<reference href="https://bdu.fstec.ru/vul/2024-09432" type="self" id="BDU:2024-09432" title="BDU:2024-09432" />
			<reference href="https://bdu.fstec.ru/vul/2024-09429" type="self" id="BDU:2024-09429" title="BDU:2024-09429" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-actionpack" epoch="2" version="6.1.6.1" release="4.el7" arch="noarch" src="">
					<filename>rubygem-actionpack-2:6.1.6.1-4.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241029-03</id>
		<issued date="2024-10-29" />
		<updated date="2024-10-29" />
		<title>Уязвимость podman </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в podman</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-podman-cve-2024-9676/</description>
               <solution>
                    Запретить использование в ОС пакета Podman
                или
                    Установить обновление для пакета(ов) Podman
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-podman-cve-2024-9676/" type="self" id="ROS-20241029-03" title="ROS-20241029-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9676" type="cve" id="CVE-2024-9676" title="CVE-2024-9676" />
			<reference href="https://bdu.fstec.ru/vul/2024-09457" type="self" id="BDU:2024-09457" title="BDU:2024-09457" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="podman" epoch="0" version="4.9.5" release="2.el7" arch="x86_64" src="">
					<filename>podman-0:4.9.5-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241029-15</id>
		<issued date="2024-10-29" />
		<updated date="2024-12-23" />
		<title>Уязвимость buildah </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в buildah</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-buildah-cve-2024-96763212/</description>
               <solution>
                    Запретить использование в ОС пакета buildah
                или
                    Установить обновление для пакета(ов) buildah
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-buildah-cve-2024-96763212/" type="self" id="ROS-20241029-15" title="ROS-20241029-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9676" type="cve" id="CVE-2024-9676" title="CVE-2024-9676" />
			<reference href="https://bdu.fstec.ru/vul/2024-09457" type="self" id="BDU:2024-09457" title="BDU:2024-09457" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="buildah" epoch="0" version="1.37.5" release="1.el7" arch="x86_64" src="">
					<filename>buildah-0:1.37.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241029-14</id>
		<issued date="2024-10-29" />
		<updated date="2024-12-23" />
		<title>Уязвимость cri-o </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в cri-o</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cri-o-cve-2024-96769367/</description>
               <solution>
                    Запретить использование в ОС пакета cri-o
                или
                    Установить обновление для пакета(ов) cri-o
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cri-o-cve-2024-96769367/" type="self" id="ROS-20241029-14" title="ROS-20241029-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9676" type="cve" id="CVE-2024-9676" title="CVE-2024-9676" />
			<reference href="https://bdu.fstec.ru/vul/2024-09457" type="self" id="BDU:2024-09457" title="BDU:2024-09457" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cri-o" epoch="0" version="1.24.6" release="1.el7" arch="x86_64" src="">
					<filename>cri-o-0:1.24.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241029-04</id>
		<issued date="2024-10-29" />
		<updated date="2024-10-29" />
		<title>Уязвимость podman </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в podman</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-podman-cve-2024-9341/</description>
               <solution>
                    Запретить использование в ОС пакета podman
                или
                    Установить обновление для пакета(ов) podman
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-podman-cve-2024-9341/" type="self" id="ROS-20241029-04" title="ROS-20241029-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9341" type="cve" id="CVE-2024-9341" title="CVE-2024-9341" />
			<reference href="https://bdu.fstec.ru/vul/2024-09461" type="self" id="BDU:2024-09461" title="BDU:2024-09461" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="podman" epoch="0" version="4.9.5" release="2.el7" arch="x86_64" src="">
					<filename>podman-0:4.9.5-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241029-13</id>
		<issued date="2024-10-29" />
		<updated date="2024-12-23" />
		<title>Уязвимость containers-common </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в containers-common</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-containers-common-cve-2024-93417022/</description>
               <solution>
                    Запретить использование в ОС пакета containers-common
                или
                    Установить обновление для пакета(ов) containers-common
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-containers-common-cve-2024-93417022/" type="self" id="ROS-20241029-13" title="ROS-20241029-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9341" type="cve" id="CVE-2024-9341" title="CVE-2024-9341" />
			<reference href="https://bdu.fstec.ru/vul/2024-09461" type="self" id="BDU:2024-09461" title="BDU:2024-09461" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="containers-common" epoch="5" version="0.60.4" release="1.el7" arch="noarch" src="">
					<filename>containers-common-5:0.60.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241029-05</id>
		<issued date="2024-10-29" />
		<updated date="2024-10-29" />
		<title>Уязвимость podman </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в podman</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-podman-cve-2024-9407/</description>
               <solution>
                    Запретить использование в ОС пакета Podman
                или
                    Установить обновление для пакета(ов) Podman
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-podman-cve-2024-9407/" type="self" id="ROS-20241029-05" title="ROS-20241029-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9407" type="cve" id="CVE-2024-9407" title="CVE-2024-9407" />
			<reference href="https://bdu.fstec.ru/vul/2024-09460" type="self" id="BDU:2024-09460" title="BDU:2024-09460" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="podman" epoch="0" version="4.9.5" release="2.el7" arch="x86_64" src="">
					<filename>podman-0:4.9.5-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241029-12</id>
		<issued date="2024-10-29" />
		<updated date="2024-12-23" />
		<title>Уязвимость buildah </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в buildah</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-buildah-cve-2024-94079917/</description>
               <solution>
                    Запретить использование в ОС пакета buildah
                или
                    Установить обновление для пакета(ов) buildah
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-buildah-cve-2024-94079917/" type="self" id="ROS-20241029-12" title="ROS-20241029-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9407" type="cve" id="CVE-2024-9407" title="CVE-2024-9407" />
			<reference href="https://bdu.fstec.ru/vul/2024-09460" type="self" id="BDU:2024-09460" title="BDU:2024-09460" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="buildah" epoch="0" version="1.37.5" release="1.el7" arch="x86_64" src="">
					<filename>buildah-0:1.37.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241029-06</id>
		<issued date="2024-10-29" />
		<updated date="2024-10-29" />
		<title>Уязвимость libheif </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libheif</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libheif-cve-2024-41311/</description>
               <solution>
                    Запретить использование в ОС пакета Libheif
                или
                    Установить обновление для пакета(ов) Libheif
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libheif-cve-2024-41311/" type="self" id="ROS-20241029-06" title="ROS-20241029-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41311" type="cve" id="CVE-2024-41311" title="CVE-2024-41311" />
			<reference href="https://bdu.fstec.ru/vul/2024-09439" type="self" id="BDU:2024-09439" title="BDU:2024-09439" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libheif" epoch="0" version="1.16.1" release="5.el7" arch="x86_64" src="">
					<filename>libheif-0:1.16.1-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241029-07</id>
		<issued date="2024-10-29" />
		<updated date="2024-10-29" />
		<title>Уязвимость buildah </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в buildah</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-buildah-cve-2024-9675/</description>
               <solution>
                    Запретить использование в ОС пакета Buildah
                или
                    Установить обновление для пакета(ов) Buildah
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-buildah-cve-2024-9675/" type="self" id="ROS-20241029-07" title="ROS-20241029-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9675" type="cve" id="CVE-2024-9675" title="CVE-2024-9675" />
			<reference href="https://bdu.fstec.ru/vul/2024-09320" type="self" id="BDU:2024-09320" title="BDU:2024-09320" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="buildah" epoch="0" version="1.37.5" release="1.el7" arch="x86_64" src="">
					<filename>buildah-0:1.37.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241029-08</id>
		<issued date="2024-10-29" />
		<updated date="2024-10-29" />
		<title>Множественные уязвимости opensearch</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в opensearch</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-opensearch-291024/</description>
               <solution>
                    Запретить использование в ОС пакета opensearch
                или
                    Установить обновление для пакета(ов) opensearch
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-opensearch-291024/" type="self" id="ROS-20241029-08" title="ROS-20241029-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4068" type="cve" id="CVE-2024-4068" title="CVE-2024-4068" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37890" type="cve" id="CVE-2024-37890" title="CVE-2024-37890" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4067" type="cve" id="CVE-2024-4067" title="CVE-2024-4067" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45857" type="cve" id="CVE-2023-45857" title="CVE-2023-45857" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43794" type="cve" id="CVE-2024-43794" title="CVE-2024-43794" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28863" type="cve" id="CVE-2024-28863" title="CVE-2024-28863" />
			<reference href="https://bdu.fstec.ru/vul/2024-09427" type="self" id="BDU:2024-09427" title="BDU:2024-09427" />
			<reference href="https://bdu.fstec.ru/vul/2024-06239" type="self" id="BDU:2024-06239" title="BDU:2024-06239" />
			<reference href="https://bdu.fstec.ru/vul/2024-09421" type="self" id="BDU:2024-09421" title="BDU:2024-09421" />
			<reference href="https://bdu.fstec.ru/vul/2024-02118" type="self" id="BDU:2024-02118" title="BDU:2024-02118" />
			<reference href="https://bdu.fstec.ru/vul/2024-09420" type="self" id="BDU:2024-09420" title="BDU:2024-09420" />
			<reference href="https://bdu.fstec.ru/vul/2024-09418" type="self" id="BDU:2024-09418" title="BDU:2024-09418" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="opensearch" epoch="0" version="2.16.0" release="2.el7" arch="x86_64" src="">
					<filename>opensearch-0:2.16.0-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241031-01</id>
		<issued date="2024-10-31" />
		<updated date="2024-10-31" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-3110241/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-3110241/" type="self" id="ROS-20241031-01" title="ROS-20241031-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26956" type="cve" id="CVE-2024-26956" title="CVE-2024-26956" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26957" type="cve" id="CVE-2024-26957" title="CVE-2024-26957" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26964" type="cve" id="CVE-2024-26964" title="CVE-2024-26964" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26965" type="cve" id="CVE-2024-26965" title="CVE-2024-26965" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26966" type="cve" id="CVE-2024-26966" title="CVE-2024-26966" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26969" type="cve" id="CVE-2024-26969" title="CVE-2024-26969" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26970" type="cve" id="CVE-2024-26970" title="CVE-2024-26970" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26973" type="cve" id="CVE-2024-26973" title="CVE-2024-26973" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974" type="cve" id="CVE-2024-26974" title="CVE-2024-26974" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976" type="cve" id="CVE-2024-26976" title="CVE-2024-26976" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26977" type="cve" id="CVE-2024-26977" title="CVE-2024-26977" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26955" type="cve" id="CVE-2024-26955" title="CVE-2024-26955" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26951" type="cve" id="CVE-2024-26951" title="CVE-2024-26951" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26950" type="cve" id="CVE-2024-26950" title="CVE-2024-26950" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26937" type="cve" id="CVE-2024-26937" title="CVE-2024-26937" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935" type="cve" id="CVE-2024-26935" title="CVE-2024-26935" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931" type="cve" id="CVE-2024-26931" title="CVE-2024-26931" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48664" type="cve" id="CVE-2022-48664" title="CVE-2022-48664" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48663" type="cve" id="CVE-2022-48663" title="CVE-2022-48663" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48653" type="cve" id="CVE-2022-48653" title="CVE-2022-48653" />
			<reference href="https://bdu.fstec.ru/vul/2024-09415" type="self" id="BDU:2024-09415" title="BDU:2024-09415" />
			<reference href="https://bdu.fstec.ru/vul/2024-09414" type="self" id="BDU:2024-09414" title="BDU:2024-09414" />
			<reference href="https://bdu.fstec.ru/vul/2024-09412" type="self" id="BDU:2024-09412" title="BDU:2024-09412" />
			<reference href="https://bdu.fstec.ru/vul/2024-09411" type="self" id="BDU:2024-09411" title="BDU:2024-09411" />
			<reference href="https://bdu.fstec.ru/vul/2024-09410" type="self" id="BDU:2024-09410" title="BDU:2024-09410" />
			<reference href="https://bdu.fstec.ru/vul/2024-09409" type="self" id="BDU:2024-09409" title="BDU:2024-09409" />
			<reference href="https://bdu.fstec.ru/vul/2024-09406" type="self" id="BDU:2024-09406" title="BDU:2024-09406" />
			<reference href="https://bdu.fstec.ru/vul/2024-09405" type="self" id="BDU:2024-09405" title="BDU:2024-09405" />
			<reference href="https://bdu.fstec.ru/vul/2024-09403" type="self" id="BDU:2024-09403" title="BDU:2024-09403" />
			<reference href="https://bdu.fstec.ru/vul/2024-09401" type="self" id="BDU:2024-09401" title="BDU:2024-09401" />
			<reference href="https://bdu.fstec.ru/vul/2024-09400" type="self" id="BDU:2024-09400" title="BDU:2024-09400" />
			<reference href="https://bdu.fstec.ru/vul/2024-09399" type="self" id="BDU:2024-09399" title="BDU:2024-09399" />
			<reference href="https://bdu.fstec.ru/vul/2024-09398" type="self" id="BDU:2024-09398" title="BDU:2024-09398" />
			<reference href="https://bdu.fstec.ru/vul/2024-09397" type="self" id="BDU:2024-09397" title="BDU:2024-09397" />
			<reference href="https://bdu.fstec.ru/vul/2024-09396" type="self" id="BDU:2024-09396" title="BDU:2024-09396" />
			<reference href="https://bdu.fstec.ru/vul/2024-09394" type="self" id="BDU:2024-09394" title="BDU:2024-09394" />
			<reference href="https://bdu.fstec.ru/vul/2024-09393" type="self" id="BDU:2024-09393" title="BDU:2024-09393" />
			<reference href="https://bdu.fstec.ru/vul/2024-09392" type="self" id="BDU:2024-09392" title="BDU:2024-09392" />
			<reference href="https://bdu.fstec.ru/vul/2024-09391" type="self" id="BDU:2024-09391" title="BDU:2024-09391" />
			<reference href="https://bdu.fstec.ru/vul/2024-09375" type="self" id="BDU:2024-09375" title="BDU:2024-09375" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241031-02</id>
		<issued date="2024-10-31" />
		<updated date="2024-10-31" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-3110242/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-3110242/" type="self" id="ROS-20241031-02" title="ROS-20241031-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26959" type="cve" id="CVE-2024-26959" title="CVE-2024-26959" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26963" type="cve" id="CVE-2024-26963" title="CVE-2024-26963" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26968" type="cve" id="CVE-2024-26968" title="CVE-2024-26968" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26971" type="cve" id="CVE-2024-26971" title="CVE-2024-26971" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26975" type="cve" id="CVE-2024-26975" title="CVE-2024-26975" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26978" type="cve" id="CVE-2024-26978" title="CVE-2024-26978" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26987" type="cve" id="CVE-2024-26987" title="CVE-2024-26987" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26946" type="cve" id="CVE-2024-26946" title="CVE-2024-26946" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26943" type="cve" id="CVE-2024-26943" title="CVE-2024-26943" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26940" type="cve" id="CVE-2024-26940" title="CVE-2024-26940" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52647" type="cve" id="CVE-2023-52647" title="CVE-2023-52647" />
			<reference href="https://bdu.fstec.ru/vul/2024-09374" type="self" id="BDU:2024-09374" title="BDU:2024-09374" />
			<reference href="https://bdu.fstec.ru/vul/2024-09373" type="self" id="BDU:2024-09373" title="BDU:2024-09373" />
			<reference href="https://bdu.fstec.ru/vul/2024-09372" type="self" id="BDU:2024-09372" title="BDU:2024-09372" />
			<reference href="https://bdu.fstec.ru/vul/2024-09371" type="self" id="BDU:2024-09371" title="BDU:2024-09371" />
			<reference href="https://bdu.fstec.ru/vul/2024-03638" type="self" id="BDU:2024-03638" title="BDU:2024-03638" />
			<reference href="https://bdu.fstec.ru/vul/2024-03639" type="self" id="BDU:2024-03639" title="BDU:2024-03639" />
			<reference href="https://bdu.fstec.ru/vul/2024-09370" type="self" id="BDU:2024-09370" title="BDU:2024-09370" />
			<reference href="https://bdu.fstec.ru/vul/2024-09369" type="self" id="BDU:2024-09369" title="BDU:2024-09369" />
			<reference href="https://bdu.fstec.ru/vul/2024-09368" type="self" id="BDU:2024-09368" title="BDU:2024-09368" />
			<reference href="https://bdu.fstec.ru/vul/2024-09367" type="self" id="BDU:2024-09367" title="BDU:2024-09367" />
			<reference href="https://bdu.fstec.ru/vul/2024-09366" type="self" id="BDU:2024-09366" title="BDU:2024-09366" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241101-01</id>
		<issued date="2024-11-01" />
		<updated date="2024-11-01" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-0111241/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-0111241/" type="self" id="ROS-20241101-01" title="ROS-20241101-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922" type="cve" id="CVE-2024-26922" title="CVE-2024-26922" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26926" type="cve" id="CVE-2024-26926" title="CVE-2024-26926" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27009" type="cve" id="CVE-2024-27009" title="CVE-2024-27009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008" type="cve" id="CVE-2024-27008" title="CVE-2024-27008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27004" type="cve" id="CVE-2024-27004" title="CVE-2024-27004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27001" type="cve" id="CVE-2024-27001" title="CVE-2024-27001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27000" type="cve" id="CVE-2024-27000" title="CVE-2024-27000" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26999" type="cve" id="CVE-2024-26999" title="CVE-2024-26999" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26997" type="cve" id="CVE-2024-26997" title="CVE-2024-26997" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26994" type="cve" id="CVE-2024-26994" title="CVE-2024-26994" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993" type="cve" id="CVE-2024-26993" title="CVE-2024-26993" />
			<reference href="https://bdu.fstec.ru/vul/2024-09343" type="self" id="BDU:2024-09343" title="BDU:2024-09343" />
			<reference href="https://bdu.fstec.ru/vul/2024-09340" type="self" id="BDU:2024-09340" title="BDU:2024-09340" />
			<reference href="https://bdu.fstec.ru/vul/2024-09339" type="self" id="BDU:2024-09339" title="BDU:2024-09339" />
			<reference href="https://bdu.fstec.ru/vul/2024-09332" type="self" id="BDU:2024-09332" title="BDU:2024-09332" />
			<reference href="https://bdu.fstec.ru/vul/2024-09330" type="self" id="BDU:2024-09330" title="BDU:2024-09330" />
			<reference href="https://bdu.fstec.ru/vul/2024-09329" type="self" id="BDU:2024-09329" title="BDU:2024-09329" />
			<reference href="https://bdu.fstec.ru/vul/2024-09328" type="self" id="BDU:2024-09328" title="BDU:2024-09328" />
			<reference href="https://bdu.fstec.ru/vul/2024-09326" type="self" id="BDU:2024-09326" title="BDU:2024-09326" />
			<reference href="https://bdu.fstec.ru/vul/2024-09323" type="self" id="BDU:2024-09323" title="BDU:2024-09323" />
			<reference href="https://bdu.fstec.ru/vul/2024-09322" type="self" id="BDU:2024-09322" title="BDU:2024-09322" />
			<reference href="https://bdu.fstec.ru/vul/2024-09321" type="self" id="BDU:2024-09321" title="BDU:2024-09321" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241101-02</id>
		<issued date="2024-11-01" />
		<updated date="2024-11-01" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-0111242/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-0111242/" type="self" id="ROS-20241101-02" title="ROS-20241101-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27036" type="cve" id="CVE-2024-27036" title="CVE-2024-27036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27033" type="cve" id="CVE-2024-27033" title="CVE-2024-27033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27031" type="cve" id="CVE-2024-27031" title="CVE-2024-27031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27026" type="cve" id="CVE-2024-27026" title="CVE-2024-27026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27023" type="cve" id="CVE-2024-27023" title="CVE-2024-27023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52649" type="cve" id="CVE-2023-52649" title="CVE-2023-52649" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48669" type="cve" id="CVE-2022-48669" title="CVE-2022-48669" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27022" type="cve" id="CVE-2024-27022" title="CVE-2024-27022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27003" type="cve" id="CVE-2024-27003" title="CVE-2024-27003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26998" type="cve" id="CVE-2024-26998" title="CVE-2024-26998" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26992" type="cve" id="CVE-2024-26992" title="CVE-2024-26992" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27040" type="cve" id="CVE-2024-27040" title="CVE-2024-27040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27048" type="cve" id="CVE-2024-27048" title="CVE-2024-27048" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27050" type="cve" id="CVE-2024-27050" title="CVE-2024-27050" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27058" type="cve" id="CVE-2024-27058" title="CVE-2024-27058" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27061" type="cve" id="CVE-2024-27061" title="CVE-2024-27061" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27063" type="cve" id="CVE-2024-27063" title="CVE-2024-27063" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27064" type="cve" id="CVE-2024-27064" title="CVE-2024-27064" />
			<reference href="https://bdu.fstec.ru/vul/2024-09365" type="self" id="BDU:2024-09365" title="BDU:2024-09365" />
			<reference href="https://bdu.fstec.ru/vul/2024-09362" type="self" id="BDU:2024-09362" title="BDU:2024-09362" />
			<reference href="https://bdu.fstec.ru/vul/2024-09360" type="self" id="BDU:2024-09360" title="BDU:2024-09360" />
			<reference href="https://bdu.fstec.ru/vul/2024-09359" type="self" id="BDU:2024-09359" title="BDU:2024-09359" />
			<reference href="https://bdu.fstec.ru/vul/2024-09358" type="self" id="BDU:2024-09358" title="BDU:2024-09358" />
			<reference href="https://bdu.fstec.ru/vul/2024-09357" type="self" id="BDU:2024-09357" title="BDU:2024-09357" />
			<reference href="https://bdu.fstec.ru/vul/2024-09356" type="self" id="BDU:2024-09356" title="BDU:2024-09356" />
			<reference href="https://bdu.fstec.ru/vul/2024-04584" type="self" id="BDU:2024-04584" title="BDU:2024-04584" />
			<reference href="https://bdu.fstec.ru/vul/2024-09355" type="self" id="BDU:2024-09355" title="BDU:2024-09355" />
			<reference href="https://bdu.fstec.ru/vul/2024-09353" type="self" id="BDU:2024-09353" title="BDU:2024-09353" />
			<reference href="https://bdu.fstec.ru/vul/2024-09352" type="self" id="BDU:2024-09352" title="BDU:2024-09352" />
			<reference href="https://bdu.fstec.ru/vul/2024-09351" type="self" id="BDU:2024-09351" title="BDU:2024-09351" />
			<reference href="https://bdu.fstec.ru/vul/2024-09350" type="self" id="BDU:2024-09350" title="BDU:2024-09350" />
			<reference href="https://bdu.fstec.ru/vul/2024-09349" type="self" id="BDU:2024-09349" title="BDU:2024-09349" />
			<reference href="https://bdu.fstec.ru/vul/2024-09347" type="self" id="BDU:2024-09347" title="BDU:2024-09347" />
			<reference href="https://bdu.fstec.ru/vul/2024-03645" type="self" id="BDU:2024-03645" title="BDU:2024-03645" />
			<reference href="https://bdu.fstec.ru/vul/2024-09346" type="self" id="BDU:2024-09346" title="BDU:2024-09346" />
			<reference href="https://bdu.fstec.ru/vul/2024-09344" type="self" id="BDU:2024-09344" title="BDU:2024-09344" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241105-01</id>
		<issued date="2024-11-05" />
		<updated date="2024-11-05" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-051124/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-051124/" type="self" id="ROS-20241105-01" title="ROS-20241105-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48632" type="cve" id="CVE-2022-48632" title="CVE-2022-48632" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48634" type="cve" id="CVE-2022-48634" title="CVE-2022-48634" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48635" type="cve" id="CVE-2022-48635" title="CVE-2022-48635" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48636" type="cve" id="CVE-2022-48636" title="CVE-2022-48636" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48637" type="cve" id="CVE-2022-48637" title="CVE-2022-48637" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48638" type="cve" id="CVE-2022-48638" title="CVE-2022-48638" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48639" type="cve" id="CVE-2022-48639" title="CVE-2022-48639" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48640" type="cve" id="CVE-2022-48640" title="CVE-2022-48640" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48641" type="cve" id="CVE-2022-48641" title="CVE-2022-48641" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48642" type="cve" id="CVE-2022-48642" title="CVE-2022-48642" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48643" type="cve" id="CVE-2022-48643" title="CVE-2022-48643" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48644" type="cve" id="CVE-2022-48644" title="CVE-2022-48644" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48645" type="cve" id="CVE-2022-48645" title="CVE-2022-48645" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48647" type="cve" id="CVE-2022-48647" title="CVE-2022-48647" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48648" type="cve" id="CVE-2022-48648" title="CVE-2022-48648" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48649" type="cve" id="CVE-2022-48649" title="CVE-2022-48649" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48650" type="cve" id="CVE-2022-48650" title="CVE-2022-48650" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650" type="cve" id="CVE-2023-52650" title="CVE-2023-52650" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52652" type="cve" id="CVE-2023-52652" title="CVE-2023-52652" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024" type="cve" id="CVE-2024-27024" title="CVE-2024-27024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025" type="cve" id="CVE-2024-27025" title="CVE-2024-27025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030" type="cve" id="CVE-2024-27030" title="CVE-2024-27030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27034" type="cve" id="CVE-2024-27034" title="CVE-2024-27034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27037" type="cve" id="CVE-2024-27037" title="CVE-2024-27037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27038" type="cve" id="CVE-2024-27038" title="CVE-2024-27038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27044" type="cve" id="CVE-2024-27044" title="CVE-2024-27044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27045" type="cve" id="CVE-2024-27045" title="CVE-2024-27045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046" type="cve" id="CVE-2024-27046" title="CVE-2024-27046" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27047" type="cve" id="CVE-2024-27047" title="CVE-2024-27047" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051" type="cve" id="CVE-2024-27051" title="CVE-2024-27051" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052" type="cve" id="CVE-2024-27052" title="CVE-2024-27052" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27053" type="cve" id="CVE-2024-27053" title="CVE-2024-27053" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27054" type="cve" id="CVE-2024-27054" title="CVE-2024-27054" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059" type="cve" id="CVE-2024-27059" title="CVE-2024-27059" />
			<reference href="https://bdu.fstec.ru/vul/2024-10026" type="self" id="BDU:2024-10026" title="BDU:2024-10026" />
			<reference href="https://bdu.fstec.ru/vul/2024-10025" type="self" id="BDU:2024-10025" title="BDU:2024-10025" />
			<reference href="https://bdu.fstec.ru/vul/2024-10024" type="self" id="BDU:2024-10024" title="BDU:2024-10024" />
			<reference href="https://bdu.fstec.ru/vul/2024-09918" type="self" id="BDU:2024-09918" title="BDU:2024-09918" />
			<reference href="https://bdu.fstec.ru/vul/2024-10023" type="self" id="BDU:2024-10023" title="BDU:2024-10023" />
			<reference href="https://bdu.fstec.ru/vul/2024-10022" type="self" id="BDU:2024-10022" title="BDU:2024-10022" />
			<reference href="https://bdu.fstec.ru/vul/2024-10021" type="self" id="BDU:2024-10021" title="BDU:2024-10021" />
			<reference href="https://bdu.fstec.ru/vul/2024-10020" type="self" id="BDU:2024-10020" title="BDU:2024-10020" />
			<reference href="https://bdu.fstec.ru/vul/2024-10019" type="self" id="BDU:2024-10019" title="BDU:2024-10019" />
			<reference href="https://bdu.fstec.ru/vul/2024-10018" type="self" id="BDU:2024-10018" title="BDU:2024-10018" />
			<reference href="https://bdu.fstec.ru/vul/2024-10017" type="self" id="BDU:2024-10017" title="BDU:2024-10017" />
			<reference href="https://bdu.fstec.ru/vul/2024-10016" type="self" id="BDU:2024-10016" title="BDU:2024-10016" />
			<reference href="https://bdu.fstec.ru/vul/2024-10015" type="self" id="BDU:2024-10015" title="BDU:2024-10015" />
			<reference href="https://bdu.fstec.ru/vul/2024-10014" type="self" id="BDU:2024-10014" title="BDU:2024-10014" />
			<reference href="https://bdu.fstec.ru/vul/2024-10013" type="self" id="BDU:2024-10013" title="BDU:2024-10013" />
			<reference href="https://bdu.fstec.ru/vul/2024-10012" type="self" id="BDU:2024-10012" title="BDU:2024-10012" />
			<reference href="https://bdu.fstec.ru/vul/2024-10011" type="self" id="BDU:2024-10011" title="BDU:2024-10011" />
			<reference href="https://bdu.fstec.ru/vul/2024-09725" type="self" id="BDU:2024-09725" title="BDU:2024-09725" />
			<reference href="https://bdu.fstec.ru/vul/2024-09759" type="self" id="BDU:2024-09759" title="BDU:2024-09759" />
			<reference href="https://bdu.fstec.ru/vul/2024-09841" type="self" id="BDU:2024-09841" title="BDU:2024-09841" />
			<reference href="https://bdu.fstec.ru/vul/2024-09758" type="self" id="BDU:2024-09758" title="BDU:2024-09758" />
			<reference href="https://bdu.fstec.ru/vul/2024-09757" type="self" id="BDU:2024-09757" title="BDU:2024-09757" />
			<reference href="https://bdu.fstec.ru/vul/2024-09756" type="self" id="BDU:2024-09756" title="BDU:2024-09756" />
			<reference href="https://bdu.fstec.ru/vul/2024-09729" type="self" id="BDU:2024-09729" title="BDU:2024-09729" />
			<reference href="https://bdu.fstec.ru/vul/2024-09731" type="self" id="BDU:2024-09731" title="BDU:2024-09731" />
			<reference href="https://bdu.fstec.ru/vul/2024-09728" type="self" id="BDU:2024-09728" title="BDU:2024-09728" />
			<reference href="https://bdu.fstec.ru/vul/2024-09726" type="self" id="BDU:2024-09726" title="BDU:2024-09726" />
			<reference href="https://bdu.fstec.ru/vul/2024-09723" type="self" id="BDU:2024-09723" title="BDU:2024-09723" />
			<reference href="https://bdu.fstec.ru/vul/2024-09849" type="self" id="BDU:2024-09849" title="BDU:2024-09849" />
			<reference href="https://bdu.fstec.ru/vul/2024-09848" type="self" id="BDU:2024-09848" title="BDU:2024-09848" />
			<reference href="https://bdu.fstec.ru/vul/2024-09842" type="self" id="BDU:2024-09842" title="BDU:2024-09842" />
			<reference href="https://bdu.fstec.ru/vul/2024-09856" type="self" id="BDU:2024-09856" title="BDU:2024-09856" />
			<reference href="https://bdu.fstec.ru/vul/2024-09857" type="self" id="BDU:2024-09857" title="BDU:2024-09857" />
			<reference href="https://bdu.fstec.ru/vul/2024-09855" type="self" id="BDU:2024-09855" title="BDU:2024-09855" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241023-11</id>
		<issued date="2024-11-05" />
		<updated date="2024-12-23" />
		<title>Уязвимость vim-enhanced </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в vim-enhanced</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-enhanced-cve-2024-478148929/</description>
               <solution>
                    Запретить использование в ОС пакета Vim
                или
                    Установить обновление для пакета(ов) Vim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-enhanced-cve-2024-478148929/" type="self" id="ROS-20241023-11" title="ROS-20241023-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47814" type="cve" id="CVE-2024-47814" title="CVE-2024-47814" />
			<reference href="https://bdu.fstec.ru/vul/2024-08644" type="self" id="BDU:2024-08644" title="BDU:2024-08644" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-enhanced" epoch="2" version="9.1.774" release="1.el7" arch="x86_64" src="">
					<filename>vim-enhanced-2:9.1.774-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241106-01</id>
		<issued date="2024-11-06" />
		<updated date="2024-11-06" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-061124/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-061124/" type="self" id="ROS-20241106-01" title="ROS-20241106-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024" type="cve" id="CVE-2024-27024" title="CVE-2024-27024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27413" type="cve" id="CVE-2024-27413" title="CVE-2024-27413" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27414" type="cve" id="CVE-2024-27414" title="CVE-2024-27414" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27415" type="cve" id="CVE-2024-27415" title="CVE-2024-27415" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27416" type="cve" id="CVE-2024-27416" title="CVE-2024-27416" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27417" type="cve" id="CVE-2024-27417" title="CVE-2024-27417" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27419" type="cve" id="CVE-2024-27419" title="CVE-2024-27419" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27431" type="cve" id="CVE-2024-27431" title="CVE-2024-27431" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27432" type="cve" id="CVE-2024-27432" title="CVE-2024-27432" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27436" type="cve" id="CVE-2024-27436" title="CVE-2024-27436" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35789" type="cve" id="CVE-2024-35789" title="CVE-2024-35789" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52661" type="cve" id="CVE-2023-52661" title="CVE-2023-52661" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52662" type="cve" id="CVE-2023-52662" title="CVE-2023-52662" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52667" type="cve" id="CVE-2023-52667" title="CVE-2023-52667" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52669" type="cve" id="CVE-2023-52669" title="CVE-2023-52669" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52670" type="cve" id="CVE-2023-52670" title="CVE-2023-52670" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52672" type="cve" id="CVE-2023-52672" title="CVE-2023-52672" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35796" type="cve" id="CVE-2024-35796" title="CVE-2024-35796" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35804" type="cve" id="CVE-2024-35804" title="CVE-2024-35804" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35805" type="cve" id="CVE-2024-35805" title="CVE-2024-35805" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35806" type="cve" id="CVE-2024-35806" title="CVE-2024-35806" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35807" type="cve" id="CVE-2024-35807" title="CVE-2024-35807" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35809" type="cve" id="CVE-2024-35809" title="CVE-2024-35809" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35813" type="cve" id="CVE-2024-35813" title="CVE-2024-35813" />
			<reference href="https://bdu.fstec.ru/vul/2024-09841" type="self" id="BDU:2024-09841" title="BDU:2024-09841" />
			<reference href="https://bdu.fstec.ru/vul/2024-09839" type="self" id="BDU:2024-09839" title="BDU:2024-09839" />
			<reference href="https://bdu.fstec.ru/vul/2024-09858" type="self" id="BDU:2024-09858" title="BDU:2024-09858" />
			<reference href="https://bdu.fstec.ru/vul/2024-09994" type="self" id="BDU:2024-09994" title="BDU:2024-09994" />
			<reference href="https://bdu.fstec.ru/vul/2024-09993" type="self" id="BDU:2024-09993" title="BDU:2024-09993" />
			<reference href="https://bdu.fstec.ru/vul/2024-09992" type="self" id="BDU:2024-09992" title="BDU:2024-09992" />
			<reference href="https://bdu.fstec.ru/vul/2024-09991" type="self" id="BDU:2024-09991" title="BDU:2024-09991" />
			<reference href="https://bdu.fstec.ru/vul/2024-09990" type="self" id="BDU:2024-09990" title="BDU:2024-09990" />
			<reference href="https://bdu.fstec.ru/vul/2024-09769" type="self" id="BDU:2024-09769" title="BDU:2024-09769" />
			<reference href="https://bdu.fstec.ru/vul/2024-09767" type="self" id="BDU:2024-09767" title="BDU:2024-09767" />
			<reference href="https://bdu.fstec.ru/vul/2024-09838" type="self" id="BDU:2024-09838" title="BDU:2024-09838" />
			<reference href="https://bdu.fstec.ru/vul/2024-09837" type="self" id="BDU:2024-09837" title="BDU:2024-09837" />
			<reference href="https://bdu.fstec.ru/vul/2024-09835" type="self" id="BDU:2024-09835" title="BDU:2024-09835" />
			<reference href="https://bdu.fstec.ru/vul/2024-09834" type="self" id="BDU:2024-09834" title="BDU:2024-09834" />
			<reference href="https://bdu.fstec.ru/vul/2024-09831" type="self" id="BDU:2024-09831" title="BDU:2024-09831" />
			<reference href="https://bdu.fstec.ru/vul/2024-09830" type="self" id="BDU:2024-09830" title="BDU:2024-09830" />
			<reference href="https://bdu.fstec.ru/vul/2024-09821" type="self" id="BDU:2024-09821" title="BDU:2024-09821" />
			<reference href="https://bdu.fstec.ru/vul/2024-09814" type="self" id="BDU:2024-09814" title="BDU:2024-09814" />
			<reference href="https://bdu.fstec.ru/vul/2024-09772" type="self" id="BDU:2024-09772" title="BDU:2024-09772" />
			<reference href="https://bdu.fstec.ru/vul/2024-09771" type="self" id="BDU:2024-09771" title="BDU:2024-09771" />
			<reference href="https://bdu.fstec.ru/vul/2024-09770" type="self" id="BDU:2024-09770" title="BDU:2024-09770" />
			<reference href="https://bdu.fstec.ru/vul/2024-09768" type="self" id="BDU:2024-09768" title="BDU:2024-09768" />
			<reference href="https://bdu.fstec.ru/vul/2024-09989" type="self" id="BDU:2024-09989" title="BDU:2024-09989" />
			<reference href="https://bdu.fstec.ru/vul/2024-09988" type="self" id="BDU:2024-09988" title="BDU:2024-09988" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241107-01</id>
		<issued date="2024-11-07" />
		<updated date="2024-11-07" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-0711241/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-0711241/" type="self" id="ROS-20241107-01" title="ROS-20241107-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27039" type="cve" id="CVE-2024-27039" title="CVE-2024-27039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065" type="cve" id="CVE-2024-27065" title="CVE-2024-27065" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073" type="cve" id="CVE-2024-27073" title="CVE-2024-27073" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074" type="cve" id="CVE-2024-27074" title="CVE-2024-27074" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075" type="cve" id="CVE-2024-27075" title="CVE-2024-27075" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27076" type="cve" id="CVE-2024-27076" title="CVE-2024-27076" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27077" type="cve" id="CVE-2024-27077" title="CVE-2024-27077" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078" type="cve" id="CVE-2024-27078" title="CVE-2024-27078" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388" type="cve" id="CVE-2024-27388" title="CVE-2024-27388" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27390" type="cve" id="CVE-2024-27390" title="CVE-2024-27390" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48652" type="cve" id="CVE-2022-48652" title="CVE-2022-48652" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48665" type="cve" id="CVE-2022-48665" title="CVE-2022-48665" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26936" type="cve" id="CVE-2024-26936" title="CVE-2024-26936" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26981" type="cve" id="CVE-2024-26981" title="CVE-2024-26981" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984" type="cve" id="CVE-2024-26984" title="CVE-2024-26984" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26988" type="cve" id="CVE-2024-26988" title="CVE-2024-26988" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26989" type="cve" id="CVE-2024-26989" title="CVE-2024-26989" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48696" type="cve" id="CVE-2022-48696" title="CVE-2022-48696" />
			<reference href="https://bdu.fstec.ru/vul/2024-09854" type="self" id="BDU:2024-09854" title="BDU:2024-09854" />
			<reference href="https://bdu.fstec.ru/vul/2024-09853" type="self" id="BDU:2024-09853" title="BDU:2024-09853" />
			<reference href="https://bdu.fstec.ru/vul/2024-09852" type="self" id="BDU:2024-09852" title="BDU:2024-09852" />
			<reference href="https://bdu.fstec.ru/vul/2024-09851" type="self" id="BDU:2024-09851" title="BDU:2024-09851" />
			<reference href="https://bdu.fstec.ru/vul/2024-09850" type="self" id="BDU:2024-09850" title="BDU:2024-09850" />
			<reference href="https://bdu.fstec.ru/vul/2024-09847" type="self" id="BDU:2024-09847" title="BDU:2024-09847" />
			<reference href="https://bdu.fstec.ru/vul/2024-09846" type="self" id="BDU:2024-09846" title="BDU:2024-09846" />
			<reference href="https://bdu.fstec.ru/vul/2024-09845" type="self" id="BDU:2024-09845" title="BDU:2024-09845" />
			<reference href="https://bdu.fstec.ru/vul/2024-10009" type="self" id="BDU:2024-10009" title="BDU:2024-10009" />
			<reference href="https://bdu.fstec.ru/vul/2024-10008" type="self" id="BDU:2024-10008" title="BDU:2024-10008" />
			<reference href="https://bdu.fstec.ru/vul/2024-10006" type="self" id="BDU:2024-10006" title="BDU:2024-10006" />
			<reference href="https://bdu.fstec.ru/vul/2024-10005" type="self" id="BDU:2024-10005" title="BDU:2024-10005" />
			<reference href="https://bdu.fstec.ru/vul/2024-09859" type="self" id="BDU:2024-09859" title="BDU:2024-09859" />
			<reference href="https://bdu.fstec.ru/vul/2024-09866" type="self" id="BDU:2024-09866" title="BDU:2024-09866" />
			<reference href="https://bdu.fstec.ru/vul/2024-10004" type="self" id="BDU:2024-10004" title="BDU:2024-10004" />
			<reference href="https://bdu.fstec.ru/vul/2024-10002" type="self" id="BDU:2024-10002" title="BDU:2024-10002" />
			<reference href="https://bdu.fstec.ru/vul/2024-10001" type="self" id="BDU:2024-10001" title="BDU:2024-10001" />
			<reference href="https://bdu.fstec.ru/vul/2024-10000" type="self" id="BDU:2024-10000" title="BDU:2024-10000" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241107-02</id>
		<issued date="2024-11-07" />
		<updated date="2024-11-07" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-0711242/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-0711242/" type="self" id="ROS-20241107-02" title="ROS-20241107-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48666" type="cve" id="CVE-2022-48666" title="CVE-2022-48666" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27391" type="cve" id="CVE-2024-27391" title="CVE-2024-27391" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26986" type="cve" id="CVE-2024-26986" title="CVE-2024-26986" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26990" type="cve" id="CVE-2024-26990" title="CVE-2024-26990" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27067" type="cve" id="CVE-2024-27067" title="CVE-2024-27067" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27068" type="cve" id="CVE-2024-27068" title="CVE-2024-27068" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27080" type="cve" id="CVE-2024-27080" title="CVE-2024-27080" />
			<reference href="https://bdu.fstec.ru/vul/2024-09860" type="self" id="BDU:2024-09860" title="BDU:2024-09860" />
			<reference href="https://bdu.fstec.ru/vul/2024-09999" type="self" id="BDU:2024-09999" title="BDU:2024-09999" />
			<reference href="https://bdu.fstec.ru/vul/2024-09998" type="self" id="BDU:2024-09998" title="BDU:2024-09998" />
			<reference href="https://bdu.fstec.ru/vul/2024-09997" type="self" id="BDU:2024-09997" title="BDU:2024-09997" />
			<reference href="https://bdu.fstec.ru/vul/2024-09996" type="self" id="BDU:2024-09996" title="BDU:2024-09996" />
			<reference href="https://bdu.fstec.ru/vul/2024-09844" type="self" id="BDU:2024-09844" title="BDU:2024-09844" />
			<reference href="https://bdu.fstec.ru/vul/2024-09995" type="self" id="BDU:2024-09995" title="BDU:2024-09995" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241108-01</id>
		<issued date="2024-11-08" />
		<updated date="2024-11-08" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-0811241/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-0811241/" type="self" id="ROS-20241108-01" title="ROS-20241108-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35831" type="cve" id="CVE-2024-35831" title="CVE-2024-35831" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35838" type="cve" id="CVE-2024-35838" title="CVE-2024-35838" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52678" type="cve" id="CVE-2023-52678" title="CVE-2023-52678" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52687" type="cve" id="CVE-2023-52687" title="CVE-2023-52687" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52697" type="cve" id="CVE-2023-52697" title="CVE-2023-52697" />
			<reference href="https://bdu.fstec.ru/vul/2024-09864" type="self" id="BDU:2024-09864" title="BDU:2024-09864" />
			<reference href="https://bdu.fstec.ru/vul/2024-09863" type="self" id="BDU:2024-09863" title="BDU:2024-09863" />
			<reference href="https://bdu.fstec.ru/vul/2024-09862" type="self" id="BDU:2024-09862" title="BDU:2024-09862" />
			<reference href="https://bdu.fstec.ru/vul/2024-09943" type="self" id="BDU:2024-09943" title="BDU:2024-09943" />
			<reference href="https://bdu.fstec.ru/vul/2024-09944" type="self" id="BDU:2024-09944" title="BDU:2024-09944" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241108-02</id>
		<issued date="2024-11-08" />
		<updated date="2024-11-08" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-0811242/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-0811242/" type="self" id="ROS-20241108-02" title="ROS-20241108-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35829" type="cve" id="CVE-2024-35829" title="CVE-2024-35829" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35830" type="cve" id="CVE-2024-35830" title="CVE-2024-35830" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35833" type="cve" id="CVE-2024-35833" title="CVE-2024-35833" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35835" type="cve" id="CVE-2024-35835" title="CVE-2024-35835" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35837" type="cve" id="CVE-2024-35837" title="CVE-2024-35837" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52674" type="cve" id="CVE-2023-52674" title="CVE-2023-52674" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52675" type="cve" id="CVE-2023-52675" title="CVE-2023-52675" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52677" type="cve" id="CVE-2023-52677" title="CVE-2023-52677" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52679" type="cve" id="CVE-2023-52679" title="CVE-2023-52679" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52680" type="cve" id="CVE-2023-52680" title="CVE-2023-52680" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52683" type="cve" id="CVE-2023-52683" title="CVE-2023-52683" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52686" type="cve" id="CVE-2023-52686" title="CVE-2023-52686" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52690" type="cve" id="CVE-2023-52690" title="CVE-2023-52690" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52691" type="cve" id="CVE-2023-52691" title="CVE-2023-52691" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52692" type="cve" id="CVE-2023-52692" title="CVE-2023-52692" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52693" type="cve" id="CVE-2023-52693" title="CVE-2023-52693" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52694" type="cve" id="CVE-2023-52694" title="CVE-2023-52694" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52698" type="cve" id="CVE-2023-52698" title="CVE-2023-52698" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35840" type="cve" id="CVE-2024-35840" title="CVE-2024-35840" />
			<reference href="https://bdu.fstec.ru/vul/2024-09945" type="self" id="BDU:2024-09945" title="BDU:2024-09945" />
			<reference href="https://bdu.fstec.ru/vul/2024-10034" type="self" id="BDU:2024-10034" title="BDU:2024-10034" />
			<reference href="https://bdu.fstec.ru/vul/2024-09755" type="self" id="BDU:2024-09755" title="BDU:2024-09755" />
			<reference href="https://bdu.fstec.ru/vul/2024-09754" type="self" id="BDU:2024-09754" title="BDU:2024-09754" />
			<reference href="https://bdu.fstec.ru/vul/2024-09931" type="self" id="BDU:2024-09931" title="BDU:2024-09931" />
			<reference href="https://bdu.fstec.ru/vul/2024-09930" type="self" id="BDU:2024-09930" title="BDU:2024-09930" />
			<reference href="https://bdu.fstec.ru/vul/2024-09927" type="self" id="BDU:2024-09927" title="BDU:2024-09927" />
			<reference href="https://bdu.fstec.ru/vul/2024-09925" type="self" id="BDU:2024-09925" title="BDU:2024-09925" />
			<reference href="https://bdu.fstec.ru/vul/2024-09921" type="self" id="BDU:2024-09921" title="BDU:2024-09921" />
			<reference href="https://bdu.fstec.ru/vul/2024-09923" type="self" id="BDU:2024-09923" title="BDU:2024-09923" />
			<reference href="https://bdu.fstec.ru/vul/2024-09919" type="self" id="BDU:2024-09919" title="BDU:2024-09919" />
			<reference href="https://bdu.fstec.ru/vul/2024-10033" type="self" id="BDU:2024-10033" title="BDU:2024-10033" />
			<reference href="https://bdu.fstec.ru/vul/2024-10032" type="self" id="BDU:2024-10032" title="BDU:2024-10032" />
			<reference href="https://bdu.fstec.ru/vul/2024-10031" type="self" id="BDU:2024-10031" title="BDU:2024-10031" />
			<reference href="https://bdu.fstec.ru/vul/2024-10030" type="self" id="BDU:2024-10030" title="BDU:2024-10030" />
			<reference href="https://bdu.fstec.ru/vul/2024-10029" type="self" id="BDU:2024-10029" title="BDU:2024-10029" />
			<reference href="https://bdu.fstec.ru/vul/2024-09722" type="self" id="BDU:2024-09722" title="BDU:2024-09722" />
			<reference href="https://bdu.fstec.ru/vul/2024-10028" type="self" id="BDU:2024-10028" title="BDU:2024-10028" />
			<reference href="https://bdu.fstec.ru/vul/2024-10027" type="self" id="BDU:2024-10027" title="BDU:2024-10027" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241108-03</id>
		<issued date="2024-11-08" />
		<updated date="2024-11-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-36978/</description>
               <solution>Установить обновление для пакета(ов) РЕД ОС</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-36978/" type="self" id="ROS-20241108-03" title="ROS-20241108-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36978" type="cve" id="CVE-2024-36978" title="CVE-2024-36978" />
			<reference href="https://bdu.fstec.ru/vul/2024-04680" type="self" id="BDU:2024-04680" title="BDU:2024-04680" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241023-09</id>
		<issued date="2024-11-11" />
		<updated date="2024-12-23" />
		<title>Уязвимость vim-common </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в vim-common</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-common-cve-2024-478149163/</description>
               <solution>
                    Запретить использование в ОС пакета vim-common
                или
                    Установить обновление для пакета(ов) vim-common
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-common-cve-2024-478149163/" type="self" id="ROS-20241023-09" title="ROS-20241023-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47814" type="cve" id="CVE-2024-47814" title="CVE-2024-47814" />
			<reference href="https://bdu.fstec.ru/vul/2024-08644" type="self" id="BDU:2024-08644" title="BDU:2024-08644" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-common" epoch="2" version="9.1.774" release="1.el7" arch="x86_64" src="">
					<filename>vim-common-2:9.1.774-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241023-08</id>
		<issued date="2024-11-11" />
		<updated date="2024-12-23" />
		<title>Уязвимость vim-minimal </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в vim-minimal</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-minimal-cve-2024-478142212/</description>
               <solution>
                    Запретить использование в ОС пакета vim-minimal
                или
                    Установить обновление для пакета(ов) vim-minimal
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-minimal-cve-2024-478142212/" type="self" id="ROS-20241023-08" title="ROS-20241023-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47814" type="cve" id="CVE-2024-47814" title="CVE-2024-47814" />
			<reference href="https://bdu.fstec.ru/vul/2024-08644" type="self" id="BDU:2024-08644" title="BDU:2024-08644" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-minimal" epoch="2" version="9.1.774" release="1.el7" arch="x86_64" src="">
					<filename>vim-minimal-2:9.1.774-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241023-07</id>
		<issued date="2024-11-11" />
		<updated date="2024-12-23" />
		<title>Уязвимость vim-data </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в vim-data</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-data-cve-2024-478149523/</description>
               <solution>
                    Запретить использование в ОС пакета vim-data
                или
                    Установить обновление для пакета(ов) vim-data
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-data-cve-2024-478149523/" type="self" id="ROS-20241023-07" title="ROS-20241023-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47814" type="cve" id="CVE-2024-47814" title="CVE-2024-47814" />
			<reference href="https://bdu.fstec.ru/vul/2024-08644" type="self" id="BDU:2024-08644" title="BDU:2024-08644" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-data" epoch="2" version="9.1.774" release="1.el7" arch="noarch" src="">
					<filename>vim-data-2:9.1.774-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241023-06</id>
		<issued date="2024-11-11" />
		<updated date="2024-12-23" />
		<title>Уязвимость vim-filesystem </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в vim-filesystem</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-filesystem-cve-2024-478143798/</description>
               <solution>
                    Запретить использование в ОС пакета vim-filesystem
                или
                    Установить обновление для пакета(ов) vim-filesystem
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-filesystem-cve-2024-478143798/" type="self" id="ROS-20241023-06" title="ROS-20241023-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47814" type="cve" id="CVE-2024-47814" title="CVE-2024-47814" />
			<reference href="https://bdu.fstec.ru/vul/2024-08644" type="self" id="BDU:2024-08644" title="BDU:2024-08644" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-filesystem" epoch="2" version="9.1.774" release="1.el7" arch="noarch" src="">
					<filename>vim-filesystem-2:9.1.774-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241112-01</id>
		<issued date="2024-11-12" />
		<updated date="2024-11-12" />
		<title>Уязвимость libgsasl </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libgsasl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libgsasl-cve-2022-2469/</description>
               <solution>
                    Запретить использование в ОС пакета libgsasl
                или
                    Установить обновление для пакета(ов) libgsasl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libgsasl-cve-2022-2469/" type="self" id="ROS-20241112-01" title="ROS-20241112-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2469" type="cve" id="CVE-2022-2469" title="CVE-2022-2469" />
			<reference href="https://bdu.fstec.ru/vul/2024-09877" type="self" id="BDU:2024-09877" title="BDU:2024-09877" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libgsasl" epoch="0" version="1.8.0" release="18.el7" arch="x86_64" src="">
					<filename>libgsasl-0:1.8.0-18.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241112-02</id>
		<issued date="2024-11-13" />
		<updated date="2024-11-13" />
		<title>Множественные уязвимости ansible </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в ansible</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-ansible-cve-2021-3620-cve-2023-5115-cve-2024-0690/</description>
               <solution>
                    Запретить использование в ОС пакета ansible
                или
                    Установить обновление для пакета(ов) ansible
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-ansible-cve-2021-3620-cve-2023-5115-cve-2024-0690/" type="self" id="ROS-20241112-02" title="ROS-20241112-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3620" type="cve" id="CVE-2021-3620" title="CVE-2021-3620" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5115" type="cve" id="CVE-2023-5115" title="CVE-2023-5115" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0690" type="cve" id="CVE-2024-0690" title="CVE-2024-0690" />
			<reference href="https://bdu.fstec.ru/vul/2024-06959" type="self" id="BDU:2024-06959" title="BDU:2024-06959" />
			<reference href="https://bdu.fstec.ru/vul/2023-06096" type="self" id="BDU:2023-06096" title="BDU:2023-06096" />
			<reference href="https://bdu.fstec.ru/vul/2024-01561" type="self" id="BDU:2024-01561" title="BDU:2024-01561" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ansible" epoch="0" version="6.7.0" release="1.el7" arch="noarch" src="">
					<filename>ansible-0:6.7.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240916-13</id>
		<issued date="2024-11-13" />
		<updated date="2024-12-23" />
		<title>Уязвимость python2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python2-cve-2023-27043937/</description>
               <solution>
                    Запретить использование в ОС пакета python2
                или
                    Установить обновление для пакета(ов) python2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python2-cve-2023-27043937/" type="self" id="ROS-20240916-13" title="ROS-20240916-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27043" type="cve" id="CVE-2023-27043" title="CVE-2023-27043" />
			<reference href="https://bdu.fstec.ru/vul/2023-04980" type="self" id="BDU:2023-04980" title="BDU:2023-04980" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python2" epoch="0" version="2.7.18" release="18.el7" arch="x86_64" src="">
					<filename>python2-0:2.7.18-18.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241112-03</id>
		<issued date="2024-11-13" />
		<updated date="2024-11-13" />
		<title>Множественные уязвимости packer </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в packer</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-packer-cve-2023-45288-cve-2024-28180/</description>
               <solution>
                    Запретить использование в ОС пакета packer
                или
                    Установить обновление для пакета(ов) packer
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-packer-cve-2023-45288-cve-2024-28180/" type="self" id="ROS-20241112-03" title="ROS-20241112-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45288" type="cve" id="CVE-2023-45288" title="CVE-2023-45288" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28180" type="cve" id="CVE-2024-28180" title="CVE-2024-28180" />
			<reference href="https://bdu.fstec.ru/vul/2024-02688" type="self" id="BDU:2024-02688" title="BDU:2024-02688" />
			<reference href="https://bdu.fstec.ru/vul/2024-01928" type="self" id="BDU:2024-01928" title="BDU:2024-01928" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="packer" epoch="0" version="1.11.1" release="1.el7" arch="x86_64" src="">
					<filename>packer-0:1.11.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241112-04</id>
		<issued date="2024-11-13" />
		<updated date="2024-11-13" />
		<title>Уязвимость python3-tornado </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-tornado</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-tornado-ghsa-w235-7p84-xx57/</description>
               <solution>
                    Запретить использование в ОС пакета python3-tornado
                или
                    Установить обновление для пакета(ов) python3-tornado
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-tornado-ghsa-w235-7p84-xx57/" type="self" id="ROS-20241112-04" title="ROS-20241112-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=" type="cve" id="" title="" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-tornado" epoch="0" version="6.3.3" release="2.el7" arch="x86_64" src="">
					<filename>python3-tornado-0:6.3.3-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241112-05</id>
		<issued date="2024-11-13" />
		<updated date="2024-11-13" />
		<title>Уязвимость xorg-x11-server </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в xorg-x11-server-common</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-xorg-x11-server-cve-2024-9632/</description>
               <solution>
                    Запретить использование в ОС пакета xorg-x11-server-common
                или
                    Установить обновление для пакета(ов) xorg-x11-server-common
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-xorg-x11-server-cve-2024-9632/" type="self" id="ROS-20241112-05" title="ROS-20241112-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9632" type="cve" id="CVE-2024-9632" title="CVE-2024-9632" />
			<reference href="https://bdu.fstec.ru/vul/2024-09084" type="self" id="BDU:2024-09084" title="BDU:2024-09084" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="xorg-x11-server-common" epoch="0" version="1.20.14" release="14.el7.3" arch="x86_64" src="">
					<filename>xorg-x11-server-common-0:1.20.14-14.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241112-06</id>
		<issued date="2024-11-13" />
		<updated date="2024-11-13" />
		<title>Уязвимость rubygem-rexml </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в rubygem-rexml</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-rexml-cve-2024-49761/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-rexml
                или
                    Установить обновление для пакета(ов) rubygem-rexml
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-rexml-cve-2024-49761/" type="self" id="ROS-20241112-06" title="ROS-20241112-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49761" type="cve" id="CVE-2024-49761" title="CVE-2024-49761" />
			<reference href="https://bdu.fstec.ru/vul/2024-09876" type="self" id="BDU:2024-09876" title="BDU:2024-09876" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-rexml" epoch="0" version="3.3.9" release="1.el7" arch="noarch" src="">
					<filename>rubygem-rexml-0:3.3.9-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241112-07</id>
		<issued date="2024-11-13" />
		<updated date="2024-11-13" />
		<title>Множественные уязвимости mosquitto </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в mosquitto</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mosquitto-cve-2024-10525-cve-2024-3935/</description>
               <solution>
                    Запретить использование в ОС пакета mosquitto
                или
                    Установить обновление для пакета(ов) mosquitto
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mosquitto-cve-2024-10525-cve-2024-3935/" type="self" id="ROS-20241112-07" title="ROS-20241112-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10525" type="cve" id="CVE-2024-10525" title="CVE-2024-10525" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3935" type="cve" id="CVE-2024-3935" title="CVE-2024-3935" />
			<reference href="https://bdu.fstec.ru/vul/2024-09881" type="self" id="BDU:2024-09881" title="BDU:2024-09881" />
			<reference href="https://bdu.fstec.ru/vul/2024-09880" type="self" id="BDU:2024-09880" title="BDU:2024-09880" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mosquitto" epoch="0" version="2.0.19" release="1.el7" arch="x86_64" src="">
					<filename>mosquitto-0:2.0.19-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241112-08</id>
		<issued date="2024-11-13" />
		<updated date="2024-11-13" />
		<title>Уязвимость vault </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в vault</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vault-cve-2024-8185/</description>
               <solution>
                    Запретить использование в ОС пакета vault
                или
                    Установить обновление для пакета(ов) vault
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vault-cve-2024-8185/" type="self" id="ROS-20241112-08" title="ROS-20241112-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8185" type="cve" id="CVE-2024-8185" title="CVE-2024-8185" />
			<reference href="https://bdu.fstec.ru/vul/2024-09085" type="self" id="BDU:2024-09085" title="BDU:2024-09085" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vault" epoch="0" version="1.18.1" release="1.el7" arch="x86_64" src="">
					<filename>vault-0:1.18.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241112-09</id>
		<issued date="2024-11-13" />
		<updated date="2024-11-13" />
		<title>Уязвимость consul </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в consul</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-consul-cve-2024-10006/</description>
               <solution>
                    Запретить использование в ОС пакета consul
                или
                    Установить обновление для пакета(ов) consul
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-consul-cve-2024-10006/" type="self" id="ROS-20241112-09" title="ROS-20241112-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10006" type="cve" id="CVE-2024-10006" title="CVE-2024-10006" />
			<reference href="https://bdu.fstec.ru/vul/2024-09879" type="self" id="BDU:2024-09879" title="BDU:2024-09879" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="consul" epoch="0" version="1.20.1" release="1.el7" arch="x86_64" src="">
					<filename>consul-0:1.20.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241112-10</id>
		<issued date="2024-11-13" />
		<updated date="2024-11-13" />
		<title>Уязвимость qbittorrent </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в qbittorrent</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qbittorrent-cve-2024-51774/</description>
               <solution>
                    Запретить использование в ОС пакета qbittorrent
                или
                    Установить обновление для пакета(ов) qbittorrent
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qbittorrent-cve-2024-51774/" type="self" id="ROS-20241112-10" title="ROS-20241112-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-51774" type="cve" id="CVE-2024-51774" title="CVE-2024-51774" />
			<reference href="https://bdu.fstec.ru/vul/2024-09433" type="self" id="BDU:2024-09433" title="BDU:2024-09433" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="qbittorrent" epoch="1" version="5.0.1" release="1.el7" arch="x86_64" src="">
					<filename>qbittorrent-1:5.0.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241112-11</id>
		<issued date="2024-11-13" />
		<updated date="2024-11-13" />
		<title>Множественные уязвимости nextcloud </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nextcloud</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nextcloud-cve-2023-35171-cve-2023-35927/</description>
               <solution>
                    Запретить использование в ОС пакета nextcloud
                или
                    Установить обновление для пакета(ов) nextcloud
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nextcloud-cve-2023-35171-cve-2023-35927/" type="self" id="ROS-20241112-11" title="ROS-20241112-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35171" type="cve" id="CVE-2023-35171" title="CVE-2023-35171" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35927" type="cve" id="CVE-2023-35927" title="CVE-2023-35927" />
			<reference href="https://bdu.fstec.ru/vul/2024-00714" type="self" id="BDU:2024-00714" title="BDU:2024-00714" />
			<reference href="https://bdu.fstec.ru/vul/2024-00715" type="self" id="BDU:2024-00715" title="BDU:2024-00715" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nextcloud" epoch="0" version="27.1.10" release="1.el7" arch="noarch" src="">
					<filename>nextcloud-0:27.1.10-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241112-12</id>
		<issued date="2024-11-13" />
		<updated date="2024-11-13" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-121124/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-121124/" type="self" id="ROS-20241112-12" title="ROS-20241112-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27433" type="cve" id="CVE-2024-27433" title="CVE-2024-27433" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27434" type="cve" id="CVE-2024-27434" title="CVE-2024-27434" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35786" type="cve" id="CVE-2024-35786" title="CVE-2024-35786" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35787" type="cve" id="CVE-2024-35787" title="CVE-2024-35787" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35792" type="cve" id="CVE-2024-35792" title="CVE-2024-35792" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52663" type="cve" id="CVE-2023-52663" title="CVE-2023-52663" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52668" type="cve" id="CVE-2023-52668" title="CVE-2023-52668" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35795" type="cve" id="CVE-2024-35795" title="CVE-2024-35795" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35797" type="cve" id="CVE-2024-35797" title="CVE-2024-35797" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35798" type="cve" id="CVE-2024-35798" title="CVE-2024-35798" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35800" type="cve" id="CVE-2024-35800" title="CVE-2024-35800" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35801" type="cve" id="CVE-2024-35801" title="CVE-2024-35801" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35810" type="cve" id="CVE-2024-35810" title="CVE-2024-35810" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35814" type="cve" id="CVE-2024-35814" title="CVE-2024-35814" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35816" type="cve" id="CVE-2024-35816" title="CVE-2024-35816" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35824" type="cve" id="CVE-2024-35824" title="CVE-2024-35824" />
			<reference href="https://bdu.fstec.ru/vul/2024-09970" type="self" id="BDU:2024-09970" title="BDU:2024-09970" />
			<reference href="https://bdu.fstec.ru/vul/2024-09954" type="self" id="BDU:2024-09954" title="BDU:2024-09954" />
			<reference href="https://bdu.fstec.ru/vul/2024-09958" type="self" id="BDU:2024-09958" title="BDU:2024-09958" />
			<reference href="https://bdu.fstec.ru/vul/2024-09956" type="self" id="BDU:2024-09956" title="BDU:2024-09956" />
			<reference href="https://bdu.fstec.ru/vul/2024-04231" type="self" id="BDU:2024-04231" title="BDU:2024-04231" />
			<reference href="https://bdu.fstec.ru/vul/2024-09957" type="self" id="BDU:2024-09957" title="BDU:2024-09957" />
			<reference href="https://bdu.fstec.ru/vul/2024-09982" type="self" id="BDU:2024-09982" title="BDU:2024-09982" />
			<reference href="https://bdu.fstec.ru/vul/2024-09942" type="self" id="BDU:2024-09942" title="BDU:2024-09942" />
			<reference href="https://bdu.fstec.ru/vul/2024-09940" type="self" id="BDU:2024-09940" title="BDU:2024-09940" />
			<reference href="https://bdu.fstec.ru/vul/2024-09941" type="self" id="BDU:2024-09941" title="BDU:2024-09941" />
			<reference href="https://bdu.fstec.ru/vul/2024-04230" type="self" id="BDU:2024-04230" title="BDU:2024-04230" />
			<reference href="https://bdu.fstec.ru/vul/2024-06989" type="self" id="BDU:2024-06989" title="BDU:2024-06989" />
			<reference href="https://bdu.fstec.ru/vul/2024-09959" type="self" id="BDU:2024-09959" title="BDU:2024-09959" />
			<reference href="https://bdu.fstec.ru/vul/2024-09974" type="self" id="BDU:2024-09974" title="BDU:2024-09974" />
			<reference href="https://bdu.fstec.ru/vul/2024-09960" type="self" id="BDU:2024-09960" title="BDU:2024-09960" />
			<reference href="https://bdu.fstec.ru/vul/2024-09981" type="self" id="BDU:2024-09981" title="BDU:2024-09981" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241029-11</id>
		<issued date="2024-11-13" />
		<updated date="2024-12-23" />
		<title>Уязвимость rubygem-actionmailer </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в rubygem-actionmailer</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimosti-rubygem--cve-2024-47889/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-actionmailer
                или
                    Установить обновление для пакета(ов) rubygem-actionmailer
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimosti-rubygem--cve-2024-47889/" type="self" id="ROS-20241029-11" title="ROS-20241029-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47889" type="cve" id="CVE-2024-47889" title="CVE-2024-47889" />
			<reference href="https://bdu.fstec.ru/vul/2024-09435" type="self" id="BDU:2024-09435" title="BDU:2024-09435" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-actionmailer" epoch="2" version="6.1.6.1" release="3.el7" arch="noarch" src="">
					<filename>rubygem-actionmailer-2:6.1.6.1-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241029-09</id>
		<issued date="2024-11-13" />
		<updated date="2024-12-23" />
		<title>Уязвимость rubygem-actiontext </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в rubygem-actiontext</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimosti-rubygemtext-cve-2024-47888/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-actiontext
                или
                    Установить обновление для пакета(ов) rubygem-actiontext
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimosti-rubygemtext-cve-2024-47888/" type="self" id="ROS-20241029-09" title="ROS-20241029-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47888" type="cve" id="CVE-2024-47888" title="CVE-2024-47888" />
			<reference href="https://bdu.fstec.ru/vul/2024-09437" type="self" id="BDU:2024-09437" title="BDU:2024-09437" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-actiontext" epoch="2" version="6.1.6.1" release="3.el7" arch="noarch" src="">
					<filename>rubygem-actiontext-2:6.1.6.1-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241113-01</id>
		<issued date="2024-11-13" />
		<updated date="2024-11-13" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-1311241/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-1311241/" type="self" id="ROS-20241113-01" title="ROS-20241113-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48690" type="cve" id="CVE-2022-48690" title="CVE-2022-48690" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48705" type="cve" id="CVE-2022-48705" title="CVE-2022-48705" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771" type="cve" id="CVE-2024-26771" title="CVE-2024-26771" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48699" type="cve" id="CVE-2022-48699" title="CVE-2022-48699" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48700" type="cve" id="CVE-2022-48700" title="CVE-2022-48700" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48701" type="cve" id="CVE-2022-48701" title="CVE-2022-48701" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48702" type="cve" id="CVE-2022-48702" title="CVE-2022-48702" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48695" type="cve" id="CVE-2022-48695" title="CVE-2022-48695" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48704" type="cve" id="CVE-2022-48704" title="CVE-2022-48704" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52654" type="cve" id="CVE-2023-52654" title="CVE-2023-52654" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27403" type="cve" id="CVE-2024-27403" title="CVE-2024-27403" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27410" type="cve" id="CVE-2024-27410" title="CVE-2024-27410" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35815" type="cve" id="CVE-2024-35815" title="CVE-2024-35815" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35817" type="cve" id="CVE-2024-35817" title="CVE-2024-35817" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35819" type="cve" id="CVE-2024-35819" title="CVE-2024-35819" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35821" type="cve" id="CVE-2024-35821" title="CVE-2024-35821" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35822" type="cve" id="CVE-2024-35822" title="CVE-2024-35822" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35823" type="cve" id="CVE-2024-35823" title="CVE-2024-35823" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35825" type="cve" id="CVE-2024-35825" title="CVE-2024-35825" />
			<reference href="https://bdu.fstec.ru/vul/2024-09987" type="self" id="BDU:2024-09987" title="BDU:2024-09987" />
			<reference href="https://bdu.fstec.ru/vul/2024-09986" type="self" id="BDU:2024-09986" title="BDU:2024-09986" />
			<reference href="https://bdu.fstec.ru/vul/2024-09159" type="self" id="BDU:2024-09159" title="BDU:2024-09159" />
			<reference href="https://bdu.fstec.ru/vul/2024-09766" type="self" id="BDU:2024-09766" title="BDU:2024-09766" />
			<reference href="https://bdu.fstec.ru/vul/2024-09764" type="self" id="BDU:2024-09764" title="BDU:2024-09764" />
			<reference href="https://bdu.fstec.ru/vul/2024-09762" type="self" id="BDU:2024-09762" title="BDU:2024-09762" />
			<reference href="https://bdu.fstec.ru/vul/2024-09760" type="self" id="BDU:2024-09760" title="BDU:2024-09760" />
			<reference href="https://bdu.fstec.ru/vul/2024-09713" type="self" id="BDU:2024-09713" title="BDU:2024-09713" />
			<reference href="https://bdu.fstec.ru/vul/2024-09710" type="self" id="BDU:2024-09710" title="BDU:2024-09710" />
			<reference href="https://bdu.fstec.ru/vul/2024-09707" type="self" id="BDU:2024-09707" title="BDU:2024-09707" />
			<reference href="https://bdu.fstec.ru/vul/2024-09804" type="self" id="BDU:2024-09804" title="BDU:2024-09804" />
			<reference href="https://bdu.fstec.ru/vul/2024-09802" type="self" id="BDU:2024-09802" title="BDU:2024-09802" />
			<reference href="https://bdu.fstec.ru/vul/2024-09721" type="self" id="BDU:2024-09721" title="BDU:2024-09721" />
			<reference href="https://bdu.fstec.ru/vul/2024-09716" type="self" id="BDU:2024-09716" title="BDU:2024-09716" />
			<reference href="https://bdu.fstec.ru/vul/2024-09969" type="self" id="BDU:2024-09969" title="BDU:2024-09969" />
			<reference href="https://bdu.fstec.ru/vul/2024-09938" type="self" id="BDU:2024-09938" title="BDU:2024-09938" />
			<reference href="https://bdu.fstec.ru/vul/2024-09933" type="self" id="BDU:2024-09933" title="BDU:2024-09933" />
			<reference href="https://bdu.fstec.ru/vul/2024-09917" type="self" id="BDU:2024-09917" title="BDU:2024-09917" />
			<reference href="https://bdu.fstec.ru/vul/2024-09915" type="self" id="BDU:2024-09915" title="BDU:2024-09915" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241113-02</id>
		<issued date="2024-11-13" />
		<updated date="2024-11-13" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-1311242/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-1311242/" type="self" id="ROS-20241113-02" title="ROS-20241113-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27404" type="cve" id="CVE-2024-27404" title="CVE-2024-27404" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27406" type="cve" id="CVE-2024-27406" title="CVE-2024-27406" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27409" type="cve" id="CVE-2024-27409" title="CVE-2024-27409" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52659" type="cve" id="CVE-2023-52659" title="CVE-2023-52659" />
			<reference href="https://bdu.fstec.ru/vul/2024-09985" type="self" id="BDU:2024-09985" title="BDU:2024-09985" />
			<reference href="https://bdu.fstec.ru/vul/2024-09984" type="self" id="BDU:2024-09984" title="BDU:2024-09984" />
			<reference href="https://bdu.fstec.ru/vul/2024-09983" type="self" id="BDU:2024-09983" title="BDU:2024-09983" />
			<reference href="https://bdu.fstec.ru/vul/2024-09955" type="self" id="BDU:2024-09955" title="BDU:2024-09955" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241114-01</id>
		<issued date="2024-11-14" />
		<updated date="2024-11-14" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-1411241/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-1411241/" type="self" id="ROS-20241114-01" title="ROS-20241114-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35897" type="cve" id="CVE-2024-35897" title="CVE-2024-35897" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52699" type="cve" id="CVE-2023-52699" title="CVE-2023-52699" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35922" type="cve" id="CVE-2024-35922" title="CVE-2024-35922" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35925" type="cve" id="CVE-2024-35925" title="CVE-2024-35925" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35927" type="cve" id="CVE-2024-35927" title="CVE-2024-35927" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35930" type="cve" id="CVE-2024-35930" title="CVE-2024-35930" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35933" type="cve" id="CVE-2024-35933" title="CVE-2024-35933" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35934" type="cve" id="CVE-2024-35934" title="CVE-2024-35934" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35935" type="cve" id="CVE-2024-35935" title="CVE-2024-35935" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35936" type="cve" id="CVE-2024-35936" title="CVE-2024-35936" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35938" type="cve" id="CVE-2024-35938" title="CVE-2024-35938" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35940" type="cve" id="CVE-2024-35940" title="CVE-2024-35940" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35890" type="cve" id="CVE-2024-35890" title="CVE-2024-35890" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35893" type="cve" id="CVE-2024-35893" title="CVE-2024-35893" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35895" type="cve" id="CVE-2024-35895" title="CVE-2024-35895" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35896" type="cve" id="CVE-2024-35896" title="CVE-2024-35896" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35898" type="cve" id="CVE-2024-35898" title="CVE-2024-35898" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35899" type="cve" id="CVE-2024-35899" title="CVE-2024-35899" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35900" type="cve" id="CVE-2024-35900" title="CVE-2024-35900" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35902" type="cve" id="CVE-2024-35902" title="CVE-2024-35902" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35905" type="cve" id="CVE-2024-35905" title="CVE-2024-35905" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35907" type="cve" id="CVE-2024-35907" title="CVE-2024-35907" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35910" type="cve" id="CVE-2024-35910" title="CVE-2024-35910" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35912" type="cve" id="CVE-2024-35912" title="CVE-2024-35912" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35915" type="cve" id="CVE-2024-35915" title="CVE-2024-35915" />
			<reference href="https://bdu.fstec.ru/vul/2024-09810" type="self" id="BDU:2024-09810" title="BDU:2024-09810" />
			<reference href="https://bdu.fstec.ru/vul/2024-09808" type="self" id="BDU:2024-09808" title="BDU:2024-09808" />
			<reference href="https://bdu.fstec.ru/vul/2024-09806" type="self" id="BDU:2024-09806" title="BDU:2024-09806" />
			<reference href="https://bdu.fstec.ru/vul/2024-09805" type="self" id="BDU:2024-09805" title="BDU:2024-09805" />
			<reference href="https://bdu.fstec.ru/vul/2024-09803" type="self" id="BDU:2024-09803" title="BDU:2024-09803" />
			<reference href="https://bdu.fstec.ru/vul/2024-09939" type="self" id="BDU:2024-09939" title="BDU:2024-09939" />
			<reference href="https://bdu.fstec.ru/vul/2024-09913" type="self" id="BDU:2024-09913" title="BDU:2024-09913" />
			<reference href="https://bdu.fstec.ru/vul/2024-09895" type="self" id="BDU:2024-09895" title="BDU:2024-09895" />
			<reference href="https://bdu.fstec.ru/vul/2024-09894" type="self" id="BDU:2024-09894" title="BDU:2024-09894" />
			<reference href="https://bdu.fstec.ru/vul/2024-09893" type="self" id="BDU:2024-09893" title="BDU:2024-09893" />
			<reference href="https://bdu.fstec.ru/vul/2024-09892" type="self" id="BDU:2024-09892" title="BDU:2024-09892" />
			<reference href="https://bdu.fstec.ru/vul/2024-09887" type="self" id="BDU:2024-09887" title="BDU:2024-09887" />
			<reference href="https://bdu.fstec.ru/vul/2024-09888" type="self" id="BDU:2024-09888" title="BDU:2024-09888" />
			<reference href="https://bdu.fstec.ru/vul/2024-09886" type="self" id="BDU:2024-09886" title="BDU:2024-09886" />
			<reference href="https://bdu.fstec.ru/vul/2024-09885" type="self" id="BDU:2024-09885" title="BDU:2024-09885" />
			<reference href="https://bdu.fstec.ru/vul/2024-09884" type="self" id="BDU:2024-09884" title="BDU:2024-09884" />
			<reference href="https://bdu.fstec.ru/vul/2024-09883" type="self" id="BDU:2024-09883" title="BDU:2024-09883" />
			<reference href="https://bdu.fstec.ru/vul/2024-09972" type="self" id="BDU:2024-09972" title="BDU:2024-09972" />
			<reference href="https://bdu.fstec.ru/vul/2024-09967" type="self" id="BDU:2024-09967" title="BDU:2024-09967" />
			<reference href="https://bdu.fstec.ru/vul/2024-09865" type="self" id="BDU:2024-09865" title="BDU:2024-09865" />
			<reference href="https://bdu.fstec.ru/vul/2024-09968" type="self" id="BDU:2024-09968" title="BDU:2024-09968" />
			<reference href="https://bdu.fstec.ru/vul/2024-09898" type="self" id="BDU:2024-09898" title="BDU:2024-09898" />
			<reference href="https://bdu.fstec.ru/vul/2024-09897" type="self" id="BDU:2024-09897" title="BDU:2024-09897" />
			<reference href="https://bdu.fstec.ru/vul/2024-09896" type="self" id="BDU:2024-09896" title="BDU:2024-09896" />
			<reference href="https://bdu.fstec.ru/vul/2024-09973" type="self" id="BDU:2024-09973" title="BDU:2024-09973" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241114-02</id>
		<issued date="2024-11-14" />
		<updated date="2024-11-14" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-1411242/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-1411242/" type="self" id="ROS-20241114-02" title="ROS-20241114-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35891" type="cve" id="CVE-2024-35891" title="CVE-2024-35891" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35892" type="cve" id="CVE-2024-35892" title="CVE-2024-35892" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35894" type="cve" id="CVE-2024-35894" title="CVE-2024-35894" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35901" type="cve" id="CVE-2024-35901" title="CVE-2024-35901" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35903" type="cve" id="CVE-2024-35903" title="CVE-2024-35903" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35908" type="cve" id="CVE-2024-35908" title="CVE-2024-35908" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35909" type="cve" id="CVE-2024-35909" title="CVE-2024-35909" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35911" type="cve" id="CVE-2024-35911" title="CVE-2024-35911" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35916" type="cve" id="CVE-2024-35916" title="CVE-2024-35916" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35917" type="cve" id="CVE-2024-35917" title="CVE-2024-35917" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35919" type="cve" id="CVE-2024-35919" title="CVE-2024-35919" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35920" type="cve" id="CVE-2024-35920" title="CVE-2024-35920" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35921" type="cve" id="CVE-2024-35921" title="CVE-2024-35921" />
			<reference href="https://bdu.fstec.ru/vul/2024-09961" type="self" id="BDU:2024-09961" title="BDU:2024-09961" />
			<reference href="https://bdu.fstec.ru/vul/2024-09980" type="self" id="BDU:2024-09980" title="BDU:2024-09980" />
			<reference href="https://bdu.fstec.ru/vul/2024-09962" type="self" id="BDU:2024-09962" title="BDU:2024-09962" />
			<reference href="https://bdu.fstec.ru/vul/2024-09979" type="self" id="BDU:2024-09979" title="BDU:2024-09979" />
			<reference href="https://bdu.fstec.ru/vul/2024-09978" type="self" id="BDU:2024-09978" title="BDU:2024-09978" />
			<reference href="https://bdu.fstec.ru/vul/2024-09963" type="self" id="BDU:2024-09963" title="BDU:2024-09963" />
			<reference href="https://bdu.fstec.ru/vul/2024-09964" type="self" id="BDU:2024-09964" title="BDU:2024-09964" />
			<reference href="https://bdu.fstec.ru/vul/2024-09977" type="self" id="BDU:2024-09977" title="BDU:2024-09977" />
			<reference href="https://bdu.fstec.ru/vul/2024-09971" type="self" id="BDU:2024-09971" title="BDU:2024-09971" />
			<reference href="https://bdu.fstec.ru/vul/2024-09965" type="self" id="BDU:2024-09965" title="BDU:2024-09965" />
			<reference href="https://bdu.fstec.ru/vul/2024-09976" type="self" id="BDU:2024-09976" title="BDU:2024-09976" />
			<reference href="https://bdu.fstec.ru/vul/2024-09966" type="self" id="BDU:2024-09966" title="BDU:2024-09966" />
			<reference href="https://bdu.fstec.ru/vul/2024-09975" type="self" id="BDU:2024-09975" title="BDU:2024-09975" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241115-01</id>
		<issued date="2024-11-15" />
		<updated date="2024-11-15" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-1511241/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-1511241/" type="self" id="ROS-20241115-01" title="ROS-20241115-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48708" type="cve" id="CVE-2022-48708" title="CVE-2022-48708" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48710" type="cve" id="CVE-2022-48710" title="CVE-2022-48710" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52702" type="cve" id="CVE-2023-52702" title="CVE-2023-52702" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52703" type="cve" id="CVE-2023-52703" title="CVE-2023-52703" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52705" type="cve" id="CVE-2023-52705" title="CVE-2023-52705" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35973" type="cve" id="CVE-2024-35973" title="CVE-2024-35973" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35976" type="cve" id="CVE-2024-35976" title="CVE-2024-35976" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35983" type="cve" id="CVE-2024-35983" title="CVE-2024-35983" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35988" type="cve" id="CVE-2024-35988" title="CVE-2024-35988" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35989" type="cve" id="CVE-2024-35989" title="CVE-2024-35989" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35996" type="cve" id="CVE-2024-35996" title="CVE-2024-35996" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36004" type="cve" id="CVE-2024-36004" title="CVE-2024-36004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36005" type="cve" id="CVE-2024-36005" title="CVE-2024-36005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36006" type="cve" id="CVE-2024-36006" title="CVE-2024-36006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36007" type="cve" id="CVE-2024-36007" title="CVE-2024-36007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48707" type="cve" id="CVE-2022-48707" title="CVE-2022-48707" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48709" type="cve" id="CVE-2022-48709" title="CVE-2022-48709" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52701" type="cve" id="CVE-2023-52701" title="CVE-2023-52701" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52704" type="cve" id="CVE-2023-52704" title="CVE-2023-52704" />
			<reference href="https://bdu.fstec.ru/vul/2025-04356" type="self" id="BDU:2025-04356" title="BDU:2025-04356" />
			<reference href="https://bdu.fstec.ru/vul/2025-04355" type="self" id="BDU:2025-04355" title="BDU:2025-04355" />
			<reference href="https://bdu.fstec.ru/vul/2025-10566" type="self" id="BDU:2025-10566" title="BDU:2025-10566" />
			<reference href="https://bdu.fstec.ru/vul/2025-15324" type="self" id="BDU:2025-15324" title="BDU:2025-15324" />
			<reference href="https://bdu.fstec.ru/vul/2025-14587" type="self" id="BDU:2025-14587" title="BDU:2025-14587" />
			<reference href="https://bdu.fstec.ru/vul/2025-03074" type="self" id="BDU:2025-03074" title="BDU:2025-03074" />
			<reference href="https://bdu.fstec.ru/vul/2025-04527" type="self" id="BDU:2025-04527" title="BDU:2025-04527" />
			<reference href="https://bdu.fstec.ru/vul/2025-03070" type="self" id="BDU:2025-03070" title="BDU:2025-03070" />
			<reference href="https://bdu.fstec.ru/vul/2025-03914" type="self" id="BDU:2025-03914" title="BDU:2025-03914" />
			<reference href="https://bdu.fstec.ru/vul/2025-03064" type="self" id="BDU:2025-03064" title="BDU:2025-03064" />
			<reference href="https://bdu.fstec.ru/vul/2025-08078" type="self" id="BDU:2025-08078" title="BDU:2025-08078" />
			<reference href="https://bdu.fstec.ru/vul/2025-03913" type="self" id="BDU:2025-03913" title="BDU:2025-03913" />
			<reference href="https://bdu.fstec.ru/vul/2025-03906" type="self" id="BDU:2025-03906" title="BDU:2025-03906" />
			<reference href="https://bdu.fstec.ru/vul/2025-03905" type="self" id="BDU:2025-03905" title="BDU:2025-03905" />
			<reference href="https://bdu.fstec.ru/vul/2025-03067" type="self" id="BDU:2025-03067" title="BDU:2025-03067" />
			<reference href="https://bdu.fstec.ru/vul/2025-04448" type="self" id="BDU:2025-04448" title="BDU:2025-04448" />
			<reference href="https://bdu.fstec.ru/vul/2025-04447" type="self" id="BDU:2025-04447" title="BDU:2025-04447" />
			<reference href="https://bdu.fstec.ru/vul/2025-15383" type="self" id="BDU:2025-15383" title="BDU:2025-15383" />
			<reference href="https://bdu.fstec.ru/vul/2025-14586" type="self" id="BDU:2025-14586" title="BDU:2025-14586" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241115-02</id>
		<issued date="2024-11-15" />
		<updated date="2024-11-15" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-1511242/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-1511242/" type="self" id="ROS-20241115-02" title="ROS-20241115-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35972" type="cve" id="CVE-2024-35972" title="CVE-2024-35972" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35975" type="cve" id="CVE-2024-35975" title="CVE-2024-35975" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35977" type="cve" id="CVE-2024-35977" title="CVE-2024-35977" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35979" type="cve" id="CVE-2024-35979" title="CVE-2024-35979" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35980" type="cve" id="CVE-2024-35980" title="CVE-2024-35980" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35981" type="cve" id="CVE-2024-35981" title="CVE-2024-35981" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35985" type="cve" id="CVE-2024-35985" title="CVE-2024-35985" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35986" type="cve" id="CVE-2024-35986" title="CVE-2024-35986" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35987" type="cve" id="CVE-2024-35987" title="CVE-2024-35987" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35991" type="cve" id="CVE-2024-35991" title="CVE-2024-35991" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35992" type="cve" id="CVE-2024-35992" title="CVE-2024-35992" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35993" type="cve" id="CVE-2024-35993" title="CVE-2024-35993" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36003" type="cve" id="CVE-2024-36003" title="CVE-2024-36003" />
			<reference href="https://bdu.fstec.ru/vul/2025-03075" type="self" id="BDU:2025-03075" title="BDU:2025-03075" />
			<reference href="https://bdu.fstec.ru/vul/2025-03073" type="self" id="BDU:2025-03073" title="BDU:2025-03073" />
			<reference href="https://bdu.fstec.ru/vul/2025-15107" type="self" id="BDU:2025-15107" title="BDU:2025-15107" />
			<reference href="https://bdu.fstec.ru/vul/2024-04215" type="self" id="BDU:2024-04215" title="BDU:2024-04215" />
			<reference href="https://bdu.fstec.ru/vul/2025-03072" type="self" id="BDU:2025-03072" title="BDU:2025-03072" />
			<reference href="https://bdu.fstec.ru/vul/2025-03071" type="self" id="BDU:2025-03071" title="BDU:2025-03071" />
			<reference href="https://bdu.fstec.ru/vul/2025-03069" type="self" id="BDU:2025-03069" title="BDU:2025-03069" />
			<reference href="https://bdu.fstec.ru/vul/2025-03068" type="self" id="BDU:2025-03068" title="BDU:2025-03068" />
			<reference href="https://bdu.fstec.ru/vul/2025-08081" type="self" id="BDU:2025-08081" title="BDU:2025-08081" />
			<reference href="https://bdu.fstec.ru/vul/2025-08080" type="self" id="BDU:2025-08080" title="BDU:2025-08080" />
			<reference href="https://bdu.fstec.ru/vul/2025-03066" type="self" id="BDU:2025-03066" title="BDU:2025-03066" />
			<reference href="https://bdu.fstec.ru/vul/2025-08079" type="self" id="BDU:2025-08079" title="BDU:2025-08079" />
			<reference href="https://bdu.fstec.ru/vul/2025-03063" type="self" id="BDU:2025-03063" title="BDU:2025-03063" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241118-01</id>
		<issued date="2024-11-18" />
		<updated date="2024-11-18" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-1811241/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-1811241/" type="self" id="ROS-20241118-01" title="ROS-20241118-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35848" type="cve" id="CVE-2024-35848" title="CVE-2024-35848" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35849" type="cve" id="CVE-2024-35849" title="CVE-2024-35849" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35851" type="cve" id="CVE-2024-35851" title="CVE-2024-35851" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35852" type="cve" id="CVE-2024-35852" title="CVE-2024-35852" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35853" type="cve" id="CVE-2024-35853" title="CVE-2024-35853" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35857" type="cve" id="CVE-2024-35857" title="CVE-2024-35857" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35877" type="cve" id="CVE-2024-35877" title="CVE-2024-35877" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35944" type="cve" id="CVE-2024-35944" title="CVE-2024-35944" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35947" type="cve" id="CVE-2024-35947" title="CVE-2024-35947" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35950" type="cve" id="CVE-2024-35950" title="CVE-2024-35950" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35958" type="cve" id="CVE-2024-35958" title="CVE-2024-35958" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35960" type="cve" id="CVE-2024-35960" title="CVE-2024-35960" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35962" type="cve" id="CVE-2024-35962" title="CVE-2024-35962" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35871" type="cve" id="CVE-2024-35871" title="CVE-2024-35871" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35872" type="cve" id="CVE-2024-35872" title="CVE-2024-35872" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35879" type="cve" id="CVE-2024-35879" title="CVE-2024-35879" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35884" type="cve" id="CVE-2024-35884" title="CVE-2024-35884" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35885" type="cve" id="CVE-2024-35885" title="CVE-2024-35885" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35886" type="cve" id="CVE-2024-35886" title="CVE-2024-35886" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35888" type="cve" id="CVE-2024-35888" title="CVE-2024-35888" />
			<reference href="https://bdu.fstec.ru/vul/2024-10068" type="self" id="BDU:2024-10068" title="BDU:2024-10068" />
			<reference href="https://bdu.fstec.ru/vul/2024-10067" type="self" id="BDU:2024-10067" title="BDU:2024-10067" />
			<reference href="https://bdu.fstec.ru/vul/2024-10072" type="self" id="BDU:2024-10072" title="BDU:2024-10072" />
			<reference href="https://bdu.fstec.ru/vul/2024-10071" type="self" id="BDU:2024-10071" title="BDU:2024-10071" />
			<reference href="https://bdu.fstec.ru/vul/2024-10037" type="self" id="BDU:2024-10037" title="BDU:2024-10037" />
			<reference href="https://bdu.fstec.ru/vul/2024-10066" type="self" id="BDU:2024-10066" title="BDU:2024-10066" />
			<reference href="https://bdu.fstec.ru/vul/2024-10065" type="self" id="BDU:2024-10065" title="BDU:2024-10065" />
			<reference href="https://bdu.fstec.ru/vul/2024-10064" type="self" id="BDU:2024-10064" title="BDU:2024-10064" />
			<reference href="https://bdu.fstec.ru/vul/2024-10063" type="self" id="BDU:2024-10063" title="BDU:2024-10063" />
			<reference href="https://bdu.fstec.ru/vul/2024-10062" type="self" id="BDU:2024-10062" title="BDU:2024-10062" />
			<reference href="https://bdu.fstec.ru/vul/2024-10070" type="self" id="BDU:2024-10070" title="BDU:2024-10070" />
			<reference href="https://bdu.fstec.ru/vul/2024-10061" type="self" id="BDU:2024-10061" title="BDU:2024-10061" />
			<reference href="https://bdu.fstec.ru/vul/2024-10060" type="self" id="BDU:2024-10060" title="BDU:2024-10060" />
			<reference href="https://bdu.fstec.ru/vul/2024-10059" type="self" id="BDU:2024-10059" title="BDU:2024-10059" />
			<reference href="https://bdu.fstec.ru/vul/2024-10057" type="self" id="BDU:2024-10057" title="BDU:2024-10057" />
			<reference href="https://bdu.fstec.ru/vul/2024-10055" type="self" id="BDU:2024-10055" title="BDU:2024-10055" />
			<reference href="https://bdu.fstec.ru/vul/2024-10053" type="self" id="BDU:2024-10053" title="BDU:2024-10053" />
			<reference href="https://bdu.fstec.ru/vul/2024-10052" type="self" id="BDU:2024-10052" title="BDU:2024-10052" />
			<reference href="https://bdu.fstec.ru/vul/2024-10050" type="self" id="BDU:2024-10050" title="BDU:2024-10050" />
			<reference href="https://bdu.fstec.ru/vul/2024-10048" type="self" id="BDU:2024-10048" title="BDU:2024-10048" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241118-02</id>
		<issued date="2024-11-18" />
		<updated date="2024-11-18" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-1811242/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-1811242/" type="self" id="ROS-20241118-02" title="ROS-20241118-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35850" type="cve" id="CVE-2024-35850" title="CVE-2024-35850" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35856" type="cve" id="CVE-2024-35856" title="CVE-2024-35856" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35858" type="cve" id="CVE-2024-35858" title="CVE-2024-35858" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35880" type="cve" id="CVE-2024-35880" title="CVE-2024-35880" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35882" type="cve" id="CVE-2024-35882" title="CVE-2024-35882" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35883" type="cve" id="CVE-2024-35883" title="CVE-2024-35883" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35952" type="cve" id="CVE-2024-35952" title="CVE-2024-35952" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35953" type="cve" id="CVE-2024-35953" title="CVE-2024-35953" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35954" type="cve" id="CVE-2024-35954" title="CVE-2024-35954" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35959" type="cve" id="CVE-2024-35959" title="CVE-2024-35959" />
			<reference href="https://bdu.fstec.ru/vul/2024-10047" type="self" id="BDU:2024-10047" title="BDU:2024-10047" />
			<reference href="https://bdu.fstec.ru/vul/2024-10046" type="self" id="BDU:2024-10046" title="BDU:2024-10046" />
			<reference href="https://bdu.fstec.ru/vul/2024-10044" type="self" id="BDU:2024-10044" title="BDU:2024-10044" />
			<reference href="https://bdu.fstec.ru/vul/2024-10043" type="self" id="BDU:2024-10043" title="BDU:2024-10043" />
			<reference href="https://bdu.fstec.ru/vul/2024-10042" type="self" id="BDU:2024-10042" title="BDU:2024-10042" />
			<reference href="https://bdu.fstec.ru/vul/2024-10041" type="self" id="BDU:2024-10041" title="BDU:2024-10041" />
			<reference href="https://bdu.fstec.ru/vul/2024-10040" type="self" id="BDU:2024-10040" title="BDU:2024-10040" />
			<reference href="https://bdu.fstec.ru/vul/2024-10039" type="self" id="BDU:2024-10039" title="BDU:2024-10039" />
			<reference href="https://bdu.fstec.ru/vul/2024-10038" type="self" id="BDU:2024-10038" title="BDU:2024-10038" />
			<reference href="https://bdu.fstec.ru/vul/2024-10069" type="self" id="BDU:2024-10069" title="BDU:2024-10069" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241119-01</id>
		<issued date="2024-11-19" />
		<updated date="2024-11-19" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-1911241/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-1911241/" type="self" id="ROS-20241119-01" title="ROS-20241119-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52754" type="cve" id="CVE-2023-52754" title="CVE-2023-52754" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52759" type="cve" id="CVE-2023-52759" title="CVE-2023-52759" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52762" type="cve" id="CVE-2023-52762" title="CVE-2023-52762" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52763" type="cve" id="CVE-2023-52763" title="CVE-2023-52763" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52764" type="cve" id="CVE-2023-52764" title="CVE-2023-52764" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52766" type="cve" id="CVE-2023-52766" title="CVE-2023-52766" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52768" type="cve" id="CVE-2023-52768" title="CVE-2023-52768" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52774" type="cve" id="CVE-2023-52774" title="CVE-2023-52774" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52775" type="cve" id="CVE-2023-52775" title="CVE-2023-52775" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52781" type="cve" id="CVE-2023-52781" title="CVE-2023-52781" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52784" type="cve" id="CVE-2023-52784" title="CVE-2023-52784" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52788" type="cve" id="CVE-2023-52788" title="CVE-2023-52788" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52789" type="cve" id="CVE-2023-52789" title="CVE-2023-52789" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52790" type="cve" id="CVE-2023-52790" title="CVE-2023-52790" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52791" type="cve" id="CVE-2023-52791" title="CVE-2023-52791" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52796" type="cve" id="CVE-2023-52796" title="CVE-2023-52796" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52798" type="cve" id="CVE-2023-52798" title="CVE-2023-52798" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52799" type="cve" id="CVE-2023-52799" title="CVE-2023-52799" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52800" type="cve" id="CVE-2023-52800" title="CVE-2023-52800" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52803" type="cve" id="CVE-2023-52803" title="CVE-2023-52803" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52804" type="cve" id="CVE-2023-52804" title="CVE-2023-52804" />
			<reference href="https://bdu.fstec.ru/vul/2024-10417" type="self" id="BDU:2024-10417" title="BDU:2024-10417" />
			<reference href="https://bdu.fstec.ru/vul/2024-10396" type="self" id="BDU:2024-10396" title="BDU:2024-10396" />
			<reference href="https://bdu.fstec.ru/vul/2025-14592" type="self" id="BDU:2025-14592" title="BDU:2025-14592" />
			<reference href="https://bdu.fstec.ru/vul/2025-15439" type="self" id="BDU:2025-15439" title="BDU:2025-15439" />
			<reference href="https://bdu.fstec.ru/vul/2025-15326" type="self" id="BDU:2025-15326" title="BDU:2025-15326" />
			<reference href="https://bdu.fstec.ru/vul/2025-07498" type="self" id="BDU:2025-07498" title="BDU:2025-07498" />
			<reference href="https://bdu.fstec.ru/vul/2025-14297" type="self" id="BDU:2025-14297" title="BDU:2025-14297" />
			<reference href="https://bdu.fstec.ru/vul/2025-07713" type="self" id="BDU:2025-07713" title="BDU:2025-07713" />
			<reference href="https://bdu.fstec.ru/vul/2025-07714" type="self" id="BDU:2025-07714" title="BDU:2025-07714" />
			<reference href="https://bdu.fstec.ru/vul/2025-07716" type="self" id="BDU:2025-07716" title="BDU:2025-07716" />
			<reference href="https://bdu.fstec.ru/vul/2025-15327" type="self" id="BDU:2025-15327" title="BDU:2025-15327" />
			<reference href="https://bdu.fstec.ru/vul/2025-10571" type="self" id="BDU:2025-10571" title="BDU:2025-10571" />
			<reference href="https://bdu.fstec.ru/vul/2025-15437" type="self" id="BDU:2025-15437" title="BDU:2025-15437" />
			<reference href="https://bdu.fstec.ru/vul/2025-15329" type="self" id="BDU:2025-15329" title="BDU:2025-15329" />
			<reference href="https://bdu.fstec.ru/vul/2025-15341" type="self" id="BDU:2025-15341" title="BDU:2025-15341" />
			<reference href="https://bdu.fstec.ru/vul/2025-07410" type="self" id="BDU:2025-07410" title="BDU:2025-07410" />
			<reference href="https://bdu.fstec.ru/vul/2025-15349" type="self" id="BDU:2025-15349" title="BDU:2025-15349" />
			<reference href="https://bdu.fstec.ru/vul/2025-15330" type="self" id="BDU:2025-15330" title="BDU:2025-15330" />
			<reference href="https://bdu.fstec.ru/vul/2025-15328" type="self" id="BDU:2025-15328" title="BDU:2025-15328" />
			<reference href="https://bdu.fstec.ru/vul/2025-15387" type="self" id="BDU:2025-15387" title="BDU:2025-15387" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241119-02</id>
		<issued date="2024-11-19" />
		<updated date="2024-11-19" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-1911242/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-1911242/" type="self" id="ROS-20241119-02" title="ROS-20241119-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52765" type="cve" id="CVE-2023-52765" title="CVE-2023-52765" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52767" type="cve" id="CVE-2023-52767" title="CVE-2023-52767" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52769" type="cve" id="CVE-2023-52769" title="CVE-2023-52769" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52773" type="cve" id="CVE-2023-52773" title="CVE-2023-52773" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52776" type="cve" id="CVE-2023-52776" title="CVE-2023-52776" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52777" type="cve" id="CVE-2023-52777" title="CVE-2023-52777" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52778" type="cve" id="CVE-2023-52778" title="CVE-2023-52778" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52779" type="cve" id="CVE-2023-52779" title="CVE-2023-52779" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52780" type="cve" id="CVE-2023-52780" title="CVE-2023-52780" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52782" type="cve" id="CVE-2023-52782" title="CVE-2023-52782" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52783" type="cve" id="CVE-2023-52783" title="CVE-2023-52783" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52785" type="cve" id="CVE-2023-52785" title="CVE-2023-52785" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52786" type="cve" id="CVE-2023-52786" title="CVE-2023-52786" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52787" type="cve" id="CVE-2023-52787" title="CVE-2023-52787" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52792" type="cve" id="CVE-2023-52792" title="CVE-2023-52792" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52794" type="cve" id="CVE-2023-52794" title="CVE-2023-52794" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52795" type="cve" id="CVE-2023-52795" title="CVE-2023-52795" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52801" type="cve" id="CVE-2023-52801" title="CVE-2023-52801" />
			<reference href="https://bdu.fstec.ru/vul/2024-06981" type="self" id="BDU:2024-06981" title="BDU:2024-06981" />
			<reference href="https://bdu.fstec.ru/vul/2025-15391" type="self" id="BDU:2025-15391" title="BDU:2025-15391" />
			<reference href="https://bdu.fstec.ru/vul/2024-04578" type="self" id="BDU:2024-04578" title="BDU:2024-04578" />
			<reference href="https://bdu.fstec.ru/vul/2025-10563" type="self" id="BDU:2025-10563" title="BDU:2025-10563" />
			<reference href="https://bdu.fstec.ru/vul/2025-14296" type="self" id="BDU:2025-14296" title="BDU:2025-14296" />
			<reference href="https://bdu.fstec.ru/vul/2025-07483" type="self" id="BDU:2025-07483" title="BDU:2025-07483" />
			<reference href="https://bdu.fstec.ru/vul/2025-15325" type="self" id="BDU:2025-15325" title="BDU:2025-15325" />
			<reference href="https://bdu.fstec.ru/vul/2025-07715" type="self" id="BDU:2025-07715" title="BDU:2025-07715" />
			<reference href="https://bdu.fstec.ru/vul/2025-10562" type="self" id="BDU:2025-10562" title="BDU:2025-10562" />
			<reference href="https://bdu.fstec.ru/vul/2025-06377" type="self" id="BDU:2025-06377" title="BDU:2025-06377" />
			<reference href="https://bdu.fstec.ru/vul/2024-10224" type="self" id="BDU:2024-10224" title="BDU:2024-10224" />
			<reference href="https://bdu.fstec.ru/vul/2024-10220" type="self" id="BDU:2024-10220" title="BDU:2024-10220" />
			<reference href="https://bdu.fstec.ru/vul/2024-10216" type="self" id="BDU:2024-10216" title="BDU:2024-10216" />
			<reference href="https://bdu.fstec.ru/vul/2024-10211" type="self" id="BDU:2024-10211" title="BDU:2024-10211" />
			<reference href="https://bdu.fstec.ru/vul/2024-10210" type="self" id="BDU:2024-10210" title="BDU:2024-10210" />
			<reference href="https://bdu.fstec.ru/vul/2024-10196" type="self" id="BDU:2024-10196" title="BDU:2024-10196" />
			<reference href="https://bdu.fstec.ru/vul/2024-10185" type="self" id="BDU:2024-10185" title="BDU:2024-10185" />
			<reference href="https://bdu.fstec.ru/vul/2024-10184" type="self" id="BDU:2024-10184" title="BDU:2024-10184" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241120-01</id>
		<issued date="2024-11-20" />
		<updated date="2024-11-20" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-2011241/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-2011241/" type="self" id="ROS-20241120-01" title="ROS-20241120-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52839" type="cve" id="CVE-2023-52839" title="CVE-2023-52839" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52842" type="cve" id="CVE-2023-52842" title="CVE-2023-52842" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52848" type="cve" id="CVE-2023-52848" title="CVE-2023-52848" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52850" type="cve" id="CVE-2023-52850" title="CVE-2023-52850" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52851" type="cve" id="CVE-2023-52851" title="CVE-2023-52851" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52860" type="cve" id="CVE-2023-52860" title="CVE-2023-52860" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52861" type="cve" id="CVE-2023-52861" title="CVE-2023-52861" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52862" type="cve" id="CVE-2023-52862" title="CVE-2023-52862" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52866" type="cve" id="CVE-2023-52866" title="CVE-2023-52866" />
			<reference href="https://bdu.fstec.ru/vul/2024-10405" type="self" id="BDU:2024-10405" title="BDU:2024-10405" />
			<reference href="https://bdu.fstec.ru/vul/2024-10406" type="self" id="BDU:2024-10406" title="BDU:2024-10406" />
			<reference href="https://bdu.fstec.ru/vul/2024-10407" type="self" id="BDU:2024-10407" title="BDU:2024-10407" />
			<reference href="https://bdu.fstec.ru/vul/2024-10408" type="self" id="BDU:2024-10408" title="BDU:2024-10408" />
			<reference href="https://bdu.fstec.ru/vul/2024-10410" type="self" id="BDU:2024-10410" title="BDU:2024-10410" />
			<reference href="https://bdu.fstec.ru/vul/2024-10413" type="self" id="BDU:2024-10413" title="BDU:2024-10413" />
			<reference href="https://bdu.fstec.ru/vul/2024-06984" type="self" id="BDU:2024-06984" title="BDU:2024-06984" />
			<reference href="https://bdu.fstec.ru/vul/2024-10404" type="self" id="BDU:2024-10404" title="BDU:2024-10404" />
			<reference href="https://bdu.fstec.ru/vul/2024-10415" type="self" id="BDU:2024-10415" title="BDU:2024-10415" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241120-02</id>
		<issued date="2024-11-20" />
		<updated date="2024-11-20" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-2011242/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-2011242/" type="self" id="ROS-20241120-02" title="ROS-20241120-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52828" type="cve" id="CVE-2023-52828" title="CVE-2023-52828" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52833" type="cve" id="CVE-2023-52833" title="CVE-2023-52833" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52834" type="cve" id="CVE-2023-52834" title="CVE-2023-52834" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52835" type="cve" id="CVE-2023-52835" title="CVE-2023-52835" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52836" type="cve" id="CVE-2023-52836" title="CVE-2023-52836" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52838" type="cve" id="CVE-2023-52838" title="CVE-2023-52838" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52840" type="cve" id="CVE-2023-52840" title="CVE-2023-52840" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52841" type="cve" id="CVE-2023-52841" title="CVE-2023-52841" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52843" type="cve" id="CVE-2023-52843" title="CVE-2023-52843" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52845" type="cve" id="CVE-2023-52845" title="CVE-2023-52845" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52846" type="cve" id="CVE-2023-52846" title="CVE-2023-52846" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52847" type="cve" id="CVE-2023-52847" title="CVE-2023-52847" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52849" type="cve" id="CVE-2023-52849" title="CVE-2023-52849" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52853" type="cve" id="CVE-2023-52853" title="CVE-2023-52853" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52854" type="cve" id="CVE-2023-52854" title="CVE-2023-52854" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52855" type="cve" id="CVE-2023-52855" title="CVE-2023-52855" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52856" type="cve" id="CVE-2023-52856" title="CVE-2023-52856" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52859" type="cve" id="CVE-2023-52859" title="CVE-2023-52859" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52863" type="cve" id="CVE-2023-52863" title="CVE-2023-52863" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52864" type="cve" id="CVE-2023-52864" title="CVE-2023-52864" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52865" type="cve" id="CVE-2023-52865" title="CVE-2023-52865" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52867" type="cve" id="CVE-2023-52867" title="CVE-2023-52867" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52868" type="cve" id="CVE-2023-52868" title="CVE-2023-52868" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52870" type="cve" id="CVE-2023-52870" title="CVE-2023-52870" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52871" type="cve" id="CVE-2023-52871" title="CVE-2023-52871" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52872" type="cve" id="CVE-2023-52872" title="CVE-2023-52872" />
			<reference href="https://bdu.fstec.ru/vul/2024-10414" type="self" id="BDU:2024-10414" title="BDU:2024-10414" />
			<reference href="https://bdu.fstec.ru/vul/2024-10257" type="self" id="BDU:2024-10257" title="BDU:2024-10257" />
			<reference href="https://bdu.fstec.ru/vul/2024-10256" type="self" id="BDU:2024-10256" title="BDU:2024-10256" />
			<reference href="https://bdu.fstec.ru/vul/2024-10255" type="self" id="BDU:2024-10255" title="BDU:2024-10255" />
			<reference href="https://bdu.fstec.ru/vul/2024-10253" type="self" id="BDU:2024-10253" title="BDU:2024-10253" />
			<reference href="https://bdu.fstec.ru/vul/2024-10252" type="self" id="BDU:2024-10252" title="BDU:2024-10252" />
			<reference href="https://bdu.fstec.ru/vul/2024-10254" type="self" id="BDU:2024-10254" title="BDU:2024-10254" />
			<reference href="https://bdu.fstec.ru/vul/2024-10230" type="self" id="BDU:2024-10230" title="BDU:2024-10230" />
			<reference href="https://bdu.fstec.ru/vul/2024-10265" type="self" id="BDU:2024-10265" title="BDU:2024-10265" />
			<reference href="https://bdu.fstec.ru/vul/2024-10258" type="self" id="BDU:2024-10258" title="BDU:2024-10258" />
			<reference href="https://bdu.fstec.ru/vul/2024-10207" type="self" id="BDU:2024-10207" title="BDU:2024-10207" />
			<reference href="https://bdu.fstec.ru/vul/2024-10206" type="self" id="BDU:2024-10206" title="BDU:2024-10206" />
			<reference href="https://bdu.fstec.ru/vul/2024-10205" type="self" id="BDU:2024-10205" title="BDU:2024-10205" />
			<reference href="https://bdu.fstec.ru/vul/2024-10204" type="self" id="BDU:2024-10204" title="BDU:2024-10204" />
			<reference href="https://bdu.fstec.ru/vul/2024-10203" type="self" id="BDU:2024-10203" title="BDU:2024-10203" />
			<reference href="https://bdu.fstec.ru/vul/2024-10197" type="self" id="BDU:2024-10197" title="BDU:2024-10197" />
			<reference href="https://bdu.fstec.ru/vul/2024-10209" type="self" id="BDU:2024-10209" title="BDU:2024-10209" />
			<reference href="https://bdu.fstec.ru/vul/2024-10208" type="self" id="BDU:2024-10208" title="BDU:2024-10208" />
			<reference href="https://bdu.fstec.ru/vul/2024-10202" type="self" id="BDU:2024-10202" title="BDU:2024-10202" />
			<reference href="https://bdu.fstec.ru/vul/2024-10416" type="self" id="BDU:2024-10416" title="BDU:2024-10416" />
			<reference href="https://bdu.fstec.ru/vul/2024-10412" type="self" id="BDU:2024-10412" title="BDU:2024-10412" />
			<reference href="https://bdu.fstec.ru/vul/2024-10403" type="self" id="BDU:2024-10403" title="BDU:2024-10403" />
			<reference href="https://bdu.fstec.ru/vul/2024-10398" type="self" id="BDU:2024-10398" title="BDU:2024-10398" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241121-01</id>
		<issued date="2024-11-21" />
		<updated date="2024-11-21" />
		<title>Множественные уязвимости moodle</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-moodle-2111241/</description>
               <solution>
                    Запретить использование в ОС пакета Moodle
                или
                    Установить обновление для пакета(ов) Moodle
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-moodle-2111241/" type="self" id="ROS-20241121-01" title="ROS-20241121-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45691" type="cve" id="CVE-2024-45691" title="CVE-2024-45691" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45690" type="cve" id="CVE-2024-45690" title="CVE-2024-45690" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48901" type="cve" id="CVE-2024-48901" title="CVE-2024-48901" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48898" type="cve" id="CVE-2024-48898" title="CVE-2024-48898" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48897" type="cve" id="CVE-2024-48897" title="CVE-2024-48897" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48896" type="cve" id="CVE-2024-48896" title="CVE-2024-48896" />
			<reference href="https://bdu.fstec.ru/vul/2024-10260" type="self" id="BDU:2024-10260" title="BDU:2024-10260" />
			<reference href="https://bdu.fstec.ru/vul/2024-10259" type="self" id="BDU:2024-10259" title="BDU:2024-10259" />
			<reference href="https://bdu.fstec.ru/vul/2024-10262" type="self" id="BDU:2024-10262" title="BDU:2024-10262" />
			<reference href="https://bdu.fstec.ru/vul/2024-10261" type="self" id="BDU:2024-10261" title="BDU:2024-10261" />
			<reference href="https://bdu.fstec.ru/vul/2024-10263" type="self" id="BDU:2024-10263" title="BDU:2024-10263" />
			<reference href="https://bdu.fstec.ru/vul/2024-10264" type="self" id="BDU:2024-10264" title="BDU:2024-10264" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="moodle" epoch="0" version="4.2.11" release="1.el7" arch="noarch" src="">
					<filename>moodle-0:4.2.11-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241121-02</id>
		<issued date="2024-11-21" />
		<updated date="2024-11-21" />
		<title>Уязвимость python3-openstackclient </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-openstackclient</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-openstackclient-cve-2023-6110/</description>
               <solution>
                    Запретить использование в ОС пакета python3-openstackclient
                или
                    Установить обновление для пакета(ов) python3-openstackclient
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-openstackclient-cve-2023-6110/" type="self" id="ROS-20241121-02" title="ROS-20241121-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6110" type="cve" id="CVE-2023-6110" title="CVE-2023-6110" />
			<reference href="https://bdu.fstec.ru/vul/2024-10195" type="self" id="BDU:2024-10195" title="BDU:2024-10195" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-openstackclient" epoch="0" version="6.6.0" release="1.el7" arch="noarch" src="">
					<filename>python3-openstackclient-0:6.6.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231121-04</id>
		<issued date="2024-11-21" />
		<updated date="2024-12-23" />
		<title>Множественные уязвимости nextcloud </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nextcloud</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nextcloud-cve-2024-52514-cve-2024-52515/</description>
               <solution>
                    Запретить использование в ОС пакета Nextcloud Server
                или
                    Установить обновление для пакета(ов) Nextcloud Server
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nextcloud-cve-2024-52514-cve-2024-52515/" type="self" id="ROS-20231121-04" title="ROS-20231121-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52514" type="cve" id="CVE-2024-52514" title="CVE-2024-52514" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52515" type="cve" id="CVE-2024-52515" title="CVE-2024-52515" />
			<reference href="https://bdu.fstec.ru/vul/2024-10199" type="self" id="BDU:2024-10199" title="BDU:2024-10199" />
			<reference href="https://bdu.fstec.ru/vul/2024-10198" type="self" id="BDU:2024-10198" title="BDU:2024-10198" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nextcloud" epoch="0" version="27.1.10" release="1.el7" arch="noarch" src="">
					<filename>nextcloud-0:27.1.10-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241121-04</id>
		<issued date="2024-11-21" />
		<updated date="2024-11-21" />
		<title>Уязвимость k9s </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в k9s</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-k9s-cve-2024-41110/</description>
               <solution>
                    Запретить использование в ОС пакета k9s
                или
                    Установить обновление для пакета(ов) k9s
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-k9s-cve-2024-41110/" type="self" id="ROS-20241121-04" title="ROS-20241121-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41110" type="cve" id="CVE-2024-41110" title="CVE-2024-41110" />
			<reference href="https://bdu.fstec.ru/vul/2024-05760" type="self" id="BDU:2024-05760" title="BDU:2024-05760" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="k9s" epoch="0" version="0.32.5" release="2.el7" arch="x86_64" src="">
					<filename>k9s-0:0.32.5-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241121-05</id>
		<issued date="2024-11-21" />
		<updated date="2024-11-21" />
		<title>Множественные уязвимости moodle</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-moodle-2111242/</description>
               <solution>
                    Запретить использование в ОС пакета moodle
                или
                    Установить обновление для пакета(ов) moodle
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-moodle-2111242/" type="self" id="ROS-20241121-05" title="ROS-20241121-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43440" type="cve" id="CVE-2024-43440" title="CVE-2024-43440" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43425" type="cve" id="CVE-2024-43425" title="CVE-2024-43425" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43431" type="cve" id="CVE-2024-43431" title="CVE-2024-43431" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43434" type="cve" id="CVE-2024-43434" title="CVE-2024-43434" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43428" type="cve" id="CVE-2024-43428" title="CVE-2024-43428" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43436" type="cve" id="CVE-2024-43436" title="CVE-2024-43436" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43435" type="cve" id="CVE-2024-43435" title="CVE-2024-43435" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43437" type="cve" id="CVE-2024-43437" title="CVE-2024-43437" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43432" type="cve" id="CVE-2024-43432" title="CVE-2024-43432" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43429" type="cve" id="CVE-2024-43429" title="CVE-2024-43429" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43427" type="cve" id="CVE-2024-43427" title="CVE-2024-43427" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43439" type="cve" id="CVE-2024-43439" title="CVE-2024-43439" />
			<reference href="https://bdu.fstec.ru/vul/2024-10188" type="self" id="BDU:2024-10188" title="BDU:2024-10188" />
			<reference href="https://bdu.fstec.ru/vul/2024-06552" type="self" id="BDU:2024-06552" title="BDU:2024-06552" />
			<reference href="https://bdu.fstec.ru/vul/2024-09425" type="self" id="BDU:2024-09425" title="BDU:2024-09425" />
			<reference href="https://bdu.fstec.ru/vul/2024-10186" type="self" id="BDU:2024-10186" title="BDU:2024-10186" />
			<reference href="https://bdu.fstec.ru/vul/2024-10189" type="self" id="BDU:2024-10189" title="BDU:2024-10189" />
			<reference href="https://bdu.fstec.ru/vul/2024-10190" type="self" id="BDU:2024-10190" title="BDU:2024-10190" />
			<reference href="https://bdu.fstec.ru/vul/2024-10191" type="self" id="BDU:2024-10191" title="BDU:2024-10191" />
			<reference href="https://bdu.fstec.ru/vul/2024-10192" type="self" id="BDU:2024-10192" title="BDU:2024-10192" />
			<reference href="https://bdu.fstec.ru/vul/2024-11511" type="self" id="BDU:2024-11511" title="BDU:2024-11511" />
			<reference href="https://bdu.fstec.ru/vul/2024-10193" type="self" id="BDU:2024-10193" title="BDU:2024-10193" />
			<reference href="https://bdu.fstec.ru/vul/2024-10225" type="self" id="BDU:2024-10225" title="BDU:2024-10225" />
			<reference href="https://bdu.fstec.ru/vul/2024-10194" type="self" id="BDU:2024-10194" title="BDU:2024-10194" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="moodle" epoch="0" version="4.2.11" release="1.el7" arch="noarch" src="">
					<filename>moodle-0:4.2.11-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241121-06</id>
		<issued date="2024-11-21" />
		<updated date="2024-11-21" />
		<title>Множественные уязвимости consul </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в consul</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-consul-cve-2024-10005-cve-2024-10086/</description>
               <solution>
                    Запретить использование в ОС пакета consul
                или
                    Установить обновление для пакета(ов) consul
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-consul-cve-2024-10005-cve-2024-10086/" type="self" id="ROS-20241121-06" title="ROS-20241121-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10005" type="cve" id="CVE-2024-10005" title="CVE-2024-10005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10086" type="cve" id="CVE-2024-10086" title="CVE-2024-10086" />
			<reference href="https://bdu.fstec.ru/vul/2024-10201" type="self" id="BDU:2024-10201" title="BDU:2024-10201" />
			<reference href="https://bdu.fstec.ru/vul/2024-10200" type="self" id="BDU:2024-10200" title="BDU:2024-10200" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="consul" epoch="0" version="1.20.1" release="1.el7" arch="x86_64" src="">
					<filename>consul-0:1.20.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241125-01</id>
		<issued date="2024-11-25" />
		<updated date="2024-11-25" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-2511241/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-2511241/" type="self" id="ROS-20241125-01" title="ROS-20241125-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35844" type="cve" id="CVE-2024-35844" title="CVE-2024-35844" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52707" type="cve" id="CVE-2023-52707" title="CVE-2023-52707" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52708" type="cve" id="CVE-2023-52708" title="CVE-2023-52708" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52730" type="cve" id="CVE-2023-52730" title="CVE-2023-52730" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52731" type="cve" id="CVE-2023-52731" title="CVE-2023-52731" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52735" type="cve" id="CVE-2023-52735" title="CVE-2023-52735" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52736" type="cve" id="CVE-2023-52736" title="CVE-2023-52736" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52738" type="cve" id="CVE-2023-52738" title="CVE-2023-52738" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52739" type="cve" id="CVE-2023-52739" title="CVE-2023-52739" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52740" type="cve" id="CVE-2023-52740" title="CVE-2023-52740" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52741" type="cve" id="CVE-2023-52741" title="CVE-2023-52741" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52742" type="cve" id="CVE-2023-52742" title="CVE-2023-52742" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52743" type="cve" id="CVE-2023-52743" title="CVE-2023-52743" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52744" type="cve" id="CVE-2023-52744" title="CVE-2023-52744" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52745" type="cve" id="CVE-2023-52745" title="CVE-2023-52745" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52746" type="cve" id="CVE-2023-52746" title="CVE-2023-52746" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52747" type="cve" id="CVE-2023-52747" title="CVE-2023-52747" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52748" type="cve" id="CVE-2023-52748" title="CVE-2023-52748" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52750" type="cve" id="CVE-2023-52750" title="CVE-2023-52750" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52805" type="cve" id="CVE-2023-52805" title="CVE-2023-52805" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52808" type="cve" id="CVE-2023-52808" title="CVE-2023-52808" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52811" type="cve" id="CVE-2023-52811" title="CVE-2023-52811" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52813" type="cve" id="CVE-2023-52813" title="CVE-2023-52813" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52816" type="cve" id="CVE-2023-52816" title="CVE-2023-52816" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52818" type="cve" id="CVE-2023-52818" title="CVE-2023-52818" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52819" type="cve" id="CVE-2023-52819" title="CVE-2023-52819" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52825" type="cve" id="CVE-2023-52825" title="CVE-2023-52825" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52826" type="cve" id="CVE-2023-52826" title="CVE-2023-52826" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52872" type="cve" id="CVE-2023-52872" title="CVE-2023-52872" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52873" type="cve" id="CVE-2023-52873" title="CVE-2023-52873" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52875" type="cve" id="CVE-2023-52875" title="CVE-2023-52875" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52876" type="cve" id="CVE-2023-52876" title="CVE-2023-52876" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52877" type="cve" id="CVE-2023-52877" title="CVE-2023-52877" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52878" type="cve" id="CVE-2023-52878" title="CVE-2023-52878" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52879" type="cve" id="CVE-2023-52879" title="CVE-2023-52879" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47450" type="cve" id="CVE-2021-47450" title="CVE-2021-47450" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47474" type="cve" id="CVE-2021-47474" title="CVE-2021-47474" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47475" type="cve" id="CVE-2021-47475" title="CVE-2021-47475" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47476" type="cve" id="CVE-2021-47476" title="CVE-2021-47476" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47477" type="cve" id="CVE-2021-47477" title="CVE-2021-47477" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47478" type="cve" id="CVE-2021-47478" title="CVE-2021-47478" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47479" type="cve" id="CVE-2021-47479" title="CVE-2021-47479" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47481" type="cve" id="CVE-2021-47481" title="CVE-2021-47481" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35847" type="cve" id="CVE-2024-35847" title="CVE-2024-35847" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35969" type="cve" id="CVE-2024-35969" title="CVE-2024-35969" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35970" type="cve" id="CVE-2024-35970" title="CVE-2024-35970" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52706" type="cve" id="CVE-2023-52706" title="CVE-2023-52706" />
			<reference href="https://bdu.fstec.ru/vul/2024-10365" type="self" id="BDU:2024-10365" title="BDU:2024-10365" />
			<reference href="https://bdu.fstec.ru/vul/2024-10367" type="self" id="BDU:2024-10367" title="BDU:2024-10367" />
			<reference href="https://bdu.fstec.ru/vul/2024-10366" type="self" id="BDU:2024-10366" title="BDU:2024-10366" />
			<reference href="https://bdu.fstec.ru/vul/2024-10372" type="self" id="BDU:2024-10372" title="BDU:2024-10372" />
			<reference href="https://bdu.fstec.ru/vul/2024-10374" type="self" id="BDU:2024-10374" title="BDU:2024-10374" />
			<reference href="https://bdu.fstec.ru/vul/2024-10368" type="self" id="BDU:2024-10368" title="BDU:2024-10368" />
			<reference href="https://bdu.fstec.ru/vul/2024-10369" type="self" id="BDU:2024-10369" title="BDU:2024-10369" />
			<reference href="https://bdu.fstec.ru/vul/2024-10364" type="self" id="BDU:2024-10364" title="BDU:2024-10364" />
			<reference href="https://bdu.fstec.ru/vul/2024-10373" type="self" id="BDU:2024-10373" title="BDU:2024-10373" />
			<reference href="https://bdu.fstec.ru/vul/2024-10363" type="self" id="BDU:2024-10363" title="BDU:2024-10363" />
			<reference href="https://bdu.fstec.ru/vul/2024-10370" type="self" id="BDU:2024-10370" title="BDU:2024-10370" />
			<reference href="https://bdu.fstec.ru/vul/2024-10371" type="self" id="BDU:2024-10371" title="BDU:2024-10371" />
			<reference href="https://bdu.fstec.ru/vul/2024-10499" type="self" id="BDU:2024-10499" title="BDU:2024-10499" />
			<reference href="https://bdu.fstec.ru/vul/2024-10500" type="self" id="BDU:2024-10500" title="BDU:2024-10500" />
			<reference href="https://bdu.fstec.ru/vul/2024-10488" type="self" id="BDU:2024-10488" title="BDU:2024-10488" />
			<reference href="https://bdu.fstec.ru/vul/2024-10501" type="self" id="BDU:2024-10501" title="BDU:2024-10501" />
			<reference href="https://bdu.fstec.ru/vul/2024-10502" type="self" id="BDU:2024-10502" title="BDU:2024-10502" />
			<reference href="https://bdu.fstec.ru/vul/2024-10503" type="self" id="BDU:2024-10503" title="BDU:2024-10503" />
			<reference href="https://bdu.fstec.ru/vul/2024-10504" type="self" id="BDU:2024-10504" title="BDU:2024-10504" />
			<reference href="https://bdu.fstec.ru/vul/2024-10505" type="self" id="BDU:2024-10505" title="BDU:2024-10505" />
			<reference href="https://bdu.fstec.ru/vul/2024-10492" type="self" id="BDU:2024-10492" title="BDU:2024-10492" />
			<reference href="https://bdu.fstec.ru/vul/2024-10489" type="self" id="BDU:2024-10489" title="BDU:2024-10489" />
			<reference href="https://bdu.fstec.ru/vul/2024-10508" type="self" id="BDU:2024-10508" title="BDU:2024-10508" />
			<reference href="https://bdu.fstec.ru/vul/2024-10506" type="self" id="BDU:2024-10506" title="BDU:2024-10506" />
			<reference href="https://bdu.fstec.ru/vul/2024-10515" type="self" id="BDU:2024-10515" title="BDU:2024-10515" />
			<reference href="https://bdu.fstec.ru/vul/2024-10516" type="self" id="BDU:2024-10516" title="BDU:2024-10516" />
			<reference href="https://bdu.fstec.ru/vul/2024-10507" type="self" id="BDU:2024-10507" title="BDU:2024-10507" />
			<reference href="https://bdu.fstec.ru/vul/2024-10490" type="self" id="BDU:2024-10490" title="BDU:2024-10490" />
			<reference href="https://bdu.fstec.ru/vul/2024-10496" type="self" id="BDU:2024-10496" title="BDU:2024-10496" />
			<reference href="https://bdu.fstec.ru/vul/2024-10523" type="self" id="BDU:2024-10523" title="BDU:2024-10523" />
			<reference href="https://bdu.fstec.ru/vul/2024-10520" type="self" id="BDU:2024-10520" title="BDU:2024-10520" />
			<reference href="https://bdu.fstec.ru/vul/2024-10493" type="self" id="BDU:2024-10493" title="BDU:2024-10493" />
			<reference href="https://bdu.fstec.ru/vul/2024-10522" type="self" id="BDU:2024-10522" title="BDU:2024-10522" />
			<reference href="https://bdu.fstec.ru/vul/2024-10521" type="self" id="BDU:2024-10521" title="BDU:2024-10521" />
			<reference href="https://bdu.fstec.ru/vul/2024-10519" type="self" id="BDU:2024-10519" title="BDU:2024-10519" />
			<reference href="https://bdu.fstec.ru/vul/2024-10518" type="self" id="BDU:2024-10518" title="BDU:2024-10518" />
			<reference href="https://bdu.fstec.ru/vul/2024-10495" type="self" id="BDU:2024-10495" title="BDU:2024-10495" />
			<reference href="https://bdu.fstec.ru/vul/2024-10517" type="self" id="BDU:2024-10517" title="BDU:2024-10517" />
			<reference href="https://bdu.fstec.ru/vul/2024-10498" type="self" id="BDU:2024-10498" title="BDU:2024-10498" />
			<reference href="https://bdu.fstec.ru/vul/2024-10397" type="self" id="BDU:2024-10397" title="BDU:2024-10397" />
			<reference href="https://bdu.fstec.ru/vul/2024-10510" type="self" id="BDU:2024-10510" title="BDU:2024-10510" />
			<reference href="https://bdu.fstec.ru/vul/2024-10509" type="self" id="BDU:2024-10509" title="BDU:2024-10509" />
			<reference href="https://bdu.fstec.ru/vul/2024-10511" type="self" id="BDU:2024-10511" title="BDU:2024-10511" />
			<reference href="https://bdu.fstec.ru/vul/2024-10512" type="self" id="BDU:2024-10512" title="BDU:2024-10512" />
			<reference href="https://bdu.fstec.ru/vul/2024-10513" type="self" id="BDU:2024-10513" title="BDU:2024-10513" />
			<reference href="https://bdu.fstec.ru/vul/2024-10514" type="self" id="BDU:2024-10514" title="BDU:2024-10514" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241125-02</id>
		<issued date="2024-11-25" />
		<updated date="2024-11-25" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-2511242/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-2511242/" type="self" id="ROS-20241125-02" title="ROS-20241125-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35842" type="cve" id="CVE-2024-35842" title="CVE-2024-35842" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52807" type="cve" id="CVE-2023-52807" title="CVE-2023-52807" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52874" type="cve" id="CVE-2023-52874" title="CVE-2023-52874" />
			<reference href="https://bdu.fstec.ru/vul/2024-10268" type="self" id="BDU:2024-10268" title="BDU:2024-10268" />
			<reference href="https://bdu.fstec.ru/vul/2024-10269" type="self" id="BDU:2024-10269" title="BDU:2024-10269" />
			<reference href="https://bdu.fstec.ru/vul/2024-10270" type="self" id="BDU:2024-10270" title="BDU:2024-10270" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241126-01</id>
		<issued date="2024-11-26" />
		<updated date="2024-11-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-36011/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-36011/" type="self" id="ROS-20241126-01" title="ROS-20241126-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36011" type="cve" id="CVE-2024-36011" title="CVE-2024-36011" />
			<reference href="https://bdu.fstec.ru/vul/2024-04540" type="self" id="BDU:2024-04540" title="BDU:2024-04540" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241126-02</id>
		<issued date="2024-11-26" />
		<updated date="2024-11-26" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-2611241/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-2611241/" type="self" id="ROS-20241126-02" title="ROS-20241126-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47482" type="cve" id="CVE-2021-47482" title="CVE-2021-47482" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47483" type="cve" id="CVE-2021-47483" title="CVE-2021-47483" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47484" type="cve" id="CVE-2021-47484" title="CVE-2021-47484" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47485" type="cve" id="CVE-2021-47485" title="CVE-2021-47485" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47486" type="cve" id="CVE-2021-47486" title="CVE-2021-47486" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47488" type="cve" id="CVE-2021-47488" title="CVE-2021-47488" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47489" type="cve" id="CVE-2021-47489" title="CVE-2021-47489" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47491" type="cve" id="CVE-2021-47491" title="CVE-2021-47491" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47492" type="cve" id="CVE-2021-47492" title="CVE-2021-47492" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47493" type="cve" id="CVE-2021-47493" title="CVE-2021-47493" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47494" type="cve" id="CVE-2021-47494" title="CVE-2021-47494" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47496" type="cve" id="CVE-2021-47496" title="CVE-2021-47496" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47499" type="cve" id="CVE-2021-47499" title="CVE-2021-47499" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47500" type="cve" id="CVE-2021-47500" title="CVE-2021-47500" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47501" type="cve" id="CVE-2021-47501" title="CVE-2021-47501" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47502" type="cve" id="CVE-2021-47502" title="CVE-2021-47502" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47503" type="cve" id="CVE-2021-47503" title="CVE-2021-47503" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47504" type="cve" id="CVE-2021-47504" title="CVE-2021-47504" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47505" type="cve" id="CVE-2021-47505" title="CVE-2021-47505" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47506" type="cve" id="CVE-2021-47506" title="CVE-2021-47506" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47507" type="cve" id="CVE-2021-47507" title="CVE-2021-47507" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47508" type="cve" id="CVE-2021-47508" title="CVE-2021-47508" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47509" type="cve" id="CVE-2021-47509" title="CVE-2021-47509" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47510" type="cve" id="CVE-2021-47510" title="CVE-2021-47510" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47511" type="cve" id="CVE-2021-47511" title="CVE-2021-47511" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47512" type="cve" id="CVE-2021-47512" title="CVE-2021-47512" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47514" type="cve" id="CVE-2021-47514" title="CVE-2021-47514" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47515" type="cve" id="CVE-2021-47515" title="CVE-2021-47515" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47517" type="cve" id="CVE-2021-47517" title="CVE-2021-47517" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47523" type="cve" id="CVE-2021-47523" title="CVE-2021-47523" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47524" type="cve" id="CVE-2021-47524" title="CVE-2021-47524" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47527" type="cve" id="CVE-2021-47527" title="CVE-2021-47527" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47530" type="cve" id="CVE-2021-47530" title="CVE-2021-47530" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47531" type="cve" id="CVE-2021-47531" title="CVE-2021-47531" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47532" type="cve" id="CVE-2021-47532" title="CVE-2021-47532" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47533" type="cve" id="CVE-2021-47533" title="CVE-2021-47533" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47534" type="cve" id="CVE-2021-47534" title="CVE-2021-47534" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47535" type="cve" id="CVE-2021-47535" title="CVE-2021-47535" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47536" type="cve" id="CVE-2021-47536" title="CVE-2021-47536" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47538" type="cve" id="CVE-2021-47538" title="CVE-2021-47538" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47539" type="cve" id="CVE-2021-47539" title="CVE-2021-47539" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47544" type="cve" id="CVE-2021-47544" title="CVE-2021-47544" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47547" type="cve" id="CVE-2021-47547" title="CVE-2021-47547" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47548" type="cve" id="CVE-2021-47548" title="CVE-2021-47548" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47549" type="cve" id="CVE-2021-47549" title="CVE-2021-47549" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47551" type="cve" id="CVE-2021-47551" title="CVE-2021-47551" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47552" type="cve" id="CVE-2021-47552" title="CVE-2021-47552" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47553" type="cve" id="CVE-2021-47553" title="CVE-2021-47553" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47554" type="cve" id="CVE-2021-47554" title="CVE-2021-47554" />
			<reference href="https://bdu.fstec.ru/vul/2024-10637" type="self" id="BDU:2024-10637" title="BDU:2024-10637" />
			<reference href="https://bdu.fstec.ru/vul/2024-10636" type="self" id="BDU:2024-10636" title="BDU:2024-10636" />
			<reference href="https://bdu.fstec.ru/vul/2024-10635" type="self" id="BDU:2024-10635" title="BDU:2024-10635" />
			<reference href="https://bdu.fstec.ru/vul/2024-10634" type="self" id="BDU:2024-10634" title="BDU:2024-10634" />
			<reference href="https://bdu.fstec.ru/vul/2024-10633" type="self" id="BDU:2024-10633" title="BDU:2024-10633" />
			<reference href="https://bdu.fstec.ru/vul/2024-10632" type="self" id="BDU:2024-10632" title="BDU:2024-10632" />
			<reference href="https://bdu.fstec.ru/vul/2024-10631" type="self" id="BDU:2024-10631" title="BDU:2024-10631" />
			<reference href="https://bdu.fstec.ru/vul/2024-10630" type="self" id="BDU:2024-10630" title="BDU:2024-10630" />
			<reference href="https://bdu.fstec.ru/vul/2024-10629" type="self" id="BDU:2024-10629" title="BDU:2024-10629" />
			<reference href="https://bdu.fstec.ru/vul/2024-10627" type="self" id="BDU:2024-10627" title="BDU:2024-10627" />
			<reference href="https://bdu.fstec.ru/vul/2024-10626" type="self" id="BDU:2024-10626" title="BDU:2024-10626" />
			<reference href="https://bdu.fstec.ru/vul/2024-10595" type="self" id="BDU:2024-10595" title="BDU:2024-10595" />
			<reference href="https://bdu.fstec.ru/vul/2024-10592" type="self" id="BDU:2024-10592" title="BDU:2024-10592" />
			<reference href="https://bdu.fstec.ru/vul/2024-10591" type="self" id="BDU:2024-10591" title="BDU:2024-10591" />
			<reference href="https://bdu.fstec.ru/vul/2024-10590" type="self" id="BDU:2024-10590" title="BDU:2024-10590" />
			<reference href="https://bdu.fstec.ru/vul/2024-10587" type="self" id="BDU:2024-10587" title="BDU:2024-10587" />
			<reference href="https://bdu.fstec.ru/vul/2024-10586" type="self" id="BDU:2024-10586" title="BDU:2024-10586" />
			<reference href="https://bdu.fstec.ru/vul/2024-10585" type="self" id="BDU:2024-10585" title="BDU:2024-10585" />
			<reference href="https://bdu.fstec.ru/vul/2024-10584" type="self" id="BDU:2024-10584" title="BDU:2024-10584" />
			<reference href="https://bdu.fstec.ru/vul/2024-10583" type="self" id="BDU:2024-10583" title="BDU:2024-10583" />
			<reference href="https://bdu.fstec.ru/vul/2024-10582" type="self" id="BDU:2024-10582" title="BDU:2024-10582" />
			<reference href="https://bdu.fstec.ru/vul/2024-10581" type="self" id="BDU:2024-10581" title="BDU:2024-10581" />
			<reference href="https://bdu.fstec.ru/vul/2024-10580" type="self" id="BDU:2024-10580" title="BDU:2024-10580" />
			<reference href="https://bdu.fstec.ru/vul/2024-10578" type="self" id="BDU:2024-10578" title="BDU:2024-10578" />
			<reference href="https://bdu.fstec.ru/vul/2024-10577" type="self" id="BDU:2024-10577" title="BDU:2024-10577" />
			<reference href="https://bdu.fstec.ru/vul/2024-10576" type="self" id="BDU:2024-10576" title="BDU:2024-10576" />
			<reference href="https://bdu.fstec.ru/vul/2024-10575" type="self" id="BDU:2024-10575" title="BDU:2024-10575" />
			<reference href="https://bdu.fstec.ru/vul/2024-10574" type="self" id="BDU:2024-10574" title="BDU:2024-10574" />
			<reference href="https://bdu.fstec.ru/vul/2024-10573" type="self" id="BDU:2024-10573" title="BDU:2024-10573" />
			<reference href="https://bdu.fstec.ru/vul/2024-10531" type="self" id="BDU:2024-10531" title="BDU:2024-10531" />
			<reference href="https://bdu.fstec.ru/vul/2024-10530" type="self" id="BDU:2024-10530" title="BDU:2024-10530" />
			<reference href="https://bdu.fstec.ru/vul/2024-10766" type="self" id="BDU:2024-10766" title="BDU:2024-10766" />
			<reference href="https://bdu.fstec.ru/vul/2024-10758" type="self" id="BDU:2024-10758" title="BDU:2024-10758" />
			<reference href="https://bdu.fstec.ru/vul/2024-10757" type="self" id="BDU:2024-10757" title="BDU:2024-10757" />
			<reference href="https://bdu.fstec.ru/vul/2024-10755" type="self" id="BDU:2024-10755" title="BDU:2024-10755" />
			<reference href="https://bdu.fstec.ru/vul/2024-10753" type="self" id="BDU:2024-10753" title="BDU:2024-10753" />
			<reference href="https://bdu.fstec.ru/vul/2024-10750" type="self" id="BDU:2024-10750" title="BDU:2024-10750" />
			<reference href="https://bdu.fstec.ru/vul/2024-10748" type="self" id="BDU:2024-10748" title="BDU:2024-10748" />
			<reference href="https://bdu.fstec.ru/vul/2024-10745" type="self" id="BDU:2024-10745" title="BDU:2024-10745" />
			<reference href="https://bdu.fstec.ru/vul/2024-10740" type="self" id="BDU:2024-10740" title="BDU:2024-10740" />
			<reference href="https://bdu.fstec.ru/vul/2024-10763" type="self" id="BDU:2024-10763" title="BDU:2024-10763" />
			<reference href="https://bdu.fstec.ru/vul/2024-10737" type="self" id="BDU:2024-10737" title="BDU:2024-10737" />
			<reference href="https://bdu.fstec.ru/vul/2024-10736" type="self" id="BDU:2024-10736" title="BDU:2024-10736" />
			<reference href="https://bdu.fstec.ru/vul/2024-10579" type="self" id="BDU:2024-10579" title="BDU:2024-10579" />
			<reference href="https://bdu.fstec.ru/vul/2024-10731" type="self" id="BDU:2024-10731" title="BDU:2024-10731" />
			<reference href="https://bdu.fstec.ru/vul/2024-10730" type="self" id="BDU:2024-10730" title="BDU:2024-10730" />
			<reference href="https://bdu.fstec.ru/vul/2024-10729" type="self" id="BDU:2024-10729" title="BDU:2024-10729" />
			<reference href="https://bdu.fstec.ru/vul/2024-10728" type="self" id="BDU:2024-10728" title="BDU:2024-10728" />
			<reference href="https://bdu.fstec.ru/vul/2024-10727" type="self" id="BDU:2024-10727" title="BDU:2024-10727" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241127-01</id>
		<issued date="2024-11-27" />
		<updated date="2024-11-27" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-2711241/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-2711241/" type="self" id="ROS-20241127-01" title="ROS-20241127-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36016" type="cve" id="CVE-2024-36016" title="CVE-2024-36016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36025" type="cve" id="CVE-2024-36025" title="CVE-2024-36025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52882" type="cve" id="CVE-2023-52882" title="CVE-2023-52882" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36029" type="cve" id="CVE-2024-36029" title="CVE-2024-36029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36031" type="cve" id="CVE-2024-36031" title="CVE-2024-36031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36880" type="cve" id="CVE-2024-36880" title="CVE-2024-36880" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36889" type="cve" id="CVE-2024-36889" title="CVE-2024-36889" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36906" type="cve" id="CVE-2024-36906" title="CVE-2024-36906" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36916" type="cve" id="CVE-2024-36916" title="CVE-2024-36916" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36919" type="cve" id="CVE-2024-36919" title="CVE-2024-36919" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36928" type="cve" id="CVE-2024-36928" title="CVE-2024-36928" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36929" type="cve" id="CVE-2024-36929" title="CVE-2024-36929" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36931" type="cve" id="CVE-2024-36931" title="CVE-2024-36931" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36933" type="cve" id="CVE-2024-36933" title="CVE-2024-36933" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36934" type="cve" id="CVE-2024-36934" title="CVE-2024-36934" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36937" type="cve" id="CVE-2024-36937" title="CVE-2024-36937" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36939" type="cve" id="CVE-2024-36939" title="CVE-2024-36939" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36940" type="cve" id="CVE-2024-36940" title="CVE-2024-36940" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36941" type="cve" id="CVE-2024-36941" title="CVE-2024-36941" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36942" type="cve" id="CVE-2024-36942" title="CVE-2024-36942" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36944" type="cve" id="CVE-2024-36944" title="CVE-2024-36944" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36946" type="cve" id="CVE-2024-36946" title="CVE-2024-36946" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36947" type="cve" id="CVE-2024-36947" title="CVE-2024-36947" />
			<reference href="https://bdu.fstec.ru/vul/2024-10699" type="self" id="BDU:2024-10699" title="BDU:2024-10699" />
			<reference href="https://bdu.fstec.ru/vul/2024-10698" type="self" id="BDU:2024-10698" title="BDU:2024-10698" />
			<reference href="https://bdu.fstec.ru/vul/2024-10697" type="self" id="BDU:2024-10697" title="BDU:2024-10697" />
			<reference href="https://bdu.fstec.ru/vul/2024-10696" type="self" id="BDU:2024-10696" title="BDU:2024-10696" />
			<reference href="https://bdu.fstec.ru/vul/2024-10588" type="self" id="BDU:2024-10588" title="BDU:2024-10588" />
			<reference href="https://bdu.fstec.ru/vul/2024-10694" type="self" id="BDU:2024-10694" title="BDU:2024-10694" />
			<reference href="https://bdu.fstec.ru/vul/2024-10693" type="self" id="BDU:2024-10693" title="BDU:2024-10693" />
			<reference href="https://bdu.fstec.ru/vul/2024-10691" type="self" id="BDU:2024-10691" title="BDU:2024-10691" />
			<reference href="https://bdu.fstec.ru/vul/2024-10690" type="self" id="BDU:2024-10690" title="BDU:2024-10690" />
			<reference href="https://bdu.fstec.ru/vul/2024-10688" type="self" id="BDU:2024-10688" title="BDU:2024-10688" />
			<reference href="https://bdu.fstec.ru/vul/2024-10687" type="self" id="BDU:2024-10687" title="BDU:2024-10687" />
			<reference href="https://bdu.fstec.ru/vul/2024-10686" type="self" id="BDU:2024-10686" title="BDU:2024-10686" />
			<reference href="https://bdu.fstec.ru/vul/2024-10684" type="self" id="BDU:2024-10684" title="BDU:2024-10684" />
			<reference href="https://bdu.fstec.ru/vul/2024-10683" type="self" id="BDU:2024-10683" title="BDU:2024-10683" />
			<reference href="https://bdu.fstec.ru/vul/2024-10682" type="self" id="BDU:2024-10682" title="BDU:2024-10682" />
			<reference href="https://bdu.fstec.ru/vul/2024-10681" type="self" id="BDU:2024-10681" title="BDU:2024-10681" />
			<reference href="https://bdu.fstec.ru/vul/2024-10680" type="self" id="BDU:2024-10680" title="BDU:2024-10680" />
			<reference href="https://bdu.fstec.ru/vul/2024-10679" type="self" id="BDU:2024-10679" title="BDU:2024-10679" />
			<reference href="https://bdu.fstec.ru/vul/2024-10678" type="self" id="BDU:2024-10678" title="BDU:2024-10678" />
			<reference href="https://bdu.fstec.ru/vul/2024-10677" type="self" id="BDU:2024-10677" title="BDU:2024-10677" />
			<reference href="https://bdu.fstec.ru/vul/2024-10676" type="self" id="BDU:2024-10676" title="BDU:2024-10676" />
			<reference href="https://bdu.fstec.ru/vul/2024-10675" type="self" id="BDU:2024-10675" title="BDU:2024-10675" />
			<reference href="https://bdu.fstec.ru/vul/2024-10674" type="self" id="BDU:2024-10674" title="BDU:2024-10674" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241127-02</id>
		<issued date="2024-11-27" />
		<updated date="2024-11-27" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-2711242/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-2711242/" type="self" id="ROS-20241127-02" title="ROS-20241127-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47555" type="cve" id="CVE-2021-47555" title="CVE-2021-47555" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47557" type="cve" id="CVE-2021-47557" title="CVE-2021-47557" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47558" type="cve" id="CVE-2021-47558" title="CVE-2021-47558" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47560" type="cve" id="CVE-2021-47560" title="CVE-2021-47560" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47561" type="cve" id="CVE-2021-47561" title="CVE-2021-47561" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47562" type="cve" id="CVE-2021-47562" title="CVE-2021-47562" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47563" type="cve" id="CVE-2021-47563" title="CVE-2021-47563" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47564" type="cve" id="CVE-2021-47564" title="CVE-2021-47564" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47565" type="cve" id="CVE-2021-47565" title="CVE-2021-47565" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47566" type="cve" id="CVE-2021-47566" title="CVE-2021-47566" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47567" type="cve" id="CVE-2021-47567" title="CVE-2021-47567" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47568" type="cve" id="CVE-2021-47568" title="CVE-2021-47568" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47569" type="cve" id="CVE-2021-47569" title="CVE-2021-47569" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52881" type="cve" id="CVE-2023-52881" title="CVE-2023-52881" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36020" type="cve" id="CVE-2024-36020" title="CVE-2024-36020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52880" type="cve" id="CVE-2023-52880" title="CVE-2023-52880" />
			<reference href="https://bdu.fstec.ru/vul/2024-10673" type="self" id="BDU:2024-10673" title="BDU:2024-10673" />
			<reference href="https://bdu.fstec.ru/vul/2024-10672" type="self" id="BDU:2024-10672" title="BDU:2024-10672" />
			<reference href="https://bdu.fstec.ru/vul/2024-10671" type="self" id="BDU:2024-10671" title="BDU:2024-10671" />
			<reference href="https://bdu.fstec.ru/vul/2024-10670" type="self" id="BDU:2024-10670" title="BDU:2024-10670" />
			<reference href="https://bdu.fstec.ru/vul/2024-10669" type="self" id="BDU:2024-10669" title="BDU:2024-10669" />
			<reference href="https://bdu.fstec.ru/vul/2024-10668" type="self" id="BDU:2024-10668" title="BDU:2024-10668" />
			<reference href="https://bdu.fstec.ru/vul/2024-10667" type="self" id="BDU:2024-10667" title="BDU:2024-10667" />
			<reference href="https://bdu.fstec.ru/vul/2024-10666" type="self" id="BDU:2024-10666" title="BDU:2024-10666" />
			<reference href="https://bdu.fstec.ru/vul/2024-10665" type="self" id="BDU:2024-10665" title="BDU:2024-10665" />
			<reference href="https://bdu.fstec.ru/vul/2024-10664" type="self" id="BDU:2024-10664" title="BDU:2024-10664" />
			<reference href="https://bdu.fstec.ru/vul/2024-10663" type="self" id="BDU:2024-10663" title="BDU:2024-10663" />
			<reference href="https://bdu.fstec.ru/vul/2024-10662" type="self" id="BDU:2024-10662" title="BDU:2024-10662" />
			<reference href="https://bdu.fstec.ru/vul/2024-10661" type="self" id="BDU:2024-10661" title="BDU:2024-10661" />
			<reference href="https://bdu.fstec.ru/vul/2024-10660" type="self" id="BDU:2024-10660" title="BDU:2024-10660" />
			<reference href="https://bdu.fstec.ru/vul/2024-10659" type="self" id="BDU:2024-10659" title="BDU:2024-10659" />
			<reference href="https://bdu.fstec.ru/vul/2024-10658" type="self" id="BDU:2024-10658" title="BDU:2024-10658" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241127-03</id>
		<issued date="2024-11-27" />
		<updated date="2024-11-27" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-2711243/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-2711243/" type="self" id="ROS-20241127-03" title="ROS-20241127-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36018" type="cve" id="CVE-2024-36018" title="CVE-2024-36018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36019" type="cve" id="CVE-2024-36019" title="CVE-2024-36019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36028" type="cve" id="CVE-2024-36028" title="CVE-2024-36028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36032" type="cve" id="CVE-2024-36032" title="CVE-2024-36032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36033" type="cve" id="CVE-2024-36033" title="CVE-2024-36033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36882" type="cve" id="CVE-2024-36882" title="CVE-2024-36882" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36887" type="cve" id="CVE-2024-36887" title="CVE-2024-36887" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36888" type="cve" id="CVE-2024-36888" title="CVE-2024-36888" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36890" type="cve" id="CVE-2024-36890" title="CVE-2024-36890" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36891" type="cve" id="CVE-2024-36891" title="CVE-2024-36891" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36894" type="cve" id="CVE-2024-36894" title="CVE-2024-36894" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36895" type="cve" id="CVE-2024-36895" title="CVE-2024-36895" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36896" type="cve" id="CVE-2024-36896" title="CVE-2024-36896" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36901" type="cve" id="CVE-2024-36901" title="CVE-2024-36901" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36925" type="cve" id="CVE-2024-36925" title="CVE-2024-36925" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36926" type="cve" id="CVE-2024-36926" title="CVE-2024-36926" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36930" type="cve" id="CVE-2024-36930" title="CVE-2024-36930" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36945" type="cve" id="CVE-2024-36945" title="CVE-2024-36945" />
			<reference href="https://bdu.fstec.ru/vul/2024-04547" type="self" id="BDU:2024-04547" title="BDU:2024-04547" />
			<reference href="https://bdu.fstec.ru/vul/2024-04548" type="self" id="BDU:2024-04548" title="BDU:2024-04548" />
			<reference href="https://bdu.fstec.ru/vul/2024-10726" type="self" id="BDU:2024-10726" title="BDU:2024-10726" />
			<reference href="https://bdu.fstec.ru/vul/2024-10711" type="self" id="BDU:2024-10711" title="BDU:2024-10711" />
			<reference href="https://bdu.fstec.ru/vul/2024-10710" type="self" id="BDU:2024-10710" title="BDU:2024-10710" />
			<reference href="https://bdu.fstec.ru/vul/2024-10709" type="self" id="BDU:2024-10709" title="BDU:2024-10709" />
			<reference href="https://bdu.fstec.ru/vul/2024-10708" type="self" id="BDU:2024-10708" title="BDU:2024-10708" />
			<reference href="https://bdu.fstec.ru/vul/2024-10707" type="self" id="BDU:2024-10707" title="BDU:2024-10707" />
			<reference href="https://bdu.fstec.ru/vul/2024-10705" type="self" id="BDU:2024-10705" title="BDU:2024-10705" />
			<reference href="https://bdu.fstec.ru/vul/2024-04553" type="self" id="BDU:2024-04553" title="BDU:2024-04553" />
			<reference href="https://bdu.fstec.ru/vul/2024-10704" type="self" id="BDU:2024-10704" title="BDU:2024-10704" />
			<reference href="https://bdu.fstec.ru/vul/2024-10703" type="self" id="BDU:2024-10703" title="BDU:2024-10703" />
			<reference href="https://bdu.fstec.ru/vul/2024-10589" type="self" id="BDU:2024-10589" title="BDU:2024-10589" />
			<reference href="https://bdu.fstec.ru/vul/2024-04555" type="self" id="BDU:2024-04555" title="BDU:2024-04555" />
			<reference href="https://bdu.fstec.ru/vul/2024-10702" type="self" id="BDU:2024-10702" title="BDU:2024-10702" />
			<reference href="https://bdu.fstec.ru/vul/2024-10701" type="self" id="BDU:2024-10701" title="BDU:2024-10701" />
			<reference href="https://bdu.fstec.ru/vul/2024-04559" type="self" id="BDU:2024-04559" title="BDU:2024-04559" />
			<reference href="https://bdu.fstec.ru/vul/2024-10700" type="self" id="BDU:2024-10700" title="BDU:2024-10700" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241129-01</id>
		<issued date="2024-11-29" />
		<updated date="2024-11-29" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-2911241/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-2911241/" type="self" id="ROS-20241129-01" title="ROS-20241129-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35827" type="cve" id="CVE-2024-35827" title="CVE-2024-35827" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35834" type="cve" id="CVE-2024-35834" title="CVE-2024-35834" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35841" type="cve" id="CVE-2024-35841" title="CVE-2024-35841" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36962" type="cve" id="CVE-2024-36962" title="CVE-2024-36962" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36963" type="cve" id="CVE-2024-36963" title="CVE-2024-36963" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36964" type="cve" id="CVE-2024-36964" title="CVE-2024-36964" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36973" type="cve" id="CVE-2024-36973" title="CVE-2024-36973" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36974" type="cve" id="CVE-2024-36974" title="CVE-2024-36974" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36977" type="cve" id="CVE-2024-36977" title="CVE-2024-36977" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36979" type="cve" id="CVE-2024-36979" title="CVE-2024-36979" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38539" type="cve" id="CVE-2024-38539" title="CVE-2024-38539" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38551" type="cve" id="CVE-2024-38551" title="CVE-2024-38551" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38561" type="cve" id="CVE-2024-38561" title="CVE-2024-38561" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38562" type="cve" id="CVE-2024-38562" title="CVE-2024-38562" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38566" type="cve" id="CVE-2024-38566" title="CVE-2024-38566" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38568" type="cve" id="CVE-2024-38568" title="CVE-2024-38568" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38569" type="cve" id="CVE-2024-38569" title="CVE-2024-38569" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38572" type="cve" id="CVE-2024-38572" title="CVE-2024-38572" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38575" type="cve" id="CVE-2024-38575" title="CVE-2024-38575" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38576" type="cve" id="CVE-2024-38576" title="CVE-2024-38576" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38577" type="cve" id="CVE-2024-38577" title="CVE-2024-38577" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38584" type="cve" id="CVE-2024-38584" title="CVE-2024-38584" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38585" type="cve" id="CVE-2024-38585" title="CVE-2024-38585" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38588" type="cve" id="CVE-2024-38588" title="CVE-2024-38588" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38593" type="cve" id="CVE-2024-38593" title="CVE-2024-38593" />
			<reference href="https://bdu.fstec.ru/vul/2024-11575" type="self" id="BDU:2024-11575" title="BDU:2024-11575" />
			<reference href="https://bdu.fstec.ru/vul/2024-11581" type="self" id="BDU:2024-11581" title="BDU:2024-11581" />
			<reference href="https://bdu.fstec.ru/vul/2024-11582" type="self" id="BDU:2024-11582" title="BDU:2024-11582" />
			<reference href="https://bdu.fstec.ru/vul/2024-11583" type="self" id="BDU:2024-11583" title="BDU:2024-11583" />
			<reference href="https://bdu.fstec.ru/vul/2024-11526" type="self" id="BDU:2024-11526" title="BDU:2024-11526" />
			<reference href="https://bdu.fstec.ru/vul/2024-06044" type="self" id="BDU:2024-06044" title="BDU:2024-06044" />
			<reference href="https://bdu.fstec.ru/vul/2024-06048" type="self" id="BDU:2024-06048" title="BDU:2024-06048" />
			<reference href="https://bdu.fstec.ru/vul/2024-06047" type="self" id="BDU:2024-06047" title="BDU:2024-06047" />
			<reference href="https://bdu.fstec.ru/vul/2024-06058" type="self" id="BDU:2024-06058" title="BDU:2024-06058" />
			<reference href="https://bdu.fstec.ru/vul/2024-11574" type="self" id="BDU:2024-11574" title="BDU:2024-11574" />
			<reference href="https://bdu.fstec.ru/vul/2024-05048" type="self" id="BDU:2024-05048" title="BDU:2024-05048" />
			<reference href="https://bdu.fstec.ru/vul/2024-11573" type="self" id="BDU:2024-11573" title="BDU:2024-11573" />
			<reference href="https://bdu.fstec.ru/vul/2024-11572" type="self" id="BDU:2024-11572" title="BDU:2024-11572" />
			<reference href="https://bdu.fstec.ru/vul/2024-08319" type="self" id="BDU:2024-08319" title="BDU:2024-08319" />
			<reference href="https://bdu.fstec.ru/vul/2024-08321" type="self" id="BDU:2024-08321" title="BDU:2024-08321" />
			<reference href="https://bdu.fstec.ru/vul/2024-11571" type="self" id="BDU:2024-11571" title="BDU:2024-11571" />
			<reference href="https://bdu.fstec.ru/vul/2024-11570" type="self" id="BDU:2024-11570" title="BDU:2024-11570" />
			<reference href="https://bdu.fstec.ru/vul/2024-11569" type="self" id="BDU:2024-11569" title="BDU:2024-11569" />
			<reference href="https://bdu.fstec.ru/vul/2024-07758" type="self" id="BDU:2024-07758" title="BDU:2024-07758" />
			<reference href="https://bdu.fstec.ru/vul/2024-11568" type="self" id="BDU:2024-11568" title="BDU:2024-11568" />
			<reference href="https://bdu.fstec.ru/vul/2024-11567" type="self" id="BDU:2024-11567" title="BDU:2024-11567" />
			<reference href="https://bdu.fstec.ru/vul/2024-08308" type="self" id="BDU:2024-08308" title="BDU:2024-08308" />
			<reference href="https://bdu.fstec.ru/vul/2024-11566" type="self" id="BDU:2024-11566" title="BDU:2024-11566" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241129-02</id>
		<issued date="2024-11-29" />
		<updated date="2024-11-29" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-2911242/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-2911242/" type="self" id="ROS-20241129-02" title="ROS-20241129-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36944" type="cve" id="CVE-2024-36944" title="CVE-2024-36944" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36950" type="cve" id="CVE-2024-36950" title="CVE-2024-36950" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36952" type="cve" id="CVE-2024-36952" title="CVE-2024-36952" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36953" type="cve" id="CVE-2024-36953" title="CVE-2024-36953" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36954" type="cve" id="CVE-2024-36954" title="CVE-2024-36954" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36955" type="cve" id="CVE-2024-36955" title="CVE-2024-36955" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36957" type="cve" id="CVE-2024-36957" title="CVE-2024-36957" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36959" type="cve" id="CVE-2024-36959" title="CVE-2024-36959" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36960" type="cve" id="CVE-2024-36960" title="CVE-2024-36960" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38548" type="cve" id="CVE-2024-38548" title="CVE-2024-38548" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38550" type="cve" id="CVE-2024-38550" title="CVE-2024-38550" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38558" type="cve" id="CVE-2024-38558" title="CVE-2024-38558" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38559" type="cve" id="CVE-2024-38559" title="CVE-2024-38559" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38560" type="cve" id="CVE-2024-38560" title="CVE-2024-38560" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38565" type="cve" id="CVE-2024-38565" title="CVE-2024-38565" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38567" type="cve" id="CVE-2024-38567" title="CVE-2024-38567" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38573" type="cve" id="CVE-2024-38573" title="CVE-2024-38573" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38578" type="cve" id="CVE-2024-38578" title="CVE-2024-38578" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38579" type="cve" id="CVE-2024-38579" title="CVE-2024-38579" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38580" type="cve" id="CVE-2024-38580" title="CVE-2024-38580" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38582" type="cve" id="CVE-2024-38582" title="CVE-2024-38582" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38586" type="cve" id="CVE-2024-38586" title="CVE-2024-38586" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38587" type="cve" id="CVE-2024-38587" title="CVE-2024-38587" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38589" type="cve" id="CVE-2024-38589" title="CVE-2024-38589" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35828" type="cve" id="CVE-2024-35828" title="CVE-2024-35828" />
			<reference href="https://bdu.fstec.ru/vul/2024-10676" type="self" id="BDU:2024-10676" title="BDU:2024-10676" />
			<reference href="https://bdu.fstec.ru/vul/2024-10761" type="self" id="BDU:2024-10761" title="BDU:2024-10761" />
			<reference href="https://bdu.fstec.ru/vul/2024-10756" type="self" id="BDU:2024-10756" title="BDU:2024-10756" />
			<reference href="https://bdu.fstec.ru/vul/2024-10754" type="self" id="BDU:2024-10754" title="BDU:2024-10754" />
			<reference href="https://bdu.fstec.ru/vul/2024-10752" type="self" id="BDU:2024-10752" title="BDU:2024-10752" />
			<reference href="https://bdu.fstec.ru/vul/2024-10762" type="self" id="BDU:2024-10762" title="BDU:2024-10762" />
			<reference href="https://bdu.fstec.ru/vul/2024-10751" type="self" id="BDU:2024-10751" title="BDU:2024-10751" />
			<reference href="https://bdu.fstec.ru/vul/2024-10749" type="self" id="BDU:2024-10749" title="BDU:2024-10749" />
			<reference href="https://bdu.fstec.ru/vul/2024-10747" type="self" id="BDU:2024-10747" title="BDU:2024-10747" />
			<reference href="https://bdu.fstec.ru/vul/2024-10746" type="self" id="BDU:2024-10746" title="BDU:2024-10746" />
			<reference href="https://bdu.fstec.ru/vul/2024-10744" type="self" id="BDU:2024-10744" title="BDU:2024-10744" />
			<reference href="https://bdu.fstec.ru/vul/2024-10743" type="self" id="BDU:2024-10743" title="BDU:2024-10743" />
			<reference href="https://bdu.fstec.ru/vul/2024-10742" type="self" id="BDU:2024-10742" title="BDU:2024-10742" />
			<reference href="https://bdu.fstec.ru/vul/2024-10741" type="self" id="BDU:2024-10741" title="BDU:2024-10741" />
			<reference href="https://bdu.fstec.ru/vul/2024-10765" type="self" id="BDU:2024-10765" title="BDU:2024-10765" />
			<reference href="https://bdu.fstec.ru/vul/2024-10764" type="self" id="BDU:2024-10764" title="BDU:2024-10764" />
			<reference href="https://bdu.fstec.ru/vul/2024-10732" type="self" id="BDU:2024-10732" title="BDU:2024-10732" />
			<reference href="https://bdu.fstec.ru/vul/2024-10734" type="self" id="BDU:2024-10734" title="BDU:2024-10734" />
			<reference href="https://bdu.fstec.ru/vul/2024-10733" type="self" id="BDU:2024-10733" title="BDU:2024-10733" />
			<reference href="https://bdu.fstec.ru/vul/2024-10735" type="self" id="BDU:2024-10735" title="BDU:2024-10735" />
			<reference href="https://bdu.fstec.ru/vul/2024-10738" type="self" id="BDU:2024-10738" title="BDU:2024-10738" />
			<reference href="https://bdu.fstec.ru/vul/2024-10759" type="self" id="BDU:2024-10759" title="BDU:2024-10759" />
			<reference href="https://bdu.fstec.ru/vul/2024-10760" type="self" id="BDU:2024-10760" title="BDU:2024-10760" />
			<reference href="https://bdu.fstec.ru/vul/2024-11552" type="self" id="BDU:2024-11552" title="BDU:2024-11552" />
			<reference href="https://bdu.fstec.ru/vul/2024-10739" type="self" id="BDU:2024-10739" title="BDU:2024-10739" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241202-01</id>
		<issued date="2024-12-02" />
		<updated date="2024-12-02" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-0212241/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-0212241/" type="self" id="ROS-20241202-01" title="ROS-20241202-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38603" type="cve" id="CVE-2024-38603" title="CVE-2024-38603" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38604" type="cve" id="CVE-2024-38604" title="CVE-2024-38604" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38616" type="cve" id="CVE-2024-38616" title="CVE-2024-38616" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38614" type="cve" id="CVE-2024-38614" title="CVE-2024-38614" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38617" type="cve" id="CVE-2024-38617" title="CVE-2024-38617" />
			<reference href="https://bdu.fstec.ru/vul/2024-11580" type="self" id="BDU:2024-11580" title="BDU:2024-11580" />
			<reference href="https://bdu.fstec.ru/vul/2024-11579" type="self" id="BDU:2024-11579" title="BDU:2024-11579" />
			<reference href="https://bdu.fstec.ru/vul/2024-11578" type="self" id="BDU:2024-11578" title="BDU:2024-11578" />
			<reference href="https://bdu.fstec.ru/vul/2024-11577" type="self" id="BDU:2024-11577" title="BDU:2024-11577" />
			<reference href="https://bdu.fstec.ru/vul/2024-11576" type="self" id="BDU:2024-11576" title="BDU:2024-11576" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241202-02</id>
		<issued date="2024-12-02" />
		<updated date="2024-12-02" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-0212242/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-0212242/" type="self" id="ROS-20241202-02" title="ROS-20241202-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38589" type="cve" id="CVE-2024-38589" title="CVE-2024-38589" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38598" type="cve" id="CVE-2024-38598" title="CVE-2024-38598" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38599" type="cve" id="CVE-2024-38599" title="CVE-2024-38599" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38600" type="cve" id="CVE-2024-38600" title="CVE-2024-38600" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38601" type="cve" id="CVE-2024-38601" title="CVE-2024-38601" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38605" type="cve" id="CVE-2024-38605" title="CVE-2024-38605" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38607" type="cve" id="CVE-2024-38607" title="CVE-2024-38607" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38610" type="cve" id="CVE-2024-38610" title="CVE-2024-38610" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38612" type="cve" id="CVE-2024-38612" title="CVE-2024-38612" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38613" type="cve" id="CVE-2024-38613" title="CVE-2024-38613" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38615" type="cve" id="CVE-2024-38615" title="CVE-2024-38615" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38618" type="cve" id="CVE-2024-38618" title="CVE-2024-38618" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47576" type="cve" id="CVE-2021-47576" title="CVE-2021-47576" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47577" type="cve" id="CVE-2021-47577" title="CVE-2021-47577" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47578" type="cve" id="CVE-2021-47578" title="CVE-2021-47578" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47579" type="cve" id="CVE-2021-47579" title="CVE-2021-47579" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47580" type="cve" id="CVE-2021-47580" title="CVE-2021-47580" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47582" type="cve" id="CVE-2021-47582" title="CVE-2021-47582" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47583" type="cve" id="CVE-2021-47583" title="CVE-2021-47583" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47584" type="cve" id="CVE-2021-47584" title="CVE-2021-47584" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47585" type="cve" id="CVE-2021-47585" title="CVE-2021-47585" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47586" type="cve" id="CVE-2021-47586" title="CVE-2021-47586" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47587" type="cve" id="CVE-2021-47587" title="CVE-2021-47587" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47588" type="cve" id="CVE-2021-47588" title="CVE-2021-47588" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47589" type="cve" id="CVE-2021-47589" title="CVE-2021-47589" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36964" type="cve" id="CVE-2024-36964" title="CVE-2024-36964" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47591" type="cve" id="CVE-2021-47591" title="CVE-2021-47591" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47592" type="cve" id="CVE-2021-47592" title="CVE-2021-47592" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47593" type="cve" id="CVE-2021-47593" title="CVE-2021-47593" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47594" type="cve" id="CVE-2021-47594" title="CVE-2021-47594" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47595" type="cve" id="CVE-2021-47595" title="CVE-2021-47595" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47598" type="cve" id="CVE-2021-47598" title="CVE-2021-47598" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47599" type="cve" id="CVE-2021-47599" title="CVE-2021-47599" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47600" type="cve" id="CVE-2021-47600" title="CVE-2021-47600" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47601" type="cve" id="CVE-2021-47601" title="CVE-2021-47601" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47602" type="cve" id="CVE-2021-47602" title="CVE-2021-47602" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47603" type="cve" id="CVE-2021-47603" title="CVE-2021-47603" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47604" type="cve" id="CVE-2021-47604" title="CVE-2021-47604" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47605" type="cve" id="CVE-2021-47605" title="CVE-2021-47605" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47606" type="cve" id="CVE-2021-47606" title="CVE-2021-47606" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47607" type="cve" id="CVE-2021-47607" title="CVE-2021-47607" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47608" type="cve" id="CVE-2021-47608" title="CVE-2021-47608" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47609" type="cve" id="CVE-2021-47609" title="CVE-2021-47609" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47610" type="cve" id="CVE-2021-47610" title="CVE-2021-47610" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47611" type="cve" id="CVE-2021-47611" title="CVE-2021-47611" />
			<reference href="https://bdu.fstec.ru/vul/2024-11552" type="self" id="BDU:2024-11552" title="BDU:2024-11552" />
			<reference href="https://bdu.fstec.ru/vul/2024-11550" type="self" id="BDU:2024-11550" title="BDU:2024-11550" />
			<reference href="https://bdu.fstec.ru/vul/2024-11549" type="self" id="BDU:2024-11549" title="BDU:2024-11549" />
			<reference href="https://bdu.fstec.ru/vul/2024-11548" type="self" id="BDU:2024-11548" title="BDU:2024-11548" />
			<reference href="https://bdu.fstec.ru/vul/2024-07389" type="self" id="BDU:2024-07389" title="BDU:2024-07389" />
			<reference href="https://bdu.fstec.ru/vul/2024-11547" type="self" id="BDU:2024-11547" title="BDU:2024-11547" />
			<reference href="https://bdu.fstec.ru/vul/2024-11546" type="self" id="BDU:2024-11546" title="BDU:2024-11546" />
			<reference href="https://bdu.fstec.ru/vul/2024-11544" type="self" id="BDU:2024-11544" title="BDU:2024-11544" />
			<reference href="https://bdu.fstec.ru/vul/2024-10602" type="self" id="BDU:2024-10602" title="BDU:2024-10602" />
			<reference href="https://bdu.fstec.ru/vul/2024-11545" type="self" id="BDU:2024-11545" title="BDU:2024-11545" />
			<reference href="https://bdu.fstec.ru/vul/2024-11543" type="self" id="BDU:2024-11543" title="BDU:2024-11543" />
			<reference href="https://bdu.fstec.ru/vul/2024-11542" type="self" id="BDU:2024-11542" title="BDU:2024-11542" />
			<reference href="https://bdu.fstec.ru/vul/2024-11541" type="self" id="BDU:2024-11541" title="BDU:2024-11541" />
			<reference href="https://bdu.fstec.ru/vul/2024-11539" type="self" id="BDU:2024-11539" title="BDU:2024-11539" />
			<reference href="https://bdu.fstec.ru/vul/2024-11540" type="self" id="BDU:2024-11540" title="BDU:2024-11540" />
			<reference href="https://bdu.fstec.ru/vul/2024-11538" type="self" id="BDU:2024-11538" title="BDU:2024-11538" />
			<reference href="https://bdu.fstec.ru/vul/2024-11537" type="self" id="BDU:2024-11537" title="BDU:2024-11537" />
			<reference href="https://bdu.fstec.ru/vul/2024-11536" type="self" id="BDU:2024-11536" title="BDU:2024-11536" />
			<reference href="https://bdu.fstec.ru/vul/2024-11535" type="self" id="BDU:2024-11535" title="BDU:2024-11535" />
			<reference href="https://bdu.fstec.ru/vul/2024-11534" type="self" id="BDU:2024-11534" title="BDU:2024-11534" />
			<reference href="https://bdu.fstec.ru/vul/2024-11533" type="self" id="BDU:2024-11533" title="BDU:2024-11533" />
			<reference href="https://bdu.fstec.ru/vul/2024-11532" type="self" id="BDU:2024-11532" title="BDU:2024-11532" />
			<reference href="https://bdu.fstec.ru/vul/2024-11531" type="self" id="BDU:2024-11531" title="BDU:2024-11531" />
			<reference href="https://bdu.fstec.ru/vul/2024-11530" type="self" id="BDU:2024-11530" title="BDU:2024-11530" />
			<reference href="https://bdu.fstec.ru/vul/2024-11525" type="self" id="BDU:2024-11525" title="BDU:2024-11525" />
			<reference href="https://bdu.fstec.ru/vul/2024-11526" type="self" id="BDU:2024-11526" title="BDU:2024-11526" />
			<reference href="https://bdu.fstec.ru/vul/2024-11527" type="self" id="BDU:2024-11527" title="BDU:2024-11527" />
			<reference href="https://bdu.fstec.ru/vul/2024-11554" type="self" id="BDU:2024-11554" title="BDU:2024-11554" />
			<reference href="https://bdu.fstec.ru/vul/2024-11553" type="self" id="BDU:2024-11553" title="BDU:2024-11553" />
			<reference href="https://bdu.fstec.ru/vul/2024-11528" type="self" id="BDU:2024-11528" title="BDU:2024-11528" />
			<reference href="https://bdu.fstec.ru/vul/2024-11529" type="self" id="BDU:2024-11529" title="BDU:2024-11529" />
			<reference href="https://bdu.fstec.ru/vul/2024-11560" type="self" id="BDU:2024-11560" title="BDU:2024-11560" />
			<reference href="https://bdu.fstec.ru/vul/2024-11561" type="self" id="BDU:2024-11561" title="BDU:2024-11561" />
			<reference href="https://bdu.fstec.ru/vul/2024-11559" type="self" id="BDU:2024-11559" title="BDU:2024-11559" />
			<reference href="https://bdu.fstec.ru/vul/2024-11558" type="self" id="BDU:2024-11558" title="BDU:2024-11558" />
			<reference href="https://bdu.fstec.ru/vul/2024-11556" type="self" id="BDU:2024-11556" title="BDU:2024-11556" />
			<reference href="https://bdu.fstec.ru/vul/2024-09779" type="self" id="BDU:2024-09779" title="BDU:2024-09779" />
			<reference href="https://bdu.fstec.ru/vul/2024-11555" type="self" id="BDU:2024-11555" title="BDU:2024-11555" />
			<reference href="https://bdu.fstec.ru/vul/2024-11584" type="self" id="BDU:2024-11584" title="BDU:2024-11584" />
			<reference href="https://bdu.fstec.ru/vul/2024-11585" type="self" id="BDU:2024-11585" title="BDU:2024-11585" />
			<reference href="https://bdu.fstec.ru/vul/2024-11564" type="self" id="BDU:2024-11564" title="BDU:2024-11564" />
			<reference href="https://bdu.fstec.ru/vul/2024-11562" type="self" id="BDU:2024-11562" title="BDU:2024-11562" />
			<reference href="https://bdu.fstec.ru/vul/2024-11563" type="self" id="BDU:2024-11563" title="BDU:2024-11563" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241203-01</id>
		<issued date="2024-12-03" />
		<updated date="2024-12-03" />
		<title>Множественные уязвимости golang </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-golang-cve-2023-24537-cve-2023-24539/</description>
               <solution>
                    Запретить использование в ОС пакета golang
                или
                    Установить обновление для пакета(ов) golang
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-golang-cve-2023-24537-cve-2023-24539/" type="self" id="ROS-20241203-01" title="ROS-20241203-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24537" type="cve" id="CVE-2023-24537" title="CVE-2023-24537" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24539" type="cve" id="CVE-2023-24539" title="CVE-2023-24539" />
			<reference href="https://bdu.fstec.ru/vul/2024-10794" type="self" id="BDU:2024-10794" title="BDU:2024-10794" />
			<reference href="https://bdu.fstec.ru/vul/2023-03470" type="self" id="BDU:2023-03470" title="BDU:2023-03470" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.21.6" release="1.el7" arch="x86_64" src="">
					<filename>golang-0:1.21.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241203-02</id>
		<issued date="2024-12-03" />
		<updated date="2024-12-03" />
		<title>Множественные уязвимости docker-ce </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в docker-ce</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-docker-ce-cve-2024-36623-cve-2024-36621/</description>
               <solution>
                    Запретить использование в ОС пакета docker-ce
                или
                    Установить обновление для пакета(ов) docker-ce
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-docker-ce-cve-2024-36623-cve-2024-36621/" type="self" id="ROS-20241203-02" title="ROS-20241203-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36623" type="cve" id="CVE-2024-36623" title="CVE-2024-36623" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36621" type="cve" id="CVE-2024-36621" title="CVE-2024-36621" />
			<reference href="https://bdu.fstec.ru/vul/2024-10797" type="self" id="BDU:2024-10797" title="BDU:2024-10797" />
			<reference href="https://bdu.fstec.ru/vul/2024-10799" type="self" id="BDU:2024-10799" title="BDU:2024-10799" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="docker-ce" epoch="4" version="25.0.5" release="1.el7" arch="x86_64" src="">
					<filename>docker-ce-4:25.0.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241203-03</id>
		<issued date="2024-12-03" />
		<updated date="2024-12-03" />
		<title>Уязвимость haproxy </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в haproxy</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-haproxy-cve-2024-53008/</description>
               <solution>
                    Запретить использование в ОС пакета HAProxy
                или
                    Установить обновление для пакета(ов) HAProxy
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-haproxy-cve-2024-53008/" type="self" id="ROS-20241203-03" title="ROS-20241203-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53008" type="cve" id="CVE-2024-53008" title="CVE-2024-53008" />
			<reference href="https://bdu.fstec.ru/vul/2024-10643" type="self" id="BDU:2024-10643" title="BDU:2024-10643" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="haproxy" epoch="0" version="3.0.3" release="1.el7" arch="x86_64" src="">
					<filename>haproxy-0:3.0.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241203-04</id>
		<issued date="2024-12-03" />
		<updated date="2024-12-03" />
		<title>Уязвимость kubernetes </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kubernetes</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kubernetes-cve-2024-10220/</description>
               <solution>
                    Запретить использование в ОС пакета kubernetes
                или
                    Установить обновление для пакета(ов) kubernetes
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kubernetes-cve-2024-10220/" type="self" id="ROS-20241203-04" title="ROS-20241203-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10220" type="cve" id="CVE-2024-10220" title="CVE-2024-10220" />
			<reference href="https://bdu.fstec.ru/vul/2024-10035" type="self" id="BDU:2024-10035" title="BDU:2024-10035" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kubernetes" epoch="0" version="1.24.17" release="7.el7" arch="x86_64" src="">
					<filename>kubernetes-0:1.24.17-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240203-05</id>
		<issued date="2024-12-03" />
		<updated date="2024-12-03" />
		<title>Множественные уязвимости tomcat </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в tomcat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-tomcat-cve-2024-52317-cve-2024-52316/</description>
               <solution>
                    Запретить использование в ОС пакета tomcat
                или
                    Установить обновление для пакета(ов) tomcat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-tomcat-cve-2024-52317-cve-2024-52316/" type="self" id="ROS-20240203-05" title="ROS-20240203-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52317" type="cve" id="CVE-2024-52317" title="CVE-2024-52317" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52316" type="cve" id="CVE-2024-52316" title="CVE-2024-52316" />
			<reference href="https://bdu.fstec.ru/vul/2024-10295" type="self" id="BDU:2024-10295" title="BDU:2024-10295" />
			<reference href="https://bdu.fstec.ru/vul/2024-10291" type="self" id="BDU:2024-10291" title="BDU:2024-10291" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat" epoch="1" version="9.0.97" release="1.el7" arch="noarch" src="">
					<filename>tomcat-1:9.0.97-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241203-06</id>
		<issued date="2024-12-03" />
		<updated date="2024-12-03" />
		<title>Уязвимость moodle </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-moodle-cve-2024-45689/</description>
               <solution>
                    Запретить использование в ОС пакета moodle
                или
                    Установить обновление для пакета(ов) moodle
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-moodle-cve-2024-45689/" type="self" id="ROS-20241203-06" title="ROS-20241203-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45689" type="cve" id="CVE-2024-45689" title="CVE-2024-45689" />
			<reference href="https://bdu.fstec.ru/vul/2024-10437" type="self" id="BDU:2024-10437" title="BDU:2024-10437" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="moodle" epoch="0" version="4.2.11" release="1.el7" arch="noarch" src="">
					<filename>moodle-0:4.2.11-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241203-07</id>
		<issued date="2024-12-03" />
		<updated date="2024-12-03" />
		<title>Множественные уязвимости nextcloud-app-mail </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nextcloud-app-mail</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nextcloud-app-mail-cve-2024-52509-cve-2024-52508/</description>
               <solution>
                    Запретить использование в ОС пакета nextcloud-app-mail
                или
                    Установить обновление для пакета(ов) nextcloud-app-mail
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nextcloud-app-mail-cve-2024-52509-cve-2024-52508/" type="self" id="ROS-20241203-07" title="ROS-20241203-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52509" type="cve" id="CVE-2024-52509" title="CVE-2024-52509" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52508" type="cve" id="CVE-2024-52508" title="CVE-2024-52508" />
			<reference href="https://bdu.fstec.ru/vul/2024-10854" type="self" id="BDU:2024-10854" title="BDU:2024-10854" />
			<reference href="https://bdu.fstec.ru/vul/2024-10855" type="self" id="BDU:2024-10855" title="BDU:2024-10855" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nextcloud-app-mail" epoch="0" version="3.7.12" release="1.el7" arch="x86_64" src="">
					<filename>nextcloud-app-mail-0:3.7.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241203-08</id>
		<issued date="2024-12-03" />
		<updated date="2024-12-03" />
		<title>Множественные уязвимости nextcloud</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nextcloud</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nextcloud-031224/</description>
               <solution>
                    Запретить использование в ОС пакета Nextcloud
                или
                    Установить обновление для пакета(ов) Nextcloud
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nextcloud-031224/" type="self" id="ROS-20241203-08" title="ROS-20241203-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52525" type="cve" id="CVE-2024-52525" title="CVE-2024-52525" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52523" type="cve" id="CVE-2024-52523" title="CVE-2024-52523" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52521" type="cve" id="CVE-2024-52521" title="CVE-2024-52521" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52520" type="cve" id="CVE-2024-52520" title="CVE-2024-52520" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52519" type="cve" id="CVE-2024-52519" title="CVE-2024-52519" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52518" type="cve" id="CVE-2024-52518" title="CVE-2024-52518" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52517" type="cve" id="CVE-2024-52517" title="CVE-2024-52517" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52516" type="cve" id="CVE-2024-52516" title="CVE-2024-52516" />
			<reference href="https://bdu.fstec.ru/vul/2024-10840" type="self" id="BDU:2024-10840" title="BDU:2024-10840" />
			<reference href="https://bdu.fstec.ru/vul/2024-10847" type="self" id="BDU:2024-10847" title="BDU:2024-10847" />
			<reference href="https://bdu.fstec.ru/vul/2024-10853" type="self" id="BDU:2024-10853" title="BDU:2024-10853" />
			<reference href="https://bdu.fstec.ru/vul/2024-10841" type="self" id="BDU:2024-10841" title="BDU:2024-10841" />
			<reference href="https://bdu.fstec.ru/vul/2024-10845" type="self" id="BDU:2024-10845" title="BDU:2024-10845" />
			<reference href="https://bdu.fstec.ru/vul/2024-10851" type="self" id="BDU:2024-10851" title="BDU:2024-10851" />
			<reference href="https://bdu.fstec.ru/vul/2024-10846" type="self" id="BDU:2024-10846" title="BDU:2024-10846" />
			<reference href="https://bdu.fstec.ru/vul/2024-10852" type="self" id="BDU:2024-10852" title="BDU:2024-10852" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nextcloud" epoch="0" version="28.0.12" release="1.el7" arch="noarch" src="">
					<filename>nextcloud-0:28.0.12-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241203-09</id>
		<issued date="2024-12-03" />
		<updated date="2025-03-20" />
		<title>Уязвимость glib2 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в glib2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glib2-cve-2024-52533/</description>
               <solution>
                    Запретить использование в ОС пакета glib2
                или
                    Установить обновление для пакета(ов) glib2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glib2-cve-2024-52533/" type="self" id="ROS-20241203-09" title="ROS-20241203-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52533" type="cve" id="CVE-2024-52533" title="CVE-2024-52533" />
			<reference href="https://bdu.fstec.ru/vul/2024-10796" type="self" id="BDU:2024-10796" title="BDU:2024-10796" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glib2" epoch="0" version="2.65.3" release="5.el7" arch="x86_64" src="">
					<filename>glib2-0:2.65.3-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241203-10</id>
		<issued date="2024-12-03" />
		<updated date="2024-12-03" />
		<title>Уязвимость zookeeper </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в zookeeper</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zookeeper-cve-2024-51504/</description>
               <solution>
                    Запретить использование в ОС пакета zookeeper
                или
                    Установить обновление для пакета(ов) zookeeper
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zookeeper-cve-2024-51504/" type="self" id="ROS-20241203-10" title="ROS-20241203-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-51504" type="cve" id="CVE-2024-51504" title="CVE-2024-51504" />
			<reference href="https://bdu.fstec.ru/vul/2024-09417" type="self" id="BDU:2024-09417" title="BDU:2024-09417" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zookeeper" epoch="0" version="3.9.3" release="1.el7" arch="x86_64" src="">
					<filename>zookeeper-0:3.9.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241203-11</id>
		<issued date="2024-12-03" />
		<updated date="2024-12-03" />
		<title>Уязвимость angie </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в angie</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-angie-cve-2024-7347/</description>
               <solution>
                    Запретить использование в ОС пакета angie
                или
                    Установить обновление для пакета(ов) angie
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-angie-cve-2024-7347/" type="self" id="ROS-20241203-11" title="ROS-20241203-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7347" type="cve" id="CVE-2024-7347" title="CVE-2024-7347" />
			<reference href="https://bdu.fstec.ru/vul/2024-06605" type="self" id="BDU:2024-06605" title="BDU:2024-06605" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="angie" epoch="0" version="1.6.2" release="1.el7" arch="x86_64" src="">
					<filename>angie-0:1.6.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241203-12</id>
		<issued date="2024-12-03" />
		<updated date="2024-12-03" />
		<title>Уязвимость curl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2024-9681/</description>
               <solution>
                    Запретить использование в ОС пакета curl
                или
                    Установить обновление для пакета(ов) curl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2024-9681/" type="self" id="ROS-20241203-12" title="ROS-20241203-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9681" type="cve" id="CVE-2024-9681" title="CVE-2024-9681" />
			<reference href="https://bdu.fstec.ru/vul/2024-09106" type="self" id="BDU:2024-09106" title="BDU:2024-09106" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="curl" epoch="0" version="7.85.0" release="23.el7.3" arch="x86_64" src="">
					<filename>curl-0:7.85.0-23.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241203-13</id>
		<issued date="2024-12-03" />
		<updated date="2024-12-03" />
		<title>Уязвимость opendmarc </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в opendmarc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opendmarc-cve-2024-25768/</description>
               <solution>
                    Запретить использование в ОС пакета OpenDMARC
                или
                    Установить обновление для пакета(ов) OpenDMARC
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opendmarc-cve-2024-25768/" type="self" id="ROS-20241203-13" title="ROS-20241203-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25768" type="cve" id="CVE-2024-25768" title="CVE-2024-25768" />
			<reference href="https://bdu.fstec.ru/vul/2024-10844" type="self" id="BDU:2024-10844" title="BDU:2024-10844" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="opendmarc" epoch="0" version="1.4.2" release="2.el7" arch="x86_64" src="">
					<filename>opendmarc-0:1.4.2-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241203-14</id>
		<issued date="2024-12-03" />
		<updated date="2024-12-03" />
		<title>Уязвимость squid </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в squid</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-squid-cve-2024-45802/</description>
               <solution>
                    Запретить использование в ОС пакета squid
                или
                    Установить обновление для пакета(ов) squid
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-squid-cve-2024-45802/" type="self" id="ROS-20241203-14" title="ROS-20241203-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45802" type="cve" id="CVE-2024-45802" title="CVE-2024-45802" />
			<reference href="https://bdu.fstec.ru/vul/2024-08860" type="self" id="BDU:2024-08860" title="BDU:2024-08860" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="squid" epoch="7" version="6.12" release="1.el7" arch="x86_64" src="">
					<filename>squid-7:6.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241203-15</id>
		<issued date="2024-12-03" />
		<updated date="2024-12-03" />
		<title>Множественные уязвимости filebeat </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в filebeat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-filebeat-cve-2022-23806-cve-2023-24540-cve-2023-24538/</description>
               <solution>
                    Запретить использование в ОС пакета filebeat
                или
                    Установить обновление для пакета(ов) filebeat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-filebeat-cve-2022-23806-cve-2023-24540-cve-2023-24538/" type="self" id="ROS-20241203-15" title="ROS-20241203-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23806" type="cve" id="CVE-2022-23806" title="CVE-2022-23806" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24540" type="cve" id="CVE-2023-24540" title="CVE-2023-24540" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24538" type="cve" id="CVE-2023-24538" title="CVE-2023-24538" />
			<reference href="https://bdu.fstec.ru/vul/2024-10793" type="self" id="BDU:2024-10793" title="BDU:2024-10793" />
			<reference href="https://bdu.fstec.ru/vul/2023-03471" type="self" id="BDU:2023-03471" title="BDU:2023-03471" />
			<reference href="https://bdu.fstec.ru/vul/2024-01979" type="self" id="BDU:2024-01979" title="BDU:2024-01979" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="filebeat" epoch="0" version="7.17.14" release="2.el7" arch="x86_64" src="">
					<filename>filebeat-0:7.17.14-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241203-16</id>
		<issued date="2024-12-03" />
		<updated date="2024-12-03" />
		<title>Уязвимость busybox </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в busybox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-busybox-cve-2022-48174/</description>
               <solution>
                    Запретить использование в ОС пакета busybox
                или
                    Установить обновление для пакета(ов) busybox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-busybox-cve-2022-48174/" type="self" id="ROS-20241203-16" title="ROS-20241203-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48174" type="cve" id="CVE-2022-48174" title="CVE-2022-48174" />
			<reference href="https://bdu.fstec.ru/vul/2023-05378" type="self" id="BDU:2023-05378" title="BDU:2023-05378" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="busybox" epoch="1" version="1.34.1" release="5.el7" arch="x86_64" src="">
					<filename>busybox-1:1.34.1-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241203-17</id>
		<issued date="2024-12-03" />
		<updated date="2024-12-03" />
		<title>Уязвимость python3-gevent </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в python3-gevent</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-gevent-cve-2023-41419/</description>
               <solution>
                    Запретить использование в ОС пакета python3-gevent
                или
                    Установить обновление для пакета(ов) python3-gevent
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-gevent-cve-2023-41419/" type="self" id="ROS-20241203-17" title="ROS-20241203-17" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41419" type="cve" id="CVE-2023-41419" title="CVE-2023-41419" />
			<reference href="https://bdu.fstec.ru/vul/2023-06603" type="self" id="BDU:2023-06603" title="BDU:2023-06603" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-gevent" epoch="0" version="23.9.1" release="1.el7" arch="x86_64" src="">
					<filename>python3-gevent-0:23.9.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241203-18</id>
		<issued date="2024-12-03" />
		<updated date="2024-12-03" />
		<title>Уязвимость xrdp </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в xrdp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-xrdp-cve-2024-39917/</description>
               <solution>
                    Запретить использование в ОС пакета xrdp
                или
                    Установить обновление для пакета(ов) xrdp
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-xrdp-cve-2024-39917/" type="self" id="ROS-20241203-18" title="ROS-20241203-18" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39917" type="cve" id="CVE-2024-39917" title="CVE-2024-39917" />
			<reference href="https://bdu.fstec.ru/vul/2024-10780" type="self" id="BDU:2024-10780" title="BDU:2024-10780" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="xrdp" epoch="1" version="0.10.1" release="1.el7" arch="x86_64" src="">
					<filename>xrdp-1:0.10.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241203-19</id>
		<issued date="2024-12-03" />
		<updated date="2024-12-03" />
		<title>Множественные уязвимости httpd </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в httpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-httpd-cve-2024-38474-cve-2024-38476/</description>
               <solution>
                    Запретить использование в ОС пакета httpd
                или
                    Установить обновление для пакета(ов) httpd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-httpd-cve-2024-38474-cve-2024-38476/" type="self" id="ROS-20241203-19" title="ROS-20241203-19" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38474" type="cve" id="CVE-2024-38474" title="CVE-2024-38474" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38476" type="cve" id="CVE-2024-38476" title="CVE-2024-38476" />
			<reference href="https://bdu.fstec.ru/vul/2024-06593" type="self" id="BDU:2024-06593" title="BDU:2024-06593" />
			<reference href="https://bdu.fstec.ru/vul/2024-05131" type="self" id="BDU:2024-05131" title="BDU:2024-05131" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="httpd" epoch="0" version="2.4.61" release="1.el7" arch="x86_64" src="">
					<filename>httpd-0:2.4.61-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241203-20</id>
		<issued date="2024-12-03" />
		<updated date="2024-12-03" />
		<title>Множественные уязвимости apache-ivy </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в apache-ivy</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-apache-ivy-cve-2022-37866-cve-2022-37865/</description>
               <solution>
                    Запретить использование в ОС пакета apache-ivy
                или
                    Установить обновление для пакета(ов) apache-ivy
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-apache-ivy-cve-2022-37866-cve-2022-37865/" type="self" id="ROS-20241203-20" title="ROS-20241203-20" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37866" type="cve" id="CVE-2022-37866" title="CVE-2022-37866" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37865" type="cve" id="CVE-2022-37865" title="CVE-2022-37865" />
			<reference href="https://bdu.fstec.ru/vul/2024-02253" type="self" id="BDU:2024-02253" title="BDU:2024-02253" />
			<reference href="https://bdu.fstec.ru/vul/2024-02278" type="self" id="BDU:2024-02278" title="BDU:2024-02278" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="apache-ivy" epoch="0" version="2.5.1" release="1.el7" arch="noarch" src="">
					<filename>apache-ivy-0:2.5.1-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241203-21</id>
		<issued date="2024-12-03" />
		<updated date="2024-12-03" />
		<title>Уязвимость drawio-desktop </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в drawio-desktop</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-drawio-desktop-cve-2022-3133/</description>
               <solution>
                    Запретить использование в ОС пакета drawio-desktop
                или
                    Установить обновление для пакета(ов) drawio-desktop
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-drawio-desktop-cve-2022-3133/" type="self" id="ROS-20241203-21" title="ROS-20241203-21" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3133" type="cve" id="CVE-2022-3133" title="CVE-2022-3133" />
			<reference href="https://bdu.fstec.ru/vul/2024-10795" type="self" id="BDU:2024-10795" title="BDU:2024-10795" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="drawio-desktop" epoch="0" version="24.7.17" release="1.el7" arch="x86_64" src="">
					<filename>drawio-desktop-0:24.7.17-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241203-22</id>
		<issued date="2024-12-03" />
		<updated date="2024-12-03" />
		<title>Множественные уязвимости puppetserver </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в puppetserver</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-puppetserver-cve-2021-27023-cve-2021-27025/</description>
               <solution>
                    Запретить использование в ОС пакета puppetserver
                или
                    Установить обновление для пакета(ов) puppetserver
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-puppetserver-cve-2021-27023-cve-2021-27025/" type="self" id="ROS-20241203-22" title="ROS-20241203-22" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27023" type="cve" id="CVE-2021-27023" title="CVE-2021-27023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27025" type="cve" id="CVE-2021-27025" title="CVE-2021-27025" />
			<reference href="https://bdu.fstec.ru/vul/2024-10798" type="self" id="BDU:2024-10798" title="BDU:2024-10798" />
			<reference href="https://bdu.fstec.ru/vul/2024-10807" type="self" id="BDU:2024-10807" title="BDU:2024-10807" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="puppetserver" epoch="0" version="7.4.2" release="1.el7" arch="noarch" src="">
					<filename>puppetserver-0:7.4.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241203-23</id>
		<issued date="2024-12-03" />
		<updated date="2024-12-03" />
		<title>Множественные уязвимости puppet </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в puppet</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-puppet-cve-2021-27023-cve-2021-270253564/</description>
               <solution>
                    Запретить использование в ОС пакета puppet
                или
                    Установить обновление для пакета(ов) puppet
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-puppet-cve-2021-27023-cve-2021-270253564/" type="self" id="ROS-20241203-23" title="ROS-20241203-23" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27023" type="cve" id="CVE-2021-27023" title="CVE-2021-27023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27025" type="cve" id="CVE-2021-27025" title="CVE-2021-27025" />
			<reference href="https://bdu.fstec.ru/vul/2024-10798" type="self" id="BDU:2024-10798" title="BDU:2024-10798" />
			<reference href="https://bdu.fstec.ru/vul/2024-10807" type="self" id="BDU:2024-10807" title="BDU:2024-10807" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="puppet" epoch="0" version="7.26.0" release="2.el7" arch="x86_64" src="">
					<filename>puppet-0:7.26.0-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241204-01</id>
		<issued date="2024-12-04" />
		<updated date="2024-12-04" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-0412241/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-0412241/" type="self" id="ROS-20241204-01" title="ROS-20241204-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38619" type="cve" id="CVE-2024-38619" title="CVE-2024-38619" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38620" type="cve" id="CVE-2024-38620" title="CVE-2024-38620" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43861" type="cve" id="CVE-2024-43861" title="CVE-2024-43861" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33619" type="cve" id="CVE-2024-33619" title="CVE-2024-33619" />
			<reference href="https://bdu.fstec.ru/vul/2024-04895" type="self" id="BDU:2024-04895" title="BDU:2024-04895" />
			<reference href="https://bdu.fstec.ru/vul/2024-07403" type="self" id="BDU:2024-07403" title="BDU:2024-07403" />
			<reference href="https://bdu.fstec.ru/vul/2024-10976" type="self" id="BDU:2024-10976" title="BDU:2024-10976" />
			<reference href="https://bdu.fstec.ru/vul/2024-10975" type="self" id="BDU:2024-10975" title="BDU:2024-10975" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241204-02</id>
		<issued date="2024-12-04" />
		<updated date="2024-12-04" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-0412242/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-0412242/" type="self" id="ROS-20241204-02" title="ROS-20241204-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47612" type="cve" id="CVE-2021-47612" title="CVE-2021-47612" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47613" type="cve" id="CVE-2021-47613" title="CVE-2021-47613" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47614" type="cve" id="CVE-2021-47614" title="CVE-2021-47614" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47616" type="cve" id="CVE-2021-47616" title="CVE-2021-47616" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47617" type="cve" id="CVE-2021-47617" title="CVE-2021-47617" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47618" type="cve" id="CVE-2021-47618" title="CVE-2021-47618" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47619" type="cve" id="CVE-2021-47619" title="CVE-2021-47619" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47620" type="cve" id="CVE-2021-47620" title="CVE-2021-47620" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48711" type="cve" id="CVE-2022-48711" title="CVE-2022-48711" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48712" type="cve" id="CVE-2022-48712" title="CVE-2022-48712" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48713" type="cve" id="CVE-2022-48713" title="CVE-2022-48713" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48714" type="cve" id="CVE-2022-48714" title="CVE-2022-48714" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48715" type="cve" id="CVE-2022-48715" title="CVE-2022-48715" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48716" type="cve" id="CVE-2022-48716" title="CVE-2022-48716" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48717" type="cve" id="CVE-2022-48717" title="CVE-2022-48717" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48718" type="cve" id="CVE-2022-48718" title="CVE-2022-48718" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47591" type="cve" id="CVE-2021-47591" title="CVE-2021-47591" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48720" type="cve" id="CVE-2022-48720" title="CVE-2022-48720" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48721" type="cve" id="CVE-2022-48721" title="CVE-2022-48721" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48722" type="cve" id="CVE-2022-48722" title="CVE-2022-48722" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48723" type="cve" id="CVE-2022-48723" title="CVE-2022-48723" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48724" type="cve" id="CVE-2022-48724" title="CVE-2022-48724" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48725" type="cve" id="CVE-2022-48725" title="CVE-2022-48725" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48726" type="cve" id="CVE-2022-48726" title="CVE-2022-48726" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48727" type="cve" id="CVE-2022-48727" title="CVE-2022-48727" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48728" type="cve" id="CVE-2022-48728" title="CVE-2022-48728" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48730" type="cve" id="CVE-2022-48730" title="CVE-2022-48730" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48731" type="cve" id="CVE-2022-48731" title="CVE-2022-48731" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48738" type="cve" id="CVE-2022-48738" title="CVE-2022-48738" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48739" type="cve" id="CVE-2022-48739" title="CVE-2022-48739" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48745" type="cve" id="CVE-2022-48745" title="CVE-2022-48745" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48746" type="cve" id="CVE-2022-48746" title="CVE-2022-48746" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48747" type="cve" id="CVE-2022-48747" title="CVE-2022-48747" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48748" type="cve" id="CVE-2022-48748" title="CVE-2022-48748" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48752" type="cve" id="CVE-2022-48752" title="CVE-2022-48752" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48754" type="cve" id="CVE-2022-48754" title="CVE-2022-48754" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48757" type="cve" id="CVE-2022-48757" title="CVE-2022-48757" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48758" type="cve" id="CVE-2022-48758" title="CVE-2022-48758" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48759" type="cve" id="CVE-2022-48759" title="CVE-2022-48759" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48760" type="cve" id="CVE-2022-48760" title="CVE-2022-48760" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48761" type="cve" id="CVE-2022-48761" title="CVE-2022-48761" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48767" type="cve" id="CVE-2022-48767" title="CVE-2022-48767" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48770" type="cve" id="CVE-2022-48770" title="CVE-2022-48770" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48771" type="cve" id="CVE-2022-48771" title="CVE-2022-48771" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52884" type="cve" id="CVE-2023-52884" title="CVE-2023-52884" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31076" type="cve" id="CVE-2024-31076" title="CVE-2024-31076" />
			<reference href="https://bdu.fstec.ru/vul/2024-10974" type="self" id="BDU:2024-10974" title="BDU:2024-10974" />
			<reference href="https://bdu.fstec.ru/vul/2024-10973" type="self" id="BDU:2024-10973" title="BDU:2024-10973" />
			<reference href="https://bdu.fstec.ru/vul/2024-10599" type="self" id="BDU:2024-10599" title="BDU:2024-10599" />
			<reference href="https://bdu.fstec.ru/vul/2024-10972" type="self" id="BDU:2024-10972" title="BDU:2024-10972" />
			<reference href="https://bdu.fstec.ru/vul/2024-10971" type="self" id="BDU:2024-10971" title="BDU:2024-10971" />
			<reference href="https://bdu.fstec.ru/vul/2024-10970" type="self" id="BDU:2024-10970" title="BDU:2024-10970" />
			<reference href="https://bdu.fstec.ru/vul/2024-10969" type="self" id="BDU:2024-10969" title="BDU:2024-10969" />
			<reference href="https://bdu.fstec.ru/vul/2024-10968" type="self" id="BDU:2024-10968" title="BDU:2024-10968" />
			<reference href="https://bdu.fstec.ru/vul/2024-10967" type="self" id="BDU:2024-10967" title="BDU:2024-10967" />
			<reference href="https://bdu.fstec.ru/vul/2024-10966" type="self" id="BDU:2024-10966" title="BDU:2024-10966" />
			<reference href="https://bdu.fstec.ru/vul/2024-10965" type="self" id="BDU:2024-10965" title="BDU:2024-10965" />
			<reference href="https://bdu.fstec.ru/vul/2024-10964" type="self" id="BDU:2024-10964" title="BDU:2024-10964" />
			<reference href="https://bdu.fstec.ru/vul/2024-07048" type="self" id="BDU:2024-07048" title="BDU:2024-07048" />
			<reference href="https://bdu.fstec.ru/vul/2024-10600" type="self" id="BDU:2024-10600" title="BDU:2024-10600" />
			<reference href="https://bdu.fstec.ru/vul/2024-10963" type="self" id="BDU:2024-10963" title="BDU:2024-10963" />
			<reference href="https://bdu.fstec.ru/vul/2024-10962" type="self" id="BDU:2024-10962" title="BDU:2024-10962" />
			<reference href="https://bdu.fstec.ru/vul/2024-11527" type="self" id="BDU:2024-11527" title="BDU:2024-11527" />
			<reference href="https://bdu.fstec.ru/vul/2024-10961" type="self" id="BDU:2024-10961" title="BDU:2024-10961" />
			<reference href="https://bdu.fstec.ru/vul/2024-10956" type="self" id="BDU:2024-10956" title="BDU:2024-10956" />
			<reference href="https://bdu.fstec.ru/vul/2024-10955" type="self" id="BDU:2024-10955" title="BDU:2024-10955" />
			<reference href="https://bdu.fstec.ru/vul/2024-10954" type="self" id="BDU:2024-10954" title="BDU:2024-10954" />
			<reference href="https://bdu.fstec.ru/vul/2024-10953" type="self" id="BDU:2024-10953" title="BDU:2024-10953" />
			<reference href="https://bdu.fstec.ru/vul/2024-10952" type="self" id="BDU:2024-10952" title="BDU:2024-10952" />
			<reference href="https://bdu.fstec.ru/vul/2024-09528" type="self" id="BDU:2024-09528" title="BDU:2024-09528" />
			<reference href="https://bdu.fstec.ru/vul/2024-07047" type="self" id="BDU:2024-07047" title="BDU:2024-07047" />
			<reference href="https://bdu.fstec.ru/vul/2024-10951" type="self" id="BDU:2024-10951" title="BDU:2024-10951" />
			<reference href="https://bdu.fstec.ru/vul/2024-07399" type="self" id="BDU:2024-07399" title="BDU:2024-07399" />
			<reference href="https://bdu.fstec.ru/vul/2024-10950" type="self" id="BDU:2024-10950" title="BDU:2024-10950" />
			<reference href="https://bdu.fstec.ru/vul/2024-10949" type="self" id="BDU:2024-10949" title="BDU:2024-10949" />
			<reference href="https://bdu.fstec.ru/vul/2024-10948" type="self" id="BDU:2024-10948" title="BDU:2024-10948" />
			<reference href="https://bdu.fstec.ru/vul/2024-10947" type="self" id="BDU:2024-10947" title="BDU:2024-10947" />
			<reference href="https://bdu.fstec.ru/vul/2024-10946" type="self" id="BDU:2024-10946" title="BDU:2024-10946" />
			<reference href="https://bdu.fstec.ru/vul/2024-10945" type="self" id="BDU:2024-10945" title="BDU:2024-10945" />
			<reference href="https://bdu.fstec.ru/vul/2024-10944" type="self" id="BDU:2024-10944" title="BDU:2024-10944" />
			<reference href="https://bdu.fstec.ru/vul/2024-10943" type="self" id="BDU:2024-10943" title="BDU:2024-10943" />
			<reference href="https://bdu.fstec.ru/vul/2024-10942" type="self" id="BDU:2024-10942" title="BDU:2024-10942" />
			<reference href="https://bdu.fstec.ru/vul/2024-10941" type="self" id="BDU:2024-10941" title="BDU:2024-10941" />
			<reference href="https://bdu.fstec.ru/vul/2024-07402" type="self" id="BDU:2024-07402" title="BDU:2024-07402" />
			<reference href="https://bdu.fstec.ru/vul/2024-07401" type="self" id="BDU:2024-07401" title="BDU:2024-07401" />
			<reference href="https://bdu.fstec.ru/vul/2024-10940" type="self" id="BDU:2024-10940" title="BDU:2024-10940" />
			<reference href="https://bdu.fstec.ru/vul/2024-10939" type="self" id="BDU:2024-10939" title="BDU:2024-10939" />
			<reference href="https://bdu.fstec.ru/vul/2024-10938" type="self" id="BDU:2024-10938" title="BDU:2024-10938" />
			<reference href="https://bdu.fstec.ru/vul/2024-10937" type="self" id="BDU:2024-10937" title="BDU:2024-10937" />
			<reference href="https://bdu.fstec.ru/vul/2024-10936" type="self" id="BDU:2024-10936" title="BDU:2024-10936" />
			<reference href="https://bdu.fstec.ru/vul/2024-10932" type="self" id="BDU:2024-10932" title="BDU:2024-10932" />
			<reference href="https://bdu.fstec.ru/vul/2024-10930" type="self" id="BDU:2024-10930" title="BDU:2024-10930" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241205-01</id>
		<issued date="2024-12-05" />
		<updated date="2024-12-05" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-051241/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-051241/" type="self" id="ROS-20241205-01" title="ROS-20241205-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39488" type="cve" id="CVE-2024-39488" title="CVE-2024-39488" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39490" type="cve" id="CVE-2024-39490" title="CVE-2024-39490" />
			<reference href="https://bdu.fstec.ru/vul/2024-10920" type="self" id="BDU:2024-10920" title="BDU:2024-10920" />
			<reference href="https://bdu.fstec.ru/vul/2024-10921" type="self" id="BDU:2024-10921" title="BDU:2024-10921" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241205-02</id>
		<issued date="2024-12-05" />
		<updated date="2024-12-05" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-0512242/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-0512242/" type="self" id="ROS-20241205-02" title="ROS-20241205-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39483" type="cve" id="CVE-2024-39483" title="CVE-2024-39483" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39484" type="cve" id="CVE-2024-39484" title="CVE-2024-39484" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39485" type="cve" id="CVE-2024-39485" title="CVE-2024-39485" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39486" type="cve" id="CVE-2024-39486" title="CVE-2024-39486" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39487" type="cve" id="CVE-2024-39487" title="CVE-2024-39487" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39491" type="cve" id="CVE-2024-39491" title="CVE-2024-39491" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39495" type="cve" id="CVE-2024-39495" title="CVE-2024-39495" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39499" type="cve" id="CVE-2024-39499" title="CVE-2024-39499" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39500" type="cve" id="CVE-2024-39500" title="CVE-2024-39500" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39501" type="cve" id="CVE-2024-39501" title="CVE-2024-39501" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39502" type="cve" id="CVE-2024-39502" title="CVE-2024-39502" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39503" type="cve" id="CVE-2024-39503" title="CVE-2024-39503" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39504" type="cve" id="CVE-2024-39504" title="CVE-2024-39504" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39505" type="cve" id="CVE-2024-39505" title="CVE-2024-39505" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39506" type="cve" id="CVE-2024-39506" title="CVE-2024-39506" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39507" type="cve" id="CVE-2024-39507" title="CVE-2024-39507" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39509" type="cve" id="CVE-2024-39509" title="CVE-2024-39509" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39510" type="cve" id="CVE-2024-39510" title="CVE-2024-39510" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40899" type="cve" id="CVE-2024-40899" title="CVE-2024-40899" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40900" type="cve" id="CVE-2024-40900" title="CVE-2024-40900" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40901" type="cve" id="CVE-2024-40901" title="CVE-2024-40901" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40902" type="cve" id="CVE-2024-40902" title="CVE-2024-40902" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40903" type="cve" id="CVE-2024-40903" title="CVE-2024-40903" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40904" type="cve" id="CVE-2024-40904" title="CVE-2024-40904" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40905" type="cve" id="CVE-2024-40905" title="CVE-2024-40905" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40906" type="cve" id="CVE-2024-40906" title="CVE-2024-40906" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40908" type="cve" id="CVE-2024-40908" title="CVE-2024-40908" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40909" type="cve" id="CVE-2024-40909" title="CVE-2024-40909" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40911" type="cve" id="CVE-2024-40911" title="CVE-2024-40911" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40912" type="cve" id="CVE-2024-40912" title="CVE-2024-40912" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40913" type="cve" id="CVE-2024-40913" title="CVE-2024-40913" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40914" type="cve" id="CVE-2024-40914" title="CVE-2024-40914" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40916" type="cve" id="CVE-2024-40916" title="CVE-2024-40916" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40919" type="cve" id="CVE-2024-40919" title="CVE-2024-40919" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40920" type="cve" id="CVE-2024-40920" title="CVE-2024-40920" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40921" type="cve" id="CVE-2024-40921" title="CVE-2024-40921" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40922" type="cve" id="CVE-2024-40922" title="CVE-2024-40922" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40923" type="cve" id="CVE-2024-40923" title="CVE-2024-40923" />
			<reference href="https://bdu.fstec.ru/vul/2024-09028" type="self" id="BDU:2024-09028" title="BDU:2024-09028" />
			<reference href="https://bdu.fstec.ru/vul/2024-06082" type="self" id="BDU:2024-06082" title="BDU:2024-06082" />
			<reference href="https://bdu.fstec.ru/vul/2024-06081" type="self" id="BDU:2024-06081" title="BDU:2024-06081" />
			<reference href="https://bdu.fstec.ru/vul/2024-06080" type="self" id="BDU:2024-06080" title="BDU:2024-06080" />
			<reference href="https://bdu.fstec.ru/vul/2024-06063" type="self" id="BDU:2024-06063" title="BDU:2024-06063" />
			<reference href="https://bdu.fstec.ru/vul/2024-10918" type="self" id="BDU:2024-10918" title="BDU:2024-10918" />
			<reference href="https://bdu.fstec.ru/vul/2024-06072" type="self" id="BDU:2024-06072" title="BDU:2024-06072" />
			<reference href="https://bdu.fstec.ru/vul/2024-10917" type="self" id="BDU:2024-10917" title="BDU:2024-10917" />
			<reference href="https://bdu.fstec.ru/vul/2024-10916" type="self" id="BDU:2024-10916" title="BDU:2024-10916" />
			<reference href="https://bdu.fstec.ru/vul/2024-10919" type="self" id="BDU:2024-10919" title="BDU:2024-10919" />
			<reference href="https://bdu.fstec.ru/vul/2024-10979" type="self" id="BDU:2024-10979" title="BDU:2024-10979" />
			<reference href="https://bdu.fstec.ru/vul/2024-10986" type="self" id="BDU:2024-10986" title="BDU:2024-10986" />
			<reference href="https://bdu.fstec.ru/vul/2024-10980" type="self" id="BDU:2024-10980" title="BDU:2024-10980" />
			<reference href="https://bdu.fstec.ru/vul/2024-11004" type="self" id="BDU:2024-11004" title="BDU:2024-11004" />
			<reference href="https://bdu.fstec.ru/vul/2024-11005" type="self" id="BDU:2024-11005" title="BDU:2024-11005" />
			<reference href="https://bdu.fstec.ru/vul/2024-11003" type="self" id="BDU:2024-11003" title="BDU:2024-11003" />
			<reference href="https://bdu.fstec.ru/vul/2024-10999" type="self" id="BDU:2024-10999" title="BDU:2024-10999" />
			<reference href="https://bdu.fstec.ru/vul/2024-06070" type="self" id="BDU:2024-06070" title="BDU:2024-06070" />
			<reference href="https://bdu.fstec.ru/vul/2024-06068" type="self" id="BDU:2024-06068" title="BDU:2024-06068" />
			<reference href="https://bdu.fstec.ru/vul/2024-11002" type="self" id="BDU:2024-11002" title="BDU:2024-11002" />
			<reference href="https://bdu.fstec.ru/vul/2024-11001" type="self" id="BDU:2024-11001" title="BDU:2024-11001" />
			<reference href="https://bdu.fstec.ru/vul/2024-07751" type="self" id="BDU:2024-07751" title="BDU:2024-07751" />
			<reference href="https://bdu.fstec.ru/vul/2024-07750" type="self" id="BDU:2024-07750" title="BDU:2024-07750" />
			<reference href="https://bdu.fstec.ru/vul/2024-11355" type="self" id="BDU:2024-11355" title="BDU:2024-11355" />
			<reference href="https://bdu.fstec.ru/vul/2024-11356" type="self" id="BDU:2024-11356" title="BDU:2024-11356" />
			<reference href="https://bdu.fstec.ru/vul/2024-08165" type="self" id="BDU:2024-08165" title="BDU:2024-08165" />
			<reference href="https://bdu.fstec.ru/vul/2024-11069" type="self" id="BDU:2024-11069" title="BDU:2024-11069" />
			<reference href="https://bdu.fstec.ru/vul/2024-08190" type="self" id="BDU:2024-08190" title="BDU:2024-08190" />
			<reference href="https://bdu.fstec.ru/vul/2024-11524" type="self" id="BDU:2024-11524" title="BDU:2024-11524" />
			<reference href="https://bdu.fstec.ru/vul/2024-11523" type="self" id="BDU:2024-11523" title="BDU:2024-11523" />
			<reference href="https://bdu.fstec.ru/vul/2024-11522" type="self" id="BDU:2024-11522" title="BDU:2024-11522" />
			<reference href="https://bdu.fstec.ru/vul/2024-11521" type="self" id="BDU:2024-11521" title="BDU:2024-11521" />
			<reference href="https://bdu.fstec.ru/vul/2024-11520" type="self" id="BDU:2024-11520" title="BDU:2024-11520" />
			<reference href="https://bdu.fstec.ru/vul/2024-11517" type="self" id="BDU:2024-11517" title="BDU:2024-11517" />
			<reference href="https://bdu.fstec.ru/vul/2024-11518" type="self" id="BDU:2024-11518" title="BDU:2024-11518" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241209-01</id>
		<issued date="2024-12-09" />
		<updated date="2024-12-09" />
		<title>Множественные уязвимости linux-firmware </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в linux-firmware</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-linux-firmware-cve-2020-12954-cve-2021-0146-cve-2021-26335-cve-2021-26334/</description>
               <solution>
                    Запретить использование в ОС пакета linux-firmware
                или
                    Установить обновление для пакета(ов) linux-firmware
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-linux-firmware-cve-2020-12954-cve-2021-0146-cve-2021-26335-cve-2021-26334/" type="self" id="ROS-20241209-01" title="ROS-20241209-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12954" type="cve" id="CVE-2020-12954" title="CVE-2020-12954" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0146" type="cve" id="CVE-2021-0146" title="CVE-2021-0146" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26335" type="cve" id="CVE-2021-26335" title="CVE-2021-26335" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26334" type="cve" id="CVE-2021-26334" title="CVE-2021-26334" />
			<reference href="https://bdu.fstec.ru/vul/2021-05803" type="self" id="BDU:2021-05803" title="BDU:2021-05803" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="linux-firmware" epoch="0" version="20240709" release="1.el7.3" arch="noarch" src="">
					<filename>linux-firmware-0:20240709-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241209-02</id>
		<issued date="2024-12-09" />
		<updated date="2024-12-09" />
		<title>Множественные уязвимости linux-firmware </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в linux-firmware</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-linux-firmware-cve-2023-45733-cve-2023-45745-cve-2023-47855-cve-2023-4610/</description>
               <solution>
                    Запретить использование в ОС пакета linux-firmware
                или
                    Установить обновление для пакета(ов) linux-firmware
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-linux-firmware-cve-2023-45733-cve-2023-45745-cve-2023-47855-cve-2023-4610/" type="self" id="ROS-20241209-02" title="ROS-20241209-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45733" type="cve" id="CVE-2023-45733" title="CVE-2023-45733" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45745" type="cve" id="CVE-2023-45745" title="CVE-2023-45745" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47855" type="cve" id="CVE-2023-47855" title="CVE-2023-47855" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46103" type="cve" id="CVE-2023-46103" title="CVE-2023-46103" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="linux-firmware" epoch="0" version="20240709" release="1.el7.3" arch="noarch" src="">
					<filename>linux-firmware-0:20240709-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241209-03</id>
		<issued date="2024-12-09" />
		<updated date="2024-12-09" />
		<title>Уязвимость ntfs-3g </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в ntfs-3g</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ntfs-3g-cve-2023-52890/</description>
               <solution>
                    Запретить использование в ОС пакета NTFS-3G
                или
                    Установить обновление для пакета(ов) NTFS-3G
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ntfs-3g-cve-2023-52890/" type="self" id="ROS-20241209-03" title="ROS-20241209-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52890" type="cve" id="CVE-2023-52890" title="CVE-2023-52890" />
			<reference href="https://bdu.fstec.ru/vul/2024-11076" type="self" id="BDU:2024-11076" title="BDU:2024-11076" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ntfs-3g" epoch="2" version="2022.10.3" release="2.el7" arch="x86_64" src="">
					<filename>ntfs-3g-2:2022.10.3-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241209-04</id>
		<issued date="2024-12-09" />
		<updated date="2024-12-09" />
		<title>Уязвимость grafana </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в grafana</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grafana-cve-2024-47875/</description>
               <solution>
                    Запретить использование в ОС пакета grafana
                или
                    Установить обновление для пакета(ов) grafana
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grafana-cve-2024-47875/" type="self" id="ROS-20241209-04" title="ROS-20241209-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47875" type="cve" id="CVE-2024-47875" title="CVE-2024-47875" />
			<reference href="https://bdu.fstec.ru/vul/2024-08024" type="self" id="BDU:2024-08024" title="BDU:2024-08024" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="grafana" epoch="0" version="11.1.3" release="1.el7" arch="x86_64" src="">
					<filename>grafana-0:11.1.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241209-05</id>
		<issued date="2024-12-09" />
		<updated date="2024-12-11" />
		<title>Уязвимость salt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в salt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-salt-cve-2024-37088/</description>
               <solution>
                    Запретить использование в ОС пакета Salt
                или
                    Установить обновление для пакета(ов) Salt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-salt-cve-2024-37088/" type="self" id="ROS-20241209-05" title="ROS-20241209-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37088" type="cve" id="CVE-2024-37088" title="CVE-2024-37088" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="salt" epoch="0" version="3007.1" release="3.el7" arch="noarch" src="">
					<filename>salt-0:3007.1-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241210-01</id>
		<issued date="2024-12-10" />
		<updated date="2024-12-10" />
		<title>Множественные уязвимости freerdp</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в freerdp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-freerdp-101224/</description>
               <solution>
                    Запретить использование в ОС пакета freerdp
                или
                    Установить обновление для пакета(ов) freerdp
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-freerdp-101224/" type="self" id="ROS-20241210-01" title="ROS-20241210-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24882" type="cve" id="CVE-2022-24882" title="CVE-2022-24882" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24883" type="cve" id="CVE-2022-24883" title="CVE-2022-24883" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22211" type="cve" id="CVE-2024-22211" title="CVE-2024-22211" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32039" type="cve" id="CVE-2024-32039" title="CVE-2024-32039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32040" type="cve" id="CVE-2024-32040" title="CVE-2024-32040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32041" type="cve" id="CVE-2024-32041" title="CVE-2024-32041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32458" type="cve" id="CVE-2024-32458" title="CVE-2024-32458" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32459" type="cve" id="CVE-2024-32459" title="CVE-2024-32459" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32460" type="cve" id="CVE-2024-32460" title="CVE-2024-32460" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32658" type="cve" id="CVE-2024-32658" title="CVE-2024-32658" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32659" type="cve" id="CVE-2024-32659" title="CVE-2024-32659" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32660" type="cve" id="CVE-2024-32660" title="CVE-2024-32660" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32661" type="cve" id="CVE-2024-32661" title="CVE-2024-32661" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32662" type="cve" id="CVE-2024-32662" title="CVE-2024-32662" />
			<reference href="https://bdu.fstec.ru/vul/2022-04713" type="self" id="BDU:2022-04713" title="BDU:2022-04713" />
			<reference href="https://bdu.fstec.ru/vul/2022-06851" type="self" id="BDU:2022-06851" title="BDU:2022-06851" />
			<reference href="https://bdu.fstec.ru/vul/2024-00706" type="self" id="BDU:2024-00706" title="BDU:2024-00706" />
			<reference href="https://bdu.fstec.ru/vul/2024-03192" type="self" id="BDU:2024-03192" title="BDU:2024-03192" />
			<reference href="https://bdu.fstec.ru/vul/2024-03220" type="self" id="BDU:2024-03220" title="BDU:2024-03220" />
			<reference href="https://bdu.fstec.ru/vul/2024-03223" type="self" id="BDU:2024-03223" title="BDU:2024-03223" />
			<reference href="https://bdu.fstec.ru/vul/2024-03221" type="self" id="BDU:2024-03221" title="BDU:2024-03221" />
			<reference href="https://bdu.fstec.ru/vul/2024-03219" type="self" id="BDU:2024-03219" title="BDU:2024-03219" />
			<reference href="https://bdu.fstec.ru/vul/2024-03222" type="self" id="BDU:2024-03222" title="BDU:2024-03222" />
			<reference href="https://bdu.fstec.ru/vul/2024-03401" type="self" id="BDU:2024-03401" title="BDU:2024-03401" />
			<reference href="https://bdu.fstec.ru/vul/2024-03402" type="self" id="BDU:2024-03402" title="BDU:2024-03402" />
			<reference href="https://bdu.fstec.ru/vul/2024-03403" type="self" id="BDU:2024-03403" title="BDU:2024-03403" />
			<reference href="https://bdu.fstec.ru/vul/2024-03394" type="self" id="BDU:2024-03394" title="BDU:2024-03394" />
			<reference href="https://bdu.fstec.ru/vul/2024-03395" type="self" id="BDU:2024-03395" title="BDU:2024-03395" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="freerdp" epoch="3" version="3.8.0" release="1.el7" arch="x86_64" src="">
					<filename>freerdp-3:3.8.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241211-01</id>
		<issued date="2024-12-11" />
		<updated date="2024-12-11" />
		<title>Множественные уязвимости opensc</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в opensc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-opensc-111224/</description>
               <solution>
                    Запретить использование в ОС пакета opensc
                или
                    Установить обновление для пакета(ов) opensc
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-opensc-111224/" type="self" id="ROS-20241211-01" title="ROS-20241211-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8443" type="cve" id="CVE-2024-8443" title="CVE-2024-8443" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45615" type="cve" id="CVE-2024-45615" title="CVE-2024-45615" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45616" type="cve" id="CVE-2024-45616" title="CVE-2024-45616" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45617" type="cve" id="CVE-2024-45617" title="CVE-2024-45617" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45618" type="cve" id="CVE-2024-45618" title="CVE-2024-45618" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45619" type="cve" id="CVE-2024-45619" title="CVE-2024-45619" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45620" type="cve" id="CVE-2024-45620" title="CVE-2024-45620" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="opensc" epoch="0" version="0.26.0" release="1.el7" arch="x86_64" src="">
					<filename>opensc-0:0.26.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241211-02</id>
		<issued date="2024-12-11" />
		<updated date="2024-12-11" />
		<title>Множественные уязвимости postgresql </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql-cve-2024-10976-cve-2024-10977-cve-2024-10978-cve-2024-10979/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql
                или
                    Установить обновление для пакета(ов) postgresql
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql-cve-2024-10976-cve-2024-10977-cve-2024-10978-cve-2024-10979/" type="self" id="ROS-20241211-02" title="ROS-20241211-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10976" type="cve" id="CVE-2024-10976" title="CVE-2024-10976" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10977" type="cve" id="CVE-2024-10977" title="CVE-2024-10977" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10978" type="cve" id="CVE-2024-10978" title="CVE-2024-10978" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10979" type="cve" id="CVE-2024-10979" title="CVE-2024-10979" />
			<reference href="https://bdu.fstec.ru/vul/2024-09684" type="self" id="BDU:2024-09684" title="BDU:2024-09684" />
			<reference href="https://bdu.fstec.ru/vul/2024-09682" type="self" id="BDU:2024-09682" title="BDU:2024-09682" />
			<reference href="https://bdu.fstec.ru/vul/2024-09681" type="self" id="BDU:2024-09681" title="BDU:2024-09681" />
			<reference href="https://bdu.fstec.ru/vul/2024-09679" type="self" id="BDU:2024-09679" title="BDU:2024-09679" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql" epoch="0" version="12.22" release="1.el7" arch="x86_64" src="">
					<filename>postgresql-0:12.22-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241211-03</id>
		<issued date="2024-12-11" />
		<updated date="2024-12-11" />
		<title>Множественные уязвимости postgresql13 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql13</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql-cve-2024-10976-cve-2024-10977-cve-2024-10978-cve-2024-109792017/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql13
                или
                    Установить обновление для пакета(ов) postgresql13
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql-cve-2024-10976-cve-2024-10977-cve-2024-10978-cve-2024-109792017/" type="self" id="ROS-20241211-03" title="ROS-20241211-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10976" type="cve" id="CVE-2024-10976" title="CVE-2024-10976" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10977" type="cve" id="CVE-2024-10977" title="CVE-2024-10977" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10978" type="cve" id="CVE-2024-10978" title="CVE-2024-10978" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10979" type="cve" id="CVE-2024-10979" title="CVE-2024-10979" />
			<reference href="https://bdu.fstec.ru/vul/2024-09684" type="self" id="BDU:2024-09684" title="BDU:2024-09684" />
			<reference href="https://bdu.fstec.ru/vul/2024-09682" type="self" id="BDU:2024-09682" title="BDU:2024-09682" />
			<reference href="https://bdu.fstec.ru/vul/2024-09681" type="self" id="BDU:2024-09681" title="BDU:2024-09681" />
			<reference href="https://bdu.fstec.ru/vul/2024-09679" type="self" id="BDU:2024-09679" title="BDU:2024-09679" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql13" epoch="0" version="13.18" release="1.el7" arch="x86_64" src="">
					<filename>postgresql13-0:13.18-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241211-04</id>
		<issued date="2024-12-11" />
		<updated date="2024-12-11" />
		<title>Множественные уязвимости postgresql14 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql14</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql-cve-2024-10976-cve-2024-10977-cve-2024-10978-cve-2024-1097920171413/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql14
                или
                    Установить обновление для пакета(ов) postgresql14
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql-cve-2024-10976-cve-2024-10977-cve-2024-10978-cve-2024-1097920171413/" type="self" id="ROS-20241211-04" title="ROS-20241211-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10976" type="cve" id="CVE-2024-10976" title="CVE-2024-10976" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10977" type="cve" id="CVE-2024-10977" title="CVE-2024-10977" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10978" type="cve" id="CVE-2024-10978" title="CVE-2024-10978" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10979" type="cve" id="CVE-2024-10979" title="CVE-2024-10979" />
			<reference href="https://bdu.fstec.ru/vul/2024-09684" type="self" id="BDU:2024-09684" title="BDU:2024-09684" />
			<reference href="https://bdu.fstec.ru/vul/2024-09682" type="self" id="BDU:2024-09682" title="BDU:2024-09682" />
			<reference href="https://bdu.fstec.ru/vul/2024-09681" type="self" id="BDU:2024-09681" title="BDU:2024-09681" />
			<reference href="https://bdu.fstec.ru/vul/2024-09679" type="self" id="BDU:2024-09679" title="BDU:2024-09679" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql14" epoch="0" version="14.15" release="1.el7" arch="x86_64" src="">
					<filename>postgresql14-0:14.15-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241211-05</id>
		<issued date="2024-12-11" />
		<updated date="2024-12-11" />
		<title>Множественные уязвимости postgresql15 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql15</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql-cve-2024-10976-cve-2024-10977-cve-2024-10978-cve-2024-1097920171413531/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql15
                или
                    Установить обновление для пакета(ов) postgresql15
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql-cve-2024-10976-cve-2024-10977-cve-2024-10978-cve-2024-1097920171413531/" type="self" id="ROS-20241211-05" title="ROS-20241211-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10976" type="cve" id="CVE-2024-10976" title="CVE-2024-10976" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10977" type="cve" id="CVE-2024-10977" title="CVE-2024-10977" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10978" type="cve" id="CVE-2024-10978" title="CVE-2024-10978" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10979" type="cve" id="CVE-2024-10979" title="CVE-2024-10979" />
			<reference href="https://bdu.fstec.ru/vul/2024-09684" type="self" id="BDU:2024-09684" title="BDU:2024-09684" />
			<reference href="https://bdu.fstec.ru/vul/2024-09682" type="self" id="BDU:2024-09682" title="BDU:2024-09682" />
			<reference href="https://bdu.fstec.ru/vul/2024-09681" type="self" id="BDU:2024-09681" title="BDU:2024-09681" />
			<reference href="https://bdu.fstec.ru/vul/2024-09679" type="self" id="BDU:2024-09679" title="BDU:2024-09679" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql15" epoch="0" version="15.10" release="1.el7" arch="x86_64" src="">
					<filename>postgresql15-0:15.10-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241211-06</id>
		<issued date="2024-12-11" />
		<updated date="2024-12-11" />
		<title>Множественные уязвимости postgresql16 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql16</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql-cve-2024-10976-cve-2024-10977-cve-2024-10978-cve-2024-10979201714135318636/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql16
                или
                    Установить обновление для пакета(ов) postgresql16
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql-cve-2024-10976-cve-2024-10977-cve-2024-10978-cve-2024-10979201714135318636/" type="self" id="ROS-20241211-06" title="ROS-20241211-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10976" type="cve" id="CVE-2024-10976" title="CVE-2024-10976" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10977" type="cve" id="CVE-2024-10977" title="CVE-2024-10977" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10978" type="cve" id="CVE-2024-10978" title="CVE-2024-10978" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10979" type="cve" id="CVE-2024-10979" title="CVE-2024-10979" />
			<reference href="https://bdu.fstec.ru/vul/2024-09684" type="self" id="BDU:2024-09684" title="BDU:2024-09684" />
			<reference href="https://bdu.fstec.ru/vul/2024-09682" type="self" id="BDU:2024-09682" title="BDU:2024-09682" />
			<reference href="https://bdu.fstec.ru/vul/2024-09681" type="self" id="BDU:2024-09681" title="BDU:2024-09681" />
			<reference href="https://bdu.fstec.ru/vul/2024-09679" type="self" id="BDU:2024-09679" title="BDU:2024-09679" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql16" epoch="0" version="16.6" release="1.el7" arch="x86_64" src="">
					<filename>postgresql16-0:16.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241211-07</id>
		<issued date="2024-12-11" />
		<updated date="2024-12-11" />
		<title>Множественные уязвимости postgresql-1c </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql-cve-2024-10976-cve-2024-10977-cve-2024-10978-cve-2024-109791188/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql-1c
                или
                    Установить обновление для пакета(ов) postgresql-1c
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql-cve-2024-10976-cve-2024-10977-cve-2024-10978-cve-2024-109791188/" type="self" id="ROS-20241211-07" title="ROS-20241211-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10976" type="cve" id="CVE-2024-10976" title="CVE-2024-10976" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10977" type="cve" id="CVE-2024-10977" title="CVE-2024-10977" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10978" type="cve" id="CVE-2024-10978" title="CVE-2024-10978" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10979" type="cve" id="CVE-2024-10979" title="CVE-2024-10979" />
			<reference href="https://bdu.fstec.ru/vul/2024-09684" type="self" id="BDU:2024-09684" title="BDU:2024-09684" />
			<reference href="https://bdu.fstec.ru/vul/2024-09682" type="self" id="BDU:2024-09682" title="BDU:2024-09682" />
			<reference href="https://bdu.fstec.ru/vul/2024-09681" type="self" id="BDU:2024-09681" title="BDU:2024-09681" />
			<reference href="https://bdu.fstec.ru/vul/2024-09679" type="self" id="BDU:2024-09679" title="BDU:2024-09679" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql-1c" epoch="0" version="14.15" release="1.el7" arch="x86_64" src="">
					<filename>postgresql-1c-0:14.15-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241211-08</id>
		<issued date="2024-12-11" />
		<updated date="2024-12-11" />
		<title>Множественные уязвимости postgresql15-1c </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql15-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql-cve-2024-10976-cve-2024-10977-cve-2024-10978-cve-2024-109791188494/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql15-1c
                или
                    Установить обновление для пакета(ов) postgresql15-1c
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql-cve-2024-10976-cve-2024-10977-cve-2024-10978-cve-2024-109791188494/" type="self" id="ROS-20241211-08" title="ROS-20241211-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10976" type="cve" id="CVE-2024-10976" title="CVE-2024-10976" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10977" type="cve" id="CVE-2024-10977" title="CVE-2024-10977" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10978" type="cve" id="CVE-2024-10978" title="CVE-2024-10978" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10979" type="cve" id="CVE-2024-10979" title="CVE-2024-10979" />
			<reference href="https://bdu.fstec.ru/vul/2024-09684" type="self" id="BDU:2024-09684" title="BDU:2024-09684" />
			<reference href="https://bdu.fstec.ru/vul/2024-09682" type="self" id="BDU:2024-09682" title="BDU:2024-09682" />
			<reference href="https://bdu.fstec.ru/vul/2024-09681" type="self" id="BDU:2024-09681" title="BDU:2024-09681" />
			<reference href="https://bdu.fstec.ru/vul/2024-09679" type="self" id="BDU:2024-09679" title="BDU:2024-09679" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql15-1c" epoch="0" version="15.10" release="1.el7" arch="x86_64" src="">
					<filename>postgresql15-1c-0:15.10-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241211-09</id>
		<issued date="2024-12-11" />
		<updated date="2024-12-11" />
		<title>Множественные уязвимости grafana </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в grafana</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-grafana-cve-2024-8118-cve-2024-9476-cve-2024-9264/</description>
               <solution>
                    Запретить использование в ОС пакета grafana
                или
                    Установить обновление для пакета(ов) grafana
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-grafana-cve-2024-8118-cve-2024-9476-cve-2024-9264/" type="self" id="ROS-20241211-09" title="ROS-20241211-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8118" type="cve" id="CVE-2024-8118" title="CVE-2024-8118" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9476" type="cve" id="CVE-2024-9476" title="CVE-2024-9476" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9264" type="cve" id="CVE-2024-9264" title="CVE-2024-9264" />
			<reference href="https://bdu.fstec.ru/vul/2024-07696" type="self" id="BDU:2024-07696" title="BDU:2024-07696" />
			<reference href="https://bdu.fstec.ru/vul/2024-09900" type="self" id="BDU:2024-09900" title="BDU:2024-09900" />
			<reference href="https://bdu.fstec.ru/vul/2024-08254" type="self" id="BDU:2024-08254" title="BDU:2024-08254" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="grafana" epoch="0" version="11.2.4" release="1.el7" arch="x86_64" src="">
					<filename>grafana-0:11.2.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241211-10</id>
		<issued date="2024-12-11" />
		<updated date="2024-12-11" />
		<title>Уязвимость gnutls </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gnutls</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gnutls-cve-2024-0553/</description>
               <solution>
                    Запретить использование в ОС пакета gnutls
                или
                    Установить обновление для пакета(ов) gnutls
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gnutls-cve-2024-0553/" type="self" id="ROS-20241211-10" title="ROS-20241211-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0553" type="cve" id="CVE-2024-0553" title="CVE-2024-0553" />
			<reference href="https://bdu.fstec.ru/vul/2024-00707" type="self" id="BDU:2024-00707" title="BDU:2024-00707" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gnutls" epoch="0" version="3.6.16" release="1.el7" arch="x86_64" src="">
					<filename>gnutls-0:3.6.16-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241211-11</id>
		<issued date="2024-12-11" />
		<updated date="2024-12-11" />
		<title>Уязвимость python3-urllib3 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-urllib3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-urllib3-cve-2024-37891/</description>
               <solution>
                    Использовать Proxy-Authorization заголовки с urllib3's ProxyManager. Отключть HTTP перенаправление с помощью redirects=False при отправке запросов. Не использовать Proxy-Authorization заголовки.
                или
                    Установить обновление для пакета(ов) python3-urllib3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-urllib3-cve-2024-37891/" type="self" id="ROS-20241211-11" title="ROS-20241211-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37891" type="cve" id="CVE-2024-37891" title="CVE-2024-37891" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-urllib3" epoch="0" version="1.26.20" release="1.el7" arch="noarch" src="">
					<filename>python3-urllib3-0:1.26.20-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241211-12</id>
		<issued date="2024-12-11" />
		<updated date="2024-12-11" />
		<title>Уязвимость freeradius </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в freeradius</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-freeradius-cve-2024-3596/</description>
               <solution>
                    Запретить использование в ОС пакета freeradius
                или
                    Установить обновление для пакета(ов) freeradius
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-freeradius-cve-2024-3596/" type="self" id="ROS-20241211-12" title="ROS-20241211-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3596" type="cve" id="CVE-2024-3596" title="CVE-2024-3596" />
			<reference href="https://bdu.fstec.ru/vul/2024-05180" type="self" id="BDU:2024-05180" title="BDU:2024-05180" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="freeradius" epoch="0" version="3.2.6" release="1.el7" arch="x86_64" src="">
					<filename>freeradius-0:3.2.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241211-13</id>
		<issued date="2024-12-11" />
		<updated date="2024-12-11" />
		<title>Уязвимость keepalived </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в keepalived</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-keepalived-cve-2024-41184/</description>
               <solution>
                    Запретить использование в ОС пакета keepalived
                или
                    Установить обновление для пакета(ов) keepalived
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-keepalived-cve-2024-41184/" type="self" id="ROS-20241211-13" title="ROS-20241211-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41184" type="cve" id="CVE-2024-41184" title="CVE-2024-41184" />
			<reference href="https://bdu.fstec.ru/vul/2024-06444" type="self" id="BDU:2024-06444" title="BDU:2024-06444" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="keepalived" epoch="0" version="2.3.2" release="1.el7" arch="x86_64" src="">
					<filename>keepalived-0:2.3.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241211-14</id>
		<issued date="2024-12-11" />
		<updated date="2024-12-11" />
		<title>Уязвимость python3-ipython </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-ipython</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-ipython-cve-2022-21699/</description>
               <solution>
                    Запретить использование в ОС пакета python3-ipython
                или
                    Установить обновление для пакета(ов) python3-ipython
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-ipython-cve-2022-21699/" type="self" id="ROS-20241211-14" title="ROS-20241211-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21699" type="cve" id="CVE-2022-21699" title="CVE-2022-21699" />
			<reference href="https://bdu.fstec.ru/vul/2022-05761" type="self" id="BDU:2022-05761" title="BDU:2022-05761" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-ipython" epoch="0" version="8.4.0" release="2.el7" arch="noarch" src="">
					<filename>python3-ipython-0:8.4.0-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241212-01</id>
		<issued date="2024-12-12" />
		<updated date="2024-12-12" />
		<title>Множественные уязвимости pcre2 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в pcre2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-pcre2-cve-2022-41409-cve-2022-1587/</description>
               <solution>
                    Запретить использование в ОС пакета pcre2
                или
                    Установить обновление для пакета(ов) pcre2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-pcre2-cve-2022-41409-cve-2022-1587/" type="self" id="ROS-20241212-01" title="ROS-20241212-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41409" type="cve" id="CVE-2022-41409" title="CVE-2022-41409" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587" type="cve" id="CVE-2022-1587" title="CVE-2022-1587" />
			<reference href="https://bdu.fstec.ru/vul/2023-05302" type="self" id="BDU:2023-05302" title="BDU:2023-05302" />
			<reference href="https://bdu.fstec.ru/vul/2023-02635" type="self" id="BDU:2023-02635" title="BDU:2023-02635" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pcre2" epoch="0" version="10.44" release="1.el7" arch="x86_64" src="">
					<filename>pcre2-0:10.44-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241212-02</id>
		<issued date="2024-12-12" />
		<updated date="2024-12-12" />
		<title>Уязвимость zabbix-lts-server-mysql </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в zabbix-lts-server-mysql</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix-lts-server-mysql-cve-2024-42327/</description>
               <solution>
                    Запретить использование в ОС пакета zabbix-lts-server-mysql
                или
                    Установить обновление для пакета(ов) zabbix-lts-server-mysql
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix-lts-server-mysql-cve-2024-42327/" type="self" id="ROS-20241212-02" title="ROS-20241212-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42327" type="cve" id="CVE-2024-42327" title="CVE-2024-42327" />
			<reference href="https://bdu.fstec.ru/vul/2024-10543" type="self" id="BDU:2024-10543" title="BDU:2024-10543" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix-lts-server-mysql" epoch="1" version="6.0.36" release="1.el7" arch="x86_64" src="">
					<filename>zabbix-lts-server-mysql-1:6.0.36-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241212-03</id>
		<issued date="2024-12-12" />
		<updated date="2024-12-12" />
		<title>Уязвимость docker-ce </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в docker-ce</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-docker-ce-cve-2024-36620/</description>
               <solution>
                    Запретить использование в ОС пакета docker-ce
                или
                    Установить обновление для пакета(ов) docker-ce
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-docker-ce-cve-2024-36620/" type="self" id="ROS-20241212-03" title="ROS-20241212-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36620" type="cve" id="CVE-2024-36620" title="CVE-2024-36620" />
			<reference href="https://bdu.fstec.ru/vul/2024-11295" type="self" id="BDU:2024-11295" title="BDU:2024-11295" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="docker-ce" epoch="4" version="25.0.6" release="1.el7" arch="x86_64" src="">
					<filename>docker-ce-4:25.0.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241212-04</id>
		<issued date="2024-12-12" />
		<updated date="2024-12-23" />
		<title>Уязвимость zabbix-lts-server-pgsql </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в zabbix-lts-server-pgsql</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix-lts-server-pgsql-cve-2024-42327/</description>
               <solution>
                    Запретить использование в ОС пакета zabbix-lts-server-pgsql
                или
                    Установить обновление для пакета(ов) zabbix-lts-server-pgsql
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix-lts-server-pgsql-cve-2024-42327/" type="self" id="ROS-20241212-04" title="ROS-20241212-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42327" type="cve" id="CVE-2024-42327" title="CVE-2024-42327" />
			<reference href="https://bdu.fstec.ru/vul/2024-10543" type="self" id="BDU:2024-10543" title="BDU:2024-10543" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix-lts-server-pgsql" epoch="1" version="6.0.36" release="1.el7" arch="x86_64" src="">
					<filename>zabbix-lts-server-pgsql-1:6.0.36-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241216-01</id>
		<issued date="2024-12-16" />
		<updated date="2024-12-16" />
		<title>Множественные уязвимости zabbix7-lts-server-mysql</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в zabbix7-lts-server-mysql</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix7-lts-server-mysql-161224/</description>
               <solution>
                    Запретить использование в ОС пакета zabbix7-lts-server-mysql
                или
                    Установить обновление для пакета(ов) zabbix7-lts-server-mysql
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix7-lts-server-mysql-161224/" type="self" id="ROS-20241216-01" title="ROS-20241216-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42331" type="cve" id="CVE-2024-42331" title="CVE-2024-42331" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42328" type="cve" id="CVE-2024-42328" title="CVE-2024-42328" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42329" type="cve" id="CVE-2024-42329" title="CVE-2024-42329" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36468" type="cve" id="CVE-2024-36468" title="CVE-2024-36468" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42326" type="cve" id="CVE-2024-42326" title="CVE-2024-42326" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36467" type="cve" id="CVE-2024-36467" title="CVE-2024-36467" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36466" type="cve" id="CVE-2024-36466" title="CVE-2024-36466" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36463" type="cve" id="CVE-2024-36463" title="CVE-2024-36463" />
			<reference href="https://bdu.fstec.ru/vul/2024-11322" type="self" id="BDU:2024-11322" title="BDU:2024-11322" />
			<reference href="https://bdu.fstec.ru/vul/2024-11323" type="self" id="BDU:2024-11323" title="BDU:2024-11323" />
			<reference href="https://bdu.fstec.ru/vul/2024-11321" type="self" id="BDU:2024-11321" title="BDU:2024-11321" />
			<reference href="https://bdu.fstec.ru/vul/2024-10776" type="self" id="BDU:2024-10776" title="BDU:2024-10776" />
			<reference href="https://bdu.fstec.ru/vul/2024-11320" type="self" id="BDU:2024-11320" title="BDU:2024-11320" />
			<reference href="https://bdu.fstec.ru/vul/2024-10777" type="self" id="BDU:2024-10777" title="BDU:2024-10777" />
			<reference href="https://bdu.fstec.ru/vul/2024-10866" type="self" id="BDU:2024-10866" title="BDU:2024-10866" />
			<reference href="https://bdu.fstec.ru/vul/2024-10864" type="self" id="BDU:2024-10864" title="BDU:2024-10864" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix7-lts-server-mysql" epoch="1" version="7.0.5" release="1.el7" arch="x86_64" src="">
					<filename>zabbix7-lts-server-mysql-1:7.0.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241216-02</id>
		<issued date="2024-12-16" />
		<updated date="2024-12-16" />
		<title>Множественные уязвимости zabbix7-lts-server-pgsql</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в zabbix7-lts-server-pgsql</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix7-lts-server-pgsql-1612242895/</description>
               <solution>
                    Запретить использование в ОС пакета zabbix7-lts-server-pgsql
                или
                    Установить обновление для пакета(ов) zabbix7-lts-server-pgsql
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix7-lts-server-pgsql-1612242895/" type="self" id="ROS-20241216-02" title="ROS-20241216-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42331" type="cve" id="CVE-2024-42331" title="CVE-2024-42331" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42328" type="cve" id="CVE-2024-42328" title="CVE-2024-42328" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42329" type="cve" id="CVE-2024-42329" title="CVE-2024-42329" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36468" type="cve" id="CVE-2024-36468" title="CVE-2024-36468" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42326" type="cve" id="CVE-2024-42326" title="CVE-2024-42326" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36467" type="cve" id="CVE-2024-36467" title="CVE-2024-36467" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36466" type="cve" id="CVE-2024-36466" title="CVE-2024-36466" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36463" type="cve" id="CVE-2024-36463" title="CVE-2024-36463" />
			<reference href="https://bdu.fstec.ru/vul/2024-11322" type="self" id="BDU:2024-11322" title="BDU:2024-11322" />
			<reference href="https://bdu.fstec.ru/vul/2024-11323" type="self" id="BDU:2024-11323" title="BDU:2024-11323" />
			<reference href="https://bdu.fstec.ru/vul/2024-11321" type="self" id="BDU:2024-11321" title="BDU:2024-11321" />
			<reference href="https://bdu.fstec.ru/vul/2024-10776" type="self" id="BDU:2024-10776" title="BDU:2024-10776" />
			<reference href="https://bdu.fstec.ru/vul/2024-11320" type="self" id="BDU:2024-11320" title="BDU:2024-11320" />
			<reference href="https://bdu.fstec.ru/vul/2024-10777" type="self" id="BDU:2024-10777" title="BDU:2024-10777" />
			<reference href="https://bdu.fstec.ru/vul/2024-10866" type="self" id="BDU:2024-10866" title="BDU:2024-10866" />
			<reference href="https://bdu.fstec.ru/vul/2024-10864" type="self" id="BDU:2024-10864" title="BDU:2024-10864" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix7-lts-server-pgsql" epoch="1" version="7.0.5" release="1.el7" arch="x86_64" src="">
					<filename>zabbix7-lts-server-pgsql-1:7.0.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241216-03</id>
		<issued date="2024-12-16" />
		<updated date="2024-12-16" />
		<title>Множественные уязвимости zabbix-lts-server-pgsql</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в zabbix-lts-server-pgsql</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix-lts-server-pgsql-16122428957361/</description>
               <solution>
                    Запретить использование в ОС пакета zabbix-lts-server-pgsql
                или
                    Установить обновление для пакета(ов) zabbix-lts-server-pgsql
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix-lts-server-pgsql-16122428957361/" type="self" id="ROS-20241216-03" title="ROS-20241216-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36463" type="cve" id="CVE-2024-36463" title="CVE-2024-36463" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36467" type="cve" id="CVE-2024-36467" title="CVE-2024-36467" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36466" type="cve" id="CVE-2024-36466" title="CVE-2024-36466" />
			<reference href="https://bdu.fstec.ru/vul/2024-10864" type="self" id="BDU:2024-10864" title="BDU:2024-10864" />
			<reference href="https://bdu.fstec.ru/vul/2024-10777" type="self" id="BDU:2024-10777" title="BDU:2024-10777" />
			<reference href="https://bdu.fstec.ru/vul/2024-10866" type="self" id="BDU:2024-10866" title="BDU:2024-10866" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix-lts-server-pgsql" epoch="1" version="6.0.36" release="1.el7" arch="x86_64" src="">
					<filename>zabbix-lts-server-pgsql-1:6.0.36-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241216-04</id>
		<issued date="2024-12-16" />
		<updated date="2024-12-16" />
		<title>Множественные уязвимости zabbix-lts-server-mysql</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в zabbix-lts-server-mysql</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix-lts-server-mysql-161224289573611427/</description>
               <solution>
                    Запретить использование в ОС пакета zabbix-lts-server-mysql
                или
                    Установить обновление для пакета(ов) zabbix-lts-server-mysql
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix-lts-server-mysql-161224289573611427/" type="self" id="ROS-20241216-04" title="ROS-20241216-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36463" type="cve" id="CVE-2024-36463" title="CVE-2024-36463" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36467" type="cve" id="CVE-2024-36467" title="CVE-2024-36467" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36466" type="cve" id="CVE-2024-36466" title="CVE-2024-36466" />
			<reference href="https://bdu.fstec.ru/vul/2024-10864" type="self" id="BDU:2024-10864" title="BDU:2024-10864" />
			<reference href="https://bdu.fstec.ru/vul/2024-10777" type="self" id="BDU:2024-10777" title="BDU:2024-10777" />
			<reference href="https://bdu.fstec.ru/vul/2024-10866" type="self" id="BDU:2024-10866" title="BDU:2024-10866" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix-lts-server-mysql" epoch="1" version="6.0.36" release="1.el7" arch="x86_64" src="">
					<filename>zabbix-lts-server-mysql-1:6.0.36-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241216-05</id>
		<issued date="2024-12-16" />
		<updated date="2024-12-16" />
		<title>Множественные уязвимости zabbix-server-mysql</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в zabbix-server-mysql</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix-server-mysql-1612242895736114272410/</description>
               <solution>
                    Запретить использование в ОС пакета zabbix-server-mysql
                или
                    Установить обновление для пакета(ов) zabbix-server-mysql
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix-server-mysql-1612242895736114272410/" type="self" id="ROS-20241216-05" title="ROS-20241216-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36463" type="cve" id="CVE-2024-36463" title="CVE-2024-36463" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36467" type="cve" id="CVE-2024-36467" title="CVE-2024-36467" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36466" type="cve" id="CVE-2024-36466" title="CVE-2024-36466" />
			<reference href="https://bdu.fstec.ru/vul/2024-10864" type="self" id="BDU:2024-10864" title="BDU:2024-10864" />
			<reference href="https://bdu.fstec.ru/vul/2024-10777" type="self" id="BDU:2024-10777" title="BDU:2024-10777" />
			<reference href="https://bdu.fstec.ru/vul/2024-10866" type="self" id="BDU:2024-10866" title="BDU:2024-10866" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix-server-mysql" epoch="1" version="6.4.18" release="1.el7" arch="x86_64" src="">
					<filename>zabbix-server-mysql-1:6.4.18-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241216-06</id>
		<issued date="2024-12-16" />
		<updated date="2024-12-16" />
		<title>Множественные уязвимости zabbix-server-pgsql</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в zabbix-server-pgsql</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix-server-pgsql-161224289573613502/</description>
               <solution>
                    Запретить использование в ОС пакета zabbix-server-pgsql
                или
                    Установить обновление для пакета(ов) zabbix-server-pgsql
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix-server-pgsql-161224289573613502/" type="self" id="ROS-20241216-06" title="ROS-20241216-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36463" type="cve" id="CVE-2024-36463" title="CVE-2024-36463" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36467" type="cve" id="CVE-2024-36467" title="CVE-2024-36467" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36466" type="cve" id="CVE-2024-36466" title="CVE-2024-36466" />
			<reference href="https://bdu.fstec.ru/vul/2024-10864" type="self" id="BDU:2024-10864" title="BDU:2024-10864" />
			<reference href="https://bdu.fstec.ru/vul/2024-10777" type="self" id="BDU:2024-10777" title="BDU:2024-10777" />
			<reference href="https://bdu.fstec.ru/vul/2024-10866" type="self" id="BDU:2024-10866" title="BDU:2024-10866" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix-server-pgsql" epoch="1" version="6.4.18" release="1.el7" arch="x86_64" src="">
					<filename>zabbix-server-pgsql-1:6.4.18-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241216-07</id>
		<issued date="2024-12-16" />
		<updated date="2024-12-16" />
		<title>Множественные уязвимости python3-asyncssh </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-asyncssh</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-asyncssh-cve-2023-46445-cve-2023-46446/</description>
               <solution>
                    Запретить использование в ОС пакета python3-asyncssh
                или
                    Установить обновление для пакета(ов) python3-asyncssh
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-asyncssh-cve-2023-46445-cve-2023-46446/" type="self" id="ROS-20241216-07" title="ROS-20241216-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46445" type="cve" id="CVE-2023-46445" title="CVE-2023-46445" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46446" type="cve" id="CVE-2023-46446" title="CVE-2023-46446" />
			<reference href="https://bdu.fstec.ru/vul/2024-11318" type="self" id="BDU:2024-11318" title="BDU:2024-11318" />
			<reference href="https://bdu.fstec.ru/vul/2024-11319" type="self" id="BDU:2024-11319" title="BDU:2024-11319" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-asyncssh" epoch="0" version="2.14.2" release="1.el7" arch="noarch" src="">
					<filename>python3-asyncssh-0:2.14.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241216-08</id>
		<issued date="2024-12-16" />
		<updated date="2024-12-16" />
		<title>Уязвимость xrdp </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в xrdp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-xrdp-cve-2023-40184/</description>
               <solution>
                    Запретить использование в ОС пакета xrdp
                или
                    Установить обновление для пакета(ов) xrdp
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-xrdp-cve-2023-40184/" type="self" id="ROS-20241216-08" title="ROS-20241216-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40184" type="cve" id="CVE-2023-40184" title="CVE-2023-40184" />
			<reference href="https://bdu.fstec.ru/vul/2023-07659" type="self" id="BDU:2023-07659" title="BDU:2023-07659" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="xrdp" epoch="1" version="0.10.1" release="1.el7" arch="x86_64" src="">
					<filename>xrdp-1:0.10.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241216-09</id>
		<issued date="2024-12-16" />
		<updated date="2024-12-16" />
		<title>Уязвимость apache-kafka </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в apache-kafka</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-kafka-cve-2024-31141/</description>
               <solution>
                    Запретить использование в ОС пакета apache-kafka
                или
                    Установить обновление для пакета(ов) apache-kafka
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-kafka-cve-2024-31141/" type="self" id="ROS-20241216-09" title="ROS-20241216-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31141" type="cve" id="CVE-2024-31141" title="CVE-2024-31141" />
			<reference href="https://bdu.fstec.ru/vul/2024-10294" type="self" id="BDU:2024-10294" title="BDU:2024-10294" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="apache-kafka" epoch="0" version="3.7.1" release="1.el7" arch="x86_64" src="">
					<filename>apache-kafka-0:3.7.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241216-10</id>
		<issued date="2024-12-16" />
		<updated date="2024-12-16" />
		<title>Уязвимость jetty </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в jetty</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jetty-cve-2024-9823/</description>
               <solution>
                    Запретить использование в ОС пакета Jetty
                или
                    Установить обновление для пакета(ов) Jetty
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jetty-cve-2024-9823/" type="self" id="ROS-20241216-10" title="ROS-20241216-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9823" type="cve" id="CVE-2024-9823" title="CVE-2024-9823" />
			<reference href="https://bdu.fstec.ru/vul/2024-11324" type="self" id="BDU:2024-11324" title="BDU:2024-11324" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jetty" epoch="0" version="9.4.54" release="1.el7" arch="noarch" src="">
					<filename>jetty-0:9.4.54-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241218-01</id>
		<issued date="2024-12-18" />
		<updated date="2024-12-18" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-181224/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-181224/" type="self" id="ROS-20241218-01" title="ROS-20241218-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931" type="cve" id="CVE-2023-6931" title="CVE-2023-6931" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932" type="cve" id="CVE-2023-6932" title="CVE-2023-6932" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6606" type="cve" id="CVE-2023-6606" title="CVE-2023-6606" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6610" type="cve" id="CVE-2023-6610" title="CVE-2023-6610" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6111" type="cve" id="CVE-2023-6111" title="CVE-2023-6111" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233" type="cve" id="CVE-2023-47233" title="CVE-2023-47233" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42756" type="cve" id="CVE-2023-42756" title="CVE-2023-42756" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42753" type="cve" id="CVE-2023-42753" title="CVE-2023-42753" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42752" type="cve" id="CVE-2023-42752" title="CVE-2023-42752" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1194" type="cve" id="CVE-2023-1194" title="CVE-2023-1194" />
			<reference href="https://bdu.fstec.ru/vul/2023-09023" type="self" id="BDU:2023-09023" title="BDU:2023-09023" />
			<reference href="https://bdu.fstec.ru/vul/2023-09022" type="self" id="BDU:2023-09022" title="BDU:2023-09022" />
			<reference href="https://bdu.fstec.ru/vul/2023-08638" type="self" id="BDU:2023-08638" title="BDU:2023-08638" />
			<reference href="https://bdu.fstec.ru/vul/2023-08637" type="self" id="BDU:2023-08637" title="BDU:2023-08637" />
			<reference href="https://bdu.fstec.ru/vul/2023-07978" type="self" id="BDU:2023-07978" title="BDU:2023-07978" />
			<reference href="https://bdu.fstec.ru/vul/2023-07688" type="self" id="BDU:2023-07688" title="BDU:2023-07688" />
			<reference href="https://bdu.fstec.ru/vul/2023-06159" type="self" id="BDU:2023-06159" title="BDU:2023-06159" />
			<reference href="https://bdu.fstec.ru/vul/2023-06160" type="self" id="BDU:2023-06160" title="BDU:2023-06160" />
			<reference href="https://bdu.fstec.ru/vul/2023-05963" type="self" id="BDU:2023-05963" title="BDU:2023-05963" />
			<reference href="https://bdu.fstec.ru/vul/2023-01278" type="self" id="BDU:2023-01278" title="BDU:2023-01278" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241220-01</id>
		<issued date="2024-12-20" />
		<updated date="2024-12-20" />
		<title>Уязвимость PHP </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в php</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-cve-2023-0567/</description>
               <solution>
                    Запретить использование в ОС пакета php
                или
                    Установить обновление для пакета(ов) php.

                        Установка и обновление пакетов PHP до версии 8.Х на РЕД ОС производится по инструкции https://redos.red-soft.ru/base/arm/arm-other/php-8-redos-73/

                    
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-cve-2023-0567/" type="self" id="ROS-20241220-01" title="ROS-20241220-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0567" type="cve" id="CVE-2023-0567" title="CVE-2023-0567" />
			<reference href="https://bdu.fstec.ru/vul/2024-07326" type="self" id="BDU:2024-07326" title="BDU:2024-07326" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php" epoch="0" version="8.1.24" release="1.el7" arch="x86_64" src="">
					<filename>php-0:8.1.24-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241220-02</id>
		<issued date="2024-12-20" />
		<updated date="2024-12-20" />
		<title>Уязвимость mpg123 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mpg123</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mpg123-cve-2024-10573/</description>
               <solution>
                    Запретить использование в ОС пакета mpg123
                или
                    Установить обновление для пакета(ов) mpg123
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mpg123-cve-2024-10573/" type="self" id="ROS-20241220-02" title="ROS-20241220-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10573" type="cve" id="CVE-2024-10573" title="CVE-2024-10573" />
			<reference href="https://bdu.fstec.ru/vul/2024-11493" type="self" id="BDU:2024-11493" title="BDU:2024-11493" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mpg123" epoch="0" version="1.32.9" release="1.el7" arch="x86_64" src="">
					<filename>mpg123-0:1.32.9-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241220-03</id>
		<issued date="2024-12-20" />
		<updated date="2024-12-20" />
		<title>Уязвимость xmlrpc-c </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в xmlrpc-c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimosti-xmlrpc-c-cve-2024-45491/</description>
               <solution>
                    Запретить использование в ОС пакета xmlrpc-c
                или
                    Установить обновление для пакета(ов) expat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimosti-xmlrpc-c-cve-2024-45491/" type="self" id="ROS-20241220-03" title="ROS-20241220-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45491" type="cve" id="CVE-2024-45491" title="CVE-2024-45491" />
			<reference href="https://bdu.fstec.ru/vul/2024-07377" type="self" id="BDU:2024-07377" title="BDU:2024-07377" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="xmlrpc-c" epoch="0" version="1.32.5" release="1908.svn2451.el7" arch="x86_64" src="">
					<filename>xmlrpc-c-0:1.32.5-1908.svn2451.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241220-04</id>
		<issued date="2024-12-20" />
		<updated date="2024-12-20" />
		<title>Уязвимость golang-x-crypto-devel </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в golang-x-crypto-devel</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-x-crypto-devel-cve-2024-45337/</description>
               <solution>
                    Запретить использование в ОС пакета golang-x-crypto-devel
                или
                    Установить обновление для пакета(ов) golang-x-crypto-devel
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-x-crypto-devel-cve-2024-45337/" type="self" id="ROS-20241220-04" title="ROS-20241220-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45337" type="cve" id="CVE-2024-45337" title="CVE-2024-45337" />
			<reference href="https://bdu.fstec.ru/vul/2024-11338" type="self" id="BDU:2024-11338" title="BDU:2024-11338" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang-x-crypto-devel" epoch="0" version="0.31.0" release="1.el7" arch="noarch" src="">
					<filename>golang-x-crypto-devel-0:0.31.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250109-01</id>
		<issued date="2025-01-09" />
		<updated date="2025-01-09" />
		<title>Уязвимость NetworkManager </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в NetworkManager</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-networkmanager-cve-2024-6501/</description>
               <solution>
                    Запретить использование в ОС пакета NetworkManager
                или
                    Установить обновление для пакета(ов) NetworkManager
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-networkmanager-cve-2024-6501/" type="self" id="ROS-20250109-01" title="ROS-20250109-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6501" type="cve" id="CVE-2024-6501" title="CVE-2024-6501" />
			<reference href="https://bdu.fstec.ru/vul/2025-00340" type="self" id="BDU:2025-00340" title="BDU:2025-00340" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="NetworkManager" epoch="1" version="1.44.2" release="3.el7" arch="x86_64" src="">
					<filename>NetworkManager-1:1.44.2-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250109-02</id>
		<issued date="2025-01-09" />
		<updated date="2025-01-09" />
		<title>Уязвимость pki-server </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в pki-server</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pki-server-cve-2023-4727/</description>
               <solution>
                    Запретить использование в ОС пакета pki-server
                или
                    Установить обновление для пакета(ов) pki-server
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pki-server-cve-2023-4727/" type="self" id="ROS-20250109-02" title="ROS-20250109-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4727" type="cve" id="CVE-2023-4727" title="CVE-2023-4727" />
			<reference href="https://bdu.fstec.ru/vul/2025-00342" type="self" id="BDU:2025-00342" title="BDU:2025-00342" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pki-server" epoch="0" version="10.10.5" release="4.el7" arch="noarch" src="">
					<filename>pki-server-0:10.10.5-4.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250109-03</id>
		<issued date="2025-01-09" />
		<updated date="2025-01-09" />
		<title>Множественные уязвимости glpi</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-glpi-090125/</description>
               <solution>
                    Запретить использование в ОС пакета GLPI
                или
                    Установить обновление для пакета(ов) GLPI
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-glpi-090125/" type="self" id="ROS-20250109-03" title="ROS-20250109-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48912" type="cve" id="CVE-2024-48912" title="CVE-2024-48912" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50339" type="cve" id="CVE-2024-50339" title="CVE-2024-50339" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40638" type="cve" id="CVE-2024-40638" title="CVE-2024-40638" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47758" type="cve" id="CVE-2024-47758" title="CVE-2024-47758" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47761" type="cve" id="CVE-2024-47761" title="CVE-2024-47761" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47760" type="cve" id="CVE-2024-47760" title="CVE-2024-47760" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45608" type="cve" id="CVE-2024-45608" title="CVE-2024-45608" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41679" type="cve" id="CVE-2024-41679" title="CVE-2024-41679" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45611" type="cve" id="CVE-2024-45611" title="CVE-2024-45611" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47759" type="cve" id="CVE-2024-47759" title="CVE-2024-47759" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43417" type="cve" id="CVE-2024-43417" title="CVE-2024-43417" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43418" type="cve" id="CVE-2024-43418" title="CVE-2024-43418" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45609" type="cve" id="CVE-2024-45609" title="CVE-2024-45609" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45610" type="cve" id="CVE-2024-45610" title="CVE-2024-45610" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41678" type="cve" id="CVE-2024-41678" title="CVE-2024-41678" />
			<reference href="https://bdu.fstec.ru/vul/2025-00485" type="self" id="BDU:2025-00485" title="BDU:2025-00485" />
			<reference href="https://bdu.fstec.ru/vul/2024-09128" type="self" id="BDU:2024-09128" title="BDU:2024-09128" />
			<reference href="https://bdu.fstec.ru/vul/2024-09424" type="self" id="BDU:2024-09424" title="BDU:2024-09424" />
			<reference href="https://bdu.fstec.ru/vul/2024-09717" type="self" id="BDU:2024-09717" title="BDU:2024-09717" />
			<reference href="https://bdu.fstec.ru/vul/2024-09514" type="self" id="BDU:2024-09514" title="BDU:2024-09514" />
			<reference href="https://bdu.fstec.ru/vul/2024-09515" type="self" id="BDU:2024-09515" title="BDU:2024-09515" />
			<reference href="https://bdu.fstec.ru/vul/2025-00333" type="self" id="BDU:2025-00333" title="BDU:2025-00333" />
			<reference href="https://bdu.fstec.ru/vul/2025-00336" type="self" id="BDU:2025-00336" title="BDU:2025-00336" />
			<reference href="https://bdu.fstec.ru/vul/2025-00330" type="self" id="BDU:2025-00330" title="BDU:2025-00330" />
			<reference href="https://bdu.fstec.ru/vul/2025-00335" type="self" id="BDU:2025-00335" title="BDU:2025-00335" />
			<reference href="https://bdu.fstec.ru/vul/2025-00329" type="self" id="BDU:2025-00329" title="BDU:2025-00329" />
			<reference href="https://bdu.fstec.ru/vul/2025-00328" type="self" id="BDU:2025-00328" title="BDU:2025-00328" />
			<reference href="https://bdu.fstec.ru/vul/2025-00334" type="self" id="BDU:2025-00334" title="BDU:2025-00334" />
			<reference href="https://bdu.fstec.ru/vul/2025-00332" type="self" id="BDU:2025-00332" title="BDU:2025-00332" />
			<reference href="https://bdu.fstec.ru/vul/2025-00331" type="self" id="BDU:2025-00331" title="BDU:2025-00331" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi" epoch="0" version="10.0.17" release="1.el7" arch="noarch" src="">
					<filename>glpi-0:10.0.17-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250109-04</id>
		<issued date="2025-01-09" />
		<updated date="2025-01-09" />
		<title>Уязвимость glpi-plugin-fields </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в glpi-plugin-fields</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-plugin-fields-cve-2024-45600/</description>
               <solution>
                    Запретить использование в ОС пакета glpi-plugin-fields
                или
                    Установить обновление для пакета(ов) glpi-plugin-fields
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-plugin-fields-cve-2024-45600/" type="self" id="ROS-20250109-04" title="ROS-20250109-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45600" type="cve" id="CVE-2024-45600" title="CVE-2024-45600" />
			<reference href="https://bdu.fstec.ru/vul/2025-00004" type="self" id="BDU:2025-00004" title="BDU:2025-00004" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi-plugin-fields" epoch="0" version="1.21.15" release="1.el7" arch="noarch" src="">
					<filename>glpi-plugin-fields-0:1.21.15-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250109-05</id>
		<issued date="2025-01-09" />
		<updated date="2025-01-09" />
		<title>Множественные уязвимости firefox</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-090125/</description>
               <solution>
                    Запретить использование в ОС пакета Firefox
                или
                    Установить обновление для пакета(ов) Firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-090125/" type="self" id="ROS-20250109-05" title="ROS-20250109-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4768" type="cve" id="CVE-2024-4768" title="CVE-2024-4768" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4767" type="cve" id="CVE-2024-4767" title="CVE-2024-4767" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4769" type="cve" id="CVE-2024-4769" title="CVE-2024-4769" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4770" type="cve" id="CVE-2024-4770" title="CVE-2024-4770" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696" type="cve" id="CVE-2024-5696" title="CVE-2024-5696" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700" type="cve" id="CVE-2024-5700" title="CVE-2024-5700" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367" type="cve" id="CVE-2024-4367" title="CVE-2024-4367" />
			<reference href="https://bdu.fstec.ru/vul/2024-06889" type="self" id="BDU:2024-06889" title="BDU:2024-06889" />
			<reference href="https://bdu.fstec.ru/vul/2024-06888" type="self" id="BDU:2024-06888" title="BDU:2024-06888" />
			<reference href="https://bdu.fstec.ru/vul/2024-06887" type="self" id="BDU:2024-06887" title="BDU:2024-06887" />
			<reference href="https://bdu.fstec.ru/vul/2024-05168" type="self" id="BDU:2024-05168" title="BDU:2024-05168" />
			<reference href="https://bdu.fstec.ru/vul/2024-04733" type="self" id="BDU:2024-04733" title="BDU:2024-04733" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.12.0" release="1.el7" arch="x86_64" src="">
					<filename>firefox-0:115.12.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250109-06</id>
		<issued date="2025-01-09" />
		<updated date="2025-01-09" />
		<title>Множественные уязвимости thunderbird</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-0901254769/</description>
               <solution>
                    Запретить использование в ОС пакета thunderbird
                или
                    Установить обновление для пакета(ов) thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-0901254769/" type="self" id="ROS-20250109-06" title="ROS-20250109-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4768" type="cve" id="CVE-2024-4768" title="CVE-2024-4768" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4767" type="cve" id="CVE-2024-4767" title="CVE-2024-4767" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4769" type="cve" id="CVE-2024-4769" title="CVE-2024-4769" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4770" type="cve" id="CVE-2024-4770" title="CVE-2024-4770" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696" type="cve" id="CVE-2024-5696" title="CVE-2024-5696" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700" type="cve" id="CVE-2024-5700" title="CVE-2024-5700" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367" type="cve" id="CVE-2024-4367" title="CVE-2024-4367" />
			<reference href="https://bdu.fstec.ru/vul/2024-06889" type="self" id="BDU:2024-06889" title="BDU:2024-06889" />
			<reference href="https://bdu.fstec.ru/vul/2024-06888" type="self" id="BDU:2024-06888" title="BDU:2024-06888" />
			<reference href="https://bdu.fstec.ru/vul/2024-06887" type="self" id="BDU:2024-06887" title="BDU:2024-06887" />
			<reference href="https://bdu.fstec.ru/vul/2024-05168" type="self" id="BDU:2024-05168" title="BDU:2024-05168" />
			<reference href="https://bdu.fstec.ru/vul/2024-04733" type="self" id="BDU:2024-04733" title="BDU:2024-04733" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="115.12.1" release="1.el7" arch="x86_64" src="">
					<filename>thunderbird-0:115.12.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250109-08</id>
		<issued date="2025-01-09" />
		<updated date="2025-01-13" />
		<title>Уязвимость ruby </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в ruby</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ruby-cve-2024-27280/</description>
               <solution>
                    Запретить использование в ОС пакета ruby
                или
                    Установить обновление для пакета(ов) ruby
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ruby-cve-2024-27280/" type="self" id="ROS-20250109-08" title="ROS-20250109-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27280" type="cve" id="CVE-2024-27280" title="CVE-2024-27280" />
			<reference href="https://bdu.fstec.ru/vul/2024-02456" type="self" id="BDU:2024-02456" title="BDU:2024-02456" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ruby" epoch="0" version="2.7.6" release="132.el7" arch="x86_64" src="">
					<filename>ruby-0:2.7.6-132.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250109-07</id>
		<issued date="2025-01-09" />
		<updated date="2025-01-09" />
		<title>Множественные уязвимости chromium</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-090125/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-090125/" type="self" id="ROS-20250109-07" title="ROS-20250109-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12053" type="cve" id="CVE-2024-12053" title="CVE-2024-12053" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12695" type="cve" id="CVE-2024-12695" title="CVE-2024-12695" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12694" type="cve" id="CVE-2024-12694" title="CVE-2024-12694" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12693" type="cve" id="CVE-2024-12693" title="CVE-2024-12693" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12692" type="cve" id="CVE-2024-12692" title="CVE-2024-12692" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12382" type="cve" id="CVE-2024-12382" title="CVE-2024-12382" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12381" type="cve" id="CVE-2024-12381" title="CVE-2024-12381" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11395" type="cve" id="CVE-2024-11395" title="CVE-2024-11395" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11117" type="cve" id="CVE-2024-11117" title="CVE-2024-11117" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11116" type="cve" id="CVE-2024-11116" title="CVE-2024-11116" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11113" type="cve" id="CVE-2024-11113" title="CVE-2024-11113" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11111" type="cve" id="CVE-2024-11111" title="CVE-2024-11111" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11110" type="cve" id="CVE-2024-11110" title="CVE-2024-11110" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10827" type="cve" id="CVE-2024-10827" title="CVE-2024-10827" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10488" type="cve" id="CVE-2024-10488" title="CVE-2024-10488" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10487" type="cve" id="CVE-2024-10487" title="CVE-2024-10487" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10231" type="cve" id="CVE-2024-10231" title="CVE-2024-10231" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10230" type="cve" id="CVE-2024-10230" title="CVE-2024-10230" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10229" type="cve" id="CVE-2024-10229" title="CVE-2024-10229" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9966" type="cve" id="CVE-2024-9966" title="CVE-2024-9966" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9964" type="cve" id="CVE-2024-9964" title="CVE-2024-9964" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9963" type="cve" id="CVE-2024-9963" title="CVE-2024-9963" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9962" type="cve" id="CVE-2024-9962" title="CVE-2024-9962" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9960" type="cve" id="CVE-2024-9960" title="CVE-2024-9960" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9959" type="cve" id="CVE-2024-9959" title="CVE-2024-9959" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9958" type="cve" id="CVE-2024-9958" title="CVE-2024-9958" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9955" type="cve" id="CVE-2024-9955" title="CVE-2024-9955" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9954" type="cve" id="CVE-2024-9954" title="CVE-2024-9954" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9603" type="cve" id="CVE-2024-9603" title="CVE-2024-9603" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9602" type="cve" id="CVE-2024-9602" title="CVE-2024-9602" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9370" type="cve" id="CVE-2024-9370" title="CVE-2024-9370" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9369" type="cve" id="CVE-2024-9369" title="CVE-2024-9369" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7025" type="cve" id="CVE-2024-7025" title="CVE-2024-7025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9123" type="cve" id="CVE-2024-9123" title="CVE-2024-9123" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9122" type="cve" id="CVE-2024-9122" title="CVE-2024-9122" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9121" type="cve" id="CVE-2024-9121" title="CVE-2024-9121" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8908" type="cve" id="CVE-2024-8908" title="CVE-2024-8908" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8906" type="cve" id="CVE-2024-8906" title="CVE-2024-8906" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8905" type="cve" id="CVE-2024-8905" title="CVE-2024-8905" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8904" type="cve" id="CVE-2024-8904" title="CVE-2024-8904" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8638" type="cve" id="CVE-2024-8638" title="CVE-2024-8638" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8636" type="cve" id="CVE-2024-8636" title="CVE-2024-8636" />
			<reference href="https://bdu.fstec.ru/vul/2025-00126" type="self" id="BDU:2025-00126" title="BDU:2025-00126" />
			<reference href="https://bdu.fstec.ru/vul/2024-11419" type="self" id="BDU:2024-11419" title="BDU:2024-11419" />
			<reference href="https://bdu.fstec.ru/vul/2024-11418" type="self" id="BDU:2024-11418" title="BDU:2024-11418" />
			<reference href="https://bdu.fstec.ru/vul/2024-11381" type="self" id="BDU:2024-11381" title="BDU:2024-11381" />
			<reference href="https://bdu.fstec.ru/vul/2024-11420" type="self" id="BDU:2024-11420" title="BDU:2024-11420" />
			<reference href="https://bdu.fstec.ru/vul/2024-11375" type="self" id="BDU:2024-11375" title="BDU:2024-11375" />
			<reference href="https://bdu.fstec.ru/vul/2024-11373" type="self" id="BDU:2024-11373" title="BDU:2024-11373" />
			<reference href="https://bdu.fstec.ru/vul/2024-10248" type="self" id="BDU:2024-10248" title="BDU:2024-10248" />
			<reference href="https://bdu.fstec.ru/vul/2024-10651" type="self" id="BDU:2024-10651" title="BDU:2024-10651" />
			<reference href="https://bdu.fstec.ru/vul/2024-10329" type="self" id="BDU:2024-10329" title="BDU:2024-10329" />
			<reference href="https://bdu.fstec.ru/vul/2024-10330" type="self" id="BDU:2024-10330" title="BDU:2024-10330" />
			<reference href="https://bdu.fstec.ru/vul/2024-10648" type="self" id="BDU:2024-10648" title="BDU:2024-10648" />
			<reference href="https://bdu.fstec.ru/vul/2024-10649" type="self" id="BDU:2024-10649" title="BDU:2024-10649" />
			<reference href="https://bdu.fstec.ru/vul/2024-10647" type="self" id="BDU:2024-10647" title="BDU:2024-10647" />
			<reference href="https://bdu.fstec.ru/vul/2024-09068" type="self" id="BDU:2024-09068" title="BDU:2024-09068" />
			<reference href="https://bdu.fstec.ru/vul/2024-08949" type="self" id="BDU:2024-08949" title="BDU:2024-08949" />
			<reference href="https://bdu.fstec.ru/vul/2024-08629" type="self" id="BDU:2024-08629" title="BDU:2024-08629" />
			<reference href="https://bdu.fstec.ru/vul/2024-08628" type="self" id="BDU:2024-08628" title="BDU:2024-08628" />
			<reference href="https://bdu.fstec.ru/vul/2024-08627" type="self" id="BDU:2024-08627" title="BDU:2024-08627" />
			<reference href="https://bdu.fstec.ru/vul/2024-11601" type="self" id="BDU:2024-11601" title="BDU:2024-11601" />
			<reference href="https://bdu.fstec.ru/vul/2024-08244" type="self" id="BDU:2024-08244" title="BDU:2024-08244" />
			<reference href="https://bdu.fstec.ru/vul/2024-08971" type="self" id="BDU:2024-08971" title="BDU:2024-08971" />
			<reference href="https://bdu.fstec.ru/vul/2024-08242" type="self" id="BDU:2024-08242" title="BDU:2024-08242" />
			<reference href="https://bdu.fstec.ru/vul/2024-08969" type="self" id="BDU:2024-08969" title="BDU:2024-08969" />
			<reference href="https://bdu.fstec.ru/vul/2024-08243" type="self" id="BDU:2024-08243" title="BDU:2024-08243" />
			<reference href="https://bdu.fstec.ru/vul/2024-08344" type="self" id="BDU:2024-08344" title="BDU:2024-08344" />
			<reference href="https://bdu.fstec.ru/vul/2024-08240" type="self" id="BDU:2024-08240" title="BDU:2024-08240" />
			<reference href="https://bdu.fstec.ru/vul/2024-09277" type="self" id="BDU:2024-09277" title="BDU:2024-09277" />
			<reference href="https://bdu.fstec.ru/vul/2024-08555" type="self" id="BDU:2024-08555" title="BDU:2024-08555" />
			<reference href="https://bdu.fstec.ru/vul/2024-08554" type="self" id="BDU:2024-08554" title="BDU:2024-08554" />
			<reference href="https://bdu.fstec.ru/vul/2024-07924" type="self" id="BDU:2024-07924" title="BDU:2024-07924" />
			<reference href="https://bdu.fstec.ru/vul/2024-08729" type="self" id="BDU:2024-08729" title="BDU:2024-08729" />
			<reference href="https://bdu.fstec.ru/vul/2024-07923" type="self" id="BDU:2024-07923" title="BDU:2024-07923" />
			<reference href="https://bdu.fstec.ru/vul/2024-07576" type="self" id="BDU:2024-07576" title="BDU:2024-07576" />
			<reference href="https://bdu.fstec.ru/vul/2024-07574" type="self" id="BDU:2024-07574" title="BDU:2024-07574" />
			<reference href="https://bdu.fstec.ru/vul/2024-07575" type="self" id="BDU:2024-07575" title="BDU:2024-07575" />
			<reference href="https://bdu.fstec.ru/vul/2024-08033" type="self" id="BDU:2024-08033" title="BDU:2024-08033" />
			<reference href="https://bdu.fstec.ru/vul/2024-08031" type="self" id="BDU:2024-08031" title="BDU:2024-08031" />
			<reference href="https://bdu.fstec.ru/vul/2024-07378" type="self" id="BDU:2024-07378" title="BDU:2024-07378" />
			<reference href="https://bdu.fstec.ru/vul/2024-07948" type="self" id="BDU:2024-07948" title="BDU:2024-07948" />
			<reference href="https://bdu.fstec.ru/vul/2024-08027" type="self" id="BDU:2024-08027" title="BDU:2024-08027" />
			<reference href="https://bdu.fstec.ru/vul/2024-07564" type="self" id="BDU:2024-07564" title="BDU:2024-07564" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="131.0.6778.204" release="1.el7" arch="x86_64" src="">
					<filename>chromium-0:131.0.6778.204-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250110-01</id>
		<issued date="2025-01-10" />
		<updated date="2025-01-10" />
		<title>Уязвимость VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2024-21259/</description>
               <solution>
                    Запретить использование в ОС пакета VirtualBox
                или
                    Установить обновление для пакета(ов) VirtualBox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2024-21259/" type="self" id="ROS-20250110-01" title="ROS-20250110-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21259" type="cve" id="CVE-2024-21259" title="CVE-2024-21259" />
			<reference href="https://bdu.fstec.ru/vul/2024-08217" type="self" id="BDU:2024-08217" title="BDU:2024-08217" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox" epoch="0" version="7.0.22" release="2.el7" arch="x86_64" src="">
					<filename>VirtualBox-0:7.0.22-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250110-02</id>
		<issued date="2025-01-10" />
		<updated date="2025-01-10" />
		<title>Множественные уязвимости exiv2</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в exiv2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-exiv2/</description>
               <solution>
                    Запретить использование в ОС пакета exiv2
                или
                    Установить обновление для пакета(ов) exiv2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-exiv2/" type="self" id="ROS-20250110-02" title="ROS-20250110-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29463" type="cve" id="CVE-2021-29463" title="CVE-2021-29463" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37622" type="cve" id="CVE-2021-37622" title="CVE-2021-37622" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29464" type="cve" id="CVE-2021-29464" title="CVE-2021-29464" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29458" type="cve" id="CVE-2021-29458" title="CVE-2021-29458" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29470" type="cve" id="CVE-2021-29470" title="CVE-2021-29470" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32815" type="cve" id="CVE-2021-32815" title="CVE-2021-32815" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31292" type="cve" id="CVE-2021-31292" title="CVE-2021-31292" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34335" type="cve" id="CVE-2021-34335" title="CVE-2021-34335" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32617" type="cve" id="CVE-2021-32617" title="CVE-2021-32617" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37618" type="cve" id="CVE-2021-37618" title="CVE-2021-37618" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37620" type="cve" id="CVE-2021-37620" title="CVE-2021-37620" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37619" type="cve" id="CVE-2021-37619" title="CVE-2021-37619" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37623" type="cve" id="CVE-2021-37623" title="CVE-2021-37623" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37621" type="cve" id="CVE-2021-37621" title="CVE-2021-37621" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34334" type="cve" id="CVE-2021-34334" title="CVE-2021-34334" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37616" type="cve" id="CVE-2021-37616" title="CVE-2021-37616" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37615" type="cve" id="CVE-2021-37615" title="CVE-2021-37615" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3482" type="cve" id="CVE-2021-3482" title="CVE-2021-3482" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29473" type="cve" id="CVE-2021-29473" title="CVE-2021-29473" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29457" type="cve" id="CVE-2021-29457" title="CVE-2021-29457" />
			<reference href="https://bdu.fstec.ru/vul/2025-00361" type="self" id="BDU:2025-00361" title="BDU:2025-00361" />
			<reference href="https://bdu.fstec.ru/vul/2023-01671" type="self" id="BDU:2023-01671" title="BDU:2023-01671" />
			<reference href="https://bdu.fstec.ru/vul/2025-00326" type="self" id="BDU:2025-00326" title="BDU:2025-00326" />
			<reference href="https://bdu.fstec.ru/vul/2023-01697" type="self" id="BDU:2023-01697" title="BDU:2023-01697" />
			<reference href="https://bdu.fstec.ru/vul/2023-05477" type="self" id="BDU:2023-05477" title="BDU:2023-05477" />
			<reference href="https://bdu.fstec.ru/vul/2022-01682" type="self" id="BDU:2022-01682" title="BDU:2022-01682" />
			<reference href="https://bdu.fstec.ru/vul/2021-05262" type="self" id="BDU:2021-05262" title="BDU:2021-05262" />
			<reference href="https://bdu.fstec.ru/vul/2022-01776" type="self" id="BDU:2022-01776" title="BDU:2022-01776" />
			<reference href="https://bdu.fstec.ru/vul/2023-05484" type="self" id="BDU:2023-05484" title="BDU:2023-05484" />
			<reference href="https://bdu.fstec.ru/vul/2023-05487" type="self" id="BDU:2023-05487" title="BDU:2023-05487" />
			<reference href="https://bdu.fstec.ru/vul/2023-01704" type="self" id="BDU:2023-01704" title="BDU:2023-01704" />
			<reference href="https://bdu.fstec.ru/vul/2023-05486" type="self" id="BDU:2023-05486" title="BDU:2023-05486" />
			<reference href="https://bdu.fstec.ru/vul/2023-05489" type="self" id="BDU:2023-05489" title="BDU:2023-05489" />
			<reference href="https://bdu.fstec.ru/vul/2023-01673" type="self" id="BDU:2023-01673" title="BDU:2023-01673" />
			<reference href="https://bdu.fstec.ru/vul/2022-01777" type="self" id="BDU:2022-01777" title="BDU:2022-01777" />
			<reference href="https://bdu.fstec.ru/vul/2023-05488" type="self" id="BDU:2023-05488" title="BDU:2023-05488" />
			<reference href="https://bdu.fstec.ru/vul/2023-05485" type="self" id="BDU:2023-05485" title="BDU:2023-05485" />
			<reference href="https://bdu.fstec.ru/vul/2021-05214" type="self" id="BDU:2021-05214" title="BDU:2021-05214" />
			<reference href="https://bdu.fstec.ru/vul/2021-05244" type="self" id="BDU:2021-05244" title="BDU:2021-05244" />
			<reference href="https://bdu.fstec.ru/vul/2021-05234" type="self" id="BDU:2021-05234" title="BDU:2021-05234" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="exiv2" epoch="0" version="0.27.5" release="1.el7" arch="x86_64" src="">
					<filename>exiv2-0:0.27.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250110-03</id>
		<issued date="2025-01-10" />
		<updated date="2025-01-10" />
		<title>Уязвимость expat </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в expat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-expat-cve-2024-50602/</description>
               <solution>
                    Запретить использование в ОС пакета expat
                или
                    Установить обновление для пакета(ов) expat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-expat-cve-2024-50602/" type="self" id="ROS-20250110-03" title="ROS-20250110-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50602" type="cve" id="CVE-2024-50602" title="CVE-2024-50602" />
			<reference href="https://bdu.fstec.ru/vul/2025-00344" type="self" id="BDU:2025-00344" title="BDU:2025-00344" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="expat" epoch="0" version="2.6.4" release="1.el7" arch="x86_64" src="">
					<filename>expat-0:2.6.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250110-04</id>
		<issued date="2025-01-10" />
		<updated date="2025-01-10" />
		<title>Множественные уязвимости tuned </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tuned</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-tuned-cve-2024-52336-cve-2024-52337/</description>
               <solution>
                    Запретить использование в ОС пакета tuned
                или
                    Установить обновление для пакета(ов) tuned
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-tuned-cve-2024-52336-cve-2024-52337/" type="self" id="ROS-20250110-04" title="ROS-20250110-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52336" type="cve" id="CVE-2024-52336" title="CVE-2024-52336" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52337" type="cve" id="CVE-2024-52337" title="CVE-2024-52337" />
			<reference href="https://bdu.fstec.ru/vul/2024-10469" type="self" id="BDU:2024-10469" title="BDU:2024-10469" />
			<reference href="https://bdu.fstec.ru/vul/2024-10906" type="self" id="BDU:2024-10906" title="BDU:2024-10906" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tuned" epoch="0" version="2.24.1" release="2.el7" arch="noarch" src="">
					<filename>tuned-0:2.24.1-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250110-05</id>
		<issued date="2025-01-10" />
		<updated date="2025-01-10" />
		<title>Множественные уязвимости zabbix-server-mysql </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в zabbix-server-mysql</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix-server-mysql-cve-2024-22117-cve-2024-42330-cve-2024-42333-cve-2024/</description>
               <solution>
                    Запретить использование в ОС пакета zabbix-server-mysql
                или
                    Установить обновление для пакета(ов) zabbix-server-mysql
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix-server-mysql-cve-2024-22117-cve-2024-42330-cve-2024-42333-cve-2024/" type="self" id="ROS-20250110-05" title="ROS-20250110-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22117" type="cve" id="CVE-2024-22117" title="CVE-2024-22117" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42330" type="cve" id="CVE-2024-42330" title="CVE-2024-42330" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42333" type="cve" id="CVE-2024-42333" title="CVE-2024-42333" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42332" type="cve" id="CVE-2024-42332" title="CVE-2024-42332" />
			<reference href="https://bdu.fstec.ru/vul/2025-00337" type="self" id="BDU:2025-00337" title="BDU:2025-00337" />
			<reference href="https://bdu.fstec.ru/vul/2024-10774" type="self" id="BDU:2024-10774" title="BDU:2024-10774" />
			<reference href="https://bdu.fstec.ru/vul/2024-10775" type="self" id="BDU:2024-10775" title="BDU:2024-10775" />
			<reference href="https://bdu.fstec.ru/vul/2024-10773" type="self" id="BDU:2024-10773" title="BDU:2024-10773" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix-server-mysql" epoch="1" version="6.4.20" release="1.el7" arch="x86_64" src="">
					<filename>zabbix-server-mysql-1:6.4.20-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250110-06</id>
		<issued date="2025-01-10" />
		<updated date="2025-01-10" />
		<title>Множественные уязвимости zabbix-server-pgsql </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в zabbix-server-pgsql</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix-server-pgsql-cve-2024-22117-cve-2024-42330-cve-2024-42333-cve-20249711/</description>
               <solution>
                    Запретить использование в ОС пакета zabbix-server-pgsql
                или
                    Установить обновление для пакета(ов) zabbix-server-pgsql
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix-server-pgsql-cve-2024-22117-cve-2024-42330-cve-2024-42333-cve-20249711/" type="self" id="ROS-20250110-06" title="ROS-20250110-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22117" type="cve" id="CVE-2024-22117" title="CVE-2024-22117" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42330" type="cve" id="CVE-2024-42330" title="CVE-2024-42330" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42333" type="cve" id="CVE-2024-42333" title="CVE-2024-42333" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42332" type="cve" id="CVE-2024-42332" title="CVE-2024-42332" />
			<reference href="https://bdu.fstec.ru/vul/2025-00337" type="self" id="BDU:2025-00337" title="BDU:2025-00337" />
			<reference href="https://bdu.fstec.ru/vul/2024-10774" type="self" id="BDU:2024-10774" title="BDU:2024-10774" />
			<reference href="https://bdu.fstec.ru/vul/2024-10775" type="self" id="BDU:2024-10775" title="BDU:2024-10775" />
			<reference href="https://bdu.fstec.ru/vul/2024-10773" type="self" id="BDU:2024-10773" title="BDU:2024-10773" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix-server-pgsql" epoch="1" version="6.4.20" release="1.el7" arch="x86_64" src="">
					<filename>zabbix-server-pgsql-1:6.4.20-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250110-07</id>
		<issued date="2025-01-10" />
		<updated date="2025-01-10" />
		<title>Уязвимость coredns </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в coredns</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-coredns-cve-2024-0874/</description>
               <solution>
                    Запретить использование в ОС пакета coredns
                или
                    Установить обновление для пакета(ов) coredns
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-coredns-cve-2024-0874/" type="self" id="ROS-20250110-07" title="ROS-20250110-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0874" type="cve" id="CVE-2024-0874" title="CVE-2024-0874" />
			<reference href="https://bdu.fstec.ru/vul/2025-00341" type="self" id="BDU:2025-00341" title="BDU:2025-00341" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="coredns" epoch="0" version="1.8.6" release="3.el7" arch="x86_64" src="">
					<filename>coredns-0:1.8.6-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250110-08</id>
		<issued date="2025-01-10" />
		<updated date="2025-01-10" />
		<title>Множественные уязвимости zbar </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в zbar</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zbar-cve-2023-40890-cve-2023-40889/</description>
               <solution>
                    Запретить использование в ОС пакета zbar
                или
                    Установить обновление для пакета(ов) zbar
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zbar-cve-2023-40890-cve-2023-40889/" type="self" id="ROS-20250110-08" title="ROS-20250110-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40890" type="cve" id="CVE-2023-40890" title="CVE-2023-40890" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40889" type="cve" id="CVE-2023-40889" title="CVE-2023-40889" />
			<reference href="https://bdu.fstec.ru/vul/2024-01499" type="self" id="BDU:2024-01499" title="BDU:2024-01499" />
			<reference href="https://bdu.fstec.ru/vul/2024-01490" type="self" id="BDU:2024-01490" title="BDU:2024-01490" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zbar" epoch="0" version="0.23.90" release="1.el7" arch="x86_64" src="">
					<filename>zbar-0:0.23.90-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250110-09</id>
		<issued date="2025-01-10" />
		<updated date="2025-01-10" />
		<title>Уязвимость erlang </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в erlang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-erlang-cve-2024-53846/</description>
               <solution>
                    Запретить использование в ОС пакета erlang
                или
                    Установить обновление для пакета(ов) erlang
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-erlang-cve-2024-53846/" type="self" id="ROS-20250110-09" title="ROS-20250110-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53846" type="cve" id="CVE-2024-53846" title="CVE-2024-53846" />
			<reference href="https://bdu.fstec.ru/vul/2025-00339" type="self" id="BDU:2025-00339" title="BDU:2025-00339" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="erlang" epoch="0" version="26.2.5.6" release="1.el7" arch="x86_64" src="">
					<filename>erlang-0:26.2.5.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250110-10</id>
		<issued date="2025-01-10" />
		<updated date="2025-01-10" />
		<title>Уязвимость python3.12 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3.12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-12-cve-2024-12254/</description>
               <solution>
                    Запретить использование в ОС пакета python3.12
                или
                    Установить обновление для пакета(ов) python3.12
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-12-cve-2024-12254/" type="self" id="ROS-20250110-10" title="ROS-20250110-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12254" type="cve" id="CVE-2024-12254" title="CVE-2024-12254" />
			<reference href="https://bdu.fstec.ru/vul/2025-00345" type="self" id="BDU:2025-00345" title="BDU:2025-00345" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.12" epoch="0" version="3.12.8" release="1.el7" arch="x86_64" src="">
					<filename>python3.12-0:3.12.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250110-11</id>
		<issued date="2025-01-10" />
		<updated date="2025-01-10" />
		<title>Уязвимость rubygem-actionpack </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в rubygem-actionpack</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-actionpack-cve-2024-28103/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-actionpack
                или
                    Установить обновление для пакета(ов) rubygem-actionpack
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-actionpack-cve-2024-28103/" type="self" id="ROS-20250110-11" title="ROS-20250110-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28103" type="cve" id="CVE-2024-28103" title="CVE-2024-28103" />
			<reference href="https://bdu.fstec.ru/vul/2025-00338" type="self" id="BDU:2025-00338" title="BDU:2025-00338" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-actionpack" epoch="2" version="6.1.6.1" release="5.el7" arch="noarch" src="">
					<filename>rubygem-actionpack-2:6.1.6.1-5.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250110-12</id>
		<issued date="2025-01-10" />
		<updated date="2025-01-10" />
		<title>Множественные уязвимости tomcat </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в tomcat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-tomcat-cve-2024-50379-cve-2024-54677/</description>
               <solution>
                    Запретить использование в ОС пакета tomcat
                или
                    Установить обновление для пакета(ов) tomcat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-tomcat-cve-2024-50379-cve-2024-54677/" type="self" id="ROS-20250110-12" title="ROS-20250110-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50379" type="cve" id="CVE-2024-50379" title="CVE-2024-50379" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54677" type="cve" id="CVE-2024-54677" title="CVE-2024-54677" />
			<reference href="https://bdu.fstec.ru/vul/2024-11286" type="self" id="BDU:2024-11286" title="BDU:2024-11286" />
			<reference href="https://bdu.fstec.ru/vul/2024-11479" type="self" id="BDU:2024-11479" title="BDU:2024-11479" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat" epoch="1" version="9.0.98" release="1.el7" arch="noarch" src="">
					<filename>tomcat-1:9.0.98-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250110-13</id>
		<issued date="2025-01-10" />
		<updated date="2025-01-10" />
		<title>Уязвимость minio </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в minio</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-minio-cve-2024-55949/</description>
               <solution>
                    Запретить использование в ОС пакета minio
                или
                    Установить обновление для пакета(ов) minio
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-minio-cve-2024-55949/" type="self" id="ROS-20250110-13" title="ROS-20250110-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-55949" type="cve" id="CVE-2024-55949" title="CVE-2024-55949" />
			<reference href="https://bdu.fstec.ru/vul/2024-11410" type="self" id="BDU:2024-11410" title="BDU:2024-11410" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="minio" epoch="0" version="20241218T131544Z" release="1.el7" arch="x86_64" src="">
					<filename>minio-0:20241218T131544Z-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250110-14</id>
		<issued date="2025-01-10" />
		<updated date="2025-01-10" />
		<title>Уязвимость gitea </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в gitea</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gitea-cve-2024-45337/</description>
               <solution>
                    Запретить использование в ОС пакета gitea
                или
                    Установить обновление для пакета(ов) gitea
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gitea-cve-2024-45337/" type="self" id="ROS-20250110-14" title="ROS-20250110-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45337" type="cve" id="CVE-2024-45337" title="CVE-2024-45337" />
			<reference href="https://bdu.fstec.ru/vul/2024-11338" type="self" id="BDU:2024-11338" title="BDU:2024-11338" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gitea" epoch="0" version="1.22.6" release="1.el7" arch="x86_64" src="">
					<filename>gitea-0:1.22.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250113-01</id>
		<issued date="2025-01-13" />
		<updated date="2025-01-13" />
		<title>Уязвимость edk2-tools </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в edk2-tools</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-edk2-tools-cve-2024-6119/</description>
               <solution>
                    Запретить использование в ОС пакета edk2-tools
                или
                    Установить обновление для пакета(ов) edk2-tools
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-edk2-tools-cve-2024-6119/" type="self" id="ROS-20250113-01" title="ROS-20250113-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6119" type="cve" id="CVE-2024-6119" title="CVE-2024-6119" />
			<reference href="https://bdu.fstec.ru/vul/2024-06735" type="self" id="BDU:2024-06735" title="BDU:2024-06735" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="edk2-tools" epoch="0" version="20240524" release="3.el7" arch="x86_64" src="">
					<filename>edk2-tools-0:20240524-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250113-02</id>
		<issued date="2025-01-13" />
		<updated date="2025-01-13" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-1301251/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-1301251/" type="self" id="ROS-20250113-02" title="ROS-20250113-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38426" type="cve" id="CVE-2023-38426" title="CVE-2023-38426" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38427" type="cve" id="CVE-2023-38427" title="CVE-2023-38427" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38428" type="cve" id="CVE-2023-38428" title="CVE-2023-38428" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38429" type="cve" id="CVE-2023-38429" title="CVE-2023-38429" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38430" type="cve" id="CVE-2023-38430" title="CVE-2023-38430" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38431" type="cve" id="CVE-2023-38431" title="CVE-2023-38431" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38432" type="cve" id="CVE-2023-38432" title="CVE-2023-38432" />
			<reference href="https://bdu.fstec.ru/vul/2023-03957" type="self" id="BDU:2023-03957" title="BDU:2023-03957" />
			<reference href="https://bdu.fstec.ru/vul/2023-03956" type="self" id="BDU:2023-03956" title="BDU:2023-03956" />
			<reference href="https://bdu.fstec.ru/vul/2023-03955" type="self" id="BDU:2023-03955" title="BDU:2023-03955" />
			<reference href="https://bdu.fstec.ru/vul/2023-03954" type="self" id="BDU:2023-03954" title="BDU:2023-03954" />
			<reference href="https://bdu.fstec.ru/vul/2023-03953" type="self" id="BDU:2023-03953" title="BDU:2023-03953" />
			<reference href="https://bdu.fstec.ru/vul/2023-03952" type="self" id="BDU:2023-03952" title="BDU:2023-03952" />
			<reference href="https://bdu.fstec.ru/vul/2023-03951" type="self" id="BDU:2023-03951" title="BDU:2023-03951" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250113-03</id>
		<issued date="2025-01-13" />
		<updated date="2025-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-25775/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-25775/" type="self" id="ROS-20250113-03" title="ROS-20250113-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775" type="cve" id="CVE-2023-25775" title="CVE-2023-25775" />
			<reference href="https://bdu.fstec.ru/vul/2023-04772" type="self" id="BDU:2023-04772" title="BDU:2023-04772" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250113-04</id>
		<issued date="2025-01-13" />
		<updated date="2025-01-13" />
		<title>Множественные уязвимости kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-cve-2024-38628-cve-2024-38636/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-cve-2024-38628-cve-2024-38636/" type="self" id="ROS-20250113-04" title="ROS-20250113-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38628" type="cve" id="CVE-2024-38628" title="CVE-2024-38628" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38636" type="cve" id="CVE-2024-38636" title="CVE-2024-38636" />
			<reference href="https://bdu.fstec.ru/vul/2025-04183" type="self" id="BDU:2025-04183" title="BDU:2025-04183" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250113-05</id>
		<issued date="2025-01-13" />
		<updated date="2025-01-13" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-1301252/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-1301252/" type="self" id="ROS-20250113-05" title="ROS-20250113-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48697" type="cve" id="CVE-2022-48697" title="CVE-2022-48697" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48719" type="cve" id="CVE-2022-48719" title="CVE-2022-48719" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48762" type="cve" id="CVE-2022-48762" title="CVE-2022-48762" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33621" type="cve" id="CVE-2024-33621" title="CVE-2024-33621" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38390" type="cve" id="CVE-2024-38390" title="CVE-2024-38390" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38637" type="cve" id="CVE-2024-38637" title="CVE-2024-38637" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47590" type="cve" id="CVE-2021-47590" title="CVE-2021-47590" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36286" type="cve" id="CVE-2024-36286" title="CVE-2024-36286" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37356" type="cve" id="CVE-2024-37356" title="CVE-2024-37356" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38621" type="cve" id="CVE-2024-38621" title="CVE-2024-38621" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38623" type="cve" id="CVE-2024-38623" title="CVE-2024-38623" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38624" type="cve" id="CVE-2024-38624" title="CVE-2024-38624" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38634" type="cve" id="CVE-2024-38634" title="CVE-2024-38634" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38635" type="cve" id="CVE-2024-38635" title="CVE-2024-38635" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38659" type="cve" id="CVE-2024-38659" title="CVE-2024-38659" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34777" type="cve" id="CVE-2024-34777" title="CVE-2024-34777" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33847" type="cve" id="CVE-2024-33847" title="CVE-2024-33847" />
			<reference href="https://bdu.fstec.ru/vul/2025-14601" type="self" id="BDU:2025-14601" title="BDU:2025-14601" />
			<reference href="https://bdu.fstec.ru/vul/2025-14251" type="self" id="BDU:2025-14251" title="BDU:2025-14251" />
			<reference href="https://bdu.fstec.ru/vul/2024-07404" type="self" id="BDU:2024-07404" title="BDU:2024-07404" />
			<reference href="https://bdu.fstec.ru/vul/2025-03922" type="self" id="BDU:2025-03922" title="BDU:2025-03922" />
			<reference href="https://bdu.fstec.ru/vul/2025-04182" type="self" id="BDU:2025-04182" title="BDU:2025-04182" />
			<reference href="https://bdu.fstec.ru/vul/2025-14248" type="self" id="BDU:2025-14248" title="BDU:2025-14248" />
			<reference href="https://bdu.fstec.ru/vul/2025-04189" type="self" id="BDU:2025-04189" title="BDU:2025-04189" />
			<reference href="https://bdu.fstec.ru/vul/2025-04187" type="self" id="BDU:2025-04187" title="BDU:2025-04187" />
			<reference href="https://bdu.fstec.ru/vul/2024-10601" type="self" id="BDU:2024-10601" title="BDU:2024-10601" />
			<reference href="https://bdu.fstec.ru/vul/2025-04186" type="self" id="BDU:2025-04186" title="BDU:2025-04186" />
			<reference href="https://bdu.fstec.ru/vul/2025-04185" type="self" id="BDU:2025-04185" title="BDU:2025-04185" />
			<reference href="https://bdu.fstec.ru/vul/2025-04184" type="self" id="BDU:2025-04184" title="BDU:2025-04184" />
			<reference href="https://bdu.fstec.ru/vul/2025-04181" type="self" id="BDU:2025-04181" title="BDU:2025-04181" />
			<reference href="https://bdu.fstec.ru/vul/2025-03916" type="self" id="BDU:2025-03916" title="BDU:2025-03916" />
			<reference href="https://bdu.fstec.ru/vul/2025-03921" type="self" id="BDU:2025-03921" title="BDU:2025-03921" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250114-01</id>
		<issued date="2025-01-14" />
		<updated date="2025-01-14" />
		<title>Множественные уязвимости python3-aiohttp </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-aiohttp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-aiohttp-cve-2024-27306-cve-2024-42367-cve-2024-30251-cve-2024-523/</description>
               <solution>
                    Запретить использование в ОС пакета python3-aiohttp
                или
                    Установить обновление для пакета(ов) python3-aiohttp
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-aiohttp-cve-2024-27306-cve-2024-42367-cve-2024-30251-cve-2024-523/" type="self" id="ROS-20250114-01" title="ROS-20250114-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27306" type="cve" id="CVE-2024-27306" title="CVE-2024-27306" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42367" type="cve" id="CVE-2024-42367" title="CVE-2024-42367" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30251" type="cve" id="CVE-2024-30251" title="CVE-2024-30251" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52304" type="cve" id="CVE-2024-52304" title="CVE-2024-52304" />
			<reference href="https://bdu.fstec.ru/vul/2025-03458" type="self" id="BDU:2025-03458" title="BDU:2025-03458" />
			<reference href="https://bdu.fstec.ru/vul/2025-03462" type="self" id="BDU:2025-03462" title="BDU:2025-03462" />
			<reference href="https://bdu.fstec.ru/vul/2024-04194" type="self" id="BDU:2024-04194" title="BDU:2024-04194" />
			<reference href="https://bdu.fstec.ru/vul/2024-10292" type="self" id="BDU:2024-10292" title="BDU:2024-10292" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-aiohttp" epoch="0" version="3.10.11" release="1.el7" arch="x86_64" src="">
					<filename>python3-aiohttp-0:3.10.11-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250114-02</id>
		<issued date="2025-01-14" />
		<updated date="2025-01-14" />
		<title>Множественные уязвимости libreoffice </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в libreoffice</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libreoffice-cve-2024-7788-cve-2024-5261/</description>
               <solution>
                    Запретить использование в ОС пакета libreoffice
                или
                    Установить обновление для пакета(ов) libreoffice
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libreoffice-cve-2024-7788-cve-2024-5261/" type="self" id="ROS-20250114-02" title="ROS-20250114-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7788" type="cve" id="CVE-2024-7788" title="CVE-2024-7788" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5261" type="cve" id="CVE-2024-5261" title="CVE-2024-5261" />
			<reference href="https://bdu.fstec.ru/vul/2024-07260" type="self" id="BDU:2024-07260" title="BDU:2024-07260" />
			<reference href="https://bdu.fstec.ru/vul/2024-04913" type="self" id="BDU:2024-04913" title="BDU:2024-04913" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libreoffice" epoch="1" version="7.6.7.2" release="4.el7" arch="x86_64" src="">
					<filename>libreoffice-1:7.6.7.2-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250114-03</id>
		<issued date="2025-01-14" />
		<updated date="2025-01-14" />
		<title>Уязвимость 389-ds-base </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в 389-ds-base</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-389-ds-base-cve-2024-5953/</description>
               <solution>
                    Запретить использование в ОС пакета 389-ds-base
                или
                    Установить обновление для пакета(ов) 389-ds-base
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-389-ds-base-cve-2024-5953/" type="self" id="ROS-20250114-03" title="ROS-20250114-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5953" type="cve" id="CVE-2024-5953" title="CVE-2024-5953" />
			<reference href="https://bdu.fstec.ru/vul/2025-03459" type="self" id="BDU:2025-03459" title="BDU:2025-03459" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="389-ds-base" epoch="0" version="2.4.5" release="3.el7" arch="x86_64" src="">
					<filename>389-ds-base-0:2.4.5-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250114-04</id>
		<issued date="2025-01-14" />
		<updated date="2025-01-14" />
		<title>Множественные уязвимости firefox </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-cve-2024-9392-cve-2024-9394-cve-2024-9393-cve-2024-9401/</description>
               <solution>
                    Запретить использование в ОС пакета Firefox
                или
                    Установить обновление для пакета(ов) Firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-cve-2024-9392-cve-2024-9394-cve-2024-9393-cve-2024-9401/" type="self" id="ROS-20250114-04" title="ROS-20250114-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9392" type="cve" id="CVE-2024-9392" title="CVE-2024-9392" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9394" type="cve" id="CVE-2024-9394" title="CVE-2024-9394" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9393" type="cve" id="CVE-2024-9393" title="CVE-2024-9393" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9401" type="cve" id="CVE-2024-9401" title="CVE-2024-9401" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.18.0" release="1.el7" arch="x86_64" src="">
					<filename>firefox-0:115.18.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250114-05</id>
		<issued date="2025-01-14" />
		<updated date="2025-01-14" />
		<title>Множественные уязвимости java-1.8.0-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в java-1.8.0-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-1-8-0-openjdk-cve-2024-21235-cve-2024-21210-cve-2024-21217-cve-2024-/</description>
               <solution>
                    Запретить использование в ОС пакета java-1.8.0-openjdk
                или
                    Установить обновление для пакета(ов) java-1.8.0-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-1-8-0-openjdk-cve-2024-21235-cve-2024-21210-cve-2024-21217-cve-2024-/" type="self" id="ROS-20250114-05" title="ROS-20250114-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21235" type="cve" id="CVE-2024-21235" title="CVE-2024-21235" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21210" type="cve" id="CVE-2024-21210" title="CVE-2024-21210" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21217" type="cve" id="CVE-2024-21217" title="CVE-2024-21217" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21208" type="cve" id="CVE-2024-21208" title="CVE-2024-21208" />
			<reference href="https://bdu.fstec.ru/vul/2024-08451" type="self" id="BDU:2024-08451" title="BDU:2024-08451" />
			<reference href="https://bdu.fstec.ru/vul/2024-11498" type="self" id="BDU:2024-11498" title="BDU:2024-11498" />
			<reference href="https://bdu.fstec.ru/vul/2024-08450" type="self" id="BDU:2024-08450" title="BDU:2024-08450" />
			<reference href="https://bdu.fstec.ru/vul/2024-11501" type="self" id="BDU:2024-11501" title="BDU:2024-11501" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-1.8.0-openjdk" epoch="1" version="1.8.0.422.b06" release="3.el7" arch="x86_64" src="">
					<filename>java-1.8.0-openjdk-1:1.8.0.422.b06-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250114-06</id>
		<issued date="2025-01-14" />
		<updated date="2025-01-14" />
		<title>Множественные уязвимости java-11-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в java-11-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-11-openjdk-cve-2024-21235-cve-2024-21210-cve-2024-21217-cve-2024-828/</description>
               <solution>
                    Запретить использование в ОС пакета java-11-openjdk
                или
                    Установить обновление для пакета(ов) java-11-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-11-openjdk-cve-2024-21235-cve-2024-21210-cve-2024-21217-cve-2024-828/" type="self" id="ROS-20250114-06" title="ROS-20250114-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21235" type="cve" id="CVE-2024-21235" title="CVE-2024-21235" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21210" type="cve" id="CVE-2024-21210" title="CVE-2024-21210" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21217" type="cve" id="CVE-2024-21217" title="CVE-2024-21217" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21208" type="cve" id="CVE-2024-21208" title="CVE-2024-21208" />
			<reference href="https://bdu.fstec.ru/vul/2024-08451" type="self" id="BDU:2024-08451" title="BDU:2024-08451" />
			<reference href="https://bdu.fstec.ru/vul/2024-11498" type="self" id="BDU:2024-11498" title="BDU:2024-11498" />
			<reference href="https://bdu.fstec.ru/vul/2024-08450" type="self" id="BDU:2024-08450" title="BDU:2024-08450" />
			<reference href="https://bdu.fstec.ru/vul/2024-11501" type="self" id="BDU:2024-11501" title="BDU:2024-11501" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-11-openjdk" epoch="1" version="11.0.25.0.9" release="1.el7" arch="x86_64" src="">
					<filename>java-11-openjdk-1:11.0.25.0.9-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250114-07</id>
		<issued date="2025-01-14" />
		<updated date="2025-01-14" />
		<title>Множественные уязвимости java-17-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в java-17-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-17-openjdk-cve-2024-21235-cve-2024-21210-cve-2024-21217-cve-2024-8282301/</description>
               <solution>
                    Запретить использование в ОС пакета java-17-openjdk
                или
                    Установить обновление для пакета(ов) java-17-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-17-openjdk-cve-2024-21235-cve-2024-21210-cve-2024-21217-cve-2024-8282301/" type="self" id="ROS-20250114-07" title="ROS-20250114-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21235" type="cve" id="CVE-2024-21235" title="CVE-2024-21235" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21210" type="cve" id="CVE-2024-21210" title="CVE-2024-21210" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21217" type="cve" id="CVE-2024-21217" title="CVE-2024-21217" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21208" type="cve" id="CVE-2024-21208" title="CVE-2024-21208" />
			<reference href="https://bdu.fstec.ru/vul/2024-08451" type="self" id="BDU:2024-08451" title="BDU:2024-08451" />
			<reference href="https://bdu.fstec.ru/vul/2024-11498" type="self" id="BDU:2024-11498" title="BDU:2024-11498" />
			<reference href="https://bdu.fstec.ru/vul/2024-08450" type="self" id="BDU:2024-08450" title="BDU:2024-08450" />
			<reference href="https://bdu.fstec.ru/vul/2024-11501" type="self" id="BDU:2024-11501" title="BDU:2024-11501" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-17-openjdk" epoch="1" version="17.0.13.0.11" release="1.el7" arch="x86_64" src="">
					<filename>java-17-openjdk-1:17.0.13.0.11-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250114-08</id>
		<issued date="2025-01-14" />
		<updated date="2025-01-14" />
		<title>Множественные уязвимости java-21-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в java-21-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-21-openjdk-cve-2024-21235-cve-2024-21210-cve-2024-21217-cve-2024-8282301716/</description>
               <solution>
                    Запретить использование в ОС пакета java-21-openjdk
                или
                    Установить обновление для пакета(ов) java-21-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-21-openjdk-cve-2024-21235-cve-2024-21210-cve-2024-21217-cve-2024-8282301716/" type="self" id="ROS-20250114-08" title="ROS-20250114-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21235" type="cve" id="CVE-2024-21235" title="CVE-2024-21235" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21210" type="cve" id="CVE-2024-21210" title="CVE-2024-21210" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21217" type="cve" id="CVE-2024-21217" title="CVE-2024-21217" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21208" type="cve" id="CVE-2024-21208" title="CVE-2024-21208" />
			<reference href="https://bdu.fstec.ru/vul/2024-08451" type="self" id="BDU:2024-08451" title="BDU:2024-08451" />
			<reference href="https://bdu.fstec.ru/vul/2024-11498" type="self" id="BDU:2024-11498" title="BDU:2024-11498" />
			<reference href="https://bdu.fstec.ru/vul/2024-08450" type="self" id="BDU:2024-08450" title="BDU:2024-08450" />
			<reference href="https://bdu.fstec.ru/vul/2024-11501" type="self" id="BDU:2024-11501" title="BDU:2024-11501" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-21-openjdk" epoch="1" version="21.0.5.0.11" release="1.el7" arch="x86_64" src="">
					<filename>java-21-openjdk-1:21.0.5.0.11-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250114-09</id>
		<issued date="2025-01-14" />
		<updated date="2025-01-14" />
		<title>Множественные уязвимости firefox </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-cve-2024-11694-cve-2024-9680/</description>
               <solution>
                    Запретить использование в ОС пакета Firefox
                или
                    Установить обновление для пакета(ов) Firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-cve-2024-11694-cve-2024-9680/" type="self" id="ROS-20250114-09" title="ROS-20250114-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11694" type="cve" id="CVE-2024-11694" title="CVE-2024-11694" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9680" type="cve" id="CVE-2024-9680" title="CVE-2024-9680" />
			<reference href="https://bdu.fstec.ru/vul/2024-07929" type="self" id="BDU:2024-07929" title="BDU:2024-07929" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.18.0" release="1.el7" arch="x86_64" src="">
					<filename>firefox-0:115.18.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250114-10</id>
		<issued date="2025-01-14" />
		<updated date="2025-01-14" />
		<title>Множественные уязвимости thunderbird </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-cve-2024-11694-cve-2024-96806542/</description>
               <solution>
                    Запретить использование в ОС пакета thunderbird
                или
                    Установить обновление для пакета(ов) thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-cve-2024-11694-cve-2024-96806542/" type="self" id="ROS-20250114-10" title="ROS-20250114-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11694" type="cve" id="CVE-2024-11694" title="CVE-2024-11694" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9680" type="cve" id="CVE-2024-9680" title="CVE-2024-9680" />
			<reference href="https://bdu.fstec.ru/vul/2024-07929" type="self" id="BDU:2024-07929" title="BDU:2024-07929" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="115.18.0" release="1.el7" arch="x86_64" src="">
					<filename>thunderbird-0:115.18.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250114-11</id>
		<issued date="2025-01-14" />
		<updated date="2025-01-14" />
		<title>Уязвимость python3-virtualenv </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в python3-virtualenv</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-virtualenv-cve-2024-53899/</description>
               <solution>
                    Запретить использование в ОС пакета python3-virtualenv
                или
                    Установить обновление для пакета(ов) python3-virtualenv
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-virtualenv-cve-2024-53899/" type="self" id="ROS-20250114-11" title="ROS-20250114-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53899" type="cve" id="CVE-2024-53899" title="CVE-2024-53899" />
			<reference href="https://bdu.fstec.ru/vul/2024-10842" type="self" id="BDU:2024-10842" title="BDU:2024-10842" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-virtualenv" epoch="0" version="20.26.6" release="1.el7" arch="noarch" src="">
					<filename>python3-virtualenv-0:20.26.6-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250114-12</id>
		<issued date="2025-01-14" />
		<updated date="2025-01-14" />
		<title>Уязвимость 7zip </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в 7zip</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-7zip-cve-2024-11477/</description>
               <solution>
                    Запретить использование в ОС пакета 7zip
                или
                    Установить обновление для пакета(ов) 7zip
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-7zip-cve-2024-11477/" type="self" id="ROS-20250114-12" title="ROS-20250114-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11477" type="cve" id="CVE-2024-11477" title="CVE-2024-11477" />
			<reference href="https://bdu.fstec.ru/vul/2024-10036" type="self" id="BDU:2024-10036" title="BDU:2024-10036" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="7zip" epoch="0" version="24.07" release="1.el7" arch="x86_64" src="">
					<filename>7zip-0:24.07-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250114-13</id>
		<issued date="2025-01-14" />
		<updated date="2025-01-14" />
		<title>Множественные уязвимости redis </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в redis</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-redis-cve-2024-51741-cve-2024-46981/</description>
               <solution>
                    Запретить использование в ОС пакета Redis
                или
                    Установить обновление для пакета(ов) Redis
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-redis-cve-2024-51741-cve-2024-46981/" type="self" id="ROS-20250114-13" title="ROS-20250114-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-51741" type="cve" id="CVE-2024-51741" title="CVE-2024-51741" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46981" type="cve" id="CVE-2024-46981" title="CVE-2024-46981" />
			<reference href="https://bdu.fstec.ru/vul/2025-00214" type="self" id="BDU:2025-00214" title="BDU:2025-00214" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="redis" epoch="0" version="7.2.7" release="1.el7" arch="x86_64" src="">
					<filename>redis-0:7.2.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250114-14</id>
		<issued date="2025-01-14" />
		<updated date="2025-01-14" />
		<title>Множественные уязвимости kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-cve-2024-26771-cve-2024-35247-cve-2024-39276-cve-2024-39467/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-cve-2024-26771-cve-2024-35247-cve-2024-39276-cve-2024-39467/" type="self" id="ROS-20250114-14" title="ROS-20250114-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771" type="cve" id="CVE-2024-26771" title="CVE-2024-26771" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35247" type="cve" id="CVE-2024-35247" title="CVE-2024-35247" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39276" type="cve" id="CVE-2024-39276" title="CVE-2024-39276" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39467" type="cve" id="CVE-2024-39467" title="CVE-2024-39467" />
			<reference href="https://bdu.fstec.ru/vul/2024-09159" type="self" id="BDU:2024-09159" title="BDU:2024-09159" />
			<reference href="https://bdu.fstec.ru/vul/2025-03436" type="self" id="BDU:2025-03436" title="BDU:2025-03436" />
			<reference href="https://bdu.fstec.ru/vul/2025-03407" type="self" id="BDU:2025-03407" title="BDU:2025-03407" />
			<reference href="https://bdu.fstec.ru/vul/2025-03452" type="self" id="BDU:2025-03452" title="BDU:2025-03452" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250114-15</id>
		<issued date="2025-01-14" />
		<updated date="2025-01-14" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-140125/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-140125/" type="self" id="ROS-20250114-15" title="ROS-20250114-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34030" type="cve" id="CVE-2024-34030" title="CVE-2024-34030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38384" type="cve" id="CVE-2024-38384" title="CVE-2024-38384" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38663" type="cve" id="CVE-2024-38663" title="CVE-2024-38663" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38664" type="cve" id="CVE-2024-38664" title="CVE-2024-38664" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38667" type="cve" id="CVE-2024-38667" title="CVE-2024-38667" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39291" type="cve" id="CVE-2024-39291" title="CVE-2024-39291" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37078" type="cve" id="CVE-2024-37078" title="CVE-2024-37078" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38385" type="cve" id="CVE-2024-38385" title="CVE-2024-38385" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39296" type="cve" id="CVE-2024-39296" title="CVE-2024-39296" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39298" type="cve" id="CVE-2024-39298" title="CVE-2024-39298" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39371" type="cve" id="CVE-2024-39371" title="CVE-2024-39371" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39461" type="cve" id="CVE-2024-39461" title="CVE-2024-39461" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39462" type="cve" id="CVE-2024-39462" title="CVE-2024-39462" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39464" type="cve" id="CVE-2024-39464" title="CVE-2024-39464" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39469" type="cve" id="CVE-2024-39469" title="CVE-2024-39469" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39470" type="cve" id="CVE-2024-39470" title="CVE-2024-39470" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39472" type="cve" id="CVE-2024-39472" title="CVE-2024-39472" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39473" type="cve" id="CVE-2024-39473" title="CVE-2024-39473" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39474" type="cve" id="CVE-2024-39474" title="CVE-2024-39474" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39481" type="cve" id="CVE-2024-39481" title="CVE-2024-39481" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39482" type="cve" id="CVE-2024-39482" title="CVE-2024-39482" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40924" type="cve" id="CVE-2024-40924" title="CVE-2024-40924" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40925" type="cve" id="CVE-2024-40925" title="CVE-2024-40925" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40927" type="cve" id="CVE-2024-40927" title="CVE-2024-40927" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40928" type="cve" id="CVE-2024-40928" title="CVE-2024-40928" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40929" type="cve" id="CVE-2024-40929" title="CVE-2024-40929" />
			<reference href="https://bdu.fstec.ru/vul/2024-06894" type="self" id="BDU:2024-06894" title="BDU:2024-06894" />
			<reference href="https://bdu.fstec.ru/vul/2025-03408" type="self" id="BDU:2025-03408" title="BDU:2025-03408" />
			<reference href="https://bdu.fstec.ru/vul/2024-06049" type="self" id="BDU:2024-06049" title="BDU:2024-06049" />
			<reference href="https://bdu.fstec.ru/vul/2024-06050" type="self" id="BDU:2024-06050" title="BDU:2024-06050" />
			<reference href="https://bdu.fstec.ru/vul/2024-06052" type="self" id="BDU:2024-06052" title="BDU:2024-06052" />
			<reference href="https://bdu.fstec.ru/vul/2024-06059" type="self" id="BDU:2024-06059" title="BDU:2024-06059" />
			<reference href="https://bdu.fstec.ru/vul/2025-03434" type="self" id="BDU:2025-03434" title="BDU:2025-03434" />
			<reference href="https://bdu.fstec.ru/vul/2025-03450" type="self" id="BDU:2025-03450" title="BDU:2025-03450" />
			<reference href="https://bdu.fstec.ru/vul/2024-10596" type="self" id="BDU:2024-10596" title="BDU:2024-10596" />
			<reference href="https://bdu.fstec.ru/vul/2025-03451" type="self" id="BDU:2025-03451" title="BDU:2025-03451" />
			<reference href="https://bdu.fstec.ru/vul/2025-03435" type="self" id="BDU:2025-03435" title="BDU:2025-03435" />
			<reference href="https://bdu.fstec.ru/vul/2024-06061" type="self" id="BDU:2024-06061" title="BDU:2024-06061" />
			<reference href="https://bdu.fstec.ru/vul/2024-06064" type="self" id="BDU:2024-06064" title="BDU:2024-06064" />
			<reference href="https://bdu.fstec.ru/vul/2024-06065" type="self" id="BDU:2024-06065" title="BDU:2024-06065" />
			<reference href="https://bdu.fstec.ru/vul/2024-06066" type="self" id="BDU:2024-06066" title="BDU:2024-06066" />
			<reference href="https://bdu.fstec.ru/vul/2024-06083" type="self" id="BDU:2024-06083" title="BDU:2024-06083" />
			<reference href="https://bdu.fstec.ru/vul/2024-11669" type="self" id="BDU:2024-11669" title="BDU:2024-11669" />
			<reference href="https://bdu.fstec.ru/vul/2025-03404" type="self" id="BDU:2025-03404" title="BDU:2025-03404" />
			<reference href="https://bdu.fstec.ru/vul/2025-03405" type="self" id="BDU:2025-03405" title="BDU:2025-03405" />
			<reference href="https://bdu.fstec.ru/vul/2025-03406" type="self" id="BDU:2025-03406" title="BDU:2025-03406" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250115-01</id>
		<issued date="2025-01-15" />
		<updated date="2025-01-15" />
		<title>Множественные уязвимости firefox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-cve-2024-10459-cve-2024-10458/</description>
               <solution>
                    Запретить использование в ОС пакета firefox
                или
                    Установить обновление для пакета(ов) firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-cve-2024-10459-cve-2024-10458/" type="self" id="ROS-20250115-01" title="ROS-20250115-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10459" type="cve" id="CVE-2024-10459" title="CVE-2024-10459" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10458" type="cve" id="CVE-2024-10458" title="CVE-2024-10458" />
			<reference href="https://bdu.fstec.ru/vul/2024-08952" type="self" id="BDU:2024-08952" title="BDU:2024-08952" />
			<reference href="https://bdu.fstec.ru/vul/2024-08951" type="self" id="BDU:2024-08951" title="BDU:2024-08951" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.18.0" release="1.el7" arch="x86_64" src="">
					<filename>firefox-0:115.18.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250115-02</id>
		<issued date="2025-01-15" />
		<updated date="2025-01-15" />
		<title>Множественные уязвимости thunderbird </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-cve-2024-10459-cve-2024-10458651/</description>
               <solution>
                    Запретить использование в ОС пакета thunderbird
                или
                    Установить обновление для пакета(ов) thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-cve-2024-10459-cve-2024-10458651/" type="self" id="ROS-20250115-02" title="ROS-20250115-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10459" type="cve" id="CVE-2024-10459" title="CVE-2024-10459" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10458" type="cve" id="CVE-2024-10458" title="CVE-2024-10458" />
			<reference href="https://bdu.fstec.ru/vul/2024-08952" type="self" id="BDU:2024-08952" title="BDU:2024-08952" />
			<reference href="https://bdu.fstec.ru/vul/2024-08951" type="self" id="BDU:2024-08951" title="BDU:2024-08951" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="115.18.0" release="1.el7" arch="x86_64" src="">
					<filename>thunderbird-0:115.18.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250115-03</id>
		<issued date="2025-01-15" />
		<updated date="2025-01-15" />
		<title>Множественные уязвимости PHP 8.1 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в php</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-8-1-cve-2024-8932-cve-2024-11234-cve-2024-8929-cve-2024-11236-cve-202/</description>
               <solution>
                    Запретить использование в ОС пакета php
                или
                    Установить обновление для пакета(ов) php.  Установка и обновление пакетов PHP до версии 8.Х на РЕД ОС производится по инструкции:
                         https://redos.red-soft.ru/base/arm/arm-other/php-8-redos-73/
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-8-1-cve-2024-8932-cve-2024-11234-cve-2024-8929-cve-2024-11236-cve-202/" type="self" id="ROS-20250115-03" title="ROS-20250115-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8932" type="cve" id="CVE-2024-8932" title="CVE-2024-8932" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11234" type="cve" id="CVE-2024-11234" title="CVE-2024-11234" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8929" type="cve" id="CVE-2024-8929" title="CVE-2024-8929" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11236" type="cve" id="CVE-2024-11236" title="CVE-2024-11236" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11233" type="cve" id="CVE-2024-11233" title="CVE-2024-11233" />
			<reference href="https://bdu.fstec.ru/vul/2024-10571" type="self" id="BDU:2024-10571" title="BDU:2024-10571" />
			<reference href="https://bdu.fstec.ru/vul/2024-10555" type="self" id="BDU:2024-10555" title="BDU:2024-10555" />
			<reference href="https://bdu.fstec.ru/vul/2024-10563" type="self" id="BDU:2024-10563" title="BDU:2024-10563" />
			<reference href="https://bdu.fstec.ru/vul/2024-09951" type="self" id="BDU:2024-09951" title="BDU:2024-09951" />
			<reference href="https://bdu.fstec.ru/vul/2024-10540" type="self" id="BDU:2024-10540" title="BDU:2024-10540" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php" epoch="0" version="8.1.31" release="1.el7" arch="x86_64" src="">
					<filename>php-0:8.1.31-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250115-04</id>
		<issued date="2025-01-15" />
		<updated date="2025-01-15" />
		<title>Множественные уязвимости PHP 8.2 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в php</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-8-2-cve-2024-8932-cve-2024-11234-cve-2024-8929-cve-2024-11236-cve-2026823/</description>
               <solution>
                    Запретить использование в ОС пакета php
                или
                    Установить обновление для пакета(ов) php.  Установка и обновление пакетов PHP до версии 8.Х на РЕД ОС производится по инструкции:
                         https://redos.red-soft.ru/base/arm/arm-other/php-8-redos-73/
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-8-2-cve-2024-8932-cve-2024-11234-cve-2024-8929-cve-2024-11236-cve-2026823/" type="self" id="ROS-20250115-04" title="ROS-20250115-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8932" type="cve" id="CVE-2024-8932" title="CVE-2024-8932" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11234" type="cve" id="CVE-2024-11234" title="CVE-2024-11234" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8929" type="cve" id="CVE-2024-8929" title="CVE-2024-8929" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11236" type="cve" id="CVE-2024-11236" title="CVE-2024-11236" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11233" type="cve" id="CVE-2024-11233" title="CVE-2024-11233" />
			<reference href="https://bdu.fstec.ru/vul/2024-10571" type="self" id="BDU:2024-10571" title="BDU:2024-10571" />
			<reference href="https://bdu.fstec.ru/vul/2024-10555" type="self" id="BDU:2024-10555" title="BDU:2024-10555" />
			<reference href="https://bdu.fstec.ru/vul/2024-10563" type="self" id="BDU:2024-10563" title="BDU:2024-10563" />
			<reference href="https://bdu.fstec.ru/vul/2024-09951" type="self" id="BDU:2024-09951" title="BDU:2024-09951" />
			<reference href="https://bdu.fstec.ru/vul/2024-10540" type="self" id="BDU:2024-10540" title="BDU:2024-10540" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php" epoch="0" version="8.2.26" release="1.el7" arch="x86_64" src="">
					<filename>php-0:8.2.26-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250115-05</id>
		<issued date="2025-01-15" />
		<updated date="2025-01-15" />
		<title>Множественные уязвимости PHP 8.3 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в php</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-8-3-cve-2024-8932-cve-2024-11234-cve-2024-8929-cve-2024-11236-cve-20268233048/</description>
               <solution>
                    Запретить использование в ОС пакета php
                или
                    Установить обновление для пакета(ов) php.  Установка и обновление пакетов PHP до версии 8.Х на РЕД ОС производится по инструкции:
                         https://redos.red-soft.ru/base/arm/arm-other/php-8-redos-73/
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-8-3-cve-2024-8932-cve-2024-11234-cve-2024-8929-cve-2024-11236-cve-20268233048/" type="self" id="ROS-20250115-05" title="ROS-20250115-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8932" type="cve" id="CVE-2024-8932" title="CVE-2024-8932" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11234" type="cve" id="CVE-2024-11234" title="CVE-2024-11234" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8929" type="cve" id="CVE-2024-8929" title="CVE-2024-8929" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11236" type="cve" id="CVE-2024-11236" title="CVE-2024-11236" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11233" type="cve" id="CVE-2024-11233" title="CVE-2024-11233" />
			<reference href="https://bdu.fstec.ru/vul/2024-10571" type="self" id="BDU:2024-10571" title="BDU:2024-10571" />
			<reference href="https://bdu.fstec.ru/vul/2024-10555" type="self" id="BDU:2024-10555" title="BDU:2024-10555" />
			<reference href="https://bdu.fstec.ru/vul/2024-10563" type="self" id="BDU:2024-10563" title="BDU:2024-10563" />
			<reference href="https://bdu.fstec.ru/vul/2024-09951" type="self" id="BDU:2024-09951" title="BDU:2024-09951" />
			<reference href="https://bdu.fstec.ru/vul/2024-10540" type="self" id="BDU:2024-10540" title="BDU:2024-10540" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php" epoch="0" version="8.3.15" release="1.el7" arch="x86_64" src="">
					<filename>php-0:8.3.15-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250115-06</id>
		<issued date="2025-01-15" />
		<updated date="2025-01-15" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-150125/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-150125/" type="self" id="ROS-20250115-06" title="ROS-20250115-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39468" type="cve" id="CVE-2024-39468" title="CVE-2024-39468" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40931" type="cve" id="CVE-2024-40931" title="CVE-2024-40931" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40932" type="cve" id="CVE-2024-40932" title="CVE-2024-40932" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40934" type="cve" id="CVE-2024-40934" title="CVE-2024-40934" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40935" type="cve" id="CVE-2024-40935" title="CVE-2024-40935" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40936" type="cve" id="CVE-2024-40936" title="CVE-2024-40936" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40937" type="cve" id="CVE-2024-40937" title="CVE-2024-40937" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40939" type="cve" id="CVE-2024-40939" title="CVE-2024-40939" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40940" type="cve" id="CVE-2024-40940" title="CVE-2024-40940" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40941" type="cve" id="CVE-2024-40941" title="CVE-2024-40941" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40942" type="cve" id="CVE-2024-40942" title="CVE-2024-40942" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40943" type="cve" id="CVE-2024-40943" title="CVE-2024-40943" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40944" type="cve" id="CVE-2024-40944" title="CVE-2024-40944" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40947" type="cve" id="CVE-2024-40947" title="CVE-2024-40947" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40948" type="cve" id="CVE-2024-40948" title="CVE-2024-40948" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40951" type="cve" id="CVE-2024-40951" title="CVE-2024-40951" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40952" type="cve" id="CVE-2024-40952" title="CVE-2024-40952" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40954" type="cve" id="CVE-2024-40954" title="CVE-2024-40954" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40955" type="cve" id="CVE-2024-40955" title="CVE-2024-40955" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40956" type="cve" id="CVE-2024-40956" title="CVE-2024-40956" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40957" type="cve" id="CVE-2024-40957" title="CVE-2024-40957" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40958" type="cve" id="CVE-2024-40958" title="CVE-2024-40958" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40959" type="cve" id="CVE-2024-40959" title="CVE-2024-40959" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40960" type="cve" id="CVE-2024-40960" title="CVE-2024-40960" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40961" type="cve" id="CVE-2024-40961" title="CVE-2024-40961" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40962" type="cve" id="CVE-2024-40962" title="CVE-2024-40962" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40963" type="cve" id="CVE-2024-40963" title="CVE-2024-40963" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40964" type="cve" id="CVE-2024-40964" title="CVE-2024-40964" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40967" type="cve" id="CVE-2024-40967" title="CVE-2024-40967" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40968" type="cve" id="CVE-2024-40968" title="CVE-2024-40968" />
			<reference href="https://bdu.fstec.ru/vul/2025-03437" type="self" id="BDU:2025-03437" title="BDU:2025-03437" />
			<reference href="https://bdu.fstec.ru/vul/2025-03397" type="self" id="BDU:2025-03397" title="BDU:2025-03397" />
			<reference href="https://bdu.fstec.ru/vul/2025-03427" type="self" id="BDU:2025-03427" title="BDU:2025-03427" />
			<reference href="https://bdu.fstec.ru/vul/2025-03428" type="self" id="BDU:2025-03428" title="BDU:2025-03428" />
			<reference href="https://bdu.fstec.ru/vul/2025-03398" type="self" id="BDU:2025-03398" title="BDU:2025-03398" />
			<reference href="https://bdu.fstec.ru/vul/2025-03399" type="self" id="BDU:2025-03399" title="BDU:2025-03399" />
			<reference href="https://bdu.fstec.ru/vul/2025-03400" type="self" id="BDU:2025-03400" title="BDU:2025-03400" />
			<reference href="https://bdu.fstec.ru/vul/2025-03401" type="self" id="BDU:2025-03401" title="BDU:2025-03401" />
			<reference href="https://bdu.fstec.ru/vul/2025-03402" type="self" id="BDU:2025-03402" title="BDU:2025-03402" />
			<reference href="https://bdu.fstec.ru/vul/2025-03429" type="self" id="BDU:2025-03429" title="BDU:2025-03429" />
			<reference href="https://bdu.fstec.ru/vul/2025-03430" type="self" id="BDU:2025-03430" title="BDU:2025-03430" />
			<reference href="https://bdu.fstec.ru/vul/2025-03431" type="self" id="BDU:2025-03431" title="BDU:2025-03431" />
			<reference href="https://bdu.fstec.ru/vul/2025-03432" type="self" id="BDU:2025-03432" title="BDU:2025-03432" />
			<reference href="https://bdu.fstec.ru/vul/2025-03403" type="self" id="BDU:2025-03403" title="BDU:2025-03403" />
			<reference href="https://bdu.fstec.ru/vul/2024-08227" type="self" id="BDU:2024-08227" title="BDU:2024-08227" />
			<reference href="https://bdu.fstec.ru/vul/2024-08302" type="self" id="BDU:2024-08302" title="BDU:2024-08302" />
			<reference href="https://bdu.fstec.ru/vul/2024-08304" type="self" id="BDU:2024-08304" title="BDU:2024-08304" />
			<reference href="https://bdu.fstec.ru/vul/2025-03433" type="self" id="BDU:2025-03433" title="BDU:2025-03433" />
			<reference href="https://bdu.fstec.ru/vul/2025-03409" type="self" id="BDU:2025-03409" title="BDU:2025-03409" />
			<reference href="https://bdu.fstec.ru/vul/2025-03438" type="self" id="BDU:2025-03438" title="BDU:2025-03438" />
			<reference href="https://bdu.fstec.ru/vul/2025-03439" type="self" id="BDU:2025-03439" title="BDU:2025-03439" />
			<reference href="https://bdu.fstec.ru/vul/2025-03410" type="self" id="BDU:2025-03410" title="BDU:2025-03410" />
			<reference href="https://bdu.fstec.ru/vul/2025-03411" type="self" id="BDU:2025-03411" title="BDU:2025-03411" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250117-01</id>
		<issued date="2025-01-17" />
		<updated date="2025-01-17" />
		<title>Уязвимость exiv2 </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в exiv2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-exiv2-cve-2021-29623/</description>
               <solution>
                    Запретить использование в ОС пакета exiv2
                или
                    Установить обновление для пакета(ов) exiv2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-exiv2-cve-2021-29623/" type="self" id="ROS-20250117-01" title="ROS-20250117-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29623" type="cve" id="CVE-2021-29623" title="CVE-2021-29623" />
			<reference href="https://bdu.fstec.ru/vul/2023-05479" type="self" id="BDU:2023-05479" title="BDU:2023-05479" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="exiv2" epoch="0" version="0.27.3" release="3.el7" arch="x86_64" src="">
					<filename>exiv2-0:0.27.3-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250117-02</id>
		<issued date="2025-01-17" />
		<updated date="2025-01-17" />
		<title>Множественные уязвимости tigervnc </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tigervnc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-tigervnc-cve-2023-6478-cve-2023-63772613/</description>
               <solution>
                    Запретить использование в ОС пакета tigervnc
                или
                    Установить обновление для пакета(ов) tigervnc
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-tigervnc-cve-2023-6478-cve-2023-63772613/" type="self" id="ROS-20250117-02" title="ROS-20250117-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6478" type="cve" id="CVE-2023-6478" title="CVE-2023-6478" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6377" type="cve" id="CVE-2023-6377" title="CVE-2023-6377" />
			<reference href="https://bdu.fstec.ru/vul/2024-02764" type="self" id="BDU:2024-02764" title="BDU:2024-02764" />
			<reference href="https://bdu.fstec.ru/vul/2024-00457" type="self" id="BDU:2024-00457" title="BDU:2024-00457" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tigervnc" epoch="0" version="1.13.1" release="1.el7" arch="x86_64" src="">
					<filename>tigervnc-0:1.13.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250117-03</id>
		<issued date="2025-01-17" />
		<updated date="2025-01-17" />
		<title>Множественные уязвимости httpd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в httpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-httpd-cve-2024-38477-cve-2024-36387/</description>
               <solution>
                    Запретить использование в ОС пакета httpd
                или
                    Установить обновление для пакета(ов) httpd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-httpd-cve-2024-38477-cve-2024-36387/" type="self" id="ROS-20250117-03" title="ROS-20250117-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38477" type="cve" id="CVE-2024-38477" title="CVE-2024-38477" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36387" type="cve" id="CVE-2024-36387" title="CVE-2024-36387" />
			<reference href="https://bdu.fstec.ru/vul/2024-05195" type="self" id="BDU:2024-05195" title="BDU:2024-05195" />
			<reference href="https://bdu.fstec.ru/vul/2024-05194" type="self" id="BDU:2024-05194" title="BDU:2024-05194" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="httpd" epoch="0" version="2.4.61" release="1.el7" arch="x86_64" src="">
					<filename>httpd-0:2.4.61-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250117-04</id>
		<issued date="2025-01-17" />
		<updated date="2025-01-17" />
		<title>Уязвимость codium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в codium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-codium-cve-2024-43601/</description>
               <solution>
                    Запретить использование в ОС пакета codium
                или
                    Установить обновление для пакета(ов) codium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-codium-cve-2024-43601/" type="self" id="ROS-20250117-04" title="ROS-20250117-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43601" type="cve" id="CVE-2024-43601" title="CVE-2024-43601" />
			<reference href="https://bdu.fstec.ru/vul/2024-08054" type="self" id="BDU:2024-08054" title="BDU:2024-08054" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="codium" epoch="0" version="1.91.1.24193" release="2.el7" arch="x86_64" src="">
					<filename>codium-0:1.91.1.24193-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250117-05</id>
		<issued date="2025-01-17" />
		<updated date="2025-01-17" />
		<title>Уязвимость python3-tornado </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-tornado</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-tornado-cve-2023-28370/</description>
               <solution>
                    Запретить использование в ОС пакета python3-tornado
                или
                    Установить обновление для пакета(ов) python3-tornado
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-tornado-cve-2023-28370/" type="self" id="ROS-20250117-05" title="ROS-20250117-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28370" type="cve" id="CVE-2023-28370" title="CVE-2023-28370" />
			<reference href="https://bdu.fstec.ru/vul/2025-00947" type="self" id="BDU:2025-00947" title="BDU:2025-00947" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-tornado" epoch="0" version="6.3.3" release="1.el7" arch="x86_64" src="">
					<filename>python3-tornado-0:6.3.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250117-06</id>
		<issued date="2025-01-17" />
		<updated date="2025-01-17" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-1701251/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-1701251/" type="self" id="ROS-20250117-06" title="ROS-20250117-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40970" type="cve" id="CVE-2024-40970" title="CVE-2024-40970" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40971" type="cve" id="CVE-2024-40971" title="CVE-2024-40971" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40974" type="cve" id="CVE-2024-40974" title="CVE-2024-40974" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40976" type="cve" id="CVE-2024-40976" title="CVE-2024-40976" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40978" type="cve" id="CVE-2024-40978" title="CVE-2024-40978" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40980" type="cve" id="CVE-2024-40980" title="CVE-2024-40980" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40981" type="cve" id="CVE-2024-40981" title="CVE-2024-40981" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40983" type="cve" id="CVE-2024-40983" title="CVE-2024-40983" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40984" type="cve" id="CVE-2024-40984" title="CVE-2024-40984" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40987" type="cve" id="CVE-2024-40987" title="CVE-2024-40987" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40988" type="cve" id="CVE-2024-40988" title="CVE-2024-40988" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40990" type="cve" id="CVE-2024-40990" title="CVE-2024-40990" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40992" type="cve" id="CVE-2024-40992" title="CVE-2024-40992" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40993" type="cve" id="CVE-2024-40993" title="CVE-2024-40993" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40994" type="cve" id="CVE-2024-40994" title="CVE-2024-40994" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40995" type="cve" id="CVE-2024-40995" title="CVE-2024-40995" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40996" type="cve" id="CVE-2024-40996" title="CVE-2024-40996" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41000" type="cve" id="CVE-2024-41000" title="CVE-2024-41000" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41002" type="cve" id="CVE-2024-41002" title="CVE-2024-41002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41004" type="cve" id="CVE-2024-41004" title="CVE-2024-41004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41005" type="cve" id="CVE-2024-41005" title="CVE-2024-41005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41006" type="cve" id="CVE-2024-41006" title="CVE-2024-41006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41007" type="cve" id="CVE-2024-41007" title="CVE-2024-41007" />
			<reference href="https://bdu.fstec.ru/vul/2025-01046" type="self" id="BDU:2025-01046" title="BDU:2025-01046" />
			<reference href="https://bdu.fstec.ru/vul/2025-01047" type="self" id="BDU:2025-01047" title="BDU:2025-01047" />
			<reference href="https://bdu.fstec.ru/vul/2025-01048" type="self" id="BDU:2025-01048" title="BDU:2025-01048" />
			<reference href="https://bdu.fstec.ru/vul/2025-01049" type="self" id="BDU:2025-01049" title="BDU:2025-01049" />
			<reference href="https://bdu.fstec.ru/vul/2025-01050" type="self" id="BDU:2025-01050" title="BDU:2025-01050" />
			<reference href="https://bdu.fstec.ru/vul/2025-01051" type="self" id="BDU:2025-01051" title="BDU:2025-01051" />
			<reference href="https://bdu.fstec.ru/vul/2025-01052" type="self" id="BDU:2025-01052" title="BDU:2025-01052" />
			<reference href="https://bdu.fstec.ru/vul/2025-01053" type="self" id="BDU:2025-01053" title="BDU:2025-01053" />
			<reference href="https://bdu.fstec.ru/vul/2025-01054" type="self" id="BDU:2025-01054" title="BDU:2025-01054" />
			<reference href="https://bdu.fstec.ru/vul/2025-01055" type="self" id="BDU:2025-01055" title="BDU:2025-01055" />
			<reference href="https://bdu.fstec.ru/vul/2025-01056" type="self" id="BDU:2025-01056" title="BDU:2025-01056" />
			<reference href="https://bdu.fstec.ru/vul/2025-01057" type="self" id="BDU:2025-01057" title="BDU:2025-01057" />
			<reference href="https://bdu.fstec.ru/vul/2025-01058" type="self" id="BDU:2025-01058" title="BDU:2025-01058" />
			<reference href="https://bdu.fstec.ru/vul/2025-01059" type="self" id="BDU:2025-01059" title="BDU:2025-01059" />
			<reference href="https://bdu.fstec.ru/vul/2024-07961" type="self" id="BDU:2024-07961" title="BDU:2024-07961" />
			<reference href="https://bdu.fstec.ru/vul/2025-01060" type="self" id="BDU:2025-01060" title="BDU:2025-01060" />
			<reference href="https://bdu.fstec.ru/vul/2024-08349" type="self" id="BDU:2024-08349" title="BDU:2024-08349" />
			<reference href="https://bdu.fstec.ru/vul/2024-07965" type="self" id="BDU:2024-07965" title="BDU:2024-07965" />
			<reference href="https://bdu.fstec.ru/vul/2025-01061" type="self" id="BDU:2025-01061" title="BDU:2025-01061" />
			<reference href="https://bdu.fstec.ru/vul/2025-01062" type="self" id="BDU:2025-01062" title="BDU:2025-01062" />
			<reference href="https://bdu.fstec.ru/vul/2024-06069" type="self" id="BDU:2024-06069" title="BDU:2024-06069" />
			<reference href="https://bdu.fstec.ru/vul/2025-01063" type="self" id="BDU:2025-01063" title="BDU:2025-01063" />
			<reference href="https://bdu.fstec.ru/vul/2025-01064" type="self" id="BDU:2025-01064" title="BDU:2025-01064" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250117-07</id>
		<issued date="2025-01-17" />
		<updated date="2025-01-17" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-1701252/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-1701252/" type="self" id="ROS-20250117-07" title="ROS-20250117-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47623" type="cve" id="CVE-2021-47623" title="CVE-2021-47623" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48774" type="cve" id="CVE-2022-48774" title="CVE-2022-48774" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48776" type="cve" id="CVE-2022-48776" title="CVE-2022-48776" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48780" type="cve" id="CVE-2022-48780" title="CVE-2022-48780" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48784" type="cve" id="CVE-2022-48784" title="CVE-2022-48784" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48786" type="cve" id="CVE-2022-48786" title="CVE-2022-48786" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48794" type="cve" id="CVE-2022-48794" title="CVE-2022-48794" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48795" type="cve" id="CVE-2022-48795" title="CVE-2022-48795" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48797" type="cve" id="CVE-2022-48797" title="CVE-2022-48797" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48798" type="cve" id="CVE-2022-48798" title="CVE-2022-48798" />
			<reference href="https://bdu.fstec.ru/vul/2025-01093" type="self" id="BDU:2025-01093" title="BDU:2025-01093" />
			<reference href="https://bdu.fstec.ru/vul/2025-01094" type="self" id="BDU:2025-01094" title="BDU:2025-01094" />
			<reference href="https://bdu.fstec.ru/vul/2025-01038" type="self" id="BDU:2025-01038" title="BDU:2025-01038" />
			<reference href="https://bdu.fstec.ru/vul/2025-01039" type="self" id="BDU:2025-01039" title="BDU:2025-01039" />
			<reference href="https://bdu.fstec.ru/vul/2025-01040" type="self" id="BDU:2025-01040" title="BDU:2025-01040" />
			<reference href="https://bdu.fstec.ru/vul/2025-01041" type="self" id="BDU:2025-01041" title="BDU:2025-01041" />
			<reference href="https://bdu.fstec.ru/vul/2025-01042" type="self" id="BDU:2025-01042" title="BDU:2025-01042" />
			<reference href="https://bdu.fstec.ru/vul/2025-01043" type="self" id="BDU:2025-01043" title="BDU:2025-01043" />
			<reference href="https://bdu.fstec.ru/vul/2025-01044" type="self" id="BDU:2025-01044" title="BDU:2025-01044" />
			<reference href="https://bdu.fstec.ru/vul/2025-01045" type="self" id="BDU:2025-01045" title="BDU:2025-01045" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250120-01</id>
		<issued date="2025-01-20" />
		<updated date="2025-01-20" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2024-10463/</description>
               <solution>
                    Запретить использование в ОС пакета firefox
                или
                    Установить обновление для пакета(ов) firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2024-10463/" type="self" id="ROS-20250120-01" title="ROS-20250120-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10463" type="cve" id="CVE-2024-10463" title="CVE-2024-10463" />
			<reference href="https://bdu.fstec.ru/vul/2025-01014" type="self" id="BDU:2025-01014" title="BDU:2025-01014" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.18.0" release="1.el7" arch="x86_64" src="">
					<filename>firefox-0:115.18.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250120-02</id>
		<issued date="2025-01-20" />
		<updated date="2025-01-20" />
		<title>Уязвимость thunderbird </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-thunderbird-cve-2024-104634376/</description>
               <solution>
                    Запретить использование в ОС пакета thunderbird
                или
                    Установить обновление для пакета(ов) thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-thunderbird-cve-2024-104634376/" type="self" id="ROS-20250120-02" title="ROS-20250120-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10463" type="cve" id="CVE-2024-10463" title="CVE-2024-10463" />
			<reference href="https://bdu.fstec.ru/vul/2025-01014" type="self" id="BDU:2025-01014" title="BDU:2025-01014" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="115.18.0" release="1.el7" arch="x86_64" src="">
					<filename>thunderbird-0:115.18.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250120-03</id>
		<issued date="2025-01-20" />
		<updated date="2025-01-20" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-2001251/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-2001251/" type="self" id="ROS-20250120-03" title="ROS-20250120-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48799" type="cve" id="CVE-2022-48799" title="CVE-2022-48799" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48801" type="cve" id="CVE-2022-48801" title="CVE-2022-48801" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48802" type="cve" id="CVE-2022-48802" title="CVE-2022-48802" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48803" type="cve" id="CVE-2022-48803" title="CVE-2022-48803" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48805" type="cve" id="CVE-2022-48805" title="CVE-2022-48805" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48806" type="cve" id="CVE-2022-48806" title="CVE-2022-48806" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48807" type="cve" id="CVE-2022-48807" title="CVE-2022-48807" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48810" type="cve" id="CVE-2022-48810" title="CVE-2022-48810" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48811" type="cve" id="CVE-2022-48811" title="CVE-2022-48811" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48812" type="cve" id="CVE-2022-48812" title="CVE-2022-48812" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48813" type="cve" id="CVE-2022-48813" title="CVE-2022-48813" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48814" type="cve" id="CVE-2022-48814" title="CVE-2022-48814" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48815" type="cve" id="CVE-2022-48815" title="CVE-2022-48815" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48817" type="cve" id="CVE-2022-48817" title="CVE-2022-48817" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48818" type="cve" id="CVE-2022-48818" title="CVE-2022-48818" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48821" type="cve" id="CVE-2022-48821" title="CVE-2022-48821" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48823" type="cve" id="CVE-2022-48823" title="CVE-2022-48823" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48825" type="cve" id="CVE-2022-48825" title="CVE-2022-48825" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48827" type="cve" id="CVE-2022-48827" title="CVE-2022-48827" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48828" type="cve" id="CVE-2022-48828" title="CVE-2022-48828" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48829" type="cve" id="CVE-2022-48829" title="CVE-2022-48829" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48830" type="cve" id="CVE-2022-48830" title="CVE-2022-48830" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48831" type="cve" id="CVE-2022-48831" title="CVE-2022-48831" />
			<reference href="https://bdu.fstec.ru/vul/2025-01065" type="self" id="BDU:2025-01065" title="BDU:2025-01065" />
			<reference href="https://bdu.fstec.ru/vul/2025-01066" type="self" id="BDU:2025-01066" title="BDU:2025-01066" />
			<reference href="https://bdu.fstec.ru/vul/2025-01067" type="self" id="BDU:2025-01067" title="BDU:2025-01067" />
			<reference href="https://bdu.fstec.ru/vul/2025-01068" type="self" id="BDU:2025-01068" title="BDU:2025-01068" />
			<reference href="https://bdu.fstec.ru/vul/2025-01070" type="self" id="BDU:2025-01070" title="BDU:2025-01070" />
			<reference href="https://bdu.fstec.ru/vul/2025-01071" type="self" id="BDU:2025-01071" title="BDU:2025-01071" />
			<reference href="https://bdu.fstec.ru/vul/2025-01072" type="self" id="BDU:2025-01072" title="BDU:2025-01072" />
			<reference href="https://bdu.fstec.ru/vul/2025-01073" type="self" id="BDU:2025-01073" title="BDU:2025-01073" />
			<reference href="https://bdu.fstec.ru/vul/2025-01074" type="self" id="BDU:2025-01074" title="BDU:2025-01074" />
			<reference href="https://bdu.fstec.ru/vul/2025-01077" type="self" id="BDU:2025-01077" title="BDU:2025-01077" />
			<reference href="https://bdu.fstec.ru/vul/2025-01078" type="self" id="BDU:2025-01078" title="BDU:2025-01078" />
			<reference href="https://bdu.fstec.ru/vul/2025-01079" type="self" id="BDU:2025-01079" title="BDU:2025-01079" />
			<reference href="https://bdu.fstec.ru/vul/2025-01080" type="self" id="BDU:2025-01080" title="BDU:2025-01080" />
			<reference href="https://bdu.fstec.ru/vul/2025-01081" type="self" id="BDU:2025-01081" title="BDU:2025-01081" />
			<reference href="https://bdu.fstec.ru/vul/2025-01075" type="self" id="BDU:2025-01075" title="BDU:2025-01075" />
			<reference href="https://bdu.fstec.ru/vul/2025-01076" type="self" id="BDU:2025-01076" title="BDU:2025-01076" />
			<reference href="https://bdu.fstec.ru/vul/2025-01082" type="self" id="BDU:2025-01082" title="BDU:2025-01082" />
			<reference href="https://bdu.fstec.ru/vul/2025-01083" type="self" id="BDU:2025-01083" title="BDU:2025-01083" />
			<reference href="https://bdu.fstec.ru/vul/2025-01084" type="self" id="BDU:2025-01084" title="BDU:2025-01084" />
			<reference href="https://bdu.fstec.ru/vul/2025-01085" type="self" id="BDU:2025-01085" title="BDU:2025-01085" />
			<reference href="https://bdu.fstec.ru/vul/2025-01086" type="self" id="BDU:2025-01086" title="BDU:2025-01086" />
			<reference href="https://bdu.fstec.ru/vul/2025-01087" type="self" id="BDU:2025-01087" title="BDU:2025-01087" />
			<reference href="https://bdu.fstec.ru/vul/2025-01088" type="self" id="BDU:2025-01088" title="BDU:2025-01088" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250120-04</id>
		<issued date="2025-01-20" />
		<updated date="2025-01-20" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-2001252/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-2001252/" type="self" id="ROS-20250120-04" title="ROS-20250120-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41009" type="cve" id="CVE-2024-41009" title="CVE-2024-41009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41010" type="cve" id="CVE-2024-41010" title="CVE-2024-41010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41011" type="cve" id="CVE-2024-41011" title="CVE-2024-41011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41012" type="cve" id="CVE-2024-41012" title="CVE-2024-41012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41015" type="cve" id="CVE-2024-41015" title="CVE-2024-41015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41017" type="cve" id="CVE-2024-41017" title="CVE-2024-41017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41018" type="cve" id="CVE-2024-41018" title="CVE-2024-41018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41019" type="cve" id="CVE-2024-41019" title="CVE-2024-41019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41020" type="cve" id="CVE-2024-41020" title="CVE-2024-41020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41021" type="cve" id="CVE-2024-41021" title="CVE-2024-41021" />
			<reference href="https://bdu.fstec.ru/vul/2025-00022" type="self" id="BDU:2025-00022" title="BDU:2025-00022" />
			<reference href="https://bdu.fstec.ru/vul/2025-01090" type="self" id="BDU:2025-01090" title="BDU:2025-01090" />
			<reference href="https://bdu.fstec.ru/vul/2024-07484" type="self" id="BDU:2024-07484" title="BDU:2024-07484" />
			<reference href="https://bdu.fstec.ru/vul/2024-07483" type="self" id="BDU:2024-07483" title="BDU:2024-07483" />
			<reference href="https://bdu.fstec.ru/vul/2025-01091" type="self" id="BDU:2025-01091" title="BDU:2025-01091" />
			<reference href="https://bdu.fstec.ru/vul/2024-08305" type="self" id="BDU:2024-08305" title="BDU:2024-08305" />
			<reference href="https://bdu.fstec.ru/vul/2024-08318" type="self" id="BDU:2024-08318" title="BDU:2024-08318" />
			<reference href="https://bdu.fstec.ru/vul/2024-08310" type="self" id="BDU:2024-08310" title="BDU:2024-08310" />
			<reference href="https://bdu.fstec.ru/vul/2024-08312" type="self" id="BDU:2024-08312" title="BDU:2024-08312" />
			<reference href="https://bdu.fstec.ru/vul/2025-01092" type="self" id="BDU:2025-01092" title="BDU:2025-01092" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250121-01</id>
		<issued date="2025-01-21" />
		<updated date="2025-01-21" />
		<title>Уязвимость python3-sqlparse </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-sqlparse</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-sqlparse-cve-2024-4340/</description>
               <solution>
                    Запретить использование в ОС пакета python3-sqlparse
                или
                    Установить обновление для пакета(ов) python3-sqlparse
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-sqlparse-cve-2024-4340/" type="self" id="ROS-20250121-01" title="ROS-20250121-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4340" type="cve" id="CVE-2024-4340" title="CVE-2024-4340" />
			<reference href="https://bdu.fstec.ru/vul/2025-01019" type="self" id="BDU:2025-01019" title="BDU:2025-01019" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-sqlparse" epoch="0" version="0.5.0" release="1.el7" arch="noarch" src="">
					<filename>python3-sqlparse-0:0.5.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250121-02</id>
		<issued date="2025-01-21" />
		<updated date="2025-01-21" />
		<title>Уязвимость koji </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в koji</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-koji-cve-2024-9427/</description>
               <solution>
                    Запретить использование в ОС пакета koji
                или
                    Установить обновление для пакета(ов) koji
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-koji-cve-2024-9427/" type="self" id="ROS-20250121-02" title="ROS-20250121-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9427" type="cve" id="CVE-2024-9427" title="CVE-2024-9427" />
			<reference href="https://bdu.fstec.ru/vul/2025-01015" type="self" id="BDU:2025-01015" title="BDU:2025-01015" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="koji" epoch="0" version="1.25.1" release="2.el7" arch="noarch" src="">
					<filename>koji-0:1.25.1-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250121-03</id>
		<issued date="2025-01-21" />
		<updated date="2025-01-21" />
		<title>Уязвимость rubygem-actionpack </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в rubygem-actionpack</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-actionpack-cve-2024-54133/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-actionpack
                или
                    Установить обновление для пакета(ов) rubygem-actionpack
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-actionpack-cve-2024-54133/" type="self" id="ROS-20250121-03" title="ROS-20250121-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54133" type="cve" id="CVE-2024-54133" title="CVE-2024-54133" />
			<reference href="https://bdu.fstec.ru/vul/2025-00917" type="self" id="BDU:2025-00917" title="BDU:2025-00917" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-actionpack" epoch="2" version="6.1.6.1" release="6.el7" arch="noarch" src="">
					<filename>rubygem-actionpack-2:6.1.6.1-6.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250121-04</id>
		<issued date="2025-01-21" />
		<updated date="2025-01-21" />
		<title>Уязвимость frr </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в frr</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-frr-cve-2024-55553/</description>
               <solution>
                    Запретить использование в ОС пакета FRR
                или
                    Установить обновление для пакета(ов) FRR
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-frr-cve-2024-55553/" type="self" id="ROS-20250121-04" title="ROS-20250121-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-55553" type="cve" id="CVE-2024-55553" title="CVE-2024-55553" />
			<reference href="https://bdu.fstec.ru/vul/2025-01022" type="self" id="BDU:2025-01022" title="BDU:2025-01022" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="frr" epoch="0" version="10.1.2" release="1.el7" arch="x86_64" src="">
					<filename>frr-0:10.1.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250121-05</id>
		<issued date="2025-01-21" />
		<updated date="2025-01-21" />
		<title>Уязвимость proftpd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в proftpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-proftpd-cve-2024-48651/</description>
               <solution>
                    Запретить использование в ОС пакета proftpd
                или
                    Установить обновление для пакета(ов) proftpd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-proftpd-cve-2024-48651/" type="self" id="ROS-20250121-05" title="ROS-20250121-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48651" type="cve" id="CVE-2024-48651" title="CVE-2024-48651" />
			<reference href="https://bdu.fstec.ru/vul/2024-10638" type="self" id="BDU:2024-10638" title="BDU:2024-10638" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="proftpd" epoch="0" version="1.3.8c" release="1.el7" arch="x86_64" src="">
					<filename>proftpd-0:1.3.8c-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250121-06</id>
		<issued date="2025-01-21" />
		<updated date="2025-01-21" />
		<title>Уязвимость python3-tornado </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-tornado</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-tornado-cve-2024-52804/</description>
               <solution>
                    Запретить использование в ОС пакета python3-tornado
                или
                    Установить обновление для пакета(ов) python3-tornado
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-tornado-cve-2024-52804/" type="self" id="ROS-20250121-06" title="ROS-20250121-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52804" type="cve" id="CVE-2024-52804" title="CVE-2024-52804" />
			<reference href="https://bdu.fstec.ru/vul/2025-00918" type="self" id="BDU:2025-00918" title="BDU:2025-00918" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-tornado" epoch="0" version="6.3.3" release="3.el7" arch="x86_64" src="">
					<filename>python3-tornado-0:6.3.3-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250121-07</id>
		<issued date="2025-01-21" />
		<updated date="2025-03-12" />
		<title>Множественные уязвимости wireshark </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в wireshark</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-wireshark-cve-2024-11596-cve-2024-9781-cve-2024-11595/</description>
               <solution>
                    Запретить использование в ОС пакета Wireshark
                или
                    Установить обновление для пакета(ов) Wireshark
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-wireshark-cve-2024-11596-cve-2024-9781-cve-2024-11595/" type="self" id="ROS-20250121-07" title="ROS-20250121-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11596" type="cve" id="CVE-2024-11596" title="CVE-2024-11596" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9781" type="cve" id="CVE-2024-9781" title="CVE-2024-9781" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11595" type="cve" id="CVE-2024-11595" title="CVE-2024-11595" />
			<reference href="https://bdu.fstec.ru/vul/2025-02193" type="self" id="BDU:2025-02193" title="BDU:2025-02193" />
			<reference href="https://bdu.fstec.ru/vul/2024-09109" type="self" id="BDU:2024-09109" title="BDU:2024-09109" />
			<reference href="https://bdu.fstec.ru/vul/2024-10175" type="self" id="BDU:2024-10175" title="BDU:2024-10175" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="wireshark" epoch="1" version="4.2.10" release="1.el7" arch="x86_64" src="">
					<filename>wireshark-1:4.2.10-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250121-08</id>
		<issued date="2025-01-21" />
		<updated date="2025-01-21" />
		<title>Уязвимость asterisk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в asterisk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-asterisk-cve-2024-42365/</description>
               <solution>
                    Запретить использование в ОС пакета Asterisk
                или
                    Установить обновление для пакета(ов) Asterisk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-asterisk-cve-2024-42365/" type="self" id="ROS-20250121-08" title="ROS-20250121-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42365" type="cve" id="CVE-2024-42365" title="CVE-2024-42365" />
			<reference href="https://bdu.fstec.ru/vul/2025-00920" type="self" id="BDU:2025-00920" title="BDU:2025-00920" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="asterisk" epoch="0" version="18.4.0" release="8.el7" arch="x86_64" src="">
					<filename>asterisk-0:18.4.0-8.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250121-09</id>
		<issued date="2025-01-21" />
		<updated date="2025-01-21" />
		<title>Множественные уязвимости python3-jinja2 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-jinja2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-jinja2-cve-2024-34064-cve-2024-56326-cve-2024-56201/</description>
               <solution>
                    Запретить использование в ОС пакета python3-jinja2
                или
                    Установить обновление для пакета(ов) python3-jinja2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-jinja2-cve-2024-34064-cve-2024-56326-cve-2024-56201/" type="self" id="ROS-20250121-09" title="ROS-20250121-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34064" type="cve" id="CVE-2024-34064" title="CVE-2024-34064" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56326" type="cve" id="CVE-2024-56326" title="CVE-2024-56326" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56201" type="cve" id="CVE-2024-56201" title="CVE-2024-56201" />
			<reference href="https://bdu.fstec.ru/vul/2025-00945" type="self" id="BDU:2025-00945" title="BDU:2025-00945" />
			<reference href="https://bdu.fstec.ru/vul/2025-00113" type="self" id="BDU:2025-00113" title="BDU:2025-00113" />
			<reference href="https://bdu.fstec.ru/vul/2025-00112" type="self" id="BDU:2025-00112" title="BDU:2025-00112" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-jinja2" epoch="0" version="3.1.5" release="1.el7" arch="noarch" src="">
					<filename>python3-jinja2-0:3.1.5-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250121-10</id>
		<issued date="2025-01-21" />
		<updated date="2025-01-21" />
		<title>Уязвимость glpi </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2024-31456/</description>
               <solution>
                    Запретить использование в ОС пакета glpi
                или
                    Установить обновление для пакета(ов) glpi
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2024-31456/" type="self" id="ROS-20250121-10" title="ROS-20250121-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31456" type="cve" id="CVE-2024-31456" title="CVE-2024-31456" />
			<reference href="https://bdu.fstec.ru/vul/2024-04047" type="self" id="BDU:2024-04047" title="BDU:2024-04047" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi" epoch="0" version="10.0.15" release="3.el7" arch="noarch" src="">
					<filename>glpi-0:10.0.15-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250121-11</id>
		<issued date="2025-01-21" />
		<updated date="2025-01-21" />
		<title>Множественные уязвимости qt5</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в qt5</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-qt5/</description>
               <solution>
                    Запретить использование в ОС пакета qt
                или
                    Установить обновление для пакета(ов) qt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-qt5/" type="self" id="ROS-20250121-11" title="ROS-20250121-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28025" type="cve" id="CVE-2021-28025" title="CVE-2021-28025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45930" type="cve" id="CVE-2021-45930" title="CVE-2021-45930" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38593" type="cve" id="CVE-2021-38593" title="CVE-2021-38593" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3481" type="cve" id="CVE-2021-3481" title="CVE-2021-3481" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32762" type="cve" id="CVE-2023-32762" title="CVE-2023-32762" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25580" type="cve" id="CVE-2024-25580" title="CVE-2024-25580" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38197" type="cve" id="CVE-2023-38197" title="CVE-2023-38197" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37369" type="cve" id="CVE-2023-37369" title="CVE-2023-37369" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34410" type="cve" id="CVE-2023-34410" title="CVE-2023-34410" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33285" type="cve" id="CVE-2023-33285" title="CVE-2023-33285" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32763" type="cve" id="CVE-2023-32763" title="CVE-2023-32763" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30161" type="cve" id="CVE-2024-30161" title="CVE-2024-30161" />
			<reference href="https://bdu.fstec.ru/vul/2025-01016" type="self" id="BDU:2025-01016" title="BDU:2025-01016" />
			<reference href="https://bdu.fstec.ru/vul/2024-09033" type="self" id="BDU:2024-09033" title="BDU:2024-09033" />
			<reference href="https://bdu.fstec.ru/vul/2025-00916" type="self" id="BDU:2025-00916" title="BDU:2025-00916" />
			<reference href="https://bdu.fstec.ru/vul/2025-01017" type="self" id="BDU:2025-01017" title="BDU:2025-01017" />
			<reference href="https://bdu.fstec.ru/vul/2023-03803" type="self" id="BDU:2023-03803" title="BDU:2023-03803" />
			<reference href="https://bdu.fstec.ru/vul/2024-02875" type="self" id="BDU:2024-02875" title="BDU:2024-02875" />
			<reference href="https://bdu.fstec.ru/vul/2023-05105" type="self" id="BDU:2023-05105" title="BDU:2023-05105" />
			<reference href="https://bdu.fstec.ru/vul/2023-09121" type="self" id="BDU:2023-09121" title="BDU:2023-09121" />
			<reference href="https://bdu.fstec.ru/vul/2023-03689" type="self" id="BDU:2023-03689" title="BDU:2023-03689" />
			<reference href="https://bdu.fstec.ru/vul/2023-03876" type="self" id="BDU:2023-03876" title="BDU:2023-03876" />
			<reference href="https://bdu.fstec.ru/vul/2023-03802" type="self" id="BDU:2023-03802" title="BDU:2023-03802" />
			<reference href="https://bdu.fstec.ru/vul/2025-01018" type="self" id="BDU:2025-01018" title="BDU:2025-01018" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="qt5" epoch="0" version="5.15.9" release="1.el7" arch="noarch" src="">
					<filename>qt5-0:5.15.9-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250121-12</id>
		<issued date="2025-01-21" />
		<updated date="2025-01-21" />
		<title>Множественные уязвимости gstreamer1-plugins-good</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в gstreamer1-plugins-good</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gstreamer1-plugins-good/</description>
               <solution>
                    Запретить использование в ОС пакета gstreamer1-plugins-good
                или
                    Установить обновление для пакета(ов) gstreamer1-plugins-good
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gstreamer1-plugins-good/" type="self" id="ROS-20250121-12" title="ROS-20250121-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47606" type="cve" id="CVE-2024-47606" title="CVE-2024-47606" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47834" type="cve" id="CVE-2024-47834" title="CVE-2024-47834" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47615" type="cve" id="CVE-2024-47615" title="CVE-2024-47615" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47613" type="cve" id="CVE-2024-47613" title="CVE-2024-47613" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47607" type="cve" id="CVE-2024-47607" title="CVE-2024-47607" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47603" type="cve" id="CVE-2024-47603" title="CVE-2024-47603" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47602" type="cve" id="CVE-2024-47602" title="CVE-2024-47602" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47601" type="cve" id="CVE-2024-47601" title="CVE-2024-47601" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47600" type="cve" id="CVE-2024-47600" title="CVE-2024-47600" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47599" type="cve" id="CVE-2024-47599" title="CVE-2024-47599" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47598" type="cve" id="CVE-2024-47598" title="CVE-2024-47598" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47597" type="cve" id="CVE-2024-47597" title="CVE-2024-47597" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47596" type="cve" id="CVE-2024-47596" title="CVE-2024-47596" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47546" type="cve" id="CVE-2024-47546" title="CVE-2024-47546" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47545" type="cve" id="CVE-2024-47545" title="CVE-2024-47545" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47544" type="cve" id="CVE-2024-47544" title="CVE-2024-47544" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47543" type="cve" id="CVE-2024-47543" title="CVE-2024-47543" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47542" type="cve" id="CVE-2024-47542" title="CVE-2024-47542" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47541" type="cve" id="CVE-2024-47541" title="CVE-2024-47541" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47540" type="cve" id="CVE-2024-47540" title="CVE-2024-47540" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47539" type="cve" id="CVE-2024-47539" title="CVE-2024-47539" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47538" type="cve" id="CVE-2024-47538" title="CVE-2024-47538" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47537" type="cve" id="CVE-2024-47537" title="CVE-2024-47537" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47775" type="cve" id="CVE-2024-47775" title="CVE-2024-47775" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47774" type="cve" id="CVE-2024-47774" title="CVE-2024-47774" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47776" type="cve" id="CVE-2024-47776" title="CVE-2024-47776" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47777" type="cve" id="CVE-2024-47777" title="CVE-2024-47777" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47778" type="cve" id="CVE-2024-47778" title="CVE-2024-47778" />
			<reference href="https://bdu.fstec.ru/vul/2025-00871" type="self" id="BDU:2025-00871" title="BDU:2025-00871" />
			<reference href="https://bdu.fstec.ru/vul/2024-11298" type="self" id="BDU:2024-11298" title="BDU:2024-11298" />
			<reference href="https://bdu.fstec.ru/vul/2024-11337" type="self" id="BDU:2024-11337" title="BDU:2024-11337" />
			<reference href="https://bdu.fstec.ru/vul/2024-11331" type="self" id="BDU:2024-11331" title="BDU:2024-11331" />
			<reference href="https://bdu.fstec.ru/vul/2024-11336" type="self" id="BDU:2024-11336" title="BDU:2024-11336" />
			<reference href="https://bdu.fstec.ru/vul/2024-11290" type="self" id="BDU:2024-11290" title="BDU:2024-11290" />
			<reference href="https://bdu.fstec.ru/vul/2025-00873" type="self" id="BDU:2025-00873" title="BDU:2025-00873" />
			<reference href="https://bdu.fstec.ru/vul/2025-00870" type="self" id="BDU:2025-00870" title="BDU:2025-00870" />
			<reference href="https://bdu.fstec.ru/vul/2024-11293" type="self" id="BDU:2024-11293" title="BDU:2024-11293" />
			<reference href="https://bdu.fstec.ru/vul/2025-00874" type="self" id="BDU:2025-00874" title="BDU:2025-00874" />
			<reference href="https://bdu.fstec.ru/vul/2024-11333" type="self" id="BDU:2024-11333" title="BDU:2024-11333" />
			<reference href="https://bdu.fstec.ru/vul/2024-11334" type="self" id="BDU:2024-11334" title="BDU:2024-11334" />
			<reference href="https://bdu.fstec.ru/vul/2025-00877" type="self" id="BDU:2025-00877" title="BDU:2025-00877" />
			<reference href="https://bdu.fstec.ru/vul/2025-00876" type="self" id="BDU:2025-00876" title="BDU:2025-00876" />
			<reference href="https://bdu.fstec.ru/vul/2025-00875" type="self" id="BDU:2025-00875" title="BDU:2025-00875" />
			<reference href="https://bdu.fstec.ru/vul/2024-11332" type="self" id="BDU:2024-11332" title="BDU:2024-11332" />
			<reference href="https://bdu.fstec.ru/vul/2024-11326" type="self" id="BDU:2024-11326" title="BDU:2024-11326" />
			<reference href="https://bdu.fstec.ru/vul/2025-00878" type="self" id="BDU:2025-00878" title="BDU:2025-00878" />
			<reference href="https://bdu.fstec.ru/vul/2024-11325" type="self" id="BDU:2024-11325" title="BDU:2024-11325" />
			<reference href="https://bdu.fstec.ru/vul/2024-11292" type="self" id="BDU:2024-11292" title="BDU:2024-11292" />
			<reference href="https://bdu.fstec.ru/vul/2024-11335" type="self" id="BDU:2024-11335" title="BDU:2024-11335" />
			<reference href="https://bdu.fstec.ru/vul/2025-00484" type="self" id="BDU:2025-00484" title="BDU:2025-00484" />
			<reference href="https://bdu.fstec.ru/vul/2025-01020" type="self" id="BDU:2025-01020" title="BDU:2025-01020" />
			<reference href="https://bdu.fstec.ru/vul/2024-11329" type="self" id="BDU:2024-11329" title="BDU:2024-11329" />
			<reference href="https://bdu.fstec.ru/vul/2024-11330" type="self" id="BDU:2024-11330" title="BDU:2024-11330" />
			<reference href="https://bdu.fstec.ru/vul/2025-01021" type="self" id="BDU:2025-01021" title="BDU:2025-01021" />
			<reference href="https://bdu.fstec.ru/vul/2024-11327" type="self" id="BDU:2024-11327" title="BDU:2024-11327" />
			<reference href="https://bdu.fstec.ru/vul/2024-11328" type="self" id="BDU:2024-11328" title="BDU:2024-11328" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gstreamer1-plugins-good" epoch="0" version="1.16.3" release="3.el7" arch="x86_64" src="">
					<filename>gstreamer1-plugins-good-0:1.16.3-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250122-01</id>
		<issued date="2025-01-22" />
		<updated date="2025-01-22" />
		<title>Множественные уязвимости kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-cve-2022-48816-cve-2022-48819/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-cve-2022-48816-cve-2022-48819/" type="self" id="ROS-20250122-01" title="ROS-20250122-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48816" type="cve" id="CVE-2022-48816" title="CVE-2022-48816" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48819" type="cve" id="CVE-2022-48819" title="CVE-2022-48819" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250122-02</id>
		<issued date="2025-01-22" />
		<updated date="2025-01-22" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-220125/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-220125/" type="self" id="ROS-20250122-02" title="ROS-20250122-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41027" type="cve" id="CVE-2024-41027" title="CVE-2024-41027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41028" type="cve" id="CVE-2024-41028" title="CVE-2024-41028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41034" type="cve" id="CVE-2024-41034" title="CVE-2024-41034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41035" type="cve" id="CVE-2024-41035" title="CVE-2024-41035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41038" type="cve" id="CVE-2024-41038" title="CVE-2024-41038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41039" type="cve" id="CVE-2024-41039" title="CVE-2024-41039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41040" type="cve" id="CVE-2024-41040" title="CVE-2024-41040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41041" type="cve" id="CVE-2024-41041" title="CVE-2024-41041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41042" type="cve" id="CVE-2024-41042" title="CVE-2024-41042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41044" type="cve" id="CVE-2024-41044" title="CVE-2024-41044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41046" type="cve" id="CVE-2024-41046" title="CVE-2024-41046" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41047" type="cve" id="CVE-2024-41047" title="CVE-2024-41047" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41048" type="cve" id="CVE-2024-41048" title="CVE-2024-41048" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41049" type="cve" id="CVE-2024-41049" title="CVE-2024-41049" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41050" type="cve" id="CVE-2024-41050" title="CVE-2024-41050" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41051" type="cve" id="CVE-2024-41051" title="CVE-2024-41051" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41055" type="cve" id="CVE-2024-41055" title="CVE-2024-41055" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41056" type="cve" id="CVE-2024-41056" title="CVE-2024-41056" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41057" type="cve" id="CVE-2024-41057" title="CVE-2024-41057" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41058" type="cve" id="CVE-2024-41058" title="CVE-2024-41058" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41059" type="cve" id="CVE-2024-41059" title="CVE-2024-41059" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41060" type="cve" id="CVE-2024-41060" title="CVE-2024-41060" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41063" type="cve" id="CVE-2024-41063" title="CVE-2024-41063" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41064" type="cve" id="CVE-2024-41064" title="CVE-2024-41064" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41065" type="cve" id="CVE-2024-41065" title="CVE-2024-41065" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41068" type="cve" id="CVE-2024-41068" title="CVE-2024-41068" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41070" type="cve" id="CVE-2024-41070" title="CVE-2024-41070" />
			<reference href="https://bdu.fstec.ru/vul/2024-08915" type="self" id="BDU:2024-08915" title="BDU:2024-08915" />
			<reference href="https://bdu.fstec.ru/vul/2024-07692" type="self" id="BDU:2024-07692" title="BDU:2024-07692" />
			<reference href="https://bdu.fstec.ru/vul/2024-08307" type="self" id="BDU:2024-08307" title="BDU:2024-08307" />
			<reference href="https://bdu.fstec.ru/vul/2024-08306" type="self" id="BDU:2024-08306" title="BDU:2024-08306" />
			<reference href="https://bdu.fstec.ru/vul/2024-08314" type="self" id="BDU:2024-08314" title="BDU:2024-08314" />
			<reference href="https://bdu.fstec.ru/vul/2024-07937" type="self" id="BDU:2024-07937" title="BDU:2024-07937" />
			<reference href="https://bdu.fstec.ru/vul/2024-08329" type="self" id="BDU:2024-08329" title="BDU:2024-08329" />
			<reference href="https://bdu.fstec.ru/vul/2024-08303" type="self" id="BDU:2024-08303" title="BDU:2024-08303" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250123-01</id>
		<issued date="2025-01-23" />
		<updated date="2025-01-23" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-230125/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-230125/" type="self" id="ROS-20250123-01" title="ROS-20250123-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41072" type="cve" id="CVE-2024-41072" title="CVE-2024-41072" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41073" type="cve" id="CVE-2024-41073" title="CVE-2024-41073" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41077" type="cve" id="CVE-2024-41077" title="CVE-2024-41077" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41078" type="cve" id="CVE-2024-41078" title="CVE-2024-41078" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41081" type="cve" id="CVE-2024-41081" title="CVE-2024-41081" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52887" type="cve" id="CVE-2023-52887" title="CVE-2023-52887" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41087" type="cve" id="CVE-2024-41087" title="CVE-2024-41087" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41089" type="cve" id="CVE-2024-41089" title="CVE-2024-41089" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41092" type="cve" id="CVE-2024-41092" title="CVE-2024-41092" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41093" type="cve" id="CVE-2024-41093" title="CVE-2024-41093" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41095" type="cve" id="CVE-2024-41095" title="CVE-2024-41095" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41096" type="cve" id="CVE-2024-41096" title="CVE-2024-41096" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41097" type="cve" id="CVE-2024-41097" title="CVE-2024-41097" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41098" type="cve" id="CVE-2024-41098" title="CVE-2024-41098" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42070" type="cve" id="CVE-2024-42070" title="CVE-2024-42070" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42073" type="cve" id="CVE-2024-42073" title="CVE-2024-42073" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42076" type="cve" id="CVE-2024-42076" title="CVE-2024-42076" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42077" type="cve" id="CVE-2024-42077" title="CVE-2024-42077" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42080" type="cve" id="CVE-2024-42080" title="CVE-2024-42080" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42082" type="cve" id="CVE-2024-42082" title="CVE-2024-42082" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42084" type="cve" id="CVE-2024-42084" title="CVE-2024-42084" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42085" type="cve" id="CVE-2024-42085" title="CVE-2024-42085" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42086" type="cve" id="CVE-2024-42086" title="CVE-2024-42086" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42087" type="cve" id="CVE-2024-42087" title="CVE-2024-42087" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42089" type="cve" id="CVE-2024-42089" title="CVE-2024-42089" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42090" type="cve" id="CVE-2024-42090" title="CVE-2024-42090" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42092" type="cve" id="CVE-2024-42092" title="CVE-2024-42092" />
			<reference href="https://bdu.fstec.ru/vul/2024-08315" type="self" id="BDU:2024-08315" title="BDU:2024-08315" />
			<reference href="https://bdu.fstec.ru/vul/2024-07983" type="self" id="BDU:2024-07983" title="BDU:2024-07983" />
			<reference href="https://bdu.fstec.ru/vul/2024-07984" type="self" id="BDU:2024-07984" title="BDU:2024-07984" />
			<reference href="https://bdu.fstec.ru/vul/2025-00839" type="self" id="BDU:2025-00839" title="BDU:2025-00839" />
			<reference href="https://bdu.fstec.ru/vul/2024-07927" type="self" id="BDU:2024-07927" title="BDU:2024-07927" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250127-01</id>
		<issued date="2025-01-27" />
		<updated date="2025-01-27" />
		<title>Множественные уязвимости python3-django </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в python3-django</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-django-cve-2024-53907-cve-2024-53908/</description>
               <solution>
                    Запретить использование в ОС пакета python3-django
                или
                    Установить обновление для пакета(ов) python3-django
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-django-cve-2024-53907-cve-2024-53908/" type="self" id="ROS-20250127-01" title="ROS-20250127-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53907" type="cve" id="CVE-2024-53907" title="CVE-2024-53907" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53908" type="cve" id="CVE-2024-53908" title="CVE-2024-53908" />
			<reference href="https://bdu.fstec.ru/vul/2024-11394" type="self" id="BDU:2024-11394" title="BDU:2024-11394" />
			<reference href="https://bdu.fstec.ru/vul/2024-10874" type="self" id="BDU:2024-10874" title="BDU:2024-10874" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-django" epoch="0" version="4.2.17" release="1.el7" arch="noarch" src="">
					<filename>python3-django-0:4.2.17-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250127-02</id>
		<issued date="2025-01-27" />
		<updated date="2025-01-27" />
		<title>Множественные уязвимости bluez </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в bluez</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-bluez-cve-2023-50229-cve-2023-50230/</description>
               <solution>
                    Запретить использование в ОС пакета bluez
                или
                    Установить обновление для пакета(ов) bluez
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-bluez-cve-2023-50229-cve-2023-50230/" type="self" id="ROS-20250127-02" title="ROS-20250127-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50229" type="cve" id="CVE-2023-50229" title="CVE-2023-50229" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50230" type="cve" id="CVE-2023-50230" title="CVE-2023-50230" />
			<reference href="https://bdu.fstec.ru/vul/2024-03556" type="self" id="BDU:2024-03556" title="BDU:2024-03556" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="bluez" epoch="0" version="5.75" release="1.el7" arch="x86_64" src="">
					<filename>bluez-0:5.75-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250127-03</id>
		<issued date="2025-01-27" />
		<updated date="2025-01-27" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-270125/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-270125/" type="self" id="ROS-20250127-03" title="ROS-20250127-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42073" type="cve" id="CVE-2024-42073" title="CVE-2024-42073" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42093" type="cve" id="CVE-2024-42093" title="CVE-2024-42093" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42094" type="cve" id="CVE-2024-42094" title="CVE-2024-42094" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42095" type="cve" id="CVE-2024-42095" title="CVE-2024-42095" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42096" type="cve" id="CVE-2024-42096" title="CVE-2024-42096" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42097" type="cve" id="CVE-2024-42097" title="CVE-2024-42097" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42098" type="cve" id="CVE-2024-42098" title="CVE-2024-42098" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42100" type="cve" id="CVE-2024-42100" title="CVE-2024-42100" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42101" type="cve" id="CVE-2024-42101" title="CVE-2024-42101" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42102" type="cve" id="CVE-2024-42102" title="CVE-2024-42102" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42103" type="cve" id="CVE-2024-42103" title="CVE-2024-42103" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42104" type="cve" id="CVE-2024-42104" title="CVE-2024-42104" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42105" type="cve" id="CVE-2024-42105" title="CVE-2024-42105" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42106" type="cve" id="CVE-2024-42106" title="CVE-2024-42106" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42109" type="cve" id="CVE-2024-42109" title="CVE-2024-42109" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42113" type="cve" id="CVE-2024-42113" title="CVE-2024-42113" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42114" type="cve" id="CVE-2024-42114" title="CVE-2024-42114" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42115" type="cve" id="CVE-2024-42115" title="CVE-2024-42115" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42119" type="cve" id="CVE-2024-42119" title="CVE-2024-42119" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42120" type="cve" id="CVE-2024-42120" title="CVE-2024-42120" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42121" type="cve" id="CVE-2024-42121" title="CVE-2024-42121" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42124" type="cve" id="CVE-2024-42124" title="CVE-2024-42124" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42126" type="cve" id="CVE-2024-42126" title="CVE-2024-42126" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42127" type="cve" id="CVE-2024-42127" title="CVE-2024-42127" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42130" type="cve" id="CVE-2024-42130" title="CVE-2024-42130" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42131" type="cve" id="CVE-2024-42131" title="CVE-2024-42131" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42132" type="cve" id="CVE-2024-42132" title="CVE-2024-42132" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42133" type="cve" id="CVE-2024-42133" title="CVE-2024-42133" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42137" type="cve" id="CVE-2024-42137" title="CVE-2024-42137" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42138" type="cve" id="CVE-2024-42138" title="CVE-2024-42138" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42140" type="cve" id="CVE-2024-42140" title="CVE-2024-42140" />
			<reference href="https://bdu.fstec.ru/vul/2024-08322" type="self" id="BDU:2024-08322" title="BDU:2024-08322" />
			<reference href="https://bdu.fstec.ru/vul/2024-08331" type="self" id="BDU:2024-08331" title="BDU:2024-08331" />
			<reference href="https://bdu.fstec.ru/vul/2025-00984" type="self" id="BDU:2025-00984" title="BDU:2025-00984" />
			<reference href="https://bdu.fstec.ru/vul/2025-00985" type="self" id="BDU:2025-00985" title="BDU:2025-00985" />
			<reference href="https://bdu.fstec.ru/vul/2025-00986" type="self" id="BDU:2025-00986" title="BDU:2025-00986" />
			<reference href="https://bdu.fstec.ru/vul/2025-00987" type="self" id="BDU:2025-00987" title="BDU:2025-00987" />
			<reference href="https://bdu.fstec.ru/vul/2025-00988" type="self" id="BDU:2025-00988" title="BDU:2025-00988" />
			<reference href="https://bdu.fstec.ru/vul/2025-00989" type="self" id="BDU:2025-00989" title="BDU:2025-00989" />
			<reference href="https://bdu.fstec.ru/vul/2025-00990" type="self" id="BDU:2025-00990" title="BDU:2025-00990" />
			<reference href="https://bdu.fstec.ru/vul/2025-00991" type="self" id="BDU:2025-00991" title="BDU:2025-00991" />
			<reference href="https://bdu.fstec.ru/vul/2024-08335" type="self" id="BDU:2024-08335" title="BDU:2024-08335" />
			<reference href="https://bdu.fstec.ru/vul/2025-00992" type="self" id="BDU:2025-00992" title="BDU:2025-00992" />
			<reference href="https://bdu.fstec.ru/vul/2025-00993" type="self" id="BDU:2025-00993" title="BDU:2025-00993" />
			<reference href="https://bdu.fstec.ru/vul/2025-00994" type="self" id="BDU:2025-00994" title="BDU:2025-00994" />
			<reference href="https://bdu.fstec.ru/vul/2025-00995" type="self" id="BDU:2025-00995" title="BDU:2025-00995" />
			<reference href="https://bdu.fstec.ru/vul/2025-00996" type="self" id="BDU:2025-00996" title="BDU:2025-00996" />
			<reference href="https://bdu.fstec.ru/vul/2025-00997" type="self" id="BDU:2025-00997" title="BDU:2025-00997" />
			<reference href="https://bdu.fstec.ru/vul/2025-00998" type="self" id="BDU:2025-00998" title="BDU:2025-00998" />
			<reference href="https://bdu.fstec.ru/vul/2025-00982" type="self" id="BDU:2025-00982" title="BDU:2025-00982" />
			<reference href="https://bdu.fstec.ru/vul/2025-00983" type="self" id="BDU:2025-00983" title="BDU:2025-00983" />
			<reference href="https://bdu.fstec.ru/vul/2025-00999" type="self" id="BDU:2025-00999" title="BDU:2025-00999" />
			<reference href="https://bdu.fstec.ru/vul/2025-01000" type="self" id="BDU:2025-01000" title="BDU:2025-01000" />
			<reference href="https://bdu.fstec.ru/vul/2025-01001" type="self" id="BDU:2025-01001" title="BDU:2025-01001" />
			<reference href="https://bdu.fstec.ru/vul/2025-01002" type="self" id="BDU:2025-01002" title="BDU:2025-01002" />
			<reference href="https://bdu.fstec.ru/vul/2025-01003" type="self" id="BDU:2025-01003" title="BDU:2025-01003" />
			<reference href="https://bdu.fstec.ru/vul/2025-01004" type="self" id="BDU:2025-01004" title="BDU:2025-01004" />
			<reference href="https://bdu.fstec.ru/vul/2025-01005" type="self" id="BDU:2025-01005" title="BDU:2025-01005" />
			<reference href="https://bdu.fstec.ru/vul/2025-00981" type="self" id="BDU:2025-00981" title="BDU:2025-00981" />
			<reference href="https://bdu.fstec.ru/vul/2025-01006" type="self" id="BDU:2025-01006" title="BDU:2025-01006" />
			<reference href="https://bdu.fstec.ru/vul/2025-01007" type="self" id="BDU:2025-01007" title="BDU:2025-01007" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250128-01</id>
		<issued date="2025-01-28" />
		<updated date="2025-01-28" />
		<title>Уязвимость linux-firmware </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в linux-firmware</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-linux-firmware-cve-2023-42667/</description>
               <solution>
                    Запретить использование в ОС пакета linux-firmware
                или
                    Установить обновление для пакета(ов) linux-firmware
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-linux-firmware-cve-2023-42667/" type="self" id="ROS-20250128-01" title="ROS-20250128-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42667" type="cve" id="CVE-2023-42667" title="CVE-2023-42667" />
			<reference href="https://bdu.fstec.ru/vul/2024-08369" type="self" id="BDU:2024-08369" title="BDU:2024-08369" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="linux-firmware" epoch="0" version="20241017" release="2.el7.3" arch="noarch" src="">
					<filename>linux-firmware-0:20241017-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250128-02</id>
		<issued date="2025-01-28" />
		<updated date="2025-01-28" />
		<title>Множественные уязвимости xen </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в xen</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-xen-cve-2024-45818-cve-2024-45817-cve-2024-45819/</description>
               <solution>
                    Запретить использование в ОС пакета Xen
                или
                    Установить обновление для пакета(ов) Xen
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-xen-cve-2024-45818-cve-2024-45817-cve-2024-45819/" type="self" id="ROS-20250128-02" title="ROS-20250128-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45818" type="cve" id="CVE-2024-45818" title="CVE-2024-45818" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45817" type="cve" id="CVE-2024-45817" title="CVE-2024-45817" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45819" type="cve" id="CVE-2024-45819" title="CVE-2024-45819" />
			<reference href="https://bdu.fstec.ru/vul/2025-01008" type="self" id="BDU:2025-01008" title="BDU:2025-01008" />
			<reference href="https://bdu.fstec.ru/vul/2024-07714" type="self" id="BDU:2024-07714" title="BDU:2024-07714" />
			<reference href="https://bdu.fstec.ru/vul/2025-01009" type="self" id="BDU:2025-01009" title="BDU:2025-01009" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="xen" epoch="0" version="4.19.1" release="1.el7" arch="x86_64" src="">
					<filename>xen-0:4.19.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250128-03</id>
		<issued date="2025-01-28" />
		<updated date="2025-01-28" />
		<title>Уязвимость golang-x-net-devel </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang-x-net-devel</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-x-net-devel-cve-2024-45338/</description>
               <solution>
                    Запретить использование в ОС пакета Golang-x-net
                или
                    Установить обновление для пакета(ов) Golang-x-net
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-x-net-devel-cve-2024-45338/" type="self" id="ROS-20250128-03" title="ROS-20250128-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45338" type="cve" id="CVE-2024-45338" title="CVE-2024-45338" />
			<reference href="https://bdu.fstec.ru/vul/2025-01010" type="self" id="BDU:2025-01010" title="BDU:2025-01010" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang-x-net-devel" epoch="0" version="0.33.0" release="1.el7" arch="noarch" src="">
					<filename>golang-x-net-devel-0:0.33.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250128-04</id>
		<issued date="2025-01-28" />
		<updated date="2025-01-28" />
		<title>Множественные уязвимости dotnet </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dotnet</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-dotnet-cve-2025-21176-cve-2025-21172-cve-2025-21173/</description>
               <solution>
                    Запретить использование в ОС пакета dotnet
                или
                    Установить обновление для пакета(ов) dotnet
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-dotnet-cve-2025-21176-cve-2025-21172-cve-2025-21173/" type="self" id="ROS-20250128-04" title="ROS-20250128-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21176" type="cve" id="CVE-2025-21176" title="CVE-2025-21176" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21172" type="cve" id="CVE-2025-21172" title="CVE-2025-21172" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21173" type="cve" id="CVE-2025-21173" title="CVE-2025-21173" />
			<reference href="https://bdu.fstec.ru/vul/2025-00588" type="self" id="BDU:2025-00588" title="BDU:2025-00588" />
			<reference href="https://bdu.fstec.ru/vul/2025-00367" type="self" id="BDU:2025-00367" title="BDU:2025-00367" />
			<reference href="https://bdu.fstec.ru/vul/2025-00356" type="self" id="BDU:2025-00356" title="BDU:2025-00356" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dotnet" epoch="0" version="8.0.112" release="1.el7" arch="x86_64" src="">
					<filename>dotnet-0:8.0.112-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250128-05</id>
		<issued date="2025-01-28" />
		<updated date="2025-01-28" />
		<title>Уязвимость python3-lxml </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-lxml</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-lxml-cve-2022-2309/</description>
               <solution>
                    Запретить использование в ОС пакета python3-lxml
                или
                    Установить обновление для пакета(ов) python3-lxml
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-lxml-cve-2022-2309/" type="self" id="ROS-20250128-05" title="ROS-20250128-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2309" type="cve" id="CVE-2022-2309" title="CVE-2022-2309" />
			<reference href="https://bdu.fstec.ru/vul/2025-01012" type="self" id="BDU:2025-01012" title="BDU:2025-01012" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-lxml" epoch="0" version="4.9.2" release="1.el7" arch="x86_64" src="">
					<filename>python3-lxml-0:4.9.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250128-06</id>
		<issued date="2025-01-28" />
		<updated date="2025-01-28" />
		<title>Множественные уязвимости python3-numpy </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-numpy</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-numpy-cve-2021-41496-cve-2021-41495-cve-2021-34141/</description>
               <solution>
                    Запретить использование в ОС пакета python3-numpy
                или
                    Установить обновление для пакета(ов) python3-numpy
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-numpy-cve-2021-41496-cve-2021-41495-cve-2021-34141/" type="self" id="ROS-20250128-06" title="ROS-20250128-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41496" type="cve" id="CVE-2021-41496" title="CVE-2021-41496" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41495" type="cve" id="CVE-2021-41495" title="CVE-2021-41495" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34141" type="cve" id="CVE-2021-34141" title="CVE-2021-34141" />
			<reference href="https://bdu.fstec.ru/vul/2025-01011" type="self" id="BDU:2025-01011" title="BDU:2025-01011" />
			<reference href="https://bdu.fstec.ru/vul/2023-05412" type="self" id="BDU:2023-05412" title="BDU:2023-05412" />
			<reference href="https://bdu.fstec.ru/vul/2022-06724" type="self" id="BDU:2022-06724" title="BDU:2022-06724" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-numpy" epoch="1" version="1.22.0" release="1.el7" arch="x86_64" src="">
					<filename>python3-numpy-1:1.22.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250128-07</id>
		<issued date="2025-01-28" />
		<updated date="2025-01-28" />
		<title>Уязвимость bluez </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в bluez</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-bluez-cve-2024-8805/</description>
               <solution>
                    Запретить использование в ОС пакета bluez
                или
                    Установить обновление для пакета(ов) bluez
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-bluez-cve-2024-8805/" type="self" id="ROS-20250128-07" title="ROS-20250128-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8805" type="cve" id="CVE-2024-8805" title="CVE-2024-8805" />
			<reference href="https://bdu.fstec.ru/vul/2024-07705" type="self" id="BDU:2024-07705" title="BDU:2024-07705" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="bluez" epoch="0" version="5.79" release="4.el7" arch="x86_64" src="">
					<filename>bluez-0:5.79-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250128-08</id>
		<issued date="2025-01-28" />
		<updated date="2025-01-28" />
		<title>Уязвимость sysstat </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в sysstat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sysstat-cve-2023-33204/</description>
               <solution>
                    Запретить использование в ОС пакета sysstat
                или
                    Установить обновление для пакета(ов) sysstat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sysstat-cve-2023-33204/" type="self" id="ROS-20250128-08" title="ROS-20250128-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33204" type="cve" id="CVE-2023-33204" title="CVE-2023-33204" />
			<reference href="https://bdu.fstec.ru/vul/2025-00980" type="self" id="BDU:2025-00980" title="BDU:2025-00980" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="sysstat" epoch="0" version="12.5.4" release="1.el7" arch="x86_64" src="">
					<filename>sysstat-0:12.5.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250128-09</id>
		<issued date="2025-01-28" />
		<updated date="2025-01-28" />
		<title>Уязвимость nomad </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nomad</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nomad-cve-2024-10975/</description>
               <solution>
                    Запретить использование в ОС пакета nomad
                или
                    Установить обновление для пакета(ов) nomad
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nomad-cve-2024-10975/" type="self" id="ROS-20250128-09" title="ROS-20250128-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10975" type="cve" id="CVE-2024-10975" title="CVE-2024-10975" />
			<reference href="https://bdu.fstec.ru/vul/2025-00122" type="self" id="BDU:2025-00122" title="BDU:2025-00122" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nomad" epoch="0" version="1.9.3" release="1.el7" arch="x86_64" src="">
					<filename>nomad-0:1.9.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250128-10</id>
		<issued date="2025-01-28" />
		<updated date="2025-01-28" />
		<title>Уязвимость podman </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в podman</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-podman-cve-2024-11218/</description>
               <solution>
                    Запретить использование в ОС пакета Podman
                или
                    Установить обновление для пакета(ов) Podman
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-podman-cve-2024-11218/" type="self" id="ROS-20250128-10" title="ROS-20250128-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11218" type="cve" id="CVE-2024-11218" title="CVE-2024-11218" />
			<reference href="https://bdu.fstec.ru/vul/2025-01013" type="self" id="BDU:2025-01013" title="BDU:2025-01013" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="podman" epoch="0" version="4.9.5" release="3.el7" arch="x86_64" src="">
					<filename>podman-0:4.9.5-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250128-11</id>
		<issued date="2025-01-28" />
		<updated date="2025-01-28" />
		<title>Уязвимость buildah </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в buildah</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-buildah-cve-2024-112181884/</description>
               <solution>
                    Запретить использование в ОС пакета buildah
                или
                    Установить обновление для пакета(ов) buildah
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-buildah-cve-2024-112181884/" type="self" id="ROS-20250128-11" title="ROS-20250128-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11218" type="cve" id="CVE-2024-11218" title="CVE-2024-11218" />
			<reference href="https://bdu.fstec.ru/vul/2025-01013" type="self" id="BDU:2025-01013" title="BDU:2025-01013" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="buildah" epoch="0" version="1.38.1" release="1.el7" arch="x86_64" src="">
					<filename>buildah-0:1.38.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250130-01</id>
		<issued date="2025-01-30" />
		<updated date="2025-01-30" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2022-21505/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2022-21505/" type="self" id="ROS-20250130-01" title="ROS-20250130-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21505" type="cve" id="CVE-2022-21505" title="CVE-2022-21505" />
			<reference href="https://bdu.fstec.ru/vul/2022-05306" type="self" id="BDU:2022-05306" title="BDU:2022-05306" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="5.15.72" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:5.15.72-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250130-02</id>
		<issued date="2025-01-30" />
		<updated date="2025-01-30" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-1086/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-1086/" type="self" id="ROS-20250130-02" title="ROS-20250130-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1086" type="cve" id="CVE-2024-1086" title="CVE-2024-1086" />
			<reference href="https://bdu.fstec.ru/vul/2024-01187" type="self" id="BDU:2024-01187" title="BDU:2024-01187" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250130-03</id>
		<issued date="2025-01-30" />
		<updated date="2025-01-30" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-300125/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-300125/" type="self" id="ROS-20250130-03" title="ROS-20250130-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42141" type="cve" id="CVE-2024-42141" title="CVE-2024-42141" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42142" type="cve" id="CVE-2024-42142" title="CVE-2024-42142" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42145" type="cve" id="CVE-2024-42145" title="CVE-2024-42145" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42148" type="cve" id="CVE-2024-42148" title="CVE-2024-42148" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42152" type="cve" id="CVE-2024-42152" title="CVE-2024-42152" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42153" type="cve" id="CVE-2024-42153" title="CVE-2024-42153" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42154" type="cve" id="CVE-2024-42154" title="CVE-2024-42154" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42157" type="cve" id="CVE-2024-42157" title="CVE-2024-42157" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42161" type="cve" id="CVE-2024-42161" title="CVE-2024-42161" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42223" type="cve" id="CVE-2024-42223" title="CVE-2024-42223" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42224" type="cve" id="CVE-2024-42224" title="CVE-2024-42224" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42225" type="cve" id="CVE-2024-42225" title="CVE-2024-42225" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42228" type="cve" id="CVE-2024-42228" title="CVE-2024-42228" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42229" type="cve" id="CVE-2024-42229" title="CVE-2024-42229" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42232" type="cve" id="CVE-2024-42232" title="CVE-2024-42232" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42235" type="cve" id="CVE-2024-42235" title="CVE-2024-42235" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42236" type="cve" id="CVE-2024-42236" title="CVE-2024-42236" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42237" type="cve" id="CVE-2024-42237" title="CVE-2024-42237" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42238" type="cve" id="CVE-2024-42238" title="CVE-2024-42238" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42240" type="cve" id="CVE-2024-42240" title="CVE-2024-42240" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42244" type="cve" id="CVE-2024-42244" title="CVE-2024-42244" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42245" type="cve" id="CVE-2024-42245" title="CVE-2024-42245" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42246" type="cve" id="CVE-2024-42246" title="CVE-2024-42246" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42247" type="cve" id="CVE-2024-42247" title="CVE-2024-42247" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42248" type="cve" id="CVE-2024-42248" title="CVE-2024-42248" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42250" type="cve" id="CVE-2024-42250" title="CVE-2024-42250" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42251" type="cve" id="CVE-2024-42251" title="CVE-2024-42251" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42258" type="cve" id="CVE-2024-42258" title="CVE-2024-42258" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42259" type="cve" id="CVE-2024-42259" title="CVE-2024-42259" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52889" type="cve" id="CVE-2023-52889" title="CVE-2023-52889" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42265" type="cve" id="CVE-2024-42265" title="CVE-2024-42265" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42267" type="cve" id="CVE-2024-42267" title="CVE-2024-42267" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42268" type="cve" id="CVE-2024-42268" title="CVE-2024-42268" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42269" type="cve" id="CVE-2024-42269" title="CVE-2024-42269" />
			<reference href="https://bdu.fstec.ru/vul/2025-01418" type="self" id="BDU:2025-01418" title="BDU:2025-01418" />
			<reference href="https://bdu.fstec.ru/vul/2025-01427" type="self" id="BDU:2025-01427" title="BDU:2025-01427" />
			<reference href="https://bdu.fstec.ru/vul/2025-01425" type="self" id="BDU:2025-01425" title="BDU:2025-01425" />
			<reference href="https://bdu.fstec.ru/vul/2024-08230" type="self" id="BDU:2024-08230" title="BDU:2024-08230" />
			<reference href="https://bdu.fstec.ru/vul/2025-01426" type="self" id="BDU:2025-01426" title="BDU:2025-01426" />
			<reference href="https://bdu.fstec.ru/vul/2025-01432" type="self" id="BDU:2025-01432" title="BDU:2025-01432" />
			<reference href="https://bdu.fstec.ru/vul/2024-07986" type="self" id="BDU:2024-07986" title="BDU:2024-07986" />
			<reference href="https://bdu.fstec.ru/vul/2024-05830" type="self" id="BDU:2024-05830" title="BDU:2024-05830" />
			<reference href="https://bdu.fstec.ru/vul/2024-07746" type="self" id="BDU:2024-07746" title="BDU:2024-07746" />
			<reference href="https://bdu.fstec.ru/vul/2025-01419" type="self" id="BDU:2025-01419" title="BDU:2025-01419" />
			<reference href="https://bdu.fstec.ru/vul/2024-07745" type="self" id="BDU:2024-07745" title="BDU:2024-07745" />
			<reference href="https://bdu.fstec.ru/vul/2024-07744" type="self" id="BDU:2024-07744" title="BDU:2024-07744" />
			<reference href="https://bdu.fstec.ru/vul/2024-07741" type="self" id="BDU:2024-07741" title="BDU:2024-07741" />
			<reference href="https://bdu.fstec.ru/vul/2024-05829" type="self" id="BDU:2024-05829" title="BDU:2024-05829" />
			<reference href="https://bdu.fstec.ru/vul/2024-08326" type="self" id="BDU:2024-08326" title="BDU:2024-08326" />
			<reference href="https://bdu.fstec.ru/vul/2024-08730" type="self" id="BDU:2024-08730" title="BDU:2024-08730" />
			<reference href="https://bdu.fstec.ru/vul/2024-08327" type="self" id="BDU:2024-08327" title="BDU:2024-08327" />
			<reference href="https://bdu.fstec.ru/vul/2024-08731" type="self" id="BDU:2024-08731" title="BDU:2024-08731" />
			<reference href="https://bdu.fstec.ru/vul/2024-08737" type="self" id="BDU:2024-08737" title="BDU:2024-08737" />
			<reference href="https://bdu.fstec.ru/vul/2024-08325" type="self" id="BDU:2024-08325" title="BDU:2024-08325" />
			<reference href="https://bdu.fstec.ru/vul/2024-08324" type="self" id="BDU:2024-08324" title="BDU:2024-08324" />
			<reference href="https://bdu.fstec.ru/vul/2025-01436" type="self" id="BDU:2025-01436" title="BDU:2025-01436" />
			<reference href="https://bdu.fstec.ru/vul/2025-01420" type="self" id="BDU:2025-01420" title="BDU:2025-01420" />
			<reference href="https://bdu.fstec.ru/vul/2024-07985" type="self" id="BDU:2024-07985" title="BDU:2024-07985" />
			<reference href="https://bdu.fstec.ru/vul/2024-08739" type="self" id="BDU:2024-08739" title="BDU:2024-08739" />
			<reference href="https://bdu.fstec.ru/vul/2025-01438" type="self" id="BDU:2025-01438" title="BDU:2025-01438" />
			<reference href="https://bdu.fstec.ru/vul/2025-01414" type="self" id="BDU:2025-01414" title="BDU:2025-01414" />
			<reference href="https://bdu.fstec.ru/vul/2025-01415" type="self" id="BDU:2025-01415" title="BDU:2025-01415" />
			<reference href="https://bdu.fstec.ru/vul/2025-01416" type="self" id="BDU:2025-01416" title="BDU:2025-01416" />
			<reference href="https://bdu.fstec.ru/vul/2025-01417" type="self" id="BDU:2025-01417" title="BDU:2025-01417" />
			<reference href="https://bdu.fstec.ru/vul/2025-01434" type="self" id="BDU:2025-01434" title="BDU:2025-01434" />
			<reference href="https://bdu.fstec.ru/vul/2025-01411" type="self" id="BDU:2025-01411" title="BDU:2025-01411" />
			<reference href="https://bdu.fstec.ru/vul/2025-01437" type="self" id="BDU:2025-01437" title="BDU:2025-01437" />
			<reference href="https://bdu.fstec.ru/vul/2025-01412" type="self" id="BDU:2025-01412" title="BDU:2025-01412" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250131-01</id>
		<issued date="2025-01-31" />
		<updated date="2025-01-31" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-310125/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-310125/" type="self" id="ROS-20250131-01" title="ROS-20250131-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42270" type="cve" id="CVE-2024-42270" title="CVE-2024-42270" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42271" type="cve" id="CVE-2024-42271" title="CVE-2024-42271" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42272" type="cve" id="CVE-2024-42272" title="CVE-2024-42272" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42274" type="cve" id="CVE-2024-42274" title="CVE-2024-42274" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42276" type="cve" id="CVE-2024-42276" title="CVE-2024-42276" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42277" type="cve" id="CVE-2024-42277" title="CVE-2024-42277" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42278" type="cve" id="CVE-2024-42278" title="CVE-2024-42278" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42280" type="cve" id="CVE-2024-42280" title="CVE-2024-42280" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42281" type="cve" id="CVE-2024-42281" title="CVE-2024-42281" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42283" type="cve" id="CVE-2024-42283" title="CVE-2024-42283" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42284" type="cve" id="CVE-2024-42284" title="CVE-2024-42284" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42285" type="cve" id="CVE-2024-42285" title="CVE-2024-42285" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42286" type="cve" id="CVE-2024-42286" title="CVE-2024-42286" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42287" type="cve" id="CVE-2024-42287" title="CVE-2024-42287" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42288" type="cve" id="CVE-2024-42288" title="CVE-2024-42288" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42289" type="cve" id="CVE-2024-42289" title="CVE-2024-42289" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42290" type="cve" id="CVE-2024-42290" title="CVE-2024-42290" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42292" type="cve" id="CVE-2024-42292" title="CVE-2024-42292" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42294" type="cve" id="CVE-2024-42294" title="CVE-2024-42294" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42295" type="cve" id="CVE-2024-42295" title="CVE-2024-42295" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42296" type="cve" id="CVE-2024-42296" title="CVE-2024-42296" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42297" type="cve" id="CVE-2024-42297" title="CVE-2024-42297" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42298" type="cve" id="CVE-2024-42298" title="CVE-2024-42298" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42299" type="cve" id="CVE-2024-42299" title="CVE-2024-42299" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42301" type="cve" id="CVE-2024-42301" title="CVE-2024-42301" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42302" type="cve" id="CVE-2024-42302" title="CVE-2024-42302" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42303" type="cve" id="CVE-2024-42303" title="CVE-2024-42303" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42304" type="cve" id="CVE-2024-42304" title="CVE-2024-42304" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42305" type="cve" id="CVE-2024-42305" title="CVE-2024-42305" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42306" type="cve" id="CVE-2024-42306" title="CVE-2024-42306" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42307" type="cve" id="CVE-2024-42307" title="CVE-2024-42307" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42309" type="cve" id="CVE-2024-42309" title="CVE-2024-42309" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42310" type="cve" id="CVE-2024-42310" title="CVE-2024-42310" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42311" type="cve" id="CVE-2024-42311" title="CVE-2024-42311" />
			<reference href="https://bdu.fstec.ru/vul/2025-01404" type="self" id="BDU:2025-01404" title="BDU:2025-01404" />
			<reference href="https://bdu.fstec.ru/vul/2024-08539" type="self" id="BDU:2024-08539" title="BDU:2024-08539" />
			<reference href="https://bdu.fstec.ru/vul/2025-01405" type="self" id="BDU:2025-01405" title="BDU:2025-01405" />
			<reference href="https://bdu.fstec.ru/vul/2025-01406" type="self" id="BDU:2025-01406" title="BDU:2025-01406" />
			<reference href="https://bdu.fstec.ru/vul/2025-01407" type="self" id="BDU:2025-01407" title="BDU:2025-01407" />
			<reference href="https://bdu.fstec.ru/vul/2025-01408" type="self" id="BDU:2025-01408" title="BDU:2025-01408" />
			<reference href="https://bdu.fstec.ru/vul/2025-01440" type="self" id="BDU:2025-01440" title="BDU:2025-01440" />
			<reference href="https://bdu.fstec.ru/vul/2024-08535" type="self" id="BDU:2024-08535" title="BDU:2024-08535" />
			<reference href="https://bdu.fstec.ru/vul/2025-01444" type="self" id="BDU:2025-01444" title="BDU:2025-01444" />
			<reference href="https://bdu.fstec.ru/vul/2025-01445" type="self" id="BDU:2025-01445" title="BDU:2025-01445" />
			<reference href="https://bdu.fstec.ru/vul/2024-08534" type="self" id="BDU:2024-08534" title="BDU:2024-08534" />
			<reference href="https://bdu.fstec.ru/vul/2024-09777" type="self" id="BDU:2024-09777" title="BDU:2024-09777" />
			<reference href="https://bdu.fstec.ru/vul/2025-01446" type="self" id="BDU:2025-01446" title="BDU:2025-01446" />
			<reference href="https://bdu.fstec.ru/vul/2025-01447" type="self" id="BDU:2025-01447" title="BDU:2025-01447" />
			<reference href="https://bdu.fstec.ru/vul/2025-01448" type="self" id="BDU:2025-01448" title="BDU:2025-01448" />
			<reference href="https://bdu.fstec.ru/vul/2025-01449" type="self" id="BDU:2025-01449" title="BDU:2025-01449" />
			<reference href="https://bdu.fstec.ru/vul/2025-01450" type="self" id="BDU:2025-01450" title="BDU:2025-01450" />
			<reference href="https://bdu.fstec.ru/vul/2025-01451" type="self" id="BDU:2025-01451" title="BDU:2025-01451" />
			<reference href="https://bdu.fstec.ru/vul/2025-01452" type="self" id="BDU:2025-01452" title="BDU:2025-01452" />
			<reference href="https://bdu.fstec.ru/vul/2025-01453" type="self" id="BDU:2025-01453" title="BDU:2025-01453" />
			<reference href="https://bdu.fstec.ru/vul/2025-01454" type="self" id="BDU:2025-01454" title="BDU:2025-01454" />
			<reference href="https://bdu.fstec.ru/vul/2025-01455" type="self" id="BDU:2025-01455" title="BDU:2025-01455" />
			<reference href="https://bdu.fstec.ru/vul/2025-01456" type="self" id="BDU:2025-01456" title="BDU:2025-01456" />
			<reference href="https://bdu.fstec.ru/vul/2025-01457" type="self" id="BDU:2025-01457" title="BDU:2025-01457" />
			<reference href="https://bdu.fstec.ru/vul/2024-08229" type="self" id="BDU:2024-08229" title="BDU:2024-08229" />
			<reference href="https://bdu.fstec.ru/vul/2024-10086" type="self" id="BDU:2024-10086" title="BDU:2024-10086" />
			<reference href="https://bdu.fstec.ru/vul/2025-01428" type="self" id="BDU:2025-01428" title="BDU:2025-01428" />
			<reference href="https://bdu.fstec.ru/vul/2025-01424" type="self" id="BDU:2025-01424" title="BDU:2025-01424" />
			<reference href="https://bdu.fstec.ru/vul/2025-01430" type="self" id="BDU:2025-01430" title="BDU:2025-01430" />
			<reference href="https://bdu.fstec.ru/vul/2025-01421" type="self" id="BDU:2025-01421" title="BDU:2025-01421" />
			<reference href="https://bdu.fstec.ru/vul/2025-01422" type="self" id="BDU:2025-01422" title="BDU:2025-01422" />
			<reference href="https://bdu.fstec.ru/vul/2025-01431" type="self" id="BDU:2025-01431" title="BDU:2025-01431" />
			<reference href="https://bdu.fstec.ru/vul/2025-01423" type="self" id="BDU:2025-01423" title="BDU:2025-01423" />
			<reference href="https://bdu.fstec.ru/vul/2025-01429" type="self" id="BDU:2025-01429" title="BDU:2025-01429" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250203-01</id>
		<issued date="2025-02-03" />
		<updated date="2025-02-03" />
		<title>Уязвимость qt5-qtsvg </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в qt5-qtsvg</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qt5-qtsvg-cve-2023-32573/</description>
               <solution>
                    Запретить использование в ОС пакета qt5-qtsvg
                или
                    Установить обновление для пакета(ов) qt5-qtsvg
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qt5-qtsvg-cve-2023-32573/" type="self" id="ROS-20250203-01" title="ROS-20250203-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32573" type="cve" id="CVE-2023-32573" title="CVE-2023-32573" />
			<reference href="https://bdu.fstec.ru/vul/2023-05106" type="self" id="BDU:2023-05106" title="BDU:2023-05106" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="qt5-qtsvg" epoch="0" version="5.15.9" release="2.el7" arch="x86_64" src="">
					<filename>qt5-qtsvg-0:5.15.9-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250203-02</id>
		<issued date="2025-02-03" />
		<updated date="2025-02-03" />
		<title>Уязвимость etcd </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в etcd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-etcd-cve-2023-32082/</description>
               <solution>
                    Запретить использование в ОС пакета etcd
                или
                    Установить обновление для пакета(ов) etcd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-etcd-cve-2023-32082/" type="self" id="ROS-20250203-02" title="ROS-20250203-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32082" type="cve" id="CVE-2023-32082" title="CVE-2023-32082" />
			<reference href="https://bdu.fstec.ru/vul/2025-01413" type="self" id="BDU:2025-01413" title="BDU:2025-01413" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="etcd" epoch="0" version="3.5.12" release="4.el7" arch="x86_64" src="">
					<filename>etcd-0:3.5.12-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250203-03</id>
		<issued date="2025-02-03" />
		<updated date="2025-02-03" />
		<title>Уязвимость dotnet </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dotnet</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet-cve-2023-28260/</description>
               <solution>
                    Запретить использование в ОС пакета dotnet
                или
                    Установить обновление для пакета(ов) dotnet
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet-cve-2023-28260/" type="self" id="ROS-20250203-03" title="ROS-20250203-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28260" type="cve" id="CVE-2023-28260" title="CVE-2023-28260" />
			<reference href="https://bdu.fstec.ru/vul/2023-02907" type="self" id="BDU:2023-02907" title="BDU:2023-02907" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dotnet" epoch="0" version="6.0.125" release="3.el7" arch="x86_64" src="">
					<filename>dotnet-0:6.0.125-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250203-04</id>
		<issued date="2025-02-03" />
		<updated date="2025-02-03" />
		<title>Множественные уязвимости rsync</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в rsync</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rsync-030225/</description>
               <solution>
                    Запретить использование в ОС пакета rsync
                или
                    Установить обновление для пакета(ов) rsync
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rsync-030225/" type="self" id="ROS-20250203-04" title="ROS-20250203-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12747" type="cve" id="CVE-2024-12747" title="CVE-2024-12747" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12088" type="cve" id="CVE-2024-12088" title="CVE-2024-12088" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12087" type="cve" id="CVE-2024-12087" title="CVE-2024-12087" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12086" type="cve" id="CVE-2024-12086" title="CVE-2024-12086" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12085" type="cve" id="CVE-2024-12085" title="CVE-2024-12085" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12084" type="cve" id="CVE-2024-12084" title="CVE-2024-12084" />
			<reference href="https://bdu.fstec.ru/vul/2025-00372" type="self" id="BDU:2025-00372" title="BDU:2025-00372" />
			<reference href="https://bdu.fstec.ru/vul/2025-00373" type="self" id="BDU:2025-00373" title="BDU:2025-00373" />
			<reference href="https://bdu.fstec.ru/vul/2025-00377" type="self" id="BDU:2025-00377" title="BDU:2025-00377" />
			<reference href="https://bdu.fstec.ru/vul/2025-00374" type="self" id="BDU:2025-00374" title="BDU:2025-00374" />
			<reference href="https://bdu.fstec.ru/vul/2025-00376" type="self" id="BDU:2025-00376" title="BDU:2025-00376" />
			<reference href="https://bdu.fstec.ru/vul/2025-00378" type="self" id="BDU:2025-00378" title="BDU:2025-00378" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rsync" epoch="0" version="3.4.1" release="2.el7" arch="x86_64" src="">
					<filename>rsync-0:3.4.1-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250203-05</id>
		<issued date="2025-02-03" />
		<updated date="2025-02-03" />
		<title>Множественные уязвимости vim-common </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в vim-common</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim-common-cve-2025-22134-cve-2025-24014/</description>
               <solution>
                    Запретить использование в ОС пакета Vim
                или
                    Установить обновление для пакета(ов) Vim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim-common-cve-2025-22134-cve-2025-24014/" type="self" id="ROS-20250203-05" title="ROS-20250203-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22134" type="cve" id="CVE-2025-22134" title="CVE-2025-22134" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24014" type="cve" id="CVE-2025-24014" title="CVE-2025-24014" />
			<reference href="https://bdu.fstec.ru/vul/2025-01433" type="self" id="BDU:2025-01433" title="BDU:2025-01433" />
			<reference href="https://bdu.fstec.ru/vul/2025-01409" type="self" id="BDU:2025-01409" title="BDU:2025-01409" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-common" epoch="2" version="9.1.1050" release="1.el7" arch="x86_64" src="">
					<filename>vim-common-2:9.1.1050-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250203-06</id>
		<issued date="2025-02-03" />
		<updated date="2025-02-03" />
		<title>Множественные уязвимости libreoffice </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libreoffice</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libreoffice-cve-2024-12426-cve-2024-12425/</description>
               <solution>
                    Запретить использование в ОС пакета libreoffice
                или
                    Установить обновление для пакета(ов) libreoffice
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libreoffice-cve-2024-12426-cve-2024-12425/" type="self" id="ROS-20250203-06" title="ROS-20250203-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12426" type="cve" id="CVE-2024-12426" title="CVE-2024-12426" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12425" type="cve" id="CVE-2024-12425" title="CVE-2024-12425" />
			<reference href="https://bdu.fstec.ru/vul/2025-00554" type="self" id="BDU:2025-00554" title="BDU:2025-00554" />
			<reference href="https://bdu.fstec.ru/vul/2025-00555" type="self" id="BDU:2025-00555" title="BDU:2025-00555" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libreoffice" epoch="1" version="7.6.7.2" release="5.el7" arch="x86_64" src="">
					<filename>libreoffice-1:7.6.7.2-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250203-07</id>
		<issued date="2025-02-03" />
		<updated date="2025-02-03" />
		<title>Множественные уязвимости firefox </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-cve-2025-0242-cve-2025-0238/</description>
               <solution>
                    Запретить использование в ОС пакета firefox
                или
                    Установить обновление для пакета(ов) firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-cve-2025-0242-cve-2025-0238/" type="self" id="ROS-20250203-07" title="ROS-20250203-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0242" type="cve" id="CVE-2025-0242" title="CVE-2025-0242" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0238" type="cve" id="CVE-2025-0238" title="CVE-2025-0238" />
			<reference href="https://bdu.fstec.ru/vul/2025-00156" type="self" id="BDU:2025-00156" title="BDU:2025-00156" />
			<reference href="https://bdu.fstec.ru/vul/2025-00154" type="self" id="BDU:2025-00154" title="BDU:2025-00154" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.19.0" release="1.el7" arch="x86_64" src="">
					<filename>firefox-0:115.19.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250203-08</id>
		<issued date="2025-02-03" />
		<updated date="2025-02-03" />
		<title>Уязвимость python3-numexpr </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в python3-numexpr</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-numexpr-cve-2023-39631/</description>
               <solution>
                    Запретить использование в ОС пакета python3-numexpr
                или
                    Установить обновление для пакета(ов) python3-numexpr
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-numexpr-cve-2023-39631/" type="self" id="ROS-20250203-08" title="ROS-20250203-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39631" type="cve" id="CVE-2023-39631" title="CVE-2023-39631" />
			<reference href="https://bdu.fstec.ru/vul/2025-01410" type="self" id="BDU:2025-01410" title="BDU:2025-01410" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-numexpr" epoch="0" version="2.8.5" release="2.el7" arch="x86_64" src="">
					<filename>python3-numexpr-0:2.8.5-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250203-09</id>
		<issued date="2025-02-03" />
		<updated date="2025-02-03" />
		<title>Уязвимость python3-multipart </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-multipart</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-multipart-cve-2024-24762/</description>
               <solution>
                    Запретить использование в ОС пакета Python3-multipart
                или
                    Установить обновление для пакета(ов) Python3-multipart
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-multipart-cve-2024-24762/" type="self" id="ROS-20250203-09" title="ROS-20250203-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24762" type="cve" id="CVE-2024-24762" title="CVE-2024-24762" />
			<reference href="https://bdu.fstec.ru/vul/2025-01435" type="self" id="BDU:2025-01435" title="BDU:2025-01435" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-multipart" epoch="0" version="0.0.7" release="1.el7" arch="noarch" src="">
					<filename>python3-multipart-0:0.0.7-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250203-10</id>
		<issued date="2025-02-03" />
		<updated date="2025-02-03" />
		<title>Уязвимость openssl </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в openssl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimosti-openssl-cve-2024-55355007/</description>
               <solution>
                    Запретить использование в ОС пакета openssl
                или
                    Установить обновление для пакета(ов) openssl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimosti-openssl-cve-2024-55355007/" type="self" id="ROS-20250203-10" title="ROS-20250203-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5535" type="cve" id="CVE-2024-5535" title="CVE-2024-5535" />
			<reference href="https://bdu.fstec.ru/vul/2024-06988" type="self" id="BDU:2024-06988" title="BDU:2024-06988" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl" epoch="1" version="1.1.1w" release="3.el7" arch="x86_64" src="">
					<filename>openssl-1:1.1.1w-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250203-11</id>
		<issued date="2025-02-03" />
		<updated date="2025-02-03" />
		<title>Множественные уязвимости lua </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в lua</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-lua-cve-2020-24370-cve-2019-6706-cve-2021-43519/</description>
               <solution>
                    Запретить использование в ОС пакета lua
                или
                    Установить обновление для пакета(ов) lua
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-lua-cve-2020-24370-cve-2019-6706-cve-2021-43519/" type="self" id="ROS-20250203-11" title="ROS-20250203-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24370" type="cve" id="CVE-2020-24370" title="CVE-2020-24370" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6706" type="cve" id="CVE-2019-6706" title="CVE-2019-6706" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43519" type="cve" id="CVE-2021-43519" title="CVE-2021-43519" />
			<reference href="https://bdu.fstec.ru/vul/2021-03735" type="self" id="BDU:2021-03735" title="BDU:2021-03735" />
			<reference href="https://bdu.fstec.ru/vul/2020-03180" type="self" id="BDU:2020-03180" title="BDU:2020-03180" />
			<reference href="https://bdu.fstec.ru/vul/2025-01458" type="self" id="BDU:2025-01458" title="BDU:2025-01458" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="lua" epoch="0" version="5.3.5" release="1.el7" arch="x86_64" src="">
					<filename>lua-0:5.3.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250203-12</id>
		<issued date="2025-02-03" />
		<updated date="2025-02-03" />
		<title>Уязвимость zfs </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в zfs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimosti-zfs-cve-2020-24370/</description>
               <solution>
                    Запретить использование в ОС пакета zfs
                или
                    Установить обновление для пакета(ов) zfs
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimosti-zfs-cve-2020-24370/" type="self" id="ROS-20250203-12" title="ROS-20250203-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24370" type="cve" id="CVE-2020-24370" title="CVE-2020-24370" />
			<reference href="https://bdu.fstec.ru/vul/2021-03735" type="self" id="BDU:2021-03735" title="BDU:2021-03735" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zfs" epoch="0" version="2.1.14" release="2.el7" arch="x86_64" src="">
					<filename>zfs-0:2.1.14-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250203-13</id>
		<issued date="2025-02-03" />
		<updated date="2025-02-03" />
		<title>Множественные уязвимости rubygem-activerecord </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в rubygem-activerecord</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rubygem-activerecord-cve-2022-44566-cve-2023-22794/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-activerecord
                или
                    Установить обновление для пакета(ов) rubygem-activerecord
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rubygem-activerecord-cve-2022-44566-cve-2023-22794/" type="self" id="ROS-20250203-13" title="ROS-20250203-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44566" type="cve" id="CVE-2022-44566" title="CVE-2022-44566" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22794" type="cve" id="CVE-2023-22794" title="CVE-2023-22794" />
			<reference href="https://bdu.fstec.ru/vul/2025-01400" type="self" id="BDU:2025-01400" title="BDU:2025-01400" />
			<reference href="https://bdu.fstec.ru/vul/2023-07138" type="self" id="BDU:2023-07138" title="BDU:2023-07138" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-activerecord" epoch="2" version="6.1.6.1" release="4.el7" arch="noarch" src="">
					<filename>rubygem-activerecord-2:6.1.6.1-4.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250203-14</id>
		<issued date="2025-02-03" />
		<updated date="2025-02-03" />
		<title>Множественные уязвимости rubygem-actionpack </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в rubygem-actionpack</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rubygem-actionpack-cve-2023-22795-cve-2023-22792/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-actionpack
                или
                    Установить обновление для пакета(ов) rubygem-actionpack
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rubygem-actionpack-cve-2023-22795-cve-2023-22792/" type="self" id="ROS-20250203-14" title="ROS-20250203-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22795" type="cve" id="CVE-2023-22795" title="CVE-2023-22795" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22792" type="cve" id="CVE-2023-22792" title="CVE-2023-22792" />
			<reference href="https://bdu.fstec.ru/vul/2025-01401" type="self" id="BDU:2025-01401" title="BDU:2025-01401" />
			<reference href="https://bdu.fstec.ru/vul/2025-01402" type="self" id="BDU:2025-01402" title="BDU:2025-01402" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-actionpack" epoch="2" version="6.1.6.1" release="7.el7" arch="noarch" src="">
					<filename>rubygem-actionpack-2:6.1.6.1-7.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250203-15</id>
		<issued date="2025-02-03" />
		<updated date="2025-02-03" />
		<title>Уязвимость rubygem-activesupport </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в rubygem-activesupport</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-activesupport-cve-2023-22796/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-activesupport
                или
                    Установить обновление для пакета(ов) rubygem-activesupport
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-activesupport-cve-2023-22796/" type="self" id="ROS-20250203-15" title="ROS-20250203-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22796" type="cve" id="CVE-2023-22796" title="CVE-2023-22796" />
			<reference href="https://bdu.fstec.ru/vul/2025-01403" type="self" id="BDU:2025-01403" title="BDU:2025-01403" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-activesupport" epoch="2" version="6.1.6.1" release="3.el7" arch="noarch" src="">
					<filename>rubygem-activesupport-2:6.1.6.1-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250204-01</id>
		<issued date="2025-02-04" />
		<updated date="2025-02-04" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-040225/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-040225/" type="self" id="ROS-20250204-01" title="ROS-20250204-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42312" type="cve" id="CVE-2024-42312" title="CVE-2024-42312" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42313" type="cve" id="CVE-2024-42313" title="CVE-2024-42313" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42314" type="cve" id="CVE-2024-42314" title="CVE-2024-42314" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42316" type="cve" id="CVE-2024-42316" title="CVE-2024-42316" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42318" type="cve" id="CVE-2024-42318" title="CVE-2024-42318" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43817" type="cve" id="CVE-2024-43817" title="CVE-2024-43817" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43818" type="cve" id="CVE-2024-43818" title="CVE-2024-43818" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43821" type="cve" id="CVE-2024-43821" title="CVE-2024-43821" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43825" type="cve" id="CVE-2024-43825" title="CVE-2024-43825" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43828" type="cve" id="CVE-2024-43828" title="CVE-2024-43828" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43829" type="cve" id="CVE-2024-43829" title="CVE-2024-43829" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43830" type="cve" id="CVE-2024-43830" title="CVE-2024-43830" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43833" type="cve" id="CVE-2024-43833" title="CVE-2024-43833" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43834" type="cve" id="CVE-2024-43834" title="CVE-2024-43834" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43835" type="cve" id="CVE-2024-43835" title="CVE-2024-43835" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43837" type="cve" id="CVE-2024-43837" title="CVE-2024-43837" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43839" type="cve" id="CVE-2024-43839" title="CVE-2024-43839" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43841" type="cve" id="CVE-2024-43841" title="CVE-2024-43841" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43842" type="cve" id="CVE-2024-43842" title="CVE-2024-43842" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43845" type="cve" id="CVE-2024-43845" title="CVE-2024-43845" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43846" type="cve" id="CVE-2024-43846" title="CVE-2024-43846" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43847" type="cve" id="CVE-2024-43847" title="CVE-2024-43847" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43849" type="cve" id="CVE-2024-43849" title="CVE-2024-43849" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43850" type="cve" id="CVE-2024-43850" title="CVE-2024-43850" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43851" type="cve" id="CVE-2024-43851" title="CVE-2024-43851" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43853" type="cve" id="CVE-2024-43853" title="CVE-2024-43853" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43854" type="cve" id="CVE-2024-43854" title="CVE-2024-43854" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43855" type="cve" id="CVE-2024-43855" title="CVE-2024-43855" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43856" type="cve" id="CVE-2024-43856" title="CVE-2024-43856" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43858" type="cve" id="CVE-2024-43858" title="CVE-2024-43858" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43859" type="cve" id="CVE-2024-43859" title="CVE-2024-43859" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43860" type="cve" id="CVE-2024-43860" title="CVE-2024-43860" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43863" type="cve" id="CVE-2024-43863" title="CVE-2024-43863" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43864" type="cve" id="CVE-2024-43864" title="CVE-2024-43864" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43867" type="cve" id="CVE-2024-43867" title="CVE-2024-43867" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43869" type="cve" id="CVE-2024-43869" title="CVE-2024-43869" />
			<reference href="https://bdu.fstec.ru/vul/2025-01730" type="self" id="BDU:2025-01730" title="BDU:2025-01730" />
			<reference href="https://bdu.fstec.ru/vul/2024-09776" type="self" id="BDU:2024-09776" title="BDU:2024-09776" />
			<reference href="https://bdu.fstec.ru/vul/2024-07926" type="self" id="BDU:2024-07926" title="BDU:2024-07926" />
			<reference href="https://bdu.fstec.ru/vul/2025-01729" type="self" id="BDU:2025-01729" title="BDU:2025-01729" />
			<reference href="https://bdu.fstec.ru/vul/2025-03379" type="self" id="BDU:2025-03379" title="BDU:2025-03379" />
			<reference href="https://bdu.fstec.ru/vul/2025-01728" type="self" id="BDU:2025-01728" title="BDU:2025-01728" />
			<reference href="https://bdu.fstec.ru/vul/2025-01727" type="self" id="BDU:2025-01727" title="BDU:2025-01727" />
			<reference href="https://bdu.fstec.ru/vul/2025-01743" type="self" id="BDU:2025-01743" title="BDU:2025-01743" />
			<reference href="https://bdu.fstec.ru/vul/2024-08300" type="self" id="BDU:2024-08300" title="BDU:2024-08300" />
			<reference href="https://bdu.fstec.ru/vul/2025-01726" type="self" id="BDU:2025-01726" title="BDU:2025-01726" />
			<reference href="https://bdu.fstec.ru/vul/2025-01725" type="self" id="BDU:2025-01725" title="BDU:2025-01725" />
			<reference href="https://bdu.fstec.ru/vul/2025-01724" type="self" id="BDU:2025-01724" title="BDU:2025-01724" />
			<reference href="https://bdu.fstec.ru/vul/2025-01739" type="self" id="BDU:2025-01739" title="BDU:2025-01739" />
			<reference href="https://bdu.fstec.ru/vul/2025-01723" type="self" id="BDU:2025-01723" title="BDU:2025-01723" />
			<reference href="https://bdu.fstec.ru/vul/2025-01742" type="self" id="BDU:2025-01742" title="BDU:2025-01742" />
			<reference href="https://bdu.fstec.ru/vul/2025-01722" type="self" id="BDU:2025-01722" title="BDU:2025-01722" />
			<reference href="https://bdu.fstec.ru/vul/2025-01738" type="self" id="BDU:2025-01738" title="BDU:2025-01738" />
			<reference href="https://bdu.fstec.ru/vul/2025-01737" type="self" id="BDU:2025-01737" title="BDU:2025-01737" />
			<reference href="https://bdu.fstec.ru/vul/2024-08311" type="self" id="BDU:2024-08311" title="BDU:2024-08311" />
			<reference href="https://bdu.fstec.ru/vul/2025-01719" type="self" id="BDU:2025-01719" title="BDU:2025-01719" />
			<reference href="https://bdu.fstec.ru/vul/2025-01721" type="self" id="BDU:2025-01721" title="BDU:2025-01721" />
			<reference href="https://bdu.fstec.ru/vul/2025-01720" type="self" id="BDU:2025-01720" title="BDU:2025-01720" />
			<reference href="https://bdu.fstec.ru/vul/2025-01736" type="self" id="BDU:2025-01736" title="BDU:2025-01736" />
			<reference href="https://bdu.fstec.ru/vul/2025-01718" type="self" id="BDU:2025-01718" title="BDU:2025-01718" />
			<reference href="https://bdu.fstec.ru/vul/2025-01735" type="self" id="BDU:2025-01735" title="BDU:2025-01735" />
			<reference href="https://bdu.fstec.ru/vul/2024-08346" type="self" id="BDU:2024-08346" title="BDU:2024-08346" />
			<reference href="https://bdu.fstec.ru/vul/2025-01717" type="self" id="BDU:2025-01717" title="BDU:2025-01717" />
			<reference href="https://bdu.fstec.ru/vul/2025-01716" type="self" id="BDU:2025-01716" title="BDU:2025-01716" />
			<reference href="https://bdu.fstec.ru/vul/2025-01734" type="self" id="BDU:2025-01734" title="BDU:2025-01734" />
			<reference href="https://bdu.fstec.ru/vul/2024-08533" type="self" id="BDU:2024-08533" title="BDU:2024-08533" />
			<reference href="https://bdu.fstec.ru/vul/2025-01715" type="self" id="BDU:2025-01715" title="BDU:2025-01715" />
			<reference href="https://bdu.fstec.ru/vul/2025-01733" type="self" id="BDU:2025-01733" title="BDU:2025-01733" />
			<reference href="https://bdu.fstec.ru/vul/2025-01714" type="self" id="BDU:2025-01714" title="BDU:2025-01714" />
			<reference href="https://bdu.fstec.ru/vul/2025-01713" type="self" id="BDU:2025-01713" title="BDU:2025-01713" />
			<reference href="https://bdu.fstec.ru/vul/2025-01732" type="self" id="BDU:2025-01732" title="BDU:2025-01732" />
			<reference href="https://bdu.fstec.ru/vul/2025-01731" type="self" id="BDU:2025-01731" title="BDU:2025-01731" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250205-01</id>
		<issued date="2025-02-05" />
		<updated date="2025-02-05" />
		<title>Множественные уязвимости kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-cve-2022-48880-cve-2022-48883/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-cve-2022-48880-cve-2022-48883/" type="self" id="ROS-20250205-01" title="ROS-20250205-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48880" type="cve" id="CVE-2022-48880" title="CVE-2022-48880" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48883" type="cve" id="CVE-2022-48883" title="CVE-2022-48883" />
			<reference href="https://bdu.fstec.ru/vul/2025-01928" type="self" id="BDU:2025-01928" title="BDU:2025-01928" />
			<reference href="https://bdu.fstec.ru/vul/2025-01974" type="self" id="BDU:2025-01974" title="BDU:2025-01974" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250205-02</id>
		<issued date="2025-02-05" />
		<updated date="2025-02-05" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-050225/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-050225/" type="self" id="ROS-20250205-02" title="ROS-20250205-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43870" type="cve" id="CVE-2024-43870" title="CVE-2024-43870" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43871" type="cve" id="CVE-2024-43871" title="CVE-2024-43871" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43873" type="cve" id="CVE-2024-43873" title="CVE-2024-43873" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43875" type="cve" id="CVE-2024-43875" title="CVE-2024-43875" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43876" type="cve" id="CVE-2024-43876" title="CVE-2024-43876" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43877" type="cve" id="CVE-2024-43877" title="CVE-2024-43877" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43879" type="cve" id="CVE-2024-43879" title="CVE-2024-43879" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43880" type="cve" id="CVE-2024-43880" title="CVE-2024-43880" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43881" type="cve" id="CVE-2024-43881" title="CVE-2024-43881" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43882" type="cve" id="CVE-2024-43882" title="CVE-2024-43882" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48880" type="cve" id="CVE-2022-48880" title="CVE-2022-48880" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43883" type="cve" id="CVE-2024-43883" title="CVE-2024-43883" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43884" type="cve" id="CVE-2024-43884" title="CVE-2024-43884" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43889" type="cve" id="CVE-2024-43889" title="CVE-2024-43889" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43890" type="cve" id="CVE-2024-43890" title="CVE-2024-43890" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43891" type="cve" id="CVE-2024-43891" title="CVE-2024-43891" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43892" type="cve" id="CVE-2024-43892" title="CVE-2024-43892" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43893" type="cve" id="CVE-2024-43893" title="CVE-2024-43893" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43894" type="cve" id="CVE-2024-43894" title="CVE-2024-43894" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43897" type="cve" id="CVE-2024-43897" title="CVE-2024-43897" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43902" type="cve" id="CVE-2024-43902" title="CVE-2024-43902" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43905" type="cve" id="CVE-2024-43905" title="CVE-2024-43905" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43907" type="cve" id="CVE-2024-43907" title="CVE-2024-43907" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43908" type="cve" id="CVE-2024-43908" title="CVE-2024-43908" />
			<reference href="https://bdu.fstec.ru/vul/2025-01934" type="self" id="BDU:2025-01934" title="BDU:2025-01934" />
			<reference href="https://bdu.fstec.ru/vul/2025-01933" type="self" id="BDU:2025-01933" title="BDU:2025-01933" />
			<reference href="https://bdu.fstec.ru/vul/2024-08071" type="self" id="BDU:2024-08071" title="BDU:2024-08071" />
			<reference href="https://bdu.fstec.ru/vul/2025-01932" type="self" id="BDU:2025-01932" title="BDU:2025-01932" />
			<reference href="https://bdu.fstec.ru/vul/2025-01972" type="self" id="BDU:2025-01972" title="BDU:2025-01972" />
			<reference href="https://bdu.fstec.ru/vul/2025-01931" type="self" id="BDU:2025-01931" title="BDU:2025-01931" />
			<reference href="https://bdu.fstec.ru/vul/2025-01973" type="self" id="BDU:2025-01973" title="BDU:2025-01973" />
			<reference href="https://bdu.fstec.ru/vul/2025-01930" type="self" id="BDU:2025-01930" title="BDU:2025-01930" />
			<reference href="https://bdu.fstec.ru/vul/2025-01929" type="self" id="BDU:2025-01929" title="BDU:2025-01929" />
			<reference href="https://bdu.fstec.ru/vul/2024-09861" type="self" id="BDU:2024-09861" title="BDU:2024-09861" />
			<reference href="https://bdu.fstec.ru/vul/2025-01928" type="self" id="BDU:2025-01928" title="BDU:2025-01928" />
			<reference href="https://bdu.fstec.ru/vul/2025-01971" type="self" id="BDU:2025-01971" title="BDU:2025-01971" />
			<reference href="https://bdu.fstec.ru/vul/2025-01970" type="self" id="BDU:2025-01970" title="BDU:2025-01970" />
			<reference href="https://bdu.fstec.ru/vul/2025-01927" type="self" id="BDU:2025-01927" title="BDU:2025-01927" />
			<reference href="https://bdu.fstec.ru/vul/2025-01926" type="self" id="BDU:2025-01926" title="BDU:2025-01926" />
			<reference href="https://bdu.fstec.ru/vul/2025-01969" type="self" id="BDU:2025-01969" title="BDU:2025-01969" />
			<reference href="https://bdu.fstec.ru/vul/2025-01924" type="self" id="BDU:2025-01924" title="BDU:2025-01924" />
			<reference href="https://bdu.fstec.ru/vul/2025-01968" type="self" id="BDU:2025-01968" title="BDU:2025-01968" />
			<reference href="https://bdu.fstec.ru/vul/2025-01923" type="self" id="BDU:2025-01923" title="BDU:2025-01923" />
			<reference href="https://bdu.fstec.ru/vul/2025-01922" type="self" id="BDU:2025-01922" title="BDU:2025-01922" />
			<reference href="https://bdu.fstec.ru/vul/2025-01965" type="self" id="BDU:2025-01965" title="BDU:2025-01965" />
			<reference href="https://bdu.fstec.ru/vul/2025-01921" type="self" id="BDU:2025-01921" title="BDU:2025-01921" />
			<reference href="https://bdu.fstec.ru/vul/2025-01964" type="self" id="BDU:2025-01964" title="BDU:2025-01964" />
			<reference href="https://bdu.fstec.ru/vul/2025-01920" type="self" id="BDU:2025-01920" title="BDU:2025-01920" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250206-01</id>
		<issued date="2025-02-06" />
		<updated date="2025-02-06" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-060225/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-060225/" type="self" id="ROS-20250206-01" title="ROS-20250206-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43909" type="cve" id="CVE-2024-43909" title="CVE-2024-43909" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43914" type="cve" id="CVE-2024-43914" title="CVE-2024-43914" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44934" type="cve" id="CVE-2024-44934" title="CVE-2024-44934" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44935" type="cve" id="CVE-2024-44935" title="CVE-2024-44935" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44943" type="cve" id="CVE-2024-44943" title="CVE-2024-44943" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44944" type="cve" id="CVE-2024-44944" title="CVE-2024-44944" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44946" type="cve" id="CVE-2024-44946" title="CVE-2024-44946" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44947" type="cve" id="CVE-2024-44947" title="CVE-2024-44947" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44948" type="cve" id="CVE-2024-44948" title="CVE-2024-44948" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44954" type="cve" id="CVE-2024-44954" title="CVE-2024-44954" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44958" type="cve" id="CVE-2024-44958" title="CVE-2024-44958" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44959" type="cve" id="CVE-2024-44959" title="CVE-2024-44959" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44960" type="cve" id="CVE-2024-44960" title="CVE-2024-44960" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44965" type="cve" id="CVE-2024-44965" title="CVE-2024-44965" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44966" type="cve" id="CVE-2024-44966" title="CVE-2024-44966" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44967" type="cve" id="CVE-2024-44967" title="CVE-2024-44967" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44968" type="cve" id="CVE-2024-44968" title="CVE-2024-44968" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44969" type="cve" id="CVE-2024-44969" title="CVE-2024-44969" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44971" type="cve" id="CVE-2024-44971" title="CVE-2024-44971" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44974" type="cve" id="CVE-2024-44974" title="CVE-2024-44974" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44982" type="cve" id="CVE-2024-44982" title="CVE-2024-44982" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44983" type="cve" id="CVE-2024-44983" title="CVE-2024-44983" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44984" type="cve" id="CVE-2024-44984" title="CVE-2024-44984" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44985" type="cve" id="CVE-2024-44985" title="CVE-2024-44985" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44986" type="cve" id="CVE-2024-44986" title="CVE-2024-44986" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44987" type="cve" id="CVE-2024-44987" title="CVE-2024-44987" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44988" type="cve" id="CVE-2024-44988" title="CVE-2024-44988" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44989" type="cve" id="CVE-2024-44989" title="CVE-2024-44989" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44990" type="cve" id="CVE-2024-44990" title="CVE-2024-44990" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44991" type="cve" id="CVE-2024-44991" title="CVE-2024-44991" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44995" type="cve" id="CVE-2024-44995" title="CVE-2024-44995" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44996" type="cve" id="CVE-2024-44996" title="CVE-2024-44996" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44997" type="cve" id="CVE-2024-44997" title="CVE-2024-44997" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44998" type="cve" id="CVE-2024-44998" title="CVE-2024-44998" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44999" type="cve" id="CVE-2024-44999" title="CVE-2024-44999" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45000" type="cve" id="CVE-2024-45000" title="CVE-2024-45000" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45001" type="cve" id="CVE-2024-45001" title="CVE-2024-45001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45002" type="cve" id="CVE-2024-45002" title="CVE-2024-45002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45003" type="cve" id="CVE-2024-45003" title="CVE-2024-45003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45005" type="cve" id="CVE-2024-45005" title="CVE-2024-45005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45006" type="cve" id="CVE-2024-45006" title="CVE-2024-45006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45007" type="cve" id="CVE-2024-45007" title="CVE-2024-45007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45008" type="cve" id="CVE-2024-45008" title="CVE-2024-45008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45009" type="cve" id="CVE-2024-45009" title="CVE-2024-45009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45011" type="cve" id="CVE-2024-45011" title="CVE-2024-45011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45012" type="cve" id="CVE-2024-45012" title="CVE-2024-45012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45016" type="cve" id="CVE-2024-45016" title="CVE-2024-45016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45018" type="cve" id="CVE-2024-45018" title="CVE-2024-45018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45019" type="cve" id="CVE-2024-45019" title="CVE-2024-45019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45020" type="cve" id="CVE-2024-45020" title="CVE-2024-45020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45021" type="cve" id="CVE-2024-45021" title="CVE-2024-45021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45022" type="cve" id="CVE-2024-45022" title="CVE-2024-45022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45025" type="cve" id="CVE-2024-45025" title="CVE-2024-45025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45026" type="cve" id="CVE-2024-45026" title="CVE-2024-45026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45028" type="cve" id="CVE-2024-45028" title="CVE-2024-45028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45029" type="cve" id="CVE-2024-45029" title="CVE-2024-45029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45030" type="cve" id="CVE-2024-45030" title="CVE-2024-45030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46672" type="cve" id="CVE-2024-46672" title="CVE-2024-46672" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46673" type="cve" id="CVE-2024-46673" title="CVE-2024-46673" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46674" type="cve" id="CVE-2024-46674" title="CVE-2024-46674" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46675" type="cve" id="CVE-2024-46675" title="CVE-2024-46675" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46676" type="cve" id="CVE-2024-46676" title="CVE-2024-46676" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46677" type="cve" id="CVE-2024-46677" title="CVE-2024-46677" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46679" type="cve" id="CVE-2024-46679" title="CVE-2024-46679" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46680" type="cve" id="CVE-2024-46680" title="CVE-2024-46680" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46685" type="cve" id="CVE-2024-46685" title="CVE-2024-46685" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46686" type="cve" id="CVE-2024-46686" title="CVE-2024-46686" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46687" type="cve" id="CVE-2024-46687" title="CVE-2024-46687" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46689" type="cve" id="CVE-2024-46689" title="CVE-2024-46689" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46692" type="cve" id="CVE-2024-46692" title="CVE-2024-46692" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46693" type="cve" id="CVE-2024-46693" title="CVE-2024-46693" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46694" type="cve" id="CVE-2024-46694" title="CVE-2024-46694" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46702" type="cve" id="CVE-2024-46702" title="CVE-2024-46702" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46706" type="cve" id="CVE-2024-46706" title="CVE-2024-46706" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46707" type="cve" id="CVE-2024-46707" title="CVE-2024-46707" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46709" type="cve" id="CVE-2024-46709" title="CVE-2024-46709" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46711" type="cve" id="CVE-2024-46711" title="CVE-2024-46711" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46713" type="cve" id="CVE-2024-46713" title="CVE-2024-46713" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46714" type="cve" id="CVE-2024-46714" title="CVE-2024-46714" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46719" type="cve" id="CVE-2024-46719" title="CVE-2024-46719" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46721" type="cve" id="CVE-2024-46721" title="CVE-2024-46721" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46722" type="cve" id="CVE-2024-46722" title="CVE-2024-46722" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46723" type="cve" id="CVE-2024-46723" title="CVE-2024-46723" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46724" type="cve" id="CVE-2024-46724" title="CVE-2024-46724" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46725" type="cve" id="CVE-2024-46725" title="CVE-2024-46725" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46731" type="cve" id="CVE-2024-46731" title="CVE-2024-46731" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46732" type="cve" id="CVE-2024-46732" title="CVE-2024-46732" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46734" type="cve" id="CVE-2024-46734" title="CVE-2024-46734" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46735" type="cve" id="CVE-2024-46735" title="CVE-2024-46735" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46738" type="cve" id="CVE-2024-46738" title="CVE-2024-46738" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46739" type="cve" id="CVE-2024-46739" title="CVE-2024-46739" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46740" type="cve" id="CVE-2024-46740" title="CVE-2024-46740" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46741" type="cve" id="CVE-2024-46741" title="CVE-2024-46741" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46743" type="cve" id="CVE-2024-46743" title="CVE-2024-46743" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46744" type="cve" id="CVE-2024-46744" title="CVE-2024-46744" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46745" type="cve" id="CVE-2024-46745" title="CVE-2024-46745" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46746" type="cve" id="CVE-2024-46746" title="CVE-2024-46746" />
			<reference href="https://bdu.fstec.ru/vul/2025-01915" type="self" id="BDU:2025-01915" title="BDU:2025-01915" />
			<reference href="https://bdu.fstec.ru/vul/2025-01914" type="self" id="BDU:2025-01914" title="BDU:2025-01914" />
			<reference href="https://bdu.fstec.ru/vul/2024-09527" type="self" id="BDU:2024-09527" title="BDU:2024-09527" />
			<reference href="https://bdu.fstec.ru/vul/2025-01913" type="self" id="BDU:2025-01913" title="BDU:2025-01913" />
			<reference href="https://bdu.fstec.ru/vul/2025-01912" type="self" id="BDU:2025-01912" title="BDU:2025-01912" />
			<reference href="https://bdu.fstec.ru/vul/2024-08316" type="self" id="BDU:2024-08316" title="BDU:2024-08316" />
			<reference href="https://bdu.fstec.ru/vul/2024-08317" type="self" id="BDU:2024-08317" title="BDU:2024-08317" />
			<reference href="https://bdu.fstec.ru/vul/2024-08320" type="self" id="BDU:2024-08320" title="BDU:2024-08320" />
			<reference href="https://bdu.fstec.ru/vul/2025-01954" type="self" id="BDU:2025-01954" title="BDU:2025-01954" />
			<reference href="https://bdu.fstec.ru/vul/2025-01911" type="self" id="BDU:2025-01911" title="BDU:2025-01911" />
			<reference href="https://bdu.fstec.ru/vul/2025-01910" type="self" id="BDU:2025-01910" title="BDU:2025-01910" />
			<reference href="https://bdu.fstec.ru/vul/2025-01951" type="self" id="BDU:2025-01951" title="BDU:2025-01951" />
			<reference href="https://bdu.fstec.ru/vul/2025-01957" type="self" id="BDU:2025-01957" title="BDU:2025-01957" />
			<reference href="https://bdu.fstec.ru/vul/2025-01909" type="self" id="BDU:2025-01909" title="BDU:2025-01909" />
			<reference href="https://bdu.fstec.ru/vul/2025-01908" type="self" id="BDU:2025-01908" title="BDU:2025-01908" />
			<reference href="https://bdu.fstec.ru/vul/2025-01953" type="self" id="BDU:2025-01953" title="BDU:2025-01953" />
			<reference href="https://bdu.fstec.ru/vul/2025-01952" type="self" id="BDU:2025-01952" title="BDU:2025-01952" />
			<reference href="https://bdu.fstec.ru/vul/2025-01907" type="self" id="BDU:2025-01907" title="BDU:2025-01907" />
			<reference href="https://bdu.fstec.ru/vul/2025-01950" type="self" id="BDU:2025-01950" title="BDU:2025-01950" />
			<reference href="https://bdu.fstec.ru/vul/2024-06733" type="self" id="BDU:2024-06733" title="BDU:2024-06733" />
			<reference href="https://bdu.fstec.ru/vul/2025-01906" type="self" id="BDU:2025-01906" title="BDU:2025-01906" />
			<reference href="https://bdu.fstec.ru/vul/2024-09524" type="self" id="BDU:2024-09524" title="BDU:2024-09524" />
			<reference href="https://bdu.fstec.ru/vul/2025-01949" type="self" id="BDU:2025-01949" title="BDU:2025-01949" />
			<reference href="https://bdu.fstec.ru/vul/2024-06751" type="self" id="BDU:2024-06751" title="BDU:2024-06751" />
			<reference href="https://bdu.fstec.ru/vul/2024-06753" type="self" id="BDU:2024-06753" title="BDU:2024-06753" />
			<reference href="https://bdu.fstec.ru/vul/2024-09526" type="self" id="BDU:2024-09526" title="BDU:2024-09526" />
			<reference href="https://bdu.fstec.ru/vul/2025-00776" type="self" id="BDU:2025-00776" title="BDU:2025-00776" />
			<reference href="https://bdu.fstec.ru/vul/2025-01948" type="self" id="BDU:2025-01948" title="BDU:2025-01948" />
			<reference href="https://bdu.fstec.ru/vul/2025-01905" type="self" id="BDU:2025-01905" title="BDU:2025-01905" />
			<reference href="https://bdu.fstec.ru/vul/2024-06759" type="self" id="BDU:2024-06759" title="BDU:2024-06759" />
			<reference href="https://bdu.fstec.ru/vul/2025-01947" type="self" id="BDU:2025-01947" title="BDU:2025-01947" />
			<reference href="https://bdu.fstec.ru/vul/2025-01813" type="self" id="BDU:2025-01813" title="BDU:2025-01813" />
			<reference href="https://bdu.fstec.ru/vul/2024-08228" type="self" id="BDU:2024-08228" title="BDU:2024-08228" />
			<reference href="https://bdu.fstec.ru/vul/2024-06745" type="self" id="BDU:2024-06745" title="BDU:2024-06745" />
			<reference href="https://bdu.fstec.ru/vul/2024-06732" type="self" id="BDU:2024-06732" title="BDU:2024-06732" />
			<reference href="https://bdu.fstec.ru/vul/2025-01963" type="self" id="BDU:2025-01963" title="BDU:2025-01963" />
			<reference href="https://bdu.fstec.ru/vul/2025-01808" type="self" id="BDU:2025-01808" title="BDU:2025-01808" />
			<reference href="https://bdu.fstec.ru/vul/2025-01807" type="self" id="BDU:2025-01807" title="BDU:2025-01807" />
			<reference href="https://bdu.fstec.ru/vul/2024-06716" type="self" id="BDU:2024-06716" title="BDU:2024-06716" />
			<reference href="https://bdu.fstec.ru/vul/2024-06715" type="self" id="BDU:2024-06715" title="BDU:2024-06715" />
			<reference href="https://bdu.fstec.ru/vul/2025-01945" type="self" id="BDU:2025-01945" title="BDU:2025-01945" />
			<reference href="https://bdu.fstec.ru/vul/2025-01956" type="self" id="BDU:2025-01956" title="BDU:2025-01956" />
			<reference href="https://bdu.fstec.ru/vul/2025-01806" type="self" id="BDU:2025-01806" title="BDU:2025-01806" />
			<reference href="https://bdu.fstec.ru/vul/2025-01805" type="self" id="BDU:2025-01805" title="BDU:2025-01805" />
			<reference href="https://bdu.fstec.ru/vul/2025-01916" type="self" id="BDU:2025-01916" title="BDU:2025-01916" />
			<reference href="https://bdu.fstec.ru/vul/2025-01787" type="self" id="BDU:2025-01787" title="BDU:2025-01787" />
			<reference href="https://bdu.fstec.ru/vul/2025-01943" type="self" id="BDU:2025-01943" title="BDU:2025-01943" />
			<reference href="https://bdu.fstec.ru/vul/2025-01919" type="self" id="BDU:2025-01919" title="BDU:2025-01919" />
			<reference href="https://bdu.fstec.ru/vul/2025-01786" type="self" id="BDU:2025-01786" title="BDU:2025-01786" />
			<reference href="https://bdu.fstec.ru/vul/2025-01785" type="self" id="BDU:2025-01785" title="BDU:2025-01785" />
			<reference href="https://bdu.fstec.ru/vul/2025-01784" type="self" id="BDU:2025-01784" title="BDU:2025-01784" />
			<reference href="https://bdu.fstec.ru/vul/2025-01946" type="self" id="BDU:2025-01946" title="BDU:2025-01946" />
			<reference href="https://bdu.fstec.ru/vul/2025-01783" type="self" id="BDU:2025-01783" title="BDU:2025-01783" />
			<reference href="https://bdu.fstec.ru/vul/2024-08075" type="self" id="BDU:2024-08075" title="BDU:2024-08075" />
			<reference href="https://bdu.fstec.ru/vul/2025-01782" type="self" id="BDU:2025-01782" title="BDU:2025-01782" />
			<reference href="https://bdu.fstec.ru/vul/2025-01944" type="self" id="BDU:2025-01944" title="BDU:2025-01944" />
			<reference href="https://bdu.fstec.ru/vul/2025-01918" type="self" id="BDU:2025-01918" title="BDU:2025-01918" />
			<reference href="https://bdu.fstec.ru/vul/2025-01781" type="self" id="BDU:2025-01781" title="BDU:2025-01781" />
			<reference href="https://bdu.fstec.ru/vul/2024-08531" type="self" id="BDU:2024-08531" title="BDU:2024-08531" />
			<reference href="https://bdu.fstec.ru/vul/2024-08333" type="self" id="BDU:2024-08333" title="BDU:2024-08333" />
			<reference href="https://bdu.fstec.ru/vul/2025-01917" type="self" id="BDU:2025-01917" title="BDU:2025-01917" />
			<reference href="https://bdu.fstec.ru/vul/2025-01942" type="self" id="BDU:2025-01942" title="BDU:2025-01942" />
			<reference href="https://bdu.fstec.ru/vul/2025-01770" type="self" id="BDU:2025-01770" title="BDU:2025-01770" />
			<reference href="https://bdu.fstec.ru/vul/2025-01769" type="self" id="BDU:2025-01769" title="BDU:2025-01769" />
			<reference href="https://bdu.fstec.ru/vul/2025-01941" type="self" id="BDU:2025-01941" title="BDU:2025-01941" />
			<reference href="https://bdu.fstec.ru/vul/2025-01768" type="self" id="BDU:2025-01768" title="BDU:2025-01768" />
			<reference href="https://bdu.fstec.ru/vul/2025-01767" type="self" id="BDU:2025-01767" title="BDU:2025-01767" />
			<reference href="https://bdu.fstec.ru/vul/2024-09529" type="self" id="BDU:2024-09529" title="BDU:2024-09529" />
			<reference href="https://bdu.fstec.ru/vul/2025-01766" type="self" id="BDU:2025-01766" title="BDU:2025-01766" />
			<reference href="https://bdu.fstec.ru/vul/2025-01940" type="self" id="BDU:2025-01940" title="BDU:2025-01940" />
			<reference href="https://bdu.fstec.ru/vul/2025-01939" type="self" id="BDU:2025-01939" title="BDU:2025-01939" />
			<reference href="https://bdu.fstec.ru/vul/2025-01765" type="self" id="BDU:2025-01765" title="BDU:2025-01765" />
			<reference href="https://bdu.fstec.ru/vul/2025-01938" type="self" id="BDU:2025-01938" title="BDU:2025-01938" />
			<reference href="https://bdu.fstec.ru/vul/2025-01764" type="self" id="BDU:2025-01764" title="BDU:2025-01764" />
			<reference href="https://bdu.fstec.ru/vul/2025-01763" type="self" id="BDU:2025-01763" title="BDU:2025-01763" />
			<reference href="https://bdu.fstec.ru/vul/2025-01937" type="self" id="BDU:2025-01937" title="BDU:2025-01937" />
			<reference href="https://bdu.fstec.ru/vul/2025-01751" type="self" id="BDU:2025-01751" title="BDU:2025-01751" />
			<reference href="https://bdu.fstec.ru/vul/2024-10375" type="self" id="BDU:2024-10375" title="BDU:2024-10375" />
			<reference href="https://bdu.fstec.ru/vul/2025-01752" type="self" id="BDU:2025-01752" title="BDU:2025-01752" />
			<reference href="https://bdu.fstec.ru/vul/2025-01955" type="self" id="BDU:2025-01955" title="BDU:2025-01955" />
			<reference href="https://bdu.fstec.ru/vul/2025-01750" type="self" id="BDU:2025-01750" title="BDU:2025-01750" />
			<reference href="https://bdu.fstec.ru/vul/2024-08328" type="self" id="BDU:2024-08328" title="BDU:2024-08328" />
			<reference href="https://bdu.fstec.ru/vul/2024-08133" type="self" id="BDU:2024-08133" title="BDU:2024-08133" />
			<reference href="https://bdu.fstec.ru/vul/2024-08135" type="self" id="BDU:2024-08135" title="BDU:2024-08135" />
			<reference href="https://bdu.fstec.ru/vul/2024-08087" type="self" id="BDU:2024-08087" title="BDU:2024-08087" />
			<reference href="https://bdu.fstec.ru/vul/2024-08235" type="self" id="BDU:2024-08235" title="BDU:2024-08235" />
			<reference href="https://bdu.fstec.ru/vul/2025-01747" type="self" id="BDU:2025-01747" title="BDU:2025-01747" />
			<reference href="https://bdu.fstec.ru/vul/2025-01936" type="self" id="BDU:2025-01936" title="BDU:2025-01936" />
			<reference href="https://bdu.fstec.ru/vul/2025-01745" type="self" id="BDU:2025-01745" title="BDU:2025-01745" />
			<reference href="https://bdu.fstec.ru/vul/2024-08083" type="self" id="BDU:2024-08083" title="BDU:2024-08083" />
			<reference href="https://bdu.fstec.ru/vul/2025-01744" type="self" id="BDU:2025-01744" title="BDU:2025-01744" />
			<reference href="https://bdu.fstec.ru/vul/2024-08184" type="self" id="BDU:2024-08184" title="BDU:2024-08184" />
			<reference href="https://bdu.fstec.ru/vul/2024-08132" type="self" id="BDU:2024-08132" title="BDU:2024-08132" />
			<reference href="https://bdu.fstec.ru/vul/2024-08084" type="self" id="BDU:2024-08084" title="BDU:2024-08084" />
			<reference href="https://bdu.fstec.ru/vul/2024-08231" type="self" id="BDU:2024-08231" title="BDU:2024-08231" />
			<reference href="https://bdu.fstec.ru/vul/2025-01935" type="self" id="BDU:2025-01935" title="BDU:2025-01935" />
			<reference href="https://bdu.fstec.ru/vul/2024-08296" type="self" id="BDU:2024-08296" title="BDU:2024-08296" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250210-01</id>
		<issued date="2025-02-10" />
		<updated date="2025-02-10" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-100225/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-100225/" type="self" id="ROS-20250210-01" title="ROS-20250210-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46750" type="cve" id="CVE-2024-46750" title="CVE-2024-46750" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46747" type="cve" id="CVE-2024-46747" title="CVE-2024-46747" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46752" type="cve" id="CVE-2024-46752" title="CVE-2024-46752" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46755" type="cve" id="CVE-2024-46755" title="CVE-2024-46755" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46756" type="cve" id="CVE-2024-46756" title="CVE-2024-46756" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46757" type="cve" id="CVE-2024-46757" title="CVE-2024-46757" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46758" type="cve" id="CVE-2024-46758" title="CVE-2024-46758" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46759" type="cve" id="CVE-2024-46759" title="CVE-2024-46759" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46761" type="cve" id="CVE-2024-46761" title="CVE-2024-46761" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46763" type="cve" id="CVE-2024-46763" title="CVE-2024-46763" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46767" type="cve" id="CVE-2024-46767" title="CVE-2024-46767" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46768" type="cve" id="CVE-2024-46768" title="CVE-2024-46768" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46771" type="cve" id="CVE-2024-46771" title="CVE-2024-46771" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46777" type="cve" id="CVE-2024-46777" title="CVE-2024-46777" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46780" type="cve" id="CVE-2024-46780" title="CVE-2024-46780" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46781" type="cve" id="CVE-2024-46781" title="CVE-2024-46781" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46804" type="cve" id="CVE-2024-46804" title="CVE-2024-46804" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46805" type="cve" id="CVE-2024-46805" title="CVE-2024-46805" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46807" type="cve" id="CVE-2024-46807" title="CVE-2024-46807" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46810" type="cve" id="CVE-2024-46810" title="CVE-2024-46810" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46814" type="cve" id="CVE-2024-46814" title="CVE-2024-46814" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46815" type="cve" id="CVE-2024-46815" title="CVE-2024-46815" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46817" type="cve" id="CVE-2024-46817" title="CVE-2024-46817" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46818" type="cve" id="CVE-2024-46818" title="CVE-2024-46818" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46819" type="cve" id="CVE-2024-46819" title="CVE-2024-46819" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46822" type="cve" id="CVE-2024-46822" title="CVE-2024-46822" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46828" type="cve" id="CVE-2024-46828" title="CVE-2024-46828" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46829" type="cve" id="CVE-2024-46829" title="CVE-2024-46829" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46832" type="cve" id="CVE-2024-46832" title="CVE-2024-46832" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46840" type="cve" id="CVE-2024-46840" title="CVE-2024-46840" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46844" type="cve" id="CVE-2024-46844" title="CVE-2024-46844" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46846" type="cve" id="CVE-2024-46846" title="CVE-2024-46846" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47659" type="cve" id="CVE-2024-47659" title="CVE-2024-47659" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47660" type="cve" id="CVE-2024-47660" title="CVE-2024-47660" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47663" type="cve" id="CVE-2024-47663" title="CVE-2024-47663" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47665" type="cve" id="CVE-2024-47665" title="CVE-2024-47665" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47667" type="cve" id="CVE-2024-47667" title="CVE-2024-47667" />
			<reference href="https://bdu.fstec.ru/vul/2025-01668" type="self" id="BDU:2025-01668" title="BDU:2025-01668" />
			<reference href="https://bdu.fstec.ru/vul/2024-08162" type="self" id="BDU:2024-08162" title="BDU:2024-08162" />
			<reference href="https://bdu.fstec.ru/vul/2025-01667" type="self" id="BDU:2025-01667" title="BDU:2025-01667" />
			<reference href="https://bdu.fstec.ru/vul/2025-01666" type="self" id="BDU:2025-01666" title="BDU:2025-01666" />
			<reference href="https://bdu.fstec.ru/vul/2024-08131" type="self" id="BDU:2024-08131" title="BDU:2024-08131" />
			<reference href="https://bdu.fstec.ru/vul/2024-08128" type="self" id="BDU:2024-08128" title="BDU:2024-08128" />
			<reference href="https://bdu.fstec.ru/vul/2024-08074" type="self" id="BDU:2024-08074" title="BDU:2024-08074" />
			<reference href="https://bdu.fstec.ru/vul/2024-08085" type="self" id="BDU:2024-08085" title="BDU:2024-08085" />
			<reference href="https://bdu.fstec.ru/vul/2025-01673" type="self" id="BDU:2025-01673" title="BDU:2025-01673" />
			<reference href="https://bdu.fstec.ru/vul/2025-01665" type="self" id="BDU:2025-01665" title="BDU:2025-01665" />
			<reference href="https://bdu.fstec.ru/vul/2025-01664" type="self" id="BDU:2025-01664" title="BDU:2025-01664" />
			<reference href="https://bdu.fstec.ru/vul/2025-01675" type="self" id="BDU:2025-01675" title="BDU:2025-01675" />
			<reference href="https://bdu.fstec.ru/vul/2025-01661" type="self" id="BDU:2025-01661" title="BDU:2025-01661" />
			<reference href="https://bdu.fstec.ru/vul/2025-01662" type="self" id="BDU:2025-01662" title="BDU:2025-01662" />
			<reference href="https://bdu.fstec.ru/vul/2025-01663" type="self" id="BDU:2025-01663" title="BDU:2025-01663" />
			<reference href="https://bdu.fstec.ru/vul/2025-01660" type="self" id="BDU:2025-01660" title="BDU:2025-01660" />
			<reference href="https://bdu.fstec.ru/vul/2024-08525" type="self" id="BDU:2024-08525" title="BDU:2024-08525" />
			<reference href="https://bdu.fstec.ru/vul/2025-01674" type="self" id="BDU:2025-01674" title="BDU:2025-01674" />
			<reference href="https://bdu.fstec.ru/vul/2025-01659" type="self" id="BDU:2025-01659" title="BDU:2025-01659" />
			<reference href="https://bdu.fstec.ru/vul/2025-01658" type="self" id="BDU:2025-01658" title="BDU:2025-01658" />
			<reference href="https://bdu.fstec.ru/vul/2024-08528" type="self" id="BDU:2024-08528" title="BDU:2024-08528" />
			<reference href="https://bdu.fstec.ru/vul/2025-01672" type="self" id="BDU:2025-01672" title="BDU:2025-01672" />
			<reference href="https://bdu.fstec.ru/vul/2025-01671" type="self" id="BDU:2025-01671" title="BDU:2025-01671" />
			<reference href="https://bdu.fstec.ru/vul/2024-08529" type="self" id="BDU:2024-08529" title="BDU:2024-08529" />
			<reference href="https://bdu.fstec.ru/vul/2025-01657" type="self" id="BDU:2025-01657" title="BDU:2025-01657" />
			<reference href="https://bdu.fstec.ru/vul/2025-01669" type="self" id="BDU:2025-01669" title="BDU:2025-01669" />
			<reference href="https://bdu.fstec.ru/vul/2025-01656" type="self" id="BDU:2025-01656" title="BDU:2025-01656" />
			<reference href="https://bdu.fstec.ru/vul/2025-01655" type="self" id="BDU:2025-01655" title="BDU:2025-01655" />
			<reference href="https://bdu.fstec.ru/vul/2025-01677" type="self" id="BDU:2025-01677" title="BDU:2025-01677" />
			<reference href="https://bdu.fstec.ru/vul/2025-01654" type="self" id="BDU:2025-01654" title="BDU:2025-01654" />
			<reference href="https://bdu.fstec.ru/vul/2024-08234" type="self" id="BDU:2024-08234" title="BDU:2024-08234" />
			<reference href="https://bdu.fstec.ru/vul/2025-01653" type="self" id="BDU:2025-01653" title="BDU:2025-01653" />
			<reference href="https://bdu.fstec.ru/vul/2024-08984" type="self" id="BDU:2024-08984" title="BDU:2024-08984" />
			<reference href="https://bdu.fstec.ru/vul/2025-01670" type="self" id="BDU:2025-01670" title="BDU:2025-01670" />
			<reference href="https://bdu.fstec.ru/vul/2025-01651" type="self" id="BDU:2025-01651" title="BDU:2025-01651" />
			<reference href="https://bdu.fstec.ru/vul/2025-01652" type="self" id="BDU:2025-01652" title="BDU:2025-01652" />
			<reference href="https://bdu.fstec.ru/vul/2025-01676" type="self" id="BDU:2025-01676" title="BDU:2025-01676" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250211-01</id>
		<issued date="2025-02-11" />
		<updated date="2025-02-11" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-110225/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-110225/" type="self" id="ROS-20250211-01" title="ROS-20250211-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48946" type="cve" id="CVE-2022-48946" title="CVE-2022-48946" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48947" type="cve" id="CVE-2022-48947" title="CVE-2022-48947" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48948" type="cve" id="CVE-2022-48948" title="CVE-2022-48948" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48949" type="cve" id="CVE-2022-48949" title="CVE-2022-48949" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48950" type="cve" id="CVE-2022-48950" title="CVE-2022-48950" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48951" type="cve" id="CVE-2022-48951" title="CVE-2022-48951" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48952" type="cve" id="CVE-2022-48952" title="CVE-2022-48952" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48953" type="cve" id="CVE-2022-48953" title="CVE-2022-48953" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48954" type="cve" id="CVE-2022-48954" title="CVE-2022-48954" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48955" type="cve" id="CVE-2022-48955" title="CVE-2022-48955" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48956" type="cve" id="CVE-2022-48956" title="CVE-2022-48956" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48957" type="cve" id="CVE-2022-48957" title="CVE-2022-48957" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48958" type="cve" id="CVE-2022-48958" title="CVE-2022-48958" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48959" type="cve" id="CVE-2022-48959" title="CVE-2022-48959" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48960" type="cve" id="CVE-2022-48960" title="CVE-2022-48960" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48961" type="cve" id="CVE-2022-48961" title="CVE-2022-48961" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48962" type="cve" id="CVE-2022-48962" title="CVE-2022-48962" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48965" type="cve" id="CVE-2022-48965" title="CVE-2022-48965" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48966" type="cve" id="CVE-2022-48966" title="CVE-2022-48966" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48967" type="cve" id="CVE-2022-48967" title="CVE-2022-48967" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48968" type="cve" id="CVE-2022-48968" title="CVE-2022-48968" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48969" type="cve" id="CVE-2022-48969" title="CVE-2022-48969" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48970" type="cve" id="CVE-2022-48970" title="CVE-2022-48970" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48971" type="cve" id="CVE-2022-48971" title="CVE-2022-48971" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48972" type="cve" id="CVE-2022-48972" title="CVE-2022-48972" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48973" type="cve" id="CVE-2022-48973" title="CVE-2022-48973" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48975" type="cve" id="CVE-2022-48975" title="CVE-2022-48975" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48977" type="cve" id="CVE-2022-48977" title="CVE-2022-48977" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48978" type="cve" id="CVE-2022-48978" title="CVE-2022-48978" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48980" type="cve" id="CVE-2022-48980" title="CVE-2022-48980" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48981" type="cve" id="CVE-2022-48981" title="CVE-2022-48981" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48982" type="cve" id="CVE-2022-48982" title="CVE-2022-48982" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48983" type="cve" id="CVE-2022-48983" title="CVE-2022-48983" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48985" type="cve" id="CVE-2022-48985" title="CVE-2022-48985" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48986" type="cve" id="CVE-2022-48986" title="CVE-2022-48986" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48987" type="cve" id="CVE-2022-48987" title="CVE-2022-48987" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48988" type="cve" id="CVE-2022-48988" title="CVE-2022-48988" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47668" type="cve" id="CVE-2024-47668" title="CVE-2024-47668" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47669" type="cve" id="CVE-2024-47669" title="CVE-2024-47669" />
			<reference href="https://bdu.fstec.ru/vul/2025-01702" type="self" id="BDU:2025-01702" title="BDU:2025-01702" />
			<reference href="https://bdu.fstec.ru/vul/2025-01695" type="self" id="BDU:2025-01695" title="BDU:2025-01695" />
			<reference href="https://bdu.fstec.ru/vul/2025-01694" type="self" id="BDU:2025-01694" title="BDU:2025-01694" />
			<reference href="https://bdu.fstec.ru/vul/2025-01693" type="self" id="BDU:2025-01693" title="BDU:2025-01693" />
			<reference href="https://bdu.fstec.ru/vul/2024-09780" type="self" id="BDU:2024-09780" title="BDU:2024-09780" />
			<reference href="https://bdu.fstec.ru/vul/2025-01692" type="self" id="BDU:2025-01692" title="BDU:2025-01692" />
			<reference href="https://bdu.fstec.ru/vul/2025-01709" type="self" id="BDU:2025-01709" title="BDU:2025-01709" />
			<reference href="https://bdu.fstec.ru/vul/2025-01691" type="self" id="BDU:2025-01691" title="BDU:2025-01691" />
			<reference href="https://bdu.fstec.ru/vul/2024-10087" type="self" id="BDU:2024-10087" title="BDU:2024-10087" />
			<reference href="https://bdu.fstec.ru/vul/2025-01690" type="self" id="BDU:2025-01690" title="BDU:2025-01690" />
			<reference href="https://bdu.fstec.ru/vul/2024-09781" type="self" id="BDU:2024-09781" title="BDU:2024-09781" />
			<reference href="https://bdu.fstec.ru/vul/2025-01708" type="self" id="BDU:2025-01708" title="BDU:2025-01708" />
			<reference href="https://bdu.fstec.ru/vul/2025-01701" type="self" id="BDU:2025-01701" title="BDU:2025-01701" />
			<reference href="https://bdu.fstec.ru/vul/2025-01700" type="self" id="BDU:2025-01700" title="BDU:2025-01700" />
			<reference href="https://bdu.fstec.ru/vul/2024-09782" type="self" id="BDU:2024-09782" title="BDU:2024-09782" />
			<reference href="https://bdu.fstec.ru/vul/2025-01699" type="self" id="BDU:2025-01699" title="BDU:2025-01699" />
			<reference href="https://bdu.fstec.ru/vul/2024-09783" type="self" id="BDU:2024-09783" title="BDU:2024-09783" />
			<reference href="https://bdu.fstec.ru/vul/2025-01698" type="self" id="BDU:2025-01698" title="BDU:2025-01698" />
			<reference href="https://bdu.fstec.ru/vul/2025-01697" type="self" id="BDU:2025-01697" title="BDU:2025-01697" />
			<reference href="https://bdu.fstec.ru/vul/2025-01696" type="self" id="BDU:2025-01696" title="BDU:2025-01696" />
			<reference href="https://bdu.fstec.ru/vul/2025-01689" type="self" id="BDU:2025-01689" title="BDU:2025-01689" />
			<reference href="https://bdu.fstec.ru/vul/2025-01712" type="self" id="BDU:2025-01712" title="BDU:2025-01712" />
			<reference href="https://bdu.fstec.ru/vul/2025-01711" type="self" id="BDU:2025-01711" title="BDU:2025-01711" />
			<reference href="https://bdu.fstec.ru/vul/2025-01686" type="self" id="BDU:2025-01686" title="BDU:2025-01686" />
			<reference href="https://bdu.fstec.ru/vul/2025-01685" type="self" id="BDU:2025-01685" title="BDU:2025-01685" />
			<reference href="https://bdu.fstec.ru/vul/2025-01707" type="self" id="BDU:2025-01707" title="BDU:2025-01707" />
			<reference href="https://bdu.fstec.ru/vul/2025-01684" type="self" id="BDU:2025-01684" title="BDU:2025-01684" />
			<reference href="https://bdu.fstec.ru/vul/2025-01706" type="self" id="BDU:2025-01706" title="BDU:2025-01706" />
			<reference href="https://bdu.fstec.ru/vul/2025-01683" type="self" id="BDU:2025-01683" title="BDU:2025-01683" />
			<reference href="https://bdu.fstec.ru/vul/2025-01682" type="self" id="BDU:2025-01682" title="BDU:2025-01682" />
			<reference href="https://bdu.fstec.ru/vul/2025-01705" type="self" id="BDU:2025-01705" title="BDU:2025-01705" />
			<reference href="https://bdu.fstec.ru/vul/2025-01681" type="self" id="BDU:2025-01681" title="BDU:2025-01681" />
			<reference href="https://bdu.fstec.ru/vul/2025-01704" type="self" id="BDU:2025-01704" title="BDU:2025-01704" />
			<reference href="https://bdu.fstec.ru/vul/2025-01710" type="self" id="BDU:2025-01710" title="BDU:2025-01710" />
			<reference href="https://bdu.fstec.ru/vul/2025-01680" type="self" id="BDU:2025-01680" title="BDU:2025-01680" />
			<reference href="https://bdu.fstec.ru/vul/2025-01679" type="self" id="BDU:2025-01679" title="BDU:2025-01679" />
			<reference href="https://bdu.fstec.ru/vul/2024-10099" type="self" id="BDU:2024-10099" title="BDU:2024-10099" />
			<reference href="https://bdu.fstec.ru/vul/2025-01678" type="self" id="BDU:2025-01678" title="BDU:2025-01678" />
			<reference href="https://bdu.fstec.ru/vul/2025-01703" type="self" id="BDU:2025-01703" title="BDU:2025-01703" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250212-01</id>
		<issued date="2025-02-12" />
		<updated date="2025-02-12" />
		<title>Уязвимость nextcloud </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nextcloud</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nextcloud-cve-2023-32320/</description>
               <solution>
                    Запретить использование в ОС пакета nextcloud
                или
                    Установить обновление для пакета(ов) nextcloud
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nextcloud-cve-2023-32320/" type="self" id="ROS-20250212-01" title="ROS-20250212-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32320" type="cve" id="CVE-2023-32320" title="CVE-2023-32320" />
			<reference href="https://bdu.fstec.ru/vul/2024-00713" type="self" id="BDU:2024-00713" title="BDU:2024-00713" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nextcloud" epoch="0" version="27.1.10" release="1.el7" arch="noarch" src="">
					<filename>nextcloud-0:27.1.10-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250212-02</id>
		<issued date="2025-02-12" />
		<updated date="2025-02-12" />
		<title>Множественные уязвимости assimp </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в assimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-assimp-cve-2024-48424-cve-2024-48425-cve-2024-45679/</description>
               <solution>
                    Запретить использование в ОС пакета Assimp
                или
                    Установить обновление для пакета(ов) Assimp
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-assimp-cve-2024-48424-cve-2024-48425-cve-2024-45679/" type="self" id="ROS-20250212-02" title="ROS-20250212-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48424" type="cve" id="CVE-2024-48424" title="CVE-2024-48424" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48425" type="cve" id="CVE-2024-48425" title="CVE-2024-48425" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45679" type="cve" id="CVE-2024-45679" title="CVE-2024-45679" />
			<reference href="https://bdu.fstec.ru/vul/2025-03338" type="self" id="BDU:2025-03338" title="BDU:2025-03338" />
			<reference href="https://bdu.fstec.ru/vul/2025-03337" type="self" id="BDU:2025-03337" title="BDU:2025-03337" />
			<reference href="https://bdu.fstec.ru/vul/2025-02665" type="self" id="BDU:2025-02665" title="BDU:2025-02665" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="assimp" epoch="0" version="5.4.3" release="1.el7" arch="x86_64" src="">
					<filename>assimp-0:5.4.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250212-03</id>
		<issued date="2025-02-12" />
		<updated date="2025-02-12" />
		<title>Уязвимость python3 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2024-9287/</description>
               <solution>
                    Запретить использование в ОС пакета Python3
                или
                    Установить обновление для пакета(ов) Python3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2024-9287/" type="self" id="ROS-20250212-03" title="ROS-20250212-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9287" type="cve" id="CVE-2024-9287" title="CVE-2024-9287" />
			<reference href="https://bdu.fstec.ru/vul/2025-03332" type="self" id="BDU:2025-03332" title="BDU:2025-03332" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3" epoch="0" version="3.8.20" release="2.el7" arch="x86_64" src="">
					<filename>python3-0:3.8.20-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250212-05</id>
		<issued date="2025-02-12" />
		<updated date="2025-02-12" />
		<title>Уязвимость nss </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nss</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nss-cve-2024-6602/</description>
               <solution>
                    Запретить использование в ОС пакета nss
                или
                    Установить обновление для пакета(ов) nss
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nss-cve-2024-6602/" type="self" id="ROS-20250212-05" title="ROS-20250212-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602" type="cve" id="CVE-2024-6602" title="CVE-2024-6602" />
			<reference href="https://bdu.fstec.ru/vul/2024-06675" type="self" id="BDU:2024-06675" title="BDU:2024-06675" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nss" epoch="0" version="3.79.4" release="3.el7" arch="x86_64" src="">
					<filename>nss-0:3.79.4-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250212-06</id>
		<issued date="2025-02-12" />
		<updated date="2025-02-12" />
		<title>Уязвимость libsndfile </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libsndfile</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libsndfile-cve-2024-50612/</description>
               <solution>
                    Запретить использование в ОС пакета libsndfile
                или
                    Установить обновление для пакета(ов) libsndfile
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libsndfile-cve-2024-50612/" type="self" id="ROS-20250212-06" title="ROS-20250212-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50612" type="cve" id="CVE-2024-50612" title="CVE-2024-50612" />
			<reference href="https://bdu.fstec.ru/vul/2025-03333" type="self" id="BDU:2025-03333" title="BDU:2025-03333" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libsndfile" epoch="0" version="1.0.28" release="14.el7" arch="x86_64" src="">
					<filename>libsndfile-0:1.0.28-14.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250212-07</id>
		<issued date="2025-02-13" />
		<updated date="2025-02-13" />
		<title>Множественные уязвимости libjxl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libjxl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libjxl-cve-2024-11498-cve-2024-11403/</description>
               <solution>
                    Запретить использование в ОС пакета libjxl
                или
                    Установить обновление для пакета(ов) libjxl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libjxl-cve-2024-11498-cve-2024-11403/" type="self" id="ROS-20250212-07" title="ROS-20250212-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11498" type="cve" id="CVE-2024-11498" title="CVE-2024-11498" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11403" type="cve" id="CVE-2024-11403" title="CVE-2024-11403" />
			<reference href="https://bdu.fstec.ru/vul/2024-10487" type="self" id="BDU:2024-10487" title="BDU:2024-10487" />
			<reference href="https://bdu.fstec.ru/vul/2024-10890" type="self" id="BDU:2024-10890" title="BDU:2024-10890" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libjxl" epoch="1" version="0.7.0" release="3.el7" arch="x86_64" src="">
					<filename>libjxl-1:0.7.0-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250212-08</id>
		<issued date="2025-02-13" />
		<updated date="2025-02-13" />
		<title>Уязвимость python3-dns </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в python3-dns</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-dns-cve-2023-29483/</description>
               <solution>
                    Запретить использование в ОС пакета python3-dns
                или
                    Установить обновление для пакета(ов) python3-dns
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-dns-cve-2023-29483/" type="self" id="ROS-20250212-08" title="ROS-20250212-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29483" type="cve" id="CVE-2023-29483" title="CVE-2023-29483" />
			<reference href="https://bdu.fstec.ru/vul/2025-03301" type="self" id="BDU:2025-03301" title="BDU:2025-03301" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-dns" epoch="0" version="2.6.1" release="1.el7" arch="noarch" src="">
					<filename>python3-dns-0:2.6.1-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250212-09</id>
		<issued date="2025-02-13" />
		<updated date="2025-02-13" />
		<title>Уязвимость postfixadmin </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postfixadmin</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postfixadmin-cve-2024-35226/</description>
               <solution>
                    Запретить использование в ОС пакета postfixadmin
                или
                    Установить обновление для пакета(ов) postfixadmin
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postfixadmin-cve-2024-35226/" type="self" id="ROS-20250212-09" title="ROS-20250212-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35226" type="cve" id="CVE-2024-35226" title="CVE-2024-35226" />
			<reference href="https://bdu.fstec.ru/vul/2025-03330" type="self" id="BDU:2025-03330" title="BDU:2025-03330" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postfixadmin" epoch="0" version="3.3.15" release="1.el7" arch="noarch" src="">
					<filename>postfixadmin-0:3.3.15-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250212-10</id>
		<issued date="2025-02-13" />
		<updated date="2025-02-13" />
		<title>Уязвимость python3-babel </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-babel</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-babel-cve-2021-42771/</description>
               <solution>
                    Запретить использование в ОС пакета python3-babel
                или
                    Установить обновление для пакета(ов) python3-babel
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-babel-cve-2021-42771/" type="self" id="ROS-20250212-10" title="ROS-20250212-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42771" type="cve" id="CVE-2021-42771" title="CVE-2021-42771" />
			<reference href="https://bdu.fstec.ru/vul/2025-02668" type="self" id="BDU:2025-02668" title="BDU:2025-02668" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-babel" epoch="0" version="2.10.1" release="1.el7" arch="noarch" src="">
					<filename>python3-babel-0:2.10.1-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250212-11</id>
		<issued date="2025-02-13" />
		<updated date="2025-02-13" />
		<title>Уязвимость nomad </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nomad</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nomad-cve-2024-12678/</description>
               <solution>
                    Запретить использование в ОС пакета Nomad
                или
                    Установить обновление для пакета(ов) Nomad
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nomad-cve-2024-12678/" type="self" id="ROS-20250212-11" title="ROS-20250212-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12678" type="cve" id="CVE-2024-12678" title="CVE-2024-12678" />
			<reference href="https://bdu.fstec.ru/vul/2025-03334" type="self" id="BDU:2025-03334" title="BDU:2025-03334" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nomad" epoch="0" version="1.9.4" release="1.el7" arch="x86_64" src="">
					<filename>nomad-0:1.9.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250212-12</id>
		<issued date="2025-02-13" />
		<updated date="2025-02-13" />
		<title>Уязвимость harfbuzz </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в harfbuzz</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-harfbuzz-cve-2024-56732/</description>
               <solution>
                    Запретить использование в ОС пакета HarfBuzz
                или
                    Установить обновление для пакета(ов) HarfBuzz
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-harfbuzz-cve-2024-56732/" type="self" id="ROS-20250212-12" title="ROS-20250212-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56732" type="cve" id="CVE-2024-56732" title="CVE-2024-56732" />
			<reference href="https://bdu.fstec.ru/vul/2025-03336" type="self" id="BDU:2025-03336" title="BDU:2025-03336" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="harfbuzz" epoch="0" version="7.3.0" release="5.el7" arch="x86_64" src="">
					<filename>harfbuzz-0:7.3.0-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250212-13</id>
		<issued date="2025-02-13" />
		<updated date="2025-02-13" />
		<title>Множественные уязвимости ntp </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ntp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-ntp-cve-2018-8956-cve-2020-15025-cve-2020-11868-cve-2020-13817/</description>
               <solution>
                    Запретить использование в ОС пакета ntp
                или
                    Установить обновление для пакета(ов) ntp
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-ntp-cve-2018-8956-cve-2020-15025-cve-2020-11868-cve-2020-13817/" type="self" id="ROS-20250212-13" title="ROS-20250212-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8956" type="cve" id="CVE-2018-8956" title="CVE-2018-8956" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15025" type="cve" id="CVE-2020-15025" title="CVE-2020-15025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11868" type="cve" id="CVE-2020-11868" title="CVE-2020-11868" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13817" type="cve" id="CVE-2020-13817" title="CVE-2020-13817" />
			<reference href="https://bdu.fstec.ru/vul/2025-03331" type="self" id="BDU:2025-03331" title="BDU:2025-03331" />
			<reference href="https://bdu.fstec.ru/vul/2020-03219" type="self" id="BDU:2020-03219" title="BDU:2020-03219" />
			<reference href="https://bdu.fstec.ru/vul/2020-03220" type="self" id="BDU:2020-03220" title="BDU:2020-03220" />
			<reference href="https://bdu.fstec.ru/vul/2024-07287" type="self" id="BDU:2024-07287" title="BDU:2024-07287" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ntp" epoch="0" version="4.2.8p18" release="1.el7" arch="x86_64" src="">
					<filename>ntp-0:4.2.8p18-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250212-14</id>
		<issued date="2025-02-13" />
		<updated date="2025-02-13" />
		<title>Уязвимость python3-tqdm </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-tqdm</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-tqdm-cve-2024-34062/</description>
               <solution>
                    Запретить использование в ОС пакета python3-tqdm
                или
                    Установить обновление для пакета(ов) python3-tqdm
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-tqdm-cve-2024-34062/" type="self" id="ROS-20250212-14" title="ROS-20250212-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34062" type="cve" id="CVE-2024-34062" title="CVE-2024-34062" />
			<reference href="https://bdu.fstec.ru/vul/2025-03340" type="self" id="BDU:2025-03340" title="BDU:2025-03340" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-tqdm" epoch="0" version="4.66.4" release="1.el7" arch="noarch" src="">
					<filename>python3-tqdm-0:4.66.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250212-15</id>
		<issued date="2025-02-13" />
		<updated date="2025-02-13" />
		<title>Множественные уязвимости nodejs </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nodejs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nodejs-cve-2025-23083-cve-2025-23085/</description>
               <solution>
                    Запретить использование в ОС пакета Node.js
                или
                    Установить обновление для пакета(ов) Node.js
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nodejs-cve-2025-23083-cve-2025-23085/" type="self" id="ROS-20250212-15" title="ROS-20250212-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23083" type="cve" id="CVE-2025-23083" title="CVE-2025-23083" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23085" type="cve" id="CVE-2025-23085" title="CVE-2025-23085" />
			<reference href="https://bdu.fstec.ru/vul/2025-03339" type="self" id="BDU:2025-03339" title="BDU:2025-03339" />
			<reference href="https://bdu.fstec.ru/vul/2025-02664" type="self" id="BDU:2025-02664" title="BDU:2025-02664" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs" epoch="1" version="18.20.6" release="1.el7" arch="x86_64" src="">
					<filename>nodejs-1:18.20.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250212-16</id>
		<issued date="2025-02-13" />
		<updated date="2025-02-13" />
		<title>Множественные уязвимости golang </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-golang-cve-2024-45336-cve-2024-45341/</description>
               <solution>
                    Запретить использование в ОС пакета golang
                или
                    Установить обновление для пакета(ов) golang
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-golang-cve-2024-45336-cve-2024-45341/" type="self" id="ROS-20250212-16" title="ROS-20250212-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45336" type="cve" id="CVE-2024-45336" title="CVE-2024-45336" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45341" type="cve" id="CVE-2024-45341" title="CVE-2024-45341" />
			<reference href="https://bdu.fstec.ru/vul/2025-02667" type="self" id="BDU:2025-02667" title="BDU:2025-02667" />
			<reference href="https://bdu.fstec.ru/vul/2025-03335" type="self" id="BDU:2025-03335" title="BDU:2025-03335" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.23.5" release="1.el7" arch="x86_64" src="">
					<filename>golang-0:1.23.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250212-17</id>
		<issued date="2025-02-13" />
		<updated date="2025-02-13" />
		<title>Уязвимость 7zip </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в 7zip</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-7zip-cve-2025-0411/</description>
               <solution>
                    Запретить использование в ОС пакета 7zip
                или
                    Установить обновление для пакета(ов) 7zip
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-7zip-cve-2025-0411/" type="self" id="ROS-20250212-17" title="ROS-20250212-17" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0411" type="cve" id="CVE-2025-0411" title="CVE-2025-0411" />
			<reference href="https://bdu.fstec.ru/vul/2025-00670" type="self" id="BDU:2025-00670" title="BDU:2025-00670" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="7zip" epoch="0" version="24.09" release="1.el7" arch="x86_64" src="">
					<filename>7zip-0:24.09-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250212-18</id>
		<issued date="2025-02-13" />
		<updated date="2025-02-13" />
		<title>Уязвимость zabbix-agent </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в zabbix-agent</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix-agent-cve-2024-22116/</description>
               <solution>
                    Запретить использование в ОС пакета zabbix-agent
                или
                    Установить обновление для пакета(ов) zabbix-agent
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix-agent-cve-2024-22116/" type="self" id="ROS-20250212-18" title="ROS-20250212-18" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22116" type="cve" id="CVE-2024-22116" title="CVE-2024-22116" />
			<reference href="https://bdu.fstec.ru/vul/2024-06204" type="self" id="BDU:2024-06204" title="BDU:2024-06204" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix-agent" epoch="1" version="6.4.18" release="1.el7" arch="x86_64" src="">
					<filename>zabbix-agent-1:6.4.18-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250213-01</id>
		<issued date="2025-02-13" />
		<updated date="2025-02-13" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-130225/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-130225/" type="self" id="ROS-20250213-01" title="ROS-20250213-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48991" type="cve" id="CVE-2022-48991" title="CVE-2022-48991" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48992" type="cve" id="CVE-2022-48992" title="CVE-2022-48992" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48994" type="cve" id="CVE-2022-48994" title="CVE-2022-48994" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48995" type="cve" id="CVE-2022-48995" title="CVE-2022-48995" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48997" type="cve" id="CVE-2022-48997" title="CVE-2022-48997" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48999" type="cve" id="CVE-2022-48999" title="CVE-2022-48999" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49000" type="cve" id="CVE-2022-49000" title="CVE-2022-49000" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49001" type="cve" id="CVE-2022-49001" title="CVE-2022-49001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49002" type="cve" id="CVE-2022-49002" title="CVE-2022-49002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49003" type="cve" id="CVE-2022-49003" title="CVE-2022-49003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49004" type="cve" id="CVE-2022-49004" title="CVE-2022-49004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49005" type="cve" id="CVE-2022-49005" title="CVE-2022-49005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49006" type="cve" id="CVE-2022-49006" title="CVE-2022-49006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49007" type="cve" id="CVE-2022-49007" title="CVE-2022-49007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49010" type="cve" id="CVE-2022-49010" title="CVE-2022-49010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49011" type="cve" id="CVE-2022-49011" title="CVE-2022-49011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49013" type="cve" id="CVE-2022-49013" title="CVE-2022-49013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49014" type="cve" id="CVE-2022-49014" title="CVE-2022-49014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49015" type="cve" id="CVE-2022-49015" title="CVE-2022-49015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49016" type="cve" id="CVE-2022-49016" title="CVE-2022-49016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49017" type="cve" id="CVE-2022-49017" title="CVE-2022-49017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49019" type="cve" id="CVE-2022-49019" title="CVE-2022-49019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49020" type="cve" id="CVE-2022-49020" title="CVE-2022-49020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49021" type="cve" id="CVE-2022-49021" title="CVE-2022-49021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49022" type="cve" id="CVE-2022-49022" title="CVE-2022-49022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49023" type="cve" id="CVE-2022-49023" title="CVE-2022-49023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49024" type="cve" id="CVE-2022-49024" title="CVE-2022-49024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49025" type="cve" id="CVE-2022-49025" title="CVE-2022-49025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49026" type="cve" id="CVE-2022-49026" title="CVE-2022-49026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49027" type="cve" id="CVE-2022-49027" title="CVE-2022-49027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49028" type="cve" id="CVE-2022-49028" title="CVE-2022-49028" />
			<reference href="https://bdu.fstec.ru/vul/2025-07469" type="self" id="BDU:2025-07469" title="BDU:2025-07469" />
			<reference href="https://bdu.fstec.ru/vul/2025-14266" type="self" id="BDU:2025-14266" title="BDU:2025-14266" />
			<reference href="https://bdu.fstec.ru/vul/2025-14267" type="self" id="BDU:2025-14267" title="BDU:2025-14267" />
			<reference href="https://bdu.fstec.ru/vul/2025-14268" type="self" id="BDU:2025-14268" title="BDU:2025-14268" />
			<reference href="https://bdu.fstec.ru/vul/2025-14570" type="self" id="BDU:2025-14570" title="BDU:2025-14570" />
			<reference href="https://bdu.fstec.ru/vul/2025-07497" type="self" id="BDU:2025-07497" title="BDU:2025-07497" />
			<reference href="https://bdu.fstec.ru/vul/2025-14270" type="self" id="BDU:2025-14270" title="BDU:2025-14270" />
			<reference href="https://bdu.fstec.ru/vul/2025-07502" type="self" id="BDU:2025-07502" title="BDU:2025-07502" />
			<reference href="https://bdu.fstec.ru/vul/2025-14271" type="self" id="BDU:2025-14271" title="BDU:2025-14271" />
			<reference href="https://bdu.fstec.ru/vul/2025-15380" type="self" id="BDU:2025-15380" title="BDU:2025-15380" />
			<reference href="https://bdu.fstec.ru/vul/2025-04347" type="self" id="BDU:2025-04347" title="BDU:2025-04347" />
			<reference href="https://bdu.fstec.ru/vul/2025-04438" type="self" id="BDU:2025-04438" title="BDU:2025-04438" />
			<reference href="https://bdu.fstec.ru/vul/2025-07504" type="self" id="BDU:2025-07504" title="BDU:2025-07504" />
			<reference href="https://bdu.fstec.ru/vul/2025-14272" type="self" id="BDU:2025-14272" title="BDU:2025-14272" />
			<reference href="https://bdu.fstec.ru/vul/2025-14275" type="self" id="BDU:2025-14275" title="BDU:2025-14275" />
			<reference href="https://bdu.fstec.ru/vul/2025-04437" type="self" id="BDU:2025-04437" title="BDU:2025-04437" />
			<reference href="https://bdu.fstec.ru/vul/2025-04428" type="self" id="BDU:2025-04428" title="BDU:2025-04428" />
			<reference href="https://bdu.fstec.ru/vul/2024-10088" type="self" id="BDU:2024-10088" title="BDU:2024-10088" />
			<reference href="https://bdu.fstec.ru/vul/2024-10089" type="self" id="BDU:2024-10089" title="BDU:2024-10089" />
			<reference href="https://bdu.fstec.ru/vul/2025-14276" type="self" id="BDU:2025-14276" title="BDU:2025-14276" />
			<reference href="https://bdu.fstec.ru/vul/2024-10090" type="self" id="BDU:2024-10090" title="BDU:2024-10090" />
			<reference href="https://bdu.fstec.ru/vul/2025-14277" type="self" id="BDU:2025-14277" title="BDU:2025-14277" />
			<reference href="https://bdu.fstec.ru/vul/2025-04436" type="self" id="BDU:2025-04436" title="BDU:2025-04436" />
			<reference href="https://bdu.fstec.ru/vul/2025-14278" type="self" id="BDU:2025-14278" title="BDU:2025-14278" />
			<reference href="https://bdu.fstec.ru/vul/2025-07471" type="self" id="BDU:2025-07471" title="BDU:2025-07471" />
			<reference href="https://bdu.fstec.ru/vul/2025-07472" type="self" id="BDU:2025-07472" title="BDU:2025-07472" />
			<reference href="https://bdu.fstec.ru/vul/2025-14279" type="self" id="BDU:2025-14279" title="BDU:2025-14279" />
			<reference href="https://bdu.fstec.ru/vul/2024-10091" type="self" id="BDU:2024-10091" title="BDU:2024-10091" />
			<reference href="https://bdu.fstec.ru/vul/2024-10092" type="self" id="BDU:2024-10092" title="BDU:2024-10092" />
			<reference href="https://bdu.fstec.ru/vul/2025-04435" type="self" id="BDU:2025-04435" title="BDU:2025-04435" />
			<reference href="https://bdu.fstec.ru/vul/2025-14280" type="self" id="BDU:2025-14280" title="BDU:2025-14280" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.20" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.20-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250214-01</id>
		<issued date="2025-02-14" />
		<updated date="2025-02-14" />
		<title>Уязвимость grafana </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в grafana</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grafana-cve-2024-10452/</description>
               <solution>
                    Запретить использование в ОС пакета grafana
                или
                    Установить обновление для пакета(ов) grafana
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grafana-cve-2024-10452/" type="self" id="ROS-20250214-01" title="ROS-20250214-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10452" type="cve" id="CVE-2024-10452" title="CVE-2024-10452" />
			<reference href="https://bdu.fstec.ru/vul/2025-01981" type="self" id="BDU:2025-01981" title="BDU:2025-01981" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="grafana" epoch="0" version="11.1.3" release="1.el7" arch="x86_64" src="">
					<filename>grafana-0:11.1.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250214-02</id>
		<issued date="2025-02-14" />
		<updated date="2025-02-14" />
		<title>Множественные уязвимости grafana </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в grafana</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-grafana-cve-2025-21614-cve-2025-21613/</description>
               <solution>
                    Запретить использование в ОС пакета grafana
                или
                    Установить обновление для пакета(ов) grafana
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-grafana-cve-2025-21614-cve-2025-21613/" type="self" id="ROS-20250214-02" title="ROS-20250214-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21614" type="cve" id="CVE-2025-21614" title="CVE-2025-21614" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21613" type="cve" id="CVE-2025-21613" title="CVE-2025-21613" />
			<reference href="https://bdu.fstec.ru/vul/2025-00211" type="self" id="BDU:2025-00211" title="BDU:2025-00211" />
			<reference href="https://bdu.fstec.ru/vul/2025-00210" type="self" id="BDU:2025-00210" title="BDU:2025-00210" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="grafana" epoch="0" version="10.3.3" release="1.1.el7" arch="x86_64" src="">
					<filename>grafana-0:10.3.3-1.1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250214-03</id>
		<issued date="2025-02-14" />
		<updated date="2025-02-14" />
		<title>Уязвимость linux-firmware </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в linux-firmware</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-linux-firmware-cve-2024-21820/</description>
               <solution>
                    Запретить использование в ОС пакета linux-firmware
                или
                    Установить обновление для пакета(ов) linux-firmware
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-linux-firmware-cve-2024-21820/" type="self" id="ROS-20250214-03" title="ROS-20250214-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21820" type="cve" id="CVE-2024-21820" title="CVE-2024-21820" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="linux-firmware" epoch="0" version="20250109" release="1.el7.3" arch="noarch" src="">
					<filename>linux-firmware-0:20250109-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250214-04</id>
		<issued date="2025-02-14" />
		<updated date="2025-07-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-1085/</description>
               <solution>
                    Установить обновление для пакета(ов) kernel-lt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-1085/" type="self" id="ROS-20250214-04" title="ROS-20250214-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1085" type="cve" id="CVE-2024-1085" title="CVE-2024-1085" />
			<reference href="https://bdu.fstec.ru/vul/2024-01186" type="self" id="BDU:2024-01186" title="BDU:2024-01186" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250214-05</id>
		<issued date="2025-02-14" />
		<updated date="2025-02-14" />
		<title>Множественные уязвимости linux-firmware </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в linux-firmware</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-linux-firmware-cve-2024-25939-cve-2024-24980-cve-2024-24853-cve-2023-4914/</description>
               <solution>
                    Запретить использование в ОС пакета linux-firmware
                или
                    Установить обновление для пакета(ов) linux-firmware
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-linux-firmware-cve-2024-25939-cve-2024-24980-cve-2024-24853-cve-2023-4914/" type="self" id="ROS-20250214-05" title="ROS-20250214-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25939" type="cve" id="CVE-2024-25939" title="CVE-2024-25939" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24980" type="cve" id="CVE-2024-24980" title="CVE-2024-24980" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24853" type="cve" id="CVE-2024-24853" title="CVE-2024-24853" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49141" type="cve" id="CVE-2023-49141" title="CVE-2023-49141" />
			<reference href="https://bdu.fstec.ru/vul/2024-10554" type="self" id="BDU:2024-10554" title="BDU:2024-10554" />
			<reference href="https://bdu.fstec.ru/vul/2024-11667" type="self" id="BDU:2024-11667" title="BDU:2024-11667" />
			<reference href="https://bdu.fstec.ru/vul/2024-10556" type="self" id="BDU:2024-10556" title="BDU:2024-10556" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="linux-firmware" epoch="0" version="20241017" release="2.el7.3" arch="noarch" src="">
					<filename>linux-firmware-0:20241017-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250214-06</id>
		<issued date="2025-02-14" />
		<updated date="2025-02-14" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-140225/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-140225/" type="self" id="ROS-20250214-06" title="ROS-20250214-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57947" type="cve" id="CVE-2024-57947" title="CVE-2024-57947" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52923" type="cve" id="CVE-2023-52923" title="CVE-2023-52923" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49035" type="cve" id="CVE-2022-49035" title="CVE-2022-49035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52922" type="cve" id="CVE-2023-52922" title="CVE-2023-52922" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52919" type="cve" id="CVE-2023-52919" title="CVE-2023-52919" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52918" type="cve" id="CVE-2023-52918" title="CVE-2023-52918" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49033" type="cve" id="CVE-2022-49033" title="CVE-2022-49033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49032" type="cve" id="CVE-2022-49032" title="CVE-2022-49032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49031" type="cve" id="CVE-2022-49031" title="CVE-2022-49031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49030" type="cve" id="CVE-2022-49030" title="CVE-2022-49030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49029" type="cve" id="CVE-2022-49029" title="CVE-2022-49029" />
			<reference href="https://bdu.fstec.ru/vul/2025-01977" type="self" id="BDU:2025-01977" title="BDU:2025-01977" />
			<reference href="https://bdu.fstec.ru/vul/2025-01984" type="self" id="BDU:2025-01984" title="BDU:2025-01984" />
			<reference href="https://bdu.fstec.ru/vul/2025-01976" type="self" id="BDU:2025-01976" title="BDU:2025-01976" />
			<reference href="https://bdu.fstec.ru/vul/2025-00165" type="self" id="BDU:2025-00165" title="BDU:2025-00165" />
			<reference href="https://bdu.fstec.ru/vul/2025-01975" type="self" id="BDU:2025-01975" title="BDU:2025-01975" />
			<reference href="https://bdu.fstec.ru/vul/2025-01983" type="self" id="BDU:2025-01983" title="BDU:2025-01983" />
			<reference href="https://bdu.fstec.ru/vul/2025-01979" type="self" id="BDU:2025-01979" title="BDU:2025-01979" />
			<reference href="https://bdu.fstec.ru/vul/2025-01978" type="self" id="BDU:2025-01978" title="BDU:2025-01978" />
			<reference href="https://bdu.fstec.ru/vul/2025-01985" type="self" id="BDU:2025-01985" title="BDU:2025-01985" />
			<reference href="https://bdu.fstec.ru/vul/2025-01982" type="self" id="BDU:2025-01982" title="BDU:2025-01982" />
			<reference href="https://bdu.fstec.ru/vul/2024-09786" type="self" id="BDU:2024-09786" title="BDU:2024-09786" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250219-01</id>
		<issued date="2025-02-19" />
		<updated date="2025-02-19" />
		<title>Множественные уязвимости linux-firmware </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в linux-firmware</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-linux-firmware-cve-2024-21853-cve-2024-23918/</description>
               <solution>
                    Запретить использование в ОС пакета linux-firmware
                или
                    Установить обновление для пакета(ов) linux-firmware
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-linux-firmware-cve-2024-21853-cve-2024-23918/" type="self" id="ROS-20250219-01" title="ROS-20250219-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21853" type="cve" id="CVE-2024-21853" title="CVE-2024-21853" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23918" type="cve" id="CVE-2024-23918" title="CVE-2024-23918" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="linux-firmware" epoch="0" version="20250109" release="1.el7.3" arch="noarch" src="">
					<filename>linux-firmware-0:20250109-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250219-02</id>
		<issued date="2025-02-19" />
		<updated date="2025-02-19" />
		<title>Уязвимость mongo-c-driver </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в mongo-c-driver</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongo-c-driver-cve-2024-6381/</description>
               <solution>
                    Запретить использование в ОС пакета mongo-c-driver
                или
                    Установить обновление для пакета(ов) mongo-c-driver
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongo-c-driver-cve-2024-6381/" type="self" id="ROS-20250219-02" title="ROS-20250219-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6381" type="cve" id="CVE-2024-6381" title="CVE-2024-6381" />
			<reference href="https://bdu.fstec.ru/vul/2024-07887" type="self" id="BDU:2024-07887" title="BDU:2024-07887" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mongo-c-driver" epoch="0" version="1.30.0" release="1.el7" arch="x86_64" src="">
					<filename>mongo-c-driver-0:1.30.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250219-03</id>
		<issued date="2025-02-19" />
		<updated date="2025-02-19" />
		<title>Множественные уязвимости trivy </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в trivy</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-trivy-cve-2025-21614-cve-2025-21613-cve-2024-45337/</description>
               <solution>
                    Запретить использование в ОС пакета trivy
                или
                    Установить обновление для пакета(ов) trivy
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-trivy-cve-2025-21614-cve-2025-21613-cve-2024-45337/" type="self" id="ROS-20250219-03" title="ROS-20250219-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21614" type="cve" id="CVE-2025-21614" title="CVE-2025-21614" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21613" type="cve" id="CVE-2025-21613" title="CVE-2025-21613" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45337" type="cve" id="CVE-2024-45337" title="CVE-2024-45337" />
			<reference href="https://bdu.fstec.ru/vul/2025-00211" type="self" id="BDU:2025-00211" title="BDU:2025-00211" />
			<reference href="https://bdu.fstec.ru/vul/2025-00210" type="self" id="BDU:2025-00210" title="BDU:2025-00210" />
			<reference href="https://bdu.fstec.ru/vul/2024-11338" type="self" id="BDU:2024-11338" title="BDU:2024-11338" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="trivy" epoch="0" version="0.59.1" release="1.el7" arch="x86_64" src="">
					<filename>trivy-0:0.59.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250219-04</id>
		<issued date="2025-02-19" />
		<updated date="2025-02-19" />
		<title>Множественные уязвимости git </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в git</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-git-cve-2024-52006-cve-2024-50349/</description>
               <solution>
                    Запретить использование в ОС пакета git
                или
                    Установить обновление для пакета(ов) git
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-git-cve-2024-52006-cve-2024-50349/" type="self" id="ROS-20250219-04" title="ROS-20250219-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52006" type="cve" id="CVE-2024-52006" title="CVE-2024-52006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50349" type="cve" id="CVE-2024-50349" title="CVE-2024-50349" />
			<reference href="https://bdu.fstec.ru/vul/2025-01177" type="self" id="BDU:2025-01177" title="BDU:2025-01177" />
			<reference href="https://bdu.fstec.ru/vul/2025-01175" type="self" id="BDU:2025-01175" title="BDU:2025-01175" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="git" epoch="0" version="2.48.1" release="1.el7" arch="x86_64" src="">
					<filename>git-0:2.48.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250219-05</id>
		<issued date="2025-02-19" />
		<updated date="2025-02-19" />
		<title>Множественные уязвимости VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-virtualbox-cve-2025-21571-cve-2025-21533/</description>
               <solution>
                    Запретить использование в ОС пакета VirtualBox
                или
                    Установить обновление для пакета(ов) VirtualBox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-virtualbox-cve-2025-21571-cve-2025-21533/" type="self" id="ROS-20250219-05" title="ROS-20250219-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21571" type="cve" id="CVE-2025-21571" title="CVE-2025-21571" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21533" type="cve" id="CVE-2025-21533" title="CVE-2025-21533" />
			<reference href="https://bdu.fstec.ru/vul/2025-03464" type="self" id="BDU:2025-03464" title="BDU:2025-03464" />
			<reference href="https://bdu.fstec.ru/vul/2025-01284" type="self" id="BDU:2025-01284" title="BDU:2025-01284" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox" epoch="0" version="7.0.24" release="1.el7" arch="x86_64" src="">
					<filename>VirtualBox-0:7.0.24-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250219-06</id>
		<issued date="2025-02-19" />
		<updated date="2025-02-19" />
		<title>Уязвимость grafana </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в grafana</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grafana-cve-2024-11741/</description>
               <solution>
                    Запретить использование в ОС пакета Grafana
                или
                    Установить обновление для пакета(ов) Grafana
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grafana-cve-2024-11741/" type="self" id="ROS-20250219-06" title="ROS-20250219-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11741" type="cve" id="CVE-2024-11741" title="CVE-2024-11741" />
			<reference href="https://bdu.fstec.ru/vul/2025-02447" type="self" id="BDU:2025-02447" title="BDU:2025-02447" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="grafana" epoch="0" version="11.2.6" release="2.el7" arch="x86_64" src="">
					<filename>grafana-0:11.2.6-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250219-07</id>
		<issued date="2025-02-19" />
		<updated date="2025-02-19" />
		<title>Уязвимость apache-commons-io </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в apache-commons-io</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-commons-io-cve-2024-47554/</description>
               <solution>
                    Запретить использование в ОС пакета apache-commons-io
                или
                    Установить обновление для пакета(ов) apache-commons-io
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-commons-io-cve-2024-47554/" type="self" id="ROS-20250219-07" title="ROS-20250219-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47554" type="cve" id="CVE-2024-47554" title="CVE-2024-47554" />
			<reference href="https://bdu.fstec.ru/vul/2025-03306" type="self" id="BDU:2025-03306" title="BDU:2025-03306" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="apache-commons-io" epoch="1" version="2.16.1" release="1.el7" arch="noarch" src="">
					<filename>apache-commons-io-1:2.16.1-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250220-01</id>
		<issued date="2025-02-20" />
		<updated date="2025-02-20" />
		<title>Множественные уязвимости kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-2002251/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-2002251/" type="self" id="ROS-20250220-01" title="ROS-20250220-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1670" type="cve" id="CVE-2023-1670" title="CVE-2023-1670" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4744" type="cve" id="CVE-2022-4744" title="CVE-2022-4744" />
			<reference href="https://bdu.fstec.ru/vul/2023-01780" type="self" id="BDU:2023-01780" title="BDU:2023-01780" />
			<reference href="https://bdu.fstec.ru/vul/2023-01797" type="self" id="BDU:2023-01797" title="BDU:2023-01797" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="5.15.106" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:5.15.106-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250220-02</id>
		<issued date="2025-02-20" />
		<updated date="2025-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-0210/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-0210/" type="self" id="ROS-20250220-02" title="ROS-20250220-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0210" type="cve" id="CVE-2023-0210" title="CVE-2023-0210" />
			<reference href="https://bdu.fstec.ru/vul/2023-00164" type="self" id="BDU:2023-00164" title="BDU:2023-00164" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="5.15.106" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:5.15.106-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250226-01</id>
		<issued date="2025-02-26" />
		<updated date="2025-02-26" />
		<title>Уязвимость python3-eventlet </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в python3-eventlet</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-eventlet-cve-2023-29483/</description>
               <solution>
                    Запретить использование в ОС пакета python3-eventlet
                или
                    Установить обновление для пакета(ов) python3-eventlet
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-eventlet-cve-2023-29483/" type="self" id="ROS-20250226-01" title="ROS-20250226-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29483" type="cve" id="CVE-2023-29483" title="CVE-2023-29483" />
			<reference href="https://bdu.fstec.ru/vul/2025-03301" type="self" id="BDU:2025-03301" title="BDU:2025-03301" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-eventlet" epoch="0" version="0.33.3" release="2.el7" arch="noarch" src="">
					<filename>python3-eventlet-0:0.33.3-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250226-02</id>
		<issued date="2025-02-26" />
		<updated date="2025-02-26" />
		<title>Уязвимость python3-pillow </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-pillow</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-pillow-cve-2024-28219/</description>
               <solution>
                    Запретить использование в ОС пакета python3-pillow
                или
                    Установить обновление для пакета(ов) python3-pillow
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-pillow-cve-2024-28219/" type="self" id="ROS-20250226-02" title="ROS-20250226-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28219" type="cve" id="CVE-2024-28219" title="CVE-2024-28219" />
			<reference href="https://bdu.fstec.ru/vul/2024-04737" type="self" id="BDU:2024-04737" title="BDU:2024-04737" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-pillow" epoch="0" version="9.5.0" release="3.el7" arch="x86_64" src="">
					<filename>python3-pillow-0:9.5.0-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250226-03</id>
		<issued date="2025-02-26" />
		<updated date="2025-02-26" />
		<title>Уязвимость mongodb-org </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2024-8305/</description>
               <solution>
                    Запретить использование в ОС пакета mongodb-org
                или
                    Установить обновление для пакета(ов) mongodb-org
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2024-8305/" type="self" id="ROS-20250226-03" title="ROS-20250226-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8305" type="cve" id="CVE-2024-8305" title="CVE-2024-8305" />
			<reference href="https://bdu.fstec.ru/vul/2024-08901" type="self" id="BDU:2024-08901" title="BDU:2024-08901" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mongodb-org" epoch="0" version="7.0.16" release="1.el7" arch="x86_64" src="">
					<filename>mongodb-org-0:7.0.16-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250226-04</id>
		<issued date="2025-02-26" />
		<updated date="2025-02-26" />
		<title>Уязвимость python3-starlette </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-starlette</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-starlette-cve-2024-47874/</description>
               <solution>
                    Запретить использование в ОС пакета python3-starlette
                или
                    Установить обновление для пакета(ов) python3-starlette
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-starlette-cve-2024-47874/" type="self" id="ROS-20250226-04" title="ROS-20250226-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47874" type="cve" id="CVE-2024-47874" title="CVE-2024-47874" />
			<reference href="https://bdu.fstec.ru/vul/2024-08761" type="self" id="BDU:2024-08761" title="BDU:2024-08761" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-starlette" epoch="0" version="0.23.0" release="3.el7" arch="noarch" src="">
					<filename>python3-starlette-0:0.23.0-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250226-05</id>
		<issued date="2025-02-26" />
		<updated date="2025-02-26" />
		<title>Уязвимость linux-firmware </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в linux-firmware</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-linux-firmware-cve-2022-23821/</description>
               <solution>
                    Запретить использование в ОС пакета Linux-firmware
                или
                    Установить обновление для пакета(ов) Linux-firmware
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-linux-firmware-cve-2022-23821/" type="self" id="ROS-20250226-05" title="ROS-20250226-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23821" type="cve" id="CVE-2022-23821" title="CVE-2022-23821" />
			<reference href="https://bdu.fstec.ru/vul/2025-03388" type="self" id="BDU:2025-03388" title="BDU:2025-03388" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="linux-firmware" epoch="0" version="20240709" release="1.el7.3" arch="noarch" src="">
					<filename>linux-firmware-0:20240709-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250226-06</id>
		<issued date="2025-02-26" />
		<updated date="2025-02-26" />
		<title>Уязвимость python3-multipart </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-multipart</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-multipart-cve-2024-53981/</description>
               <solution>
                    Запретить использование в ОС пакета Python3-multipart
                или
                    Установить обновление для пакета(ов) Python3-multipart
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-multipart-cve-2024-53981/" type="self" id="ROS-20250226-06" title="ROS-20250226-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53981" type="cve" id="CVE-2024-53981" title="CVE-2024-53981" />
			<reference href="https://bdu.fstec.ru/vul/2025-03461" type="self" id="BDU:2025-03461" title="BDU:2025-03461" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-multipart" epoch="0" version="0.0.19" release="1.el7" arch="noarch" src="">
					<filename>python3-multipart-0:0.0.19-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250226-07</id>
		<issued date="2025-02-26" />
		<updated date="2025-02-26" />
		<title>Уязвимость tomcat </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в tomcat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2024-56337/</description>
               <solution>
                    Запретить использование в ОС пакета tomcat
                или
                    Установить обновление для пакета(ов) tomcat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2024-56337/" type="self" id="ROS-20250226-07" title="ROS-20250226-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56337" type="cve" id="CVE-2024-56337" title="CVE-2024-56337" />
			<reference href="https://bdu.fstec.ru/vul/2024-11586" type="self" id="BDU:2024-11586" title="BDU:2024-11586" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat" epoch="1" version="9.0.99" release="1.el7" arch="noarch" src="">
					<filename>tomcat-1:9.0.99-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250226-08</id>
		<issued date="2025-02-26" />
		<updated date="2025-02-26" />
		<title>Множественные уязвимости openjpeg2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openjpeg2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-openjpeg2-cve-2024-56826-cve-2024-56827/</description>
               <solution>
                    Запретить использование в ОС пакета openjpeg2
                или
                    Установить обновление для пакета(ов) openjpeg2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-openjpeg2-cve-2024-56826-cve-2024-56827/" type="self" id="ROS-20250226-08" title="ROS-20250226-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56826" type="cve" id="CVE-2024-56826" title="CVE-2024-56826" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56827" type="cve" id="CVE-2024-56827" title="CVE-2024-56827" />
			<reference href="https://bdu.fstec.ru/vul/2025-03457" type="self" id="BDU:2025-03457" title="BDU:2025-03457" />
			<reference href="https://bdu.fstec.ru/vul/2025-03465" type="self" id="BDU:2025-03465" title="BDU:2025-03465" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openjpeg2" epoch="0" version="2.5.3" release="1.el7" arch="x86_64" src="">
					<filename>openjpeg2-0:2.5.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250226-09</id>
		<issued date="2025-02-26" />
		<updated date="2025-02-26" />
		<title>Уязвимость java-1.8.0-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в java-1.8.0-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-1-8-0-openjdk-cve-2025-21502/</description>
               <solution>
                    Запретить использование в ОС пакета java-1.8.0-openjdk
                или
                    Установить обновление для пакета(ов) java-1.8.0-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-1-8-0-openjdk-cve-2025-21502/" type="self" id="ROS-20250226-09" title="ROS-20250226-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21502" type="cve" id="CVE-2025-21502" title="CVE-2025-21502" />
			<reference href="https://bdu.fstec.ru/vul/2025-01180" type="self" id="BDU:2025-01180" title="BDU:2025-01180" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-1.8.0-openjdk" epoch="1" version="1.8.0.422.b06" release="3.el7" arch="x86_64" src="">
					<filename>java-1.8.0-openjdk-1:1.8.0.422.b06-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250226-10</id>
		<issued date="2025-02-26" />
		<updated date="2025-02-26" />
		<title>Уязвимость java-11-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в java-11-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-11-openjdk-cve-2025-21502753/</description>
               <solution>
                    Запретить использование в ОС пакета java-11-openjdk
                или
                    Установить обновление для пакета(ов) java-11-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-11-openjdk-cve-2025-21502753/" type="self" id="ROS-20250226-10" title="ROS-20250226-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21502" type="cve" id="CVE-2025-21502" title="CVE-2025-21502" />
			<reference href="https://bdu.fstec.ru/vul/2025-01180" type="self" id="BDU:2025-01180" title="BDU:2025-01180" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-11-openjdk" epoch="1" version="11.0.26.0.4" release="1.el7" arch="x86_64" src="">
					<filename>java-11-openjdk-1:11.0.26.0.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250226-11</id>
		<issued date="2025-02-26" />
		<updated date="2025-02-26" />
		<title>Уязвимость java-17-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в java-17-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-17-openjdk-cve-2025-21502753419/</description>
               <solution>
                    Запретить использование в ОС пакета java-17-openjdk
                или
                    Установить обновление для пакета(ов) java-17-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-17-openjdk-cve-2025-21502753419/" type="self" id="ROS-20250226-11" title="ROS-20250226-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21502" type="cve" id="CVE-2025-21502" title="CVE-2025-21502" />
			<reference href="https://bdu.fstec.ru/vul/2025-01180" type="self" id="BDU:2025-01180" title="BDU:2025-01180" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-17-openjdk" epoch="1" version="17.0.14.0.7" release="3.el7" arch="x86_64" src="">
					<filename>java-17-openjdk-1:17.0.14.0.7-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250226-12</id>
		<issued date="2025-02-26" />
		<updated date="2025-02-26" />
		<title>Уязвимость java-21-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в java-21-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-21-openjdk-cve-2025-215027534195443/</description>
               <solution>
                    Запретить использование в ОС пакета java-21-openjdk
                или
                    Установить обновление для пакета(ов) java-21-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-21-openjdk-cve-2025-215027534195443/" type="self" id="ROS-20250226-12" title="ROS-20250226-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21502" type="cve" id="CVE-2025-21502" title="CVE-2025-21502" />
			<reference href="https://bdu.fstec.ru/vul/2025-01180" type="self" id="BDU:2025-01180" title="BDU:2025-01180" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-21-openjdk" epoch="1" version="21.0.6.0.7" release="4.el7" arch="x86_64" src="">
					<filename>java-21-openjdk-1:21.0.6.0.7-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250226-13</id>
		<issued date="2025-02-26" />
		<updated date="2025-02-26" />
		<title>Уязвимость jetty </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в jetty</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jetty-cve-2024-8184/</description>
               <solution>
                    Запретить использование в ОС пакета jetty
                или
                    Установить обновление для пакета(ов) jetty
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jetty-cve-2024-8184/" type="self" id="ROS-20250226-13" title="ROS-20250226-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8184" type="cve" id="CVE-2024-8184" title="CVE-2024-8184" />
			<reference href="https://bdu.fstec.ru/vul/2025-03454" type="self" id="BDU:2025-03454" title="BDU:2025-03454" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jetty" epoch="0" version="9.4.56" release="1.el7" arch="noarch" src="">
					<filename>jetty-0:9.4.56-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250226-14</id>
		<issued date="2025-02-26" />
		<updated date="2025-02-26" />
		<title>Множественные уязвимости curl </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-curl-cve-2025-0665-cve-2025-0725/</description>
               <solution>
                    Запретить использование в ОС пакета curl
                или
                    Установить обновление для пакета(ов) curl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-curl-cve-2025-0665-cve-2025-0725/" type="self" id="ROS-20250226-14" title="ROS-20250226-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0665" type="cve" id="CVE-2025-0665" title="CVE-2025-0665" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0725" type="cve" id="CVE-2025-0725" title="CVE-2025-0725" />
			<reference href="https://bdu.fstec.ru/vul/2025-02320" type="self" id="BDU:2025-02320" title="BDU:2025-02320" />
			<reference href="https://bdu.fstec.ru/vul/2025-01585" type="self" id="BDU:2025-01585" title="BDU:2025-01585" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="curl" epoch="0" version="7.86.0" release="2.el7" arch="x86_64" src="">
					<filename>curl-0:7.86.0-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250226-15</id>
		<issued date="2025-02-26" />
		<updated date="2025-02-26" />
		<title>Множественные уязвимости netty </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в netty</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-netty-cve-2025-24970-cve-2025-25193/</description>
               <solution>
                    Запретить использование в ОС пакета Netty
                или
                    Установить обновление для пакета(ов) Netty
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-netty-cve-2025-24970-cve-2025-25193/" type="self" id="ROS-20250226-15" title="ROS-20250226-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24970" type="cve" id="CVE-2025-24970" title="CVE-2025-24970" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-25193" type="cve" id="CVE-2025-25193" title="CVE-2025-25193" />
			<reference href="https://bdu.fstec.ru/vul/2025-03389" type="self" id="BDU:2025-03389" title="BDU:2025-03389" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="netty" epoch="0" version="4.1.118" release="1.el7" arch="x86_64" src="">
					<filename>netty-0:4.1.118-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250226-16</id>
		<issued date="2025-02-26" />
		<updated date="2025-02-26" />
		<title>Уязвимость openssl3 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в openssl3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2024-12797/</description>
               <solution>
                    Запретить использование в ОС пакета openssl3
                или
                    Установить обновление для пакета(ов) openssl3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2024-12797/" type="self" id="ROS-20250226-16" title="ROS-20250226-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12797" type="cve" id="CVE-2024-12797" title="CVE-2024-12797" />
			<reference href="https://bdu.fstec.ru/vul/2025-01602" type="self" id="BDU:2025-01602" title="BDU:2025-01602" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl3" epoch="0" version="3.2.2" release="4.el7" arch="x86_64" src="">
					<filename>openssl3-0:3.2.2-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250226-17</id>
		<issued date="2025-02-26" />
		<updated date="2025-02-26" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2025-22866/</description>
               <solution>
                    Запретить использование в ОС пакета golang
                или
                    Установить обновление для пакета(ов) golang
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2025-22866/" type="self" id="ROS-20250226-17" title="ROS-20250226-17" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22866" type="cve" id="CVE-2025-22866" title="CVE-2025-22866" />
			<reference href="https://bdu.fstec.ru/vul/2025-03456" type="self" id="BDU:2025-03456" title="BDU:2025-03456" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.23.6" release="1.el7" arch="x86_64" src="">
					<filename>golang-0:1.23.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250303-01</id>
		<issued date="2025-03-03" />
		<updated date="2025-03-03" />
		<title>Уязвимость nextcloud </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nextcloud</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nextcloud-cve-2023-25818/</description>
               <solution>
                    Запретить использование в ОС пакета nextcloud
                или
                    Установить обновление для пакета(ов) nextcloud
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nextcloud-cve-2023-25818/" type="self" id="ROS-20250303-01" title="ROS-20250303-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25818" type="cve" id="CVE-2023-25818" title="CVE-2023-25818" />
			<reference href="https://bdu.fstec.ru/vul/2024-00711" type="self" id="BDU:2024-00711" title="BDU:2024-00711" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nextcloud" epoch="0" version="25.0.5" release="1.el7" arch="noarch" src="">
					<filename>nextcloud-0:25.0.5-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250303-02</id>
		<issued date="2025-03-03" />
		<updated date="2025-03-03" />
		<title>Уязвимость glpi </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2022-35914/</description>
               <solution>
                    Запретить использование в ОС пакета glpi
                или
                    Установить обновление для пакета(ов) glpi
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2022-35914/" type="self" id="ROS-20250303-02" title="ROS-20250303-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35914" type="cve" id="CVE-2022-35914" title="CVE-2022-35914" />
			<reference href="https://bdu.fstec.ru/vul/2025-03383" type="self" id="BDU:2025-03383" title="BDU:2025-03383" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi" epoch="0" version="9.5.13" release="1.el7" arch="noarch" src="">
					<filename>glpi-0:9.5.13-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250303-03</id>
		<issued date="2025-03-03" />
		<updated date="2025-03-03" />
		<title>Уязвимость dmidecode </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dmidecode</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dmidecode-cve-2023-30630/</description>
               <solution>
                    Запретить использование в ОС пакета dmidecode
                или
                    Установить обновление для пакета(ов) dmidecode
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dmidecode-cve-2023-30630/" type="self" id="ROS-20250303-03" title="ROS-20250303-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30630" type="cve" id="CVE-2023-30630" title="CVE-2023-30630" />
			<reference href="https://bdu.fstec.ru/vul/2023-07470" type="self" id="BDU:2023-07470" title="BDU:2023-07470" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dmidecode" epoch="1" version="3.5" release="1.el7" arch="x86_64" src="">
					<filename>dmidecode-1:3.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250303-04</id>
		<issued date="2025-03-03" />
		<updated date="2025-03-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-1583/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-1583/" type="self" id="ROS-20250303-04" title="ROS-20250303-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1583" type="cve" id="CVE-2023-1583" title="CVE-2023-1583" />
			<reference href="https://bdu.fstec.ru/vul/2023-01793" type="self" id="BDU:2023-01793" title="BDU:2023-01793" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250303-05</id>
		<issued date="2025-03-03" />
		<updated date="2025-03-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2022-4095/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2022-4095/" type="self" id="ROS-20250303-05" title="ROS-20250303-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4095" type="cve" id="CVE-2022-4095" title="CVE-2022-4095" />
			<reference href="https://bdu.fstec.ru/vul/2023-00456" type="self" id="BDU:2023-00456" title="BDU:2023-00456" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel" epoch="0" version="lt" release="0:5.15.66.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:5.15.66.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250303-06</id>
		<issued date="2025-03-03" />
		<updated date="2025-03-03" />
		<title>Множественные уязвимости kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-cve-2022-48423-cve-2022-48424/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-cve-2022-48423-cve-2022-48424/" type="self" id="ROS-20250303-06" title="ROS-20250303-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48423" type="cve" id="CVE-2022-48423" title="CVE-2022-48423" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48424" type="cve" id="CVE-2022-48424" title="CVE-2022-48424" />
			<reference href="https://bdu.fstec.ru/vul/2023-01745" type="self" id="BDU:2023-01745" title="BDU:2023-01745" />
			<reference href="https://bdu.fstec.ru/vul/2023-01746" type="self" id="BDU:2023-01746" title="BDU:2023-01746" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="5.15.106" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:5.15.106-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250303-07</id>
		<issued date="2025-03-03" />
		<updated date="2025-03-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2022-48425/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2022-48425/" type="self" id="ROS-20250303-07" title="ROS-20250303-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48425" type="cve" id="CVE-2022-48425" title="CVE-2022-48425" />
			<reference href="https://bdu.fstec.ru/vul/2023-01734" type="self" id="BDU:2023-01734" title="BDU:2023-01734" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250307-01</id>
		<issued date="2025-03-07" />
		<updated date="2025-03-07" />
		<title>Уязвимость socat </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в socat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-socat-cve-2024-54661/</description>
               <solution>
                    Запретить использование в ОС пакета socat
                или
                    Установить обновление для пакета(ов) socat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-socat-cve-2024-54661/" type="self" id="ROS-20250307-01" title="ROS-20250307-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54661" type="cve" id="CVE-2024-54661" title="CVE-2024-54661" />
			<reference href="https://bdu.fstec.ru/vul/2025-03292" type="self" id="BDU:2025-03292" title="BDU:2025-03292" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="socat" epoch="0" version="1.8.0.2" release="1.el7" arch="x86_64" src="">
					<filename>socat-0:1.8.0.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250307-02</id>
		<issued date="2025-03-07" />
		<updated date="2025-03-07" />
		<title>Уязвимость subversion </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в subversion</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-subversion-cve-2024-46901/</description>
               <solution>
                    Запретить использование в ОС пакета Subversion
                или
                    Установить обновление для пакета(ов) Subversion
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-subversion-cve-2024-46901/" type="self" id="ROS-20250307-02" title="ROS-20250307-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46901" type="cve" id="CVE-2024-46901" title="CVE-2024-46901" />
			<reference href="https://bdu.fstec.ru/vul/2025-03298" type="self" id="BDU:2025-03298" title="BDU:2025-03298" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="subversion" epoch="0" version="1.14.5" release="3.el7" arch="x86_64" src="">
					<filename>subversion-0:1.14.5-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250307-03</id>
		<issued date="2025-03-07" />
		<updated date="2025-03-07" />
		<title>Множественные уязвимости chromium</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-070325/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-070325/" type="self" id="ROS-20250307-03" title="ROS-20250307-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0999" type="cve" id="CVE-2025-0999" title="CVE-2025-0999" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0291" type="cve" id="CVE-2025-0291" title="CVE-2025-0291" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0444" type="cve" id="CVE-2025-0444" title="CVE-2025-0444" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0445" type="cve" id="CVE-2025-0445" title="CVE-2025-0445" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0451" type="cve" id="CVE-2025-0451" title="CVE-2025-0451" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0762" type="cve" id="CVE-2025-0762" title="CVE-2025-0762" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0611" type="cve" id="CVE-2025-0611" title="CVE-2025-0611" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0612" type="cve" id="CVE-2025-0612" title="CVE-2025-0612" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0434" type="cve" id="CVE-2025-0434" title="CVE-2025-0434" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0436" type="cve" id="CVE-2025-0436" title="CVE-2025-0436" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0437" type="cve" id="CVE-2025-0437" title="CVE-2025-0437" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0438" type="cve" id="CVE-2025-0438" title="CVE-2025-0438" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0439" type="cve" id="CVE-2025-0439" title="CVE-2025-0439" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0441" type="cve" id="CVE-2025-0441" title="CVE-2025-0441" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0442" type="cve" id="CVE-2025-0442" title="CVE-2025-0442" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0443" type="cve" id="CVE-2025-0443" title="CVE-2025-0443" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0446" type="cve" id="CVE-2025-0446" title="CVE-2025-0446" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0447" type="cve" id="CVE-2025-0447" title="CVE-2025-0447" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0448" type="cve" id="CVE-2025-0448" title="CVE-2025-0448" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0995" type="cve" id="CVE-2025-0995" title="CVE-2025-0995" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0996" type="cve" id="CVE-2025-0996" title="CVE-2025-0996" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0997" type="cve" id="CVE-2025-0997" title="CVE-2025-0997" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0998" type="cve" id="CVE-2025-0998" title="CVE-2025-0998" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1006" type="cve" id="CVE-2025-1006" title="CVE-2025-1006" />
			<reference href="https://bdu.fstec.ru/vul/2025-03316" type="self" id="BDU:2025-03316" title="BDU:2025-03316" />
			<reference href="https://bdu.fstec.ru/vul/2025-00111" type="self" id="BDU:2025-00111" title="BDU:2025-00111" />
			<reference href="https://bdu.fstec.ru/vul/2025-01274" type="self" id="BDU:2025-01274" title="BDU:2025-01274" />
			<reference href="https://bdu.fstec.ru/vul/2025-01273" type="self" id="BDU:2025-01273" title="BDU:2025-01273" />
			<reference href="https://bdu.fstec.ru/vul/2025-02318" type="self" id="BDU:2025-02318" title="BDU:2025-02318" />
			<reference href="https://bdu.fstec.ru/vul/2025-00908" type="self" id="BDU:2025-00908" title="BDU:2025-00908" />
			<reference href="https://bdu.fstec.ru/vul/2025-01352" type="self" id="BDU:2025-01352" title="BDU:2025-01352" />
			<reference href="https://bdu.fstec.ru/vul/2025-01351" type="self" id="BDU:2025-01351" title="BDU:2025-01351" />
			<reference href="https://bdu.fstec.ru/vul/2025-00712" type="self" id="BDU:2025-00712" title="BDU:2025-00712" />
			<reference href="https://bdu.fstec.ru/vul/2025-00715" type="self" id="BDU:2025-00715" title="BDU:2025-00715" />
			<reference href="https://bdu.fstec.ru/vul/2025-00716" type="self" id="BDU:2025-00716" title="BDU:2025-00716" />
			<reference href="https://bdu.fstec.ru/vul/2025-00717" type="self" id="BDU:2025-00717" title="BDU:2025-00717" />
			<reference href="https://bdu.fstec.ru/vul/2025-00748" type="self" id="BDU:2025-00748" title="BDU:2025-00748" />
			<reference href="https://bdu.fstec.ru/vul/2025-00750" type="self" id="BDU:2025-00750" title="BDU:2025-00750" />
			<reference href="https://bdu.fstec.ru/vul/2025-00751" type="self" id="BDU:2025-00751" title="BDU:2025-00751" />
			<reference href="https://bdu.fstec.ru/vul/2025-00752" type="self" id="BDU:2025-00752" title="BDU:2025-00752" />
			<reference href="https://bdu.fstec.ru/vul/2025-00755" type="self" id="BDU:2025-00755" title="BDU:2025-00755" />
			<reference href="https://bdu.fstec.ru/vul/2025-00754" type="self" id="BDU:2025-00754" title="BDU:2025-00754" />
			<reference href="https://bdu.fstec.ru/vul/2025-00753" type="self" id="BDU:2025-00753" title="BDU:2025-00753" />
			<reference href="https://bdu.fstec.ru/vul/2025-01590" type="self" id="BDU:2025-01590" title="BDU:2025-01590" />
			<reference href="https://bdu.fstec.ru/vul/2025-01589" type="self" id="BDU:2025-01589" title="BDU:2025-01589" />
			<reference href="https://bdu.fstec.ru/vul/2025-01588" type="self" id="BDU:2025-01588" title="BDU:2025-01588" />
			<reference href="https://bdu.fstec.ru/vul/2025-01587" type="self" id="BDU:2025-01587" title="BDU:2025-01587" />
			<reference href="https://bdu.fstec.ru/vul/2025-03304" type="self" id="BDU:2025-03304" title="BDU:2025-03304" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="133.0.6943.126" release="1.el7" arch="x86_64" src="">
					<filename>chromium-0:133.0.6943.126-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250307-04</id>
		<issued date="2025-03-07" />
		<updated date="2025-03-07" />
		<title>Уязвимость python3-django </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-django</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-django-cve-2024-56374/</description>
               <solution>
                    Запретить использование в ОС пакета python3-django
                или
                    Установить обновление для пакета(ов) python3-django
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-django-cve-2024-56374/" type="self" id="ROS-20250307-04" title="ROS-20250307-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56374" type="cve" id="CVE-2024-56374" title="CVE-2024-56374" />
			<reference href="https://bdu.fstec.ru/vul/2025-01179" type="self" id="BDU:2025-01179" title="BDU:2025-01179" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-django" epoch="0" version="4.2.18" release="1.el7" arch="noarch" src="">
					<filename>python3-django-0:4.2.18-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250307-05</id>
		<issued date="2025-03-07" />
		<updated date="2025-03-07" />
		<title>Уязвимость openssl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openssl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl-cve-2024-13176/</description>
               <solution>
                    Запретить использование в ОС пакета openssl
                или
                    Установить обновление для пакета(ов) openssl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl-cve-2024-13176/" type="self" id="ROS-20250307-05" title="ROS-20250307-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-13176" type="cve" id="CVE-2024-13176" title="CVE-2024-13176" />
			<reference href="https://bdu.fstec.ru/vul/2025-03280" type="self" id="BDU:2025-03280" title="BDU:2025-03280" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl" epoch="1" version="1.1.1w" release="4.el7" arch="x86_64" src="">
					<filename>openssl-1:1.1.1w-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250307-06</id>
		<issued date="2025-03-07" />
		<updated date="2025-03-07" />
		<title>Уязвимость openssl3 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openssl3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl-cve-2024-131767238/</description>
               <solution>
                    Запретить использование в ОС пакета openssl3
                или
                    Установить обновление для пакета(ов) openssl3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl-cve-2024-131767238/" type="self" id="ROS-20250307-06" title="ROS-20250307-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-13176" type="cve" id="CVE-2024-13176" title="CVE-2024-13176" />
			<reference href="https://bdu.fstec.ru/vul/2025-03280" type="self" id="BDU:2025-03280" title="BDU:2025-03280" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl3" epoch="0" version="3.2.2" release="3.el7" arch="x86_64" src="">
					<filename>openssl3-0:3.2.2-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250307-07</id>
		<issued date="2025-03-07" />
		<updated date="2025-03-07" />
		<title>Уязвимость ovn </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ovn</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ovn-cve-2025-0650/</description>
               <solution>
                    Запретить использование в ОС пакета ovn
                или
                    Установить обновление для пакета(ов) ovn
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ovn-cve-2025-0650/" type="self" id="ROS-20250307-07" title="ROS-20250307-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0650" type="cve" id="CVE-2025-0650" title="CVE-2025-0650" />
			<reference href="https://bdu.fstec.ru/vul/2025-03286" type="self" id="BDU:2025-03286" title="BDU:2025-03286" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ovn" epoch="0" version="24.09.2" release="2.el7" arch="x86_64" src="">
					<filename>ovn-0:24.09.2-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250307-08</id>
		<issued date="2025-03-07" />
		<updated date="2025-03-07" />
		<title>Уязвимость binutils </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в binutils</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-binutils-cve-2025-0840/</description>
               <solution>
                    Запретить использование в ОС пакета Binutils
                или
                    Установить обновление для пакета(ов) Binutils
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-binutils-cve-2025-0840/" type="self" id="ROS-20250307-08" title="ROS-20250307-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0840" type="cve" id="CVE-2025-0840" title="CVE-2025-0840" />
			<reference href="https://bdu.fstec.ru/vul/2025-03384" type="self" id="BDU:2025-03384" title="BDU:2025-03384" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="binutils" epoch="0" version="2.40" release="12.el7" arch="x86_64" src="">
					<filename>binutils-0:2.40-12.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250307-09</id>
		<issued date="2025-03-07" />
		<updated date="2025-03-07" />
		<title>Уязвимость raptor2 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в raptor2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-raptor2-cve-2024-57823/</description>
               <solution>
                    Запретить использование в ОС пакета raptor2
                или
                    Установить обновление для пакета(ов) raptor2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-raptor2-cve-2024-57823/" type="self" id="ROS-20250307-09" title="ROS-20250307-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57823" type="cve" id="CVE-2024-57823" title="CVE-2024-57823" />
			<reference href="https://bdu.fstec.ru/vul/2025-03460" type="self" id="BDU:2025-03460" title="BDU:2025-03460" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="raptor2" epoch="0" version="2.0.15" release="30.el7" arch="x86_64" src="">
					<filename>raptor2-0:2.0.15-30.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250307-10</id>
		<issued date="2025-03-07" />
		<updated date="2025-03-07" />
		<title>Уязвимость nginx </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nginx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nginx-cve-2025-23419/</description>
               <solution>
                    Запретить использование в ОС пакета nginx
                или
                    Установить обновление для пакета(ов) nginx
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nginx-cve-2025-23419/" type="self" id="ROS-20250307-10" title="ROS-20250307-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23419" type="cve" id="CVE-2025-23419" title="CVE-2025-23419" />
			<reference href="https://bdu.fstec.ru/vul/2025-03281" type="self" id="BDU:2025-03281" title="BDU:2025-03281" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nginx" epoch="1" version="1.26.3" release="1.el7" arch="x86_64" src="">
					<filename>nginx-1:1.26.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250307-11</id>
		<issued date="2025-03-07" />
		<updated date="2025-03-07" />
		<title>Множественные уязвимости vim-common </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в vim-common</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim-common-cve-2025-1215-cve-2025-26603/</description>
               <solution>
                    Запретить использование в ОС пакета vim
                или
                    Установить обновление для пакета(ов) vim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim-common-cve-2025-1215-cve-2025-26603/" type="self" id="ROS-20250307-11" title="ROS-20250307-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1215" type="cve" id="CVE-2025-1215" title="CVE-2025-1215" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26603" type="cve" id="CVE-2025-26603" title="CVE-2025-26603" />
			<reference href="https://bdu.fstec.ru/vul/2025-03287" type="self" id="BDU:2025-03287" title="BDU:2025-03287" />
			<reference href="https://bdu.fstec.ru/vul/2025-03299" type="self" id="BDU:2025-03299" title="BDU:2025-03299" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-common" epoch="2" version="9.1.1122" release="1.el7" arch="x86_64" src="">
					<filename>vim-common-2:9.1.1122-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250307-12</id>
		<issued date="2025-03-07" />
		<updated date="2025-03-07" />
		<title>Уязвимость nomad </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nomad</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nomad-cve-2025-0937/</description>
               <solution>
                    Запретить использование в ОС пакета Nomad
                или
                    Установить обновление для пакета(ов) Nomad
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nomad-cve-2025-0937/" type="self" id="ROS-20250307-12" title="ROS-20250307-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0937" type="cve" id="CVE-2025-0937" title="CVE-2025-0937" />
			<reference href="https://bdu.fstec.ru/vul/2025-03455" type="self" id="BDU:2025-03455" title="BDU:2025-03455" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nomad" epoch="0" version="1.9.6" release="1.el7" arch="x86_64" src="">
					<filename>nomad-0:1.9.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250307-13</id>
		<issued date="2025-03-07" />
		<updated date="2025-03-07" />
		<title>Уязвимость openssh </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openssh</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssh-CVE-2025-26465/</description>
               <solution>
                    Запретить использование в ОС пакета openssh
                или
                    Установить обновление для пакета(ов) openssh
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssh-CVE-2025-26465/" type="self" id="ROS-20250307-13" title="ROS-20250307-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26465" type="cve" id="CVE-2025-26465" title="CVE-2025-26465" />
			<reference href="https://bdu.fstec.ru/vul/2025-01959" type="self" id="BDU:2025-01959" title="BDU:2025-01959" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssh" epoch="0" version="8.9p1" release="14.el7" arch="x86_64" src="">
					<filename>openssh-0:8.9p1-14.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250307-14</id>
		<issued date="2025-03-07" />
		<updated date="2025-03-07" />
		<title>Множественные уязвимости moodle</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-moodle-070325/</description>
               <solution>
                    Запретить использование в ОС пакета moodle
                или
                    Установить обновление для пакета(ов) moodle
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-moodle-070325/" type="self" id="ROS-20250307-14" title="ROS-20250307-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26530" type="cve" id="CVE-2025-26530" title="CVE-2025-26530" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26529" type="cve" id="CVE-2025-26529" title="CVE-2025-26529" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26525" type="cve" id="CVE-2025-26525" title="CVE-2025-26525" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26526" type="cve" id="CVE-2025-26526" title="CVE-2025-26526" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26527" type="cve" id="CVE-2025-26527" title="CVE-2025-26527" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26528" type="cve" id="CVE-2025-26528" title="CVE-2025-26528" />
			<reference href="https://bdu.fstec.ru/vul/2025-02327" type="self" id="BDU:2025-02327" title="BDU:2025-02327" />
			<reference href="https://bdu.fstec.ru/vul/2025-02329" type="self" id="BDU:2025-02329" title="BDU:2025-02329" />
			<reference href="https://bdu.fstec.ru/vul/2025-02323" type="self" id="BDU:2025-02323" title="BDU:2025-02323" />
			<reference href="https://bdu.fstec.ru/vul/2025-02324" type="self" id="BDU:2025-02324" title="BDU:2025-02324" />
			<reference href="https://bdu.fstec.ru/vul/2025-02326" type="self" id="BDU:2025-02326" title="BDU:2025-02326" />
			<reference href="https://bdu.fstec.ru/vul/2025-02322" type="self" id="BDU:2025-02322" title="BDU:2025-02322" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="moodle" epoch="0" version="4.3.10" release="1.el7" arch="noarch" src="">
					<filename>moodle-0:4.3.10-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250310-01</id>
		<issued date="2025-03-10" />
		<updated date="2025-03-10" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-100325/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-100325/" type="self" id="ROS-20250310-01" title="ROS-20250310-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35966" type="cve" id="CVE-2024-35966" title="CVE-2024-35966" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35967" type="cve" id="CVE-2024-35967" title="CVE-2024-35967" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35995" type="cve" id="CVE-2024-35995" title="CVE-2024-35995" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47490" type="cve" id="CVE-2021-47490" title="CVE-2021-47490" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36893" type="cve" id="CVE-2024-36893" title="CVE-2024-36893" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36899" type="cve" id="CVE-2024-36899" title="CVE-2024-36899" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36936" type="cve" id="CVE-2024-36936" title="CVE-2024-36936" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38538" type="cve" id="CVE-2024-38538" title="CVE-2024-38538" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38544" type="cve" id="CVE-2024-38544" title="CVE-2024-38544" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38545" type="cve" id="CVE-2024-38545" title="CVE-2024-38545" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38632" type="cve" id="CVE-2024-38632" title="CVE-2024-38632" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39463" type="cve" id="CVE-2024-39463" title="CVE-2024-39463" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39494" type="cve" id="CVE-2024-39494" title="CVE-2024-39494" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39497" type="cve" id="CVE-2024-39497" title="CVE-2024-39497" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40953" type="cve" id="CVE-2024-40953" title="CVE-2024-40953" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41016" type="cve" id="CVE-2024-41016" title="CVE-2024-41016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41080" type="cve" id="CVE-2024-41080" title="CVE-2024-41080" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42068" type="cve" id="CVE-2024-42068" title="CVE-2024-42068" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42291" type="cve" id="CVE-2024-42291" title="CVE-2024-42291" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42315" type="cve" id="CVE-2024-42315" title="CVE-2024-42315" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43857" type="cve" id="CVE-2024-43857" title="CVE-2024-43857" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43868" type="cve" id="CVE-2024-43868" title="CVE-2024-43868" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52904" type="cve" id="CVE-2023-52904" title="CVE-2023-52904" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52913" type="cve" id="CVE-2023-52913" title="CVE-2023-52913" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44931" type="cve" id="CVE-2024-44931" title="CVE-2024-44931" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44940" type="cve" id="CVE-2024-44940" title="CVE-2024-44940" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44949" type="cve" id="CVE-2024-44949" title="CVE-2024-44949" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46695" type="cve" id="CVE-2024-46695" title="CVE-2024-46695" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46710" type="cve" id="CVE-2024-46710" title="CVE-2024-46710" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46809" type="cve" id="CVE-2024-46809" title="CVE-2024-46809" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46841" type="cve" id="CVE-2024-46841" title="CVE-2024-46841" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46852" type="cve" id="CVE-2024-46852" title="CVE-2024-46852" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46853" type="cve" id="CVE-2024-46853" title="CVE-2024-46853" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46854" type="cve" id="CVE-2024-46854" title="CVE-2024-46854" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46855" type="cve" id="CVE-2024-46855" title="CVE-2024-46855" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46858" type="cve" id="CVE-2024-46858" title="CVE-2024-46858" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46859" type="cve" id="CVE-2024-46859" title="CVE-2024-46859" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46864" type="cve" id="CVE-2024-46864" title="CVE-2024-46864" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46865" type="cve" id="CVE-2024-46865" title="CVE-2024-46865" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46871" type="cve" id="CVE-2024-46871" title="CVE-2024-46871" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47670" type="cve" id="CVE-2024-47670" title="CVE-2024-47670" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47671" type="cve" id="CVE-2024-47671" title="CVE-2024-47671" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47672" type="cve" id="CVE-2024-47672" title="CVE-2024-47672" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47673" type="cve" id="CVE-2024-47673" title="CVE-2024-47673" />
			<reference href="https://bdu.fstec.ru/vul/2025-03448" type="self" id="BDU:2025-03448" title="BDU:2025-03448" />
			<reference href="https://bdu.fstec.ru/vul/2025-03445" type="self" id="BDU:2025-03445" title="BDU:2025-03445" />
			<reference href="https://bdu.fstec.ru/vul/2025-03446" type="self" id="BDU:2025-03446" title="BDU:2025-03446" />
			<reference href="https://bdu.fstec.ru/vul/2025-03279" type="self" id="BDU:2025-03279" title="BDU:2025-03279" />
			<reference href="https://bdu.fstec.ru/vul/2024-04554" type="self" id="BDU:2024-04554" title="BDU:2024-04554" />
			<reference href="https://bdu.fstec.ru/vul/2025-03441" type="self" id="BDU:2025-03441" title="BDU:2025-03441" />
			<reference href="https://bdu.fstec.ru/vul/2025-00922" type="self" id="BDU:2025-00922" title="BDU:2025-00922" />
			<reference href="https://bdu.fstec.ru/vul/2025-03282" type="self" id="BDU:2025-03282" title="BDU:2025-03282" />
			<reference href="https://bdu.fstec.ru/vul/2024-09001" type="self" id="BDU:2024-09001" title="BDU:2024-09001" />
			<reference href="https://bdu.fstec.ru/vul/2024-07928" type="self" id="BDU:2024-07928" title="BDU:2024-07928" />
			<reference href="https://bdu.fstec.ru/vul/2024-06073" type="self" id="BDU:2024-06073" title="BDU:2024-06073" />
			<reference href="https://bdu.fstec.ru/vul/2025-03440" type="self" id="BDU:2025-03440" title="BDU:2025-03440" />
			<reference href="https://bdu.fstec.ru/vul/2025-03447" type="self" id="BDU:2025-03447" title="BDU:2025-03447" />
			<reference href="https://bdu.fstec.ru/vul/2024-08323" type="self" id="BDU:2024-08323" title="BDU:2024-08323" />
			<reference href="https://bdu.fstec.ru/vul/2025-03012" type="self" id="BDU:2025-03012" title="BDU:2025-03012" />
			<reference href="https://bdu.fstec.ru/vul/2025-03442" type="self" id="BDU:2025-03442" title="BDU:2025-03442" />
			<reference href="https://bdu.fstec.ru/vul/2025-02976" type="self" id="BDU:2025-02976" title="BDU:2025-02976" />
			<reference href="https://bdu.fstec.ru/vul/2025-03444" type="self" id="BDU:2025-03444" title="BDU:2025-03444" />
			<reference href="https://bdu.fstec.ru/vul/2025-00781" type="self" id="BDU:2025-00781" title="BDU:2025-00781" />
			<reference href="https://bdu.fstec.ru/vul/2025-03449" type="self" id="BDU:2025-03449" title="BDU:2025-03449" />
			<reference href="https://bdu.fstec.ru/vul/2024-08532" type="self" id="BDU:2024-08532" title="BDU:2024-08532" />
			<reference href="https://bdu.fstec.ru/vul/2024-08523" type="self" id="BDU:2024-08523" title="BDU:2024-08523" />
			<reference href="https://bdu.fstec.ru/vul/2025-03392" type="self" id="BDU:2025-03392" title="BDU:2025-03392" />
			<reference href="https://bdu.fstec.ru/vul/2025-03414" type="self" id="BDU:2025-03414" title="BDU:2025-03414" />
			<reference href="https://bdu.fstec.ru/vul/2025-03412" type="self" id="BDU:2025-03412" title="BDU:2025-03412" />
			<reference href="https://bdu.fstec.ru/vul/2025-03421" type="self" id="BDU:2025-03421" title="BDU:2025-03421" />
			<reference href="https://bdu.fstec.ru/vul/2024-08232" type="self" id="BDU:2024-08232" title="BDU:2024-08232" />
			<reference href="https://bdu.fstec.ru/vul/2024-08519" type="self" id="BDU:2024-08519" title="BDU:2024-08519" />
			<reference href="https://bdu.fstec.ru/vul/2024-08517" type="self" id="BDU:2024-08517" title="BDU:2024-08517" />
			<reference href="https://bdu.fstec.ru/vul/2025-03390" type="self" id="BDU:2025-03390" title="BDU:2025-03390" />
			<reference href="https://bdu.fstec.ru/vul/2024-08237" type="self" id="BDU:2024-08237" title="BDU:2024-08237" />
			<reference href="https://bdu.fstec.ru/vul/2024-08518" type="self" id="BDU:2024-08518" title="BDU:2024-08518" />
			<reference href="https://bdu.fstec.ru/vul/2025-03393" type="self" id="BDU:2025-03393" title="BDU:2025-03393" />
			<reference href="https://bdu.fstec.ru/vul/2024-08236" type="self" id="BDU:2024-08236" title="BDU:2024-08236" />
			<reference href="https://bdu.fstec.ru/vul/2024-08979" type="self" id="BDU:2024-08979" title="BDU:2024-08979" />
			<reference href="https://bdu.fstec.ru/vul/2024-08985" type="self" id="BDU:2024-08985" title="BDU:2024-08985" />
			<reference href="https://bdu.fstec.ru/vul/2025-03300" type="self" id="BDU:2025-03300" title="BDU:2025-03300" />
			<reference href="https://bdu.fstec.ru/vul/2025-03413" type="self" id="BDU:2025-03413" title="BDU:2025-03413" />
			<reference href="https://bdu.fstec.ru/vul/2025-03391" type="self" id="BDU:2025-03391" title="BDU:2025-03391" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250311-01</id>
		<issued date="2025-03-11" />
		<updated date="2025-03-11" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-110325/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-110325/" type="self" id="ROS-20250311-01" title="ROS-20250311-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47684" type="cve" id="CVE-2024-47684" title="CVE-2024-47684" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47682" type="cve" id="CVE-2024-47682" title="CVE-2024-47682" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47685" type="cve" id="CVE-2024-47685" title="CVE-2024-47685" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47686" type="cve" id="CVE-2024-47686" title="CVE-2024-47686" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47688" type="cve" id="CVE-2024-47688" title="CVE-2024-47688" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47689" type="cve" id="CVE-2024-47689" title="CVE-2024-47689" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47690" type="cve" id="CVE-2024-47690" title="CVE-2024-47690" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47692" type="cve" id="CVE-2024-47692" title="CVE-2024-47692" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47693" type="cve" id="CVE-2024-47693" title="CVE-2024-47693" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47695" type="cve" id="CVE-2024-47695" title="CVE-2024-47695" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47696" type="cve" id="CVE-2024-47696" title="CVE-2024-47696" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47697" type="cve" id="CVE-2024-47697" title="CVE-2024-47697" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47698" type="cve" id="CVE-2024-47698" title="CVE-2024-47698" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47699" type="cve" id="CVE-2024-47699" title="CVE-2024-47699" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47700" type="cve" id="CVE-2024-47700" title="CVE-2024-47700" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47701" type="cve" id="CVE-2024-47701" title="CVE-2024-47701" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47705" type="cve" id="CVE-2024-47705" title="CVE-2024-47705" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47706" type="cve" id="CVE-2024-47706" title="CVE-2024-47706" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47707" type="cve" id="CVE-2024-47707" title="CVE-2024-47707" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47709" type="cve" id="CVE-2024-47709" title="CVE-2024-47709" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56627" type="cve" id="CVE-2024-56627" title="CVE-2024-56627" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47710" type="cve" id="CVE-2024-47710" title="CVE-2024-47710" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47712" type="cve" id="CVE-2024-47712" title="CVE-2024-47712" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47713" type="cve" id="CVE-2024-47713" title="CVE-2024-47713" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47714" type="cve" id="CVE-2024-47714" title="CVE-2024-47714" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47715" type="cve" id="CVE-2024-47715" title="CVE-2024-47715" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47716" type="cve" id="CVE-2024-47716" title="CVE-2024-47716" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47718" type="cve" id="CVE-2024-47718" title="CVE-2024-47718" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47719" type="cve" id="CVE-2024-47719" title="CVE-2024-47719" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47720" type="cve" id="CVE-2024-47720" title="CVE-2024-47720" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47723" type="cve" id="CVE-2024-47723" title="CVE-2024-47723" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47727" type="cve" id="CVE-2024-47727" title="CVE-2024-47727" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47728" type="cve" id="CVE-2024-47728" title="CVE-2024-47728" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47730" type="cve" id="CVE-2024-47730" title="CVE-2024-47730" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47731" type="cve" id="CVE-2024-47731" title="CVE-2024-47731" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47734" type="cve" id="CVE-2024-47734" title="CVE-2024-47734" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47735" type="cve" id="CVE-2024-47735" title="CVE-2024-47735" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47737" type="cve" id="CVE-2024-47737" title="CVE-2024-47737" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47739" type="cve" id="CVE-2024-47739" title="CVE-2024-47739" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47740" type="cve" id="CVE-2024-47740" title="CVE-2024-47740" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47741" type="cve" id="CVE-2024-47741" title="CVE-2024-47741" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47742" type="cve" id="CVE-2024-47742" title="CVE-2024-47742" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47743" type="cve" id="CVE-2024-47743" title="CVE-2024-47743" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47744" type="cve" id="CVE-2024-47744" title="CVE-2024-47744" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47747" type="cve" id="CVE-2024-47747" title="CVE-2024-47747" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47748" type="cve" id="CVE-2024-47748" title="CVE-2024-47748" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47749" type="cve" id="CVE-2024-47749" title="CVE-2024-47749" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47750" type="cve" id="CVE-2024-47750" title="CVE-2024-47750" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47751" type="cve" id="CVE-2024-47751" title="CVE-2024-47751" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47756" type="cve" id="CVE-2024-47756" title="CVE-2024-47756" />
			<reference href="https://bdu.fstec.ru/vul/2025-03297" type="self" id="BDU:2025-03297" title="BDU:2025-03297" />
			<reference href="https://bdu.fstec.ru/vul/2024-08988" type="self" id="BDU:2024-08988" title="BDU:2024-08988" />
			<reference href="https://bdu.fstec.ru/vul/2024-08983" type="self" id="BDU:2024-08983" title="BDU:2024-08983" />
			<reference href="https://bdu.fstec.ru/vul/2025-03031" type="self" id="BDU:2025-03031" title="BDU:2025-03031" />
			<reference href="https://bdu.fstec.ru/vul/2025-03415" type="self" id="BDU:2025-03415" title="BDU:2025-03415" />
			<reference href="https://bdu.fstec.ru/vul/2025-03296" type="self" id="BDU:2025-03296" title="BDU:2025-03296" />
			<reference href="https://bdu.fstec.ru/vul/2025-03294" type="self" id="BDU:2025-03294" title="BDU:2025-03294" />
			<reference href="https://bdu.fstec.ru/vul/2025-03285" type="self" id="BDU:2025-03285" title="BDU:2025-03285" />
			<reference href="https://bdu.fstec.ru/vul/2025-03284" type="self" id="BDU:2025-03284" title="BDU:2025-03284" />
			<reference href="https://bdu.fstec.ru/vul/2025-03034" type="self" id="BDU:2025-03034" title="BDU:2025-03034" />
			<reference href="https://bdu.fstec.ru/vul/2025-00948" type="self" id="BDU:2025-00948" title="BDU:2025-00948" />
			<reference href="https://bdu.fstec.ru/vul/2024-08989" type="self" id="BDU:2024-08989" title="BDU:2024-08989" />
			<reference href="https://bdu.fstec.ru/vul/2024-08990" type="self" id="BDU:2024-08990" title="BDU:2024-08990" />
			<reference href="https://bdu.fstec.ru/vul/2025-03416" type="self" id="BDU:2025-03416" title="BDU:2025-03416" />
			<reference href="https://bdu.fstec.ru/vul/2025-03394" type="self" id="BDU:2025-03394" title="BDU:2025-03394" />
			<reference href="https://bdu.fstec.ru/vul/2025-03038" type="self" id="BDU:2025-03038" title="BDU:2025-03038" />
			<reference href="https://bdu.fstec.ru/vul/2025-03290" type="self" id="BDU:2025-03290" title="BDU:2025-03290" />
			<reference href="https://bdu.fstec.ru/vul/2025-03289" type="self" id="BDU:2025-03289" title="BDU:2025-03289" />
			<reference href="https://bdu.fstec.ru/vul/2025-03417" type="self" id="BDU:2025-03417" title="BDU:2025-03417" />
			<reference href="https://bdu.fstec.ru/vul/2025-03418" type="self" id="BDU:2025-03418" title="BDU:2025-03418" />
			<reference href="https://bdu.fstec.ru/vul/2025-00883" type="self" id="BDU:2025-00883" title="BDU:2025-00883" />
			<reference href="https://bdu.fstec.ru/vul/2025-03295" type="self" id="BDU:2025-03295" title="BDU:2025-03295" />
			<reference href="https://bdu.fstec.ru/vul/2025-03419" type="self" id="BDU:2025-03419" title="BDU:2025-03419" />
			<reference href="https://bdu.fstec.ru/vul/2025-03293" type="self" id="BDU:2025-03293" title="BDU:2025-03293" />
			<reference href="https://bdu.fstec.ru/vul/2025-03420" type="self" id="BDU:2025-03420" title="BDU:2025-03420" />
			<reference href="https://bdu.fstec.ru/vul/2025-03291" type="self" id="BDU:2025-03291" title="BDU:2025-03291" />
			<reference href="https://bdu.fstec.ru/vul/2025-03422" type="self" id="BDU:2025-03422" title="BDU:2025-03422" />
			<reference href="https://bdu.fstec.ru/vul/2025-03039" type="self" id="BDU:2025-03039" title="BDU:2025-03039" />
			<reference href="https://bdu.fstec.ru/vul/2025-03106" type="self" id="BDU:2025-03106" title="BDU:2025-03106" />
			<reference href="https://bdu.fstec.ru/vul/2025-03423" type="self" id="BDU:2025-03423" title="BDU:2025-03423" />
			<reference href="https://bdu.fstec.ru/vul/2025-03107" type="self" id="BDU:2025-03107" title="BDU:2025-03107" />
			<reference href="https://bdu.fstec.ru/vul/2024-08991" type="self" id="BDU:2024-08991" title="BDU:2024-08991" />
			<reference href="https://bdu.fstec.ru/vul/2025-03288" type="self" id="BDU:2025-03288" title="BDU:2025-03288" />
			<reference href="https://bdu.fstec.ru/vul/2025-03108" type="self" id="BDU:2025-03108" title="BDU:2025-03108" />
			<reference href="https://bdu.fstec.ru/vul/2025-03424" type="self" id="BDU:2025-03424" title="BDU:2025-03424" />
			<reference href="https://bdu.fstec.ru/vul/2025-03425" type="self" id="BDU:2025-03425" title="BDU:2025-03425" />
			<reference href="https://bdu.fstec.ru/vul/2025-03426" type="self" id="BDU:2025-03426" title="BDU:2025-03426" />
			<reference href="https://bdu.fstec.ru/vul/2025-03395" type="self" id="BDU:2025-03395" title="BDU:2025-03395" />
			<reference href="https://bdu.fstec.ru/vul/2025-03396" type="self" id="BDU:2025-03396" title="BDU:2025-03396" />
			<reference href="https://bdu.fstec.ru/vul/2025-03386" type="self" id="BDU:2025-03386" title="BDU:2025-03386" />
			<reference href="https://bdu.fstec.ru/vul/2024-09794" type="self" id="BDU:2024-09794" title="BDU:2024-09794" />
			<reference href="https://bdu.fstec.ru/vul/2025-03109" type="self" id="BDU:2025-03109" title="BDU:2025-03109" />
			<reference href="https://bdu.fstec.ru/vul/2025-03387" type="self" id="BDU:2025-03387" title="BDU:2025-03387" />
			<reference href="https://bdu.fstec.ru/vul/2025-03278" type="self" id="BDU:2025-03278" title="BDU:2025-03278" />
			<reference href="https://bdu.fstec.ru/vul/2024-08997" type="self" id="BDU:2024-08997" title="BDU:2024-08997" />
			<reference href="https://bdu.fstec.ru/vul/2025-03110" type="self" id="BDU:2025-03110" title="BDU:2025-03110" />
			<reference href="https://bdu.fstec.ru/vul/2025-03277" type="self" id="BDU:2025-03277" title="BDU:2025-03277" />
			<reference href="https://bdu.fstec.ru/vul/2024-08993" type="self" id="BDU:2024-08993" title="BDU:2024-08993" />
			<reference href="https://bdu.fstec.ru/vul/2024-08994" type="self" id="BDU:2024-08994" title="BDU:2024-08994" />
			<reference href="https://bdu.fstec.ru/vul/2025-03385" type="self" id="BDU:2025-03385" title="BDU:2025-03385" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250311-02</id>
		<issued date="2025-03-11" />
		<updated date="2025-03-11" />
		<title>Уязвимость postgresql13 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в postgresql13</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql13-cve-2025-1094/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql13
                или
                    Установить обновление для пакета(ов) postgresql13
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql13-cve-2025-1094/" type="self" id="ROS-20250311-02" title="ROS-20250311-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1094" type="cve" id="CVE-2025-1094" title="CVE-2025-1094" />
			<reference href="https://bdu.fstec.ru/vul/2025-01601" type="self" id="BDU:2025-01601" title="BDU:2025-01601" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql13" epoch="0" version="13.20" release="1.el7" arch="x86_64" src="">
					<filename>postgresql13-0:13.20-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250311-03</id>
		<issued date="2025-03-11" />
		<updated date="2025-03-11" />
		<title>Уязвимость postgresql14 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в postgresql14</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql14-cve-2025-1094978/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql14
                или
                    Установить обновление для пакета(ов) postgresql14
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql14-cve-2025-1094978/" type="self" id="ROS-20250311-03" title="ROS-20250311-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1094" type="cve" id="CVE-2025-1094" title="CVE-2025-1094" />
			<reference href="https://bdu.fstec.ru/vul/2025-01601" type="self" id="BDU:2025-01601" title="BDU:2025-01601" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql14" epoch="0" version="14.17" release="1.el7" arch="x86_64" src="">
					<filename>postgresql14-0:14.17-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250311-04</id>
		<issued date="2025-03-11" />
		<updated date="2025-03-11" />
		<title>Уязвимость postgresql15 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в postgresql15</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql15-cve-2025-10945054/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql15
                или
                    Установить обновление для пакета(ов) postgresql15
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql15-cve-2025-10945054/" type="self" id="ROS-20250311-04" title="ROS-20250311-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1094" type="cve" id="CVE-2025-1094" title="CVE-2025-1094" />
			<reference href="https://bdu.fstec.ru/vul/2025-01601" type="self" id="BDU:2025-01601" title="BDU:2025-01601" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql15" epoch="0" version="15.12" release="1.el7" arch="x86_64" src="">
					<filename>postgresql15-0:15.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250311-05</id>
		<issued date="2025-03-11" />
		<updated date="2025-03-11" />
		<title>Уязвимость postgresql16 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в postgresql16</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql16-cve-2025-109450548492/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql16
                или
                    Установить обновление для пакета(ов) postgresql16
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql16-cve-2025-109450548492/" type="self" id="ROS-20250311-05" title="ROS-20250311-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1094" type="cve" id="CVE-2025-1094" title="CVE-2025-1094" />
			<reference href="https://bdu.fstec.ru/vul/2025-01601" type="self" id="BDU:2025-01601" title="BDU:2025-01601" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql16" epoch="0" version="16.8" release="1.el7" arch="x86_64" src="">
					<filename>postgresql16-0:16.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250311-06</id>
		<issued date="2025-03-11" />
		<updated date="2025-03-11" />
		<title>Уязвимость postgresql17 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в postgresql17</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql17-cve-2025-1094505484921151/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql17
                или
                    Установить обновление для пакета(ов) postgresql17
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql17-cve-2025-1094505484921151/" type="self" id="ROS-20250311-06" title="ROS-20250311-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1094" type="cve" id="CVE-2025-1094" title="CVE-2025-1094" />
			<reference href="https://bdu.fstec.ru/vul/2025-01601" type="self" id="BDU:2025-01601" title="BDU:2025-01601" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql17" epoch="0" version="17.4" release="1.el7" arch="x86_64" src="">
					<filename>postgresql17-0:17.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250311-07</id>
		<issued date="2025-03-11" />
		<updated date="2025-03-11" />
		<title>Уязвимость postgresql-1c </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в postgresql-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql1c-cve-2025-10945054849211515366/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql-1c
                или
                    Установить обновление для пакета(ов) postgresql-1c
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql1c-cve-2025-10945054849211515366/" type="self" id="ROS-20250311-07" title="ROS-20250311-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1094" type="cve" id="CVE-2025-1094" title="CVE-2025-1094" />
			<reference href="https://bdu.fstec.ru/vul/2025-01601" type="self" id="BDU:2025-01601" title="BDU:2025-01601" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql-1c" epoch="0" version="14.17" release="1.el7" arch="x86_64" src="">
					<filename>postgresql-1c-0:14.17-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250311-08</id>
		<issued date="2025-03-11" />
		<updated date="2025-03-11" />
		<title>Уязвимость postgresql15-1c </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в postgresql15-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql151c-cve-2025-109450548492115153669902/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql15-1c
                или
                    Установить обновление для пакета(ов) postgresql15-1c
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql151c-cve-2025-109450548492115153669902/" type="self" id="ROS-20250311-08" title="ROS-20250311-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1094" type="cve" id="CVE-2025-1094" title="CVE-2025-1094" />
			<reference href="https://bdu.fstec.ru/vul/2025-01601" type="self" id="BDU:2025-01601" title="BDU:2025-01601" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql15-1c" epoch="0" version="15.12" release="1.el7" arch="x86_64" src="">
					<filename>postgresql15-1c-0:15.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250312-01</id>
		<issued date="2025-03-12" />
		<updated date="2025-03-12" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-120325/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-120325/" type="self" id="ROS-20250312-01" title="ROS-20250312-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47681" type="cve" id="CVE-2024-47681" title="CVE-2024-47681" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47757" type="cve" id="CVE-2024-47757" title="CVE-2024-47757" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49850" type="cve" id="CVE-2024-49850" title="CVE-2024-49850" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49851" type="cve" id="CVE-2024-49851" title="CVE-2024-49851" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49852" type="cve" id="CVE-2024-49852" title="CVE-2024-49852" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49853" type="cve" id="CVE-2024-49853" title="CVE-2024-49853" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49854" type="cve" id="CVE-2024-49854" title="CVE-2024-49854" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49855" type="cve" id="CVE-2024-49855" title="CVE-2024-49855" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49856" type="cve" id="CVE-2024-49856" title="CVE-2024-49856" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49858" type="cve" id="CVE-2024-49858" title="CVE-2024-49858" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49860" type="cve" id="CVE-2024-49860" title="CVE-2024-49860" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49862" type="cve" id="CVE-2024-49862" title="CVE-2024-49862" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49863" type="cve" id="CVE-2024-49863" title="CVE-2024-49863" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49864" type="cve" id="CVE-2024-49864" title="CVE-2024-49864" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49866" type="cve" id="CVE-2024-49866" title="CVE-2024-49866" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49867" type="cve" id="CVE-2024-49867" title="CVE-2024-49867" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49868" type="cve" id="CVE-2024-49868" title="CVE-2024-49868" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49870" type="cve" id="CVE-2024-49870" title="CVE-2024-49870" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49871" type="cve" id="CVE-2024-49871" title="CVE-2024-49871" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49874" type="cve" id="CVE-2024-49874" title="CVE-2024-49874" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49875" type="cve" id="CVE-2024-49875" title="CVE-2024-49875" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49877" type="cve" id="CVE-2024-49877" title="CVE-2024-49877" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49878" type="cve" id="CVE-2024-49878" title="CVE-2024-49878" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49879" type="cve" id="CVE-2024-49879" title="CVE-2024-49879" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49881" type="cve" id="CVE-2024-49881" title="CVE-2024-49881" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49882" type="cve" id="CVE-2024-49882" title="CVE-2024-49882" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49883" type="cve" id="CVE-2024-49883" title="CVE-2024-49883" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49884" type="cve" id="CVE-2024-49884" title="CVE-2024-49884" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49886" type="cve" id="CVE-2024-49886" title="CVE-2024-49886" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49889" type="cve" id="CVE-2024-49889" title="CVE-2024-49889" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49890" type="cve" id="CVE-2024-49890" title="CVE-2024-49890" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49892" type="cve" id="CVE-2024-49892" title="CVE-2024-49892" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49894" type="cve" id="CVE-2024-49894" title="CVE-2024-49894" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49895" type="cve" id="CVE-2024-49895" title="CVE-2024-49895" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49896" type="cve" id="CVE-2024-49896" title="CVE-2024-49896" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49900" type="cve" id="CVE-2024-49900" title="CVE-2024-49900" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49902" type="cve" id="CVE-2024-49902" title="CVE-2024-49902" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49903" type="cve" id="CVE-2024-49903" title="CVE-2024-49903" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49907" type="cve" id="CVE-2024-49907" title="CVE-2024-49907" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49913" type="cve" id="CVE-2024-49913" title="CVE-2024-49913" />
			<reference href="https://bdu.fstec.ru/vul/2024-08982" type="self" id="BDU:2024-08982" title="BDU:2024-08982" />
			<reference href="https://bdu.fstec.ru/vul/2024-08995" type="self" id="BDU:2024-08995" title="BDU:2024-08995" />
			<reference href="https://bdu.fstec.ru/vul/2024-08996" type="self" id="BDU:2024-08996" title="BDU:2024-08996" />
			<reference href="https://bdu.fstec.ru/vul/2024-08981" type="self" id="BDU:2024-08981" title="BDU:2024-08981" />
			<reference href="https://bdu.fstec.ru/vul/2024-08998" type="self" id="BDU:2024-08998" title="BDU:2024-08998" />
			<reference href="https://bdu.fstec.ru/vul/2025-03114" type="self" id="BDU:2025-03114" title="BDU:2025-03114" />
			<reference href="https://bdu.fstec.ru/vul/2025-00159" type="self" id="BDU:2025-00159" title="BDU:2025-00159" />
			<reference href="https://bdu.fstec.ru/vul/2024-10100" type="self" id="BDU:2024-10100" title="BDU:2024-10100" />
			<reference href="https://bdu.fstec.ru/vul/2024-09788" type="self" id="BDU:2024-09788" title="BDU:2024-09788" />
			<reference href="https://bdu.fstec.ru/vul/2024-09789" type="self" id="BDU:2024-09789" title="BDU:2024-09789" />
			<reference href="https://bdu.fstec.ru/vul/2024-09790" type="self" id="BDU:2024-09790" title="BDU:2024-09790" />
			<reference href="https://bdu.fstec.ru/vul/2024-09791" type="self" id="BDU:2024-09791" title="BDU:2024-09791" />
			<reference href="https://bdu.fstec.ru/vul/2025-03115" type="self" id="BDU:2025-03115" title="BDU:2025-03115" />
			<reference href="https://bdu.fstec.ru/vul/2025-03118" type="self" id="BDU:2025-03118" title="BDU:2025-03118" />
			<reference href="https://bdu.fstec.ru/vul/2025-03120" type="self" id="BDU:2025-03120" title="BDU:2025-03120" />
			<reference href="https://bdu.fstec.ru/vul/2024-09795" type="self" id="BDU:2024-09795" title="BDU:2024-09795" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250314-01</id>
		<issued date="2025-03-14" />
		<updated date="2025-04-01" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-140325/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-140325/" type="self" id="ROS-20250314-01" title="ROS-20250314-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50058" type="cve" id="CVE-2024-50058" title="CVE-2024-50058" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50055" type="cve" id="CVE-2024-50055" title="CVE-2024-50055" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50059" type="cve" id="CVE-2024-50059" title="CVE-2024-50059" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50062" type="cve" id="CVE-2024-50062" title="CVE-2024-50062" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50064" type="cve" id="CVE-2024-50064" title="CVE-2024-50064" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50065" type="cve" id="CVE-2024-50065" title="CVE-2024-50065" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50069" type="cve" id="CVE-2024-50069" title="CVE-2024-50069" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50070" type="cve" id="CVE-2024-50070" title="CVE-2024-50070" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50072" type="cve" id="CVE-2024-50072" title="CVE-2024-50072" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50074" type="cve" id="CVE-2024-50074" title="CVE-2024-50074" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50075" type="cve" id="CVE-2024-50075" title="CVE-2024-50075" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50076" type="cve" id="CVE-2024-50076" title="CVE-2024-50076" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50077" type="cve" id="CVE-2024-50077" title="CVE-2024-50077" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50078" type="cve" id="CVE-2024-50078" title="CVE-2024-50078" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50080" type="cve" id="CVE-2024-50080" title="CVE-2024-50080" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50082" type="cve" id="CVE-2024-50082" title="CVE-2024-50082" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50083" type="cve" id="CVE-2024-50083" title="CVE-2024-50083" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50084" type="cve" id="CVE-2024-50084" title="CVE-2024-50084" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50085" type="cve" id="CVE-2024-50085" title="CVE-2024-50085" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50086" type="cve" id="CVE-2024-50086" title="CVE-2024-50086" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50087" type="cve" id="CVE-2024-50087" title="CVE-2024-50087" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50088" type="cve" id="CVE-2024-50088" title="CVE-2024-50088" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50093" type="cve" id="CVE-2024-50093" title="CVE-2024-50093" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50095" type="cve" id="CVE-2024-50095" title="CVE-2024-50095" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50096" type="cve" id="CVE-2024-50096" title="CVE-2024-50096" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50097" type="cve" id="CVE-2024-50097" title="CVE-2024-50097" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50099" type="cve" id="CVE-2024-50099" title="CVE-2024-50099" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50101" type="cve" id="CVE-2024-50101" title="CVE-2024-50101" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50103" type="cve" id="CVE-2024-50103" title="CVE-2024-50103" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50110" type="cve" id="CVE-2024-50110" title="CVE-2024-50110" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50115" type="cve" id="CVE-2024-50115" title="CVE-2024-50115" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50116" type="cve" id="CVE-2024-50116" title="CVE-2024-50116" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50117" type="cve" id="CVE-2024-50117" title="CVE-2024-50117" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50120" type="cve" id="CVE-2024-50120" title="CVE-2024-50120" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50121" type="cve" id="CVE-2024-50121" title="CVE-2024-50121" />
			<reference href="https://bdu.fstec.ru/vul/2025-03382" type="self" id="BDU:2025-03382" title="BDU:2025-03382" />
			<reference href="https://bdu.fstec.ru/vul/2024-09013" type="self" id="BDU:2024-09013" title="BDU:2024-09013" />
			<reference href="https://bdu.fstec.ru/vul/2024-08977" type="self" id="BDU:2024-08977" title="BDU:2024-08977" />
			<reference href="https://bdu.fstec.ru/vul/2025-03381" type="self" id="BDU:2025-03381" title="BDU:2025-03381" />
			<reference href="https://bdu.fstec.ru/vul/2025-03380" type="self" id="BDU:2025-03380" title="BDU:2025-03380" />
			<reference href="https://bdu.fstec.ru/vul/2025-03378" type="self" id="BDU:2025-03378" title="BDU:2025-03378" />
			<reference href="https://bdu.fstec.ru/vul/2025-03371" type="self" id="BDU:2025-03371" title="BDU:2025-03371" />
			<reference href="https://bdu.fstec.ru/vul/2025-03377" type="self" id="BDU:2025-03377" title="BDU:2025-03377" />
			<reference href="https://bdu.fstec.ru/vul/2025-03373" type="self" id="BDU:2025-03373" title="BDU:2025-03373" />
			<reference href="https://bdu.fstec.ru/vul/2025-03122" type="self" id="BDU:2025-03122" title="BDU:2025-03122" />
			<reference href="https://bdu.fstec.ru/vul/2025-03376" type="self" id="BDU:2025-03376" title="BDU:2025-03376" />
			<reference href="https://bdu.fstec.ru/vul/2025-03283" type="self" id="BDU:2025-03283" title="BDU:2025-03283" />
			<reference href="https://bdu.fstec.ru/vul/2025-03372" type="self" id="BDU:2025-03372" title="BDU:2025-03372" />
			<reference href="https://bdu.fstec.ru/vul/2025-03375" type="self" id="BDU:2025-03375" title="BDU:2025-03375" />
			<reference href="https://bdu.fstec.ru/vul/2025-03374" type="self" id="BDU:2025-03374" title="BDU:2025-03374" />
			<reference href="https://bdu.fstec.ru/vul/2025-03368" type="self" id="BDU:2025-03368" title="BDU:2025-03368" />
			<reference href="https://bdu.fstec.ru/vul/2025-03124" type="self" id="BDU:2025-03124" title="BDU:2025-03124" />
			<reference href="https://bdu.fstec.ru/vul/2025-03370" type="self" id="BDU:2025-03370" title="BDU:2025-03370" />
			<reference href="https://bdu.fstec.ru/vul/2025-03369" type="self" id="BDU:2025-03369" title="BDU:2025-03369" />
			<reference href="https://bdu.fstec.ru/vul/2024-09778" type="self" id="BDU:2024-09778" title="BDU:2024-09778" />
			<reference href="https://bdu.fstec.ru/vul/2025-03357" type="self" id="BDU:2025-03357" title="BDU:2025-03357" />
			<reference href="https://bdu.fstec.ru/vul/2025-00167" type="self" id="BDU:2025-00167" title="BDU:2025-00167" />
			<reference href="https://bdu.fstec.ru/vul/2025-03362" type="self" id="BDU:2025-03362" title="BDU:2025-03362" />
			<reference href="https://bdu.fstec.ru/vul/2025-03359" type="self" id="BDU:2025-03359" title="BDU:2025-03359" />
			<reference href="https://bdu.fstec.ru/vul/2025-03356" type="self" id="BDU:2025-03356" title="BDU:2025-03356" />
			<reference href="https://bdu.fstec.ru/vul/2025-03367" type="self" id="BDU:2025-03367" title="BDU:2025-03367" />
			<reference href="https://bdu.fstec.ru/vul/2025-03358" type="self" id="BDU:2025-03358" title="BDU:2025-03358" />
			<reference href="https://bdu.fstec.ru/vul/2025-03366" type="self" id="BDU:2025-03366" title="BDU:2025-03366" />
			<reference href="https://bdu.fstec.ru/vul/2025-03364" type="self" id="BDU:2025-03364" title="BDU:2025-03364" />
			<reference href="https://bdu.fstec.ru/vul/2025-03365" type="self" id="BDU:2025-03365" title="BDU:2025-03365" />
			<reference href="https://bdu.fstec.ru/vul/2025-03127" type="self" id="BDU:2025-03127" title="BDU:2025-03127" />
			<reference href="https://bdu.fstec.ru/vul/2025-03355" type="self" id="BDU:2025-03355" title="BDU:2025-03355" />
			<reference href="https://bdu.fstec.ru/vul/2025-03361" type="self" id="BDU:2025-03361" title="BDU:2025-03361" />
			<reference href="https://bdu.fstec.ru/vul/2025-03360" type="self" id="BDU:2025-03360" title="BDU:2025-03360" />
			<reference href="https://bdu.fstec.ru/vul/2025-03130" type="self" id="BDU:2025-03130" title="BDU:2025-03130" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250314-02</id>
		<issued date="2025-03-14" />
		<updated date="2025-03-14" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-1403252/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-1403252/" type="self" id="ROS-20250314-02" title="ROS-20250314-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50218" type="cve" id="CVE-2024-50218" title="CVE-2024-50218" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50221" type="cve" id="CVE-2024-50221" title="CVE-2024-50221" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50228" type="cve" id="CVE-2024-50228" title="CVE-2024-50228" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50229" type="cve" id="CVE-2024-50229" title="CVE-2024-50229" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50230" type="cve" id="CVE-2024-50230" title="CVE-2024-50230" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50232" type="cve" id="CVE-2024-50232" title="CVE-2024-50232" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50233" type="cve" id="CVE-2024-50233" title="CVE-2024-50233" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50234" type="cve" id="CVE-2024-50234" title="CVE-2024-50234" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50235" type="cve" id="CVE-2024-50235" title="CVE-2024-50235" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50236" type="cve" id="CVE-2024-50236" title="CVE-2024-50236" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50237" type="cve" id="CVE-2024-50237" title="CVE-2024-50237" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50241" type="cve" id="CVE-2024-50241" title="CVE-2024-50241" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50242" type="cve" id="CVE-2024-50242" title="CVE-2024-50242" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50244" type="cve" id="CVE-2024-50244" title="CVE-2024-50244" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50245" type="cve" id="CVE-2024-50245" title="CVE-2024-50245" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50247" type="cve" id="CVE-2024-50247" title="CVE-2024-50247" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50249" type="cve" id="CVE-2024-50249" title="CVE-2024-50249" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50250" type="cve" id="CVE-2024-50250" title="CVE-2024-50250" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50251" type="cve" id="CVE-2024-50251" title="CVE-2024-50251" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50252" type="cve" id="CVE-2024-50252" title="CVE-2024-50252" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50255" type="cve" id="CVE-2024-50255" title="CVE-2024-50255" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50257" type="cve" id="CVE-2024-50257" title="CVE-2024-50257" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50259" type="cve" id="CVE-2024-50259" title="CVE-2024-50259" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50261" type="cve" id="CVE-2024-50261" title="CVE-2024-50261" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50262" type="cve" id="CVE-2024-50262" title="CVE-2024-50262" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50264" type="cve" id="CVE-2024-50264" title="CVE-2024-50264" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50265" type="cve" id="CVE-2024-50265" title="CVE-2024-50265" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50267" type="cve" id="CVE-2024-50267" title="CVE-2024-50267" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50268" type="cve" id="CVE-2024-50268" title="CVE-2024-50268" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50269" type="cve" id="CVE-2024-50269" title="CVE-2024-50269" />
			<reference href="https://bdu.fstec.ru/vul/2025-07909" type="self" id="BDU:2025-07909" title="BDU:2025-07909" />
			<reference href="https://bdu.fstec.ru/vul/2025-06989" type="self" id="BDU:2025-06989" title="BDU:2025-06989" />
			<reference href="https://bdu.fstec.ru/vul/2024-10101" type="self" id="BDU:2024-10101" title="BDU:2024-10101" />
			<reference href="https://bdu.fstec.ru/vul/2025-07904" type="self" id="BDU:2025-07904" title="BDU:2025-07904" />
			<reference href="https://bdu.fstec.ru/vul/2025-00172" type="self" id="BDU:2025-00172" title="BDU:2025-00172" />
			<reference href="https://bdu.fstec.ru/vul/2025-07903" type="self" id="BDU:2025-07903" title="BDU:2025-07903" />
			<reference href="https://bdu.fstec.ru/vul/2025-07902" type="self" id="BDU:2025-07902" title="BDU:2025-07902" />
			<reference href="https://bdu.fstec.ru/vul/2025-06987" type="self" id="BDU:2025-06987" title="BDU:2025-06987" />
			<reference href="https://bdu.fstec.ru/vul/2025-00173" type="self" id="BDU:2025-00173" title="BDU:2025-00173" />
			<reference href="https://bdu.fstec.ru/vul/2025-07901" type="self" id="BDU:2025-07901" title="BDU:2025-07901" />
			<reference href="https://bdu.fstec.ru/vul/2025-07900" type="self" id="BDU:2025-07900" title="BDU:2025-07900" />
			<reference href="https://bdu.fstec.ru/vul/2025-14141" type="self" id="BDU:2025-14141" title="BDU:2025-14141" />
			<reference href="https://bdu.fstec.ru/vul/2025-06988" type="self" id="BDU:2025-06988" title="BDU:2025-06988" />
			<reference href="https://bdu.fstec.ru/vul/2025-07897" type="self" id="BDU:2025-07897" title="BDU:2025-07897" />
			<reference href="https://bdu.fstec.ru/vul/2025-07896" type="self" id="BDU:2025-07896" title="BDU:2025-07896" />
			<reference href="https://bdu.fstec.ru/vul/2025-06979" type="self" id="BDU:2025-06979" title="BDU:2025-06979" />
			<reference href="https://bdu.fstec.ru/vul/2025-07894" type="self" id="BDU:2025-07894" title="BDU:2025-07894" />
			<reference href="https://bdu.fstec.ru/vul/2025-06980" type="self" id="BDU:2025-06980" title="BDU:2025-06980" />
			<reference href="https://bdu.fstec.ru/vul/2025-04330" type="self" id="BDU:2025-04330" title="BDU:2025-04330" />
			<reference href="https://bdu.fstec.ru/vul/2025-04150" type="self" id="BDU:2025-04150" title="BDU:2025-04150" />
			<reference href="https://bdu.fstec.ru/vul/2025-04149" type="self" id="BDU:2025-04149" title="BDU:2025-04149" />
			<reference href="https://bdu.fstec.ru/vul/2024-10605" type="self" id="BDU:2024-10605" title="BDU:2024-10605" />
			<reference href="https://bdu.fstec.ru/vul/2025-07891" type="self" id="BDU:2025-07891" title="BDU:2025-07891" />
			<reference href="https://bdu.fstec.ru/vul/2024-10604" type="self" id="BDU:2024-10604" title="BDU:2024-10604" />
			<reference href="https://bdu.fstec.ru/vul/2025-00228" type="self" id="BDU:2025-00228" title="BDU:2025-00228" />
			<reference href="https://bdu.fstec.ru/vul/2024-11660" type="self" id="BDU:2024-11660" title="BDU:2024-11660" />
			<reference href="https://bdu.fstec.ru/vul/2025-07890" type="self" id="BDU:2025-07890" title="BDU:2025-07890" />
			<reference href="https://bdu.fstec.ru/vul/2025-00229" type="self" id="BDU:2025-00229" title="BDU:2025-00229" />
			<reference href="https://bdu.fstec.ru/vul/2025-00231" type="self" id="BDU:2025-00231" title="BDU:2025-00231" />
			<reference href="https://bdu.fstec.ru/vul/2025-06978" type="self" id="BDU:2025-06978" title="BDU:2025-06978" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250317-01</id>
		<issued date="2025-03-17" />
		<updated date="2025-03-17" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-170325/</description>
               <solution>Установить обновление для пакета(ов) linux_kernel</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-170325/" type="self" id="ROS-20250317-01" title="ROS-20250317-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49977" type="cve" id="CVE-2024-49977" title="CVE-2024-49977" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49981" type="cve" id="CVE-2024-49981" title="CVE-2024-49981" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49982" type="cve" id="CVE-2024-49982" title="CVE-2024-49982" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49983" type="cve" id="CVE-2024-49983" title="CVE-2024-49983" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49985" type="cve" id="CVE-2024-49985" title="CVE-2024-49985" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49986" type="cve" id="CVE-2024-49986" title="CVE-2024-49986" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49995" type="cve" id="CVE-2024-49995" title="CVE-2024-49995" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49996" type="cve" id="CVE-2024-49996" title="CVE-2024-49996" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49997" type="cve" id="CVE-2024-49997" title="CVE-2024-49997" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50000" type="cve" id="CVE-2024-50000" title="CVE-2024-50000" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50001" type="cve" id="CVE-2024-50001" title="CVE-2024-50001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50002" type="cve" id="CVE-2024-50002" title="CVE-2024-50002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50003" type="cve" id="CVE-2024-50003" title="CVE-2024-50003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50006" type="cve" id="CVE-2024-50006" title="CVE-2024-50006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50007" type="cve" id="CVE-2024-50007" title="CVE-2024-50007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50008" type="cve" id="CVE-2024-50008" title="CVE-2024-50008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50010" type="cve" id="CVE-2024-50010" title="CVE-2024-50010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50013" type="cve" id="CVE-2024-50013" title="CVE-2024-50013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50015" type="cve" id="CVE-2024-50015" title="CVE-2024-50015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50019" type="cve" id="CVE-2024-50019" title="CVE-2024-50019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50022" type="cve" id="CVE-2024-50022" title="CVE-2024-50022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50023" type="cve" id="CVE-2024-50023" title="CVE-2024-50023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50024" type="cve" id="CVE-2024-50024" title="CVE-2024-50024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50026" type="cve" id="CVE-2024-50026" title="CVE-2024-50026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27397" type="cve" id="CVE-2024-27397" title="CVE-2024-27397" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50031" type="cve" id="CVE-2024-50031" title="CVE-2024-50031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50033" type="cve" id="CVE-2024-50033" title="CVE-2024-50033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50035" type="cve" id="CVE-2024-50035" title="CVE-2024-50035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50036" type="cve" id="CVE-2024-50036" title="CVE-2024-50036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50038" type="cve" id="CVE-2024-50038" title="CVE-2024-50038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50039" type="cve" id="CVE-2024-50039" title="CVE-2024-50039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50040" type="cve" id="CVE-2024-50040" title="CVE-2024-50040" />
			<reference href="https://bdu.fstec.ru/vul/2025-07990" type="self" id="BDU:2025-07990" title="BDU:2025-07990" />
			<reference href="https://bdu.fstec.ru/vul/2024-08978" type="self" id="BDU:2024-08978" title="BDU:2024-08978" />
			<reference href="https://bdu.fstec.ru/vul/2024-08999" type="self" id="BDU:2024-08999" title="BDU:2024-08999" />
			<reference href="https://bdu.fstec.ru/vul/2024-09006" type="self" id="BDU:2024-09006" title="BDU:2024-09006" />
			<reference href="https://bdu.fstec.ru/vul/2025-07987" type="self" id="BDU:2025-07987" title="BDU:2025-07987" />
			<reference href="https://bdu.fstec.ru/vul/2024-09007" type="self" id="BDU:2024-09007" title="BDU:2024-09007" />
			<reference href="https://bdu.fstec.ru/vul/2025-06996" type="self" id="BDU:2025-06996" title="BDU:2025-06996" />
			<reference href="https://bdu.fstec.ru/vul/2025-04553" type="self" id="BDU:2025-04553" title="BDU:2025-04553" />
			<reference href="https://bdu.fstec.ru/vul/2025-06999" type="self" id="BDU:2025-06999" title="BDU:2025-06999" />
			<reference href="https://bdu.fstec.ru/vul/2025-04158" type="self" id="BDU:2025-04158" title="BDU:2025-04158" />
			<reference href="https://bdu.fstec.ru/vul/2025-07985" type="self" id="BDU:2025-07985" title="BDU:2025-07985" />
			<reference href="https://bdu.fstec.ru/vul/2025-04157" type="self" id="BDU:2025-04157" title="BDU:2025-04157" />
			<reference href="https://bdu.fstec.ru/vul/2025-07984" type="self" id="BDU:2025-07984" title="BDU:2025-07984" />
			<reference href="https://bdu.fstec.ru/vul/2025-07983" type="self" id="BDU:2025-07983" title="BDU:2025-07983" />
			<reference href="https://bdu.fstec.ru/vul/2025-06998" type="self" id="BDU:2025-06998" title="BDU:2025-06998" />
			<reference href="https://bdu.fstec.ru/vul/2025-07982" type="self" id="BDU:2025-07982" title="BDU:2025-07982" />
			<reference href="https://bdu.fstec.ru/vul/2025-07981" type="self" id="BDU:2025-07981" title="BDU:2025-07981" />
			<reference href="https://bdu.fstec.ru/vul/2025-07978" type="self" id="BDU:2025-07978" title="BDU:2025-07978" />
			<reference href="https://bdu.fstec.ru/vul/2025-07976" type="self" id="BDU:2025-07976" title="BDU:2025-07976" />
			<reference href="https://bdu.fstec.ru/vul/2025-04156" type="self" id="BDU:2025-04156" title="BDU:2025-04156" />
			<reference href="https://bdu.fstec.ru/vul/2025-03902" type="self" id="BDU:2025-03902" title="BDU:2025-03902" />
			<reference href="https://bdu.fstec.ru/vul/2025-07941" type="self" id="BDU:2025-07941" title="BDU:2025-07941" />
			<reference href="https://bdu.fstec.ru/vul/2025-08523" type="self" id="BDU:2025-08523" title="BDU:2025-08523" />
			<reference href="https://bdu.fstec.ru/vul/2025-04155" type="self" id="BDU:2025-04155" title="BDU:2025-04155" />
			<reference href="https://bdu.fstec.ru/vul/2025-00432" type="self" id="BDU:2025-00432" title="BDU:2025-00432" />
			<reference href="https://bdu.fstec.ru/vul/2025-04154" type="self" id="BDU:2025-04154" title="BDU:2025-04154" />
			<reference href="https://bdu.fstec.ru/vul/2025-04687" type="self" id="BDU:2025-04687" title="BDU:2025-04687" />
			<reference href="https://bdu.fstec.ru/vul/2025-04688" type="self" id="BDU:2025-04688" title="BDU:2025-04688" />
			<reference href="https://bdu.fstec.ru/vul/2025-04685" type="self" id="BDU:2025-04685" title="BDU:2025-04685" />
			<reference href="https://bdu.fstec.ru/vul/2025-07939" type="self" id="BDU:2025-07939" title="BDU:2025-07939" />
			<reference href="https://bdu.fstec.ru/vul/2025-07938" type="self" id="BDU:2025-07938" title="BDU:2025-07938" />
			<reference href="https://bdu.fstec.ru/vul/2025-08536" type="self" id="BDU:2025-08536" title="BDU:2025-08536" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250318-01</id>
		<issued date="2025-03-18" />
		<updated date="2025-03-18" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-180325/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-180325/" type="self" id="ROS-20250318-01" title="ROS-20250318-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50141" type="cve" id="CVE-2024-50141" title="CVE-2024-50141" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50142" type="cve" id="CVE-2024-50142" title="CVE-2024-50142" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50143" type="cve" id="CVE-2024-50143" title="CVE-2024-50143" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50145" type="cve" id="CVE-2024-50145" title="CVE-2024-50145" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50147" type="cve" id="CVE-2024-50147" title="CVE-2024-50147" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50148" type="cve" id="CVE-2024-50148" title="CVE-2024-50148" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50150" type="cve" id="CVE-2024-50150" title="CVE-2024-50150" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50151" type="cve" id="CVE-2024-50151" title="CVE-2024-50151" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50153" type="cve" id="CVE-2024-50153" title="CVE-2024-50153" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50154" type="cve" id="CVE-2024-50154" title="CVE-2024-50154" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50155" type="cve" id="CVE-2024-50155" title="CVE-2024-50155" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50156" type="cve" id="CVE-2024-50156" title="CVE-2024-50156" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50160" type="cve" id="CVE-2024-50160" title="CVE-2024-50160" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50162" type="cve" id="CVE-2024-50162" title="CVE-2024-50162" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50163" type="cve" id="CVE-2024-50163" title="CVE-2024-50163" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50167" type="cve" id="CVE-2024-50167" title="CVE-2024-50167" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50168" type="cve" id="CVE-2024-50168" title="CVE-2024-50168" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50171" type="cve" id="CVE-2024-50171" title="CVE-2024-50171" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50176" type="cve" id="CVE-2024-50176" title="CVE-2024-50176" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50179" type="cve" id="CVE-2024-50179" title="CVE-2024-50179" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50180" type="cve" id="CVE-2024-50180" title="CVE-2024-50180" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50182" type="cve" id="CVE-2024-50182" title="CVE-2024-50182" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50184" type="cve" id="CVE-2024-50184" title="CVE-2024-50184" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50185" type="cve" id="CVE-2024-50185" title="CVE-2024-50185" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50186" type="cve" id="CVE-2024-50186" title="CVE-2024-50186" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50188" type="cve" id="CVE-2024-50188" title="CVE-2024-50188" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50189" type="cve" id="CVE-2024-50189" title="CVE-2024-50189" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50191" type="cve" id="CVE-2024-50191" title="CVE-2024-50191" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50192" type="cve" id="CVE-2024-50192" title="CVE-2024-50192" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50193" type="cve" id="CVE-2024-50193" title="CVE-2024-50193" />
			<reference href="https://bdu.fstec.ru/vul/2025-03474" type="self" id="BDU:2025-03474" title="BDU:2025-03474" />
			<reference href="https://bdu.fstec.ru/vul/2025-03475" type="self" id="BDU:2025-03475" title="BDU:2025-03475" />
			<reference href="https://bdu.fstec.ru/vul/2025-03467" type="self" id="BDU:2025-03467" title="BDU:2025-03467" />
			<reference href="https://bdu.fstec.ru/vul/2025-03476" type="self" id="BDU:2025-03476" title="BDU:2025-03476" />
			<reference href="https://bdu.fstec.ru/vul/2025-03477" type="self" id="BDU:2025-03477" title="BDU:2025-03477" />
			<reference href="https://bdu.fstec.ru/vul/2025-03478" type="self" id="BDU:2025-03478" title="BDU:2025-03478" />
			<reference href="https://bdu.fstec.ru/vul/2025-03468" type="self" id="BDU:2025-03468" title="BDU:2025-03468" />
			<reference href="https://bdu.fstec.ru/vul/2025-03470" type="self" id="BDU:2025-03470" title="BDU:2025-03470" />
			<reference href="https://bdu.fstec.ru/vul/2025-03479" type="self" id="BDU:2025-03479" title="BDU:2025-03479" />
			<reference href="https://bdu.fstec.ru/vul/2025-03473" type="self" id="BDU:2025-03473" title="BDU:2025-03473" />
			<reference href="https://bdu.fstec.ru/vul/2025-03469" type="self" id="BDU:2025-03469" title="BDU:2025-03469" />
			<reference href="https://bdu.fstec.ru/vul/2025-03480" type="self" id="BDU:2025-03480" title="BDU:2025-03480" />
			<reference href="https://bdu.fstec.ru/vul/2025-03481" type="self" id="BDU:2025-03481" title="BDU:2025-03481" />
			<reference href="https://bdu.fstec.ru/vul/2025-03482" type="self" id="BDU:2025-03482" title="BDU:2025-03482" />
			<reference href="https://bdu.fstec.ru/vul/2025-03483" type="self" id="BDU:2025-03483" title="BDU:2025-03483" />
			<reference href="https://bdu.fstec.ru/vul/2025-03484" type="self" id="BDU:2025-03484" title="BDU:2025-03484" />
			<reference href="https://bdu.fstec.ru/vul/2025-03485" type="self" id="BDU:2025-03485" title="BDU:2025-03485" />
			<reference href="https://bdu.fstec.ru/vul/2025-03486" type="self" id="BDU:2025-03486" title="BDU:2025-03486" />
			<reference href="https://bdu.fstec.ru/vul/2025-03487" type="self" id="BDU:2025-03487" title="BDU:2025-03487" />
			<reference href="https://bdu.fstec.ru/vul/2025-03488" type="self" id="BDU:2025-03488" title="BDU:2025-03488" />
			<reference href="https://bdu.fstec.ru/vul/2025-00170" type="self" id="BDU:2025-00170" title="BDU:2025-00170" />
			<reference href="https://bdu.fstec.ru/vul/2025-03489" type="self" id="BDU:2025-03489" title="BDU:2025-03489" />
			<reference href="https://bdu.fstec.ru/vul/2025-03490" type="self" id="BDU:2025-03490" title="BDU:2025-03490" />
			<reference href="https://bdu.fstec.ru/vul/2025-03491" type="self" id="BDU:2025-03491" title="BDU:2025-03491" />
			<reference href="https://bdu.fstec.ru/vul/2025-03471" type="self" id="BDU:2025-03471" title="BDU:2025-03471" />
			<reference href="https://bdu.fstec.ru/vul/2025-03492" type="self" id="BDU:2025-03492" title="BDU:2025-03492" />
			<reference href="https://bdu.fstec.ru/vul/2025-03493" type="self" id="BDU:2025-03493" title="BDU:2025-03493" />
			<reference href="https://bdu.fstec.ru/vul/2025-03494" type="self" id="BDU:2025-03494" title="BDU:2025-03494" />
			<reference href="https://bdu.fstec.ru/vul/2025-03495" type="self" id="BDU:2025-03495" title="BDU:2025-03495" />
			<reference href="https://bdu.fstec.ru/vul/2025-03472" type="self" id="BDU:2025-03472" title="BDU:2025-03472" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250319-01</id>
		<issued date="2025-03-19" />
		<updated date="2025-03-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-36484/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-36484/" type="self" id="ROS-20250319-01" title="ROS-20250319-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36484" type="cve" id="CVE-2024-36484" title="CVE-2024-36484" />
			<reference href="https://bdu.fstec.ru/vul/2025-03908" type="self" id="BDU:2025-03908" title="BDU:2025-03908" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250319-02</id>
		<issued date="2025-03-19" />
		<updated date="2025-03-19" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-190325/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-190325/" type="self" id="ROS-20250319-02" title="ROS-20250319-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50208" type="cve" id="CVE-2024-50208" title="CVE-2024-50208" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50209" type="cve" id="CVE-2024-50209" title="CVE-2024-50209" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50210" type="cve" id="CVE-2024-50210" title="CVE-2024-50210" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50215" type="cve" id="CVE-2024-50215" title="CVE-2024-50215" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50273" type="cve" id="CVE-2024-50273" title="CVE-2024-50273" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50275" type="cve" id="CVE-2024-50275" title="CVE-2024-50275" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50276" type="cve" id="CVE-2024-50276" title="CVE-2024-50276" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50278" type="cve" id="CVE-2024-50278" title="CVE-2024-50278" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50279" type="cve" id="CVE-2024-50279" title="CVE-2024-50279" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50282" type="cve" id="CVE-2024-50282" title="CVE-2024-50282" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50283" type="cve" id="CVE-2024-50283" title="CVE-2024-50283" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50287" type="cve" id="CVE-2024-50287" title="CVE-2024-50287" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50290" type="cve" id="CVE-2024-50290" title="CVE-2024-50290" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50292" type="cve" id="CVE-2024-50292" title="CVE-2024-50292" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50295" type="cve" id="CVE-2024-50295" title="CVE-2024-50295" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50296" type="cve" id="CVE-2024-50296" title="CVE-2024-50296" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50299" type="cve" id="CVE-2024-50299" title="CVE-2024-50299" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50301" type="cve" id="CVE-2024-50301" title="CVE-2024-50301" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50302" type="cve" id="CVE-2024-50302" title="CVE-2024-50302" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50304" type="cve" id="CVE-2024-50304" title="CVE-2024-50304" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53042" type="cve" id="CVE-2024-53042" title="CVE-2024-53042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53043" type="cve" id="CVE-2024-53043" title="CVE-2024-53043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53052" type="cve" id="CVE-2024-53052" title="CVE-2024-53052" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53055" type="cve" id="CVE-2024-53055" title="CVE-2024-53055" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53057" type="cve" id="CVE-2024-53057" title="CVE-2024-53057" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53058" type="cve" id="CVE-2024-53058" title="CVE-2024-53058" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53059" type="cve" id="CVE-2024-53059" title="CVE-2024-53059" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53061" type="cve" id="CVE-2024-53061" title="CVE-2024-53061" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53063" type="cve" id="CVE-2024-53063" title="CVE-2024-53063" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53066" type="cve" id="CVE-2024-53066" title="CVE-2024-53066" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53070" type="cve" id="CVE-2024-53070" title="CVE-2024-53070" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53072" type="cve" id="CVE-2024-53072" title="CVE-2024-53072" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53073" type="cve" id="CVE-2024-53073" title="CVE-2024-53073" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53081" type="cve" id="CVE-2024-53081" title="CVE-2024-53081" />
			<reference href="https://bdu.fstec.ru/vul/2025-03154" type="self" id="BDU:2025-03154" title="BDU:2025-03154" />
			<reference href="https://bdu.fstec.ru/vul/2025-00171" type="self" id="BDU:2025-00171" title="BDU:2025-00171" />
			<reference href="https://bdu.fstec.ru/vul/2025-03273" type="self" id="BDU:2025-03273" title="BDU:2025-03273" />
			<reference href="https://bdu.fstec.ru/vul/2025-03155" type="self" id="BDU:2025-03155" title="BDU:2025-03155" />
			<reference href="https://bdu.fstec.ru/vul/2025-00129" type="self" id="BDU:2025-00129" title="BDU:2025-00129" />
			<reference href="https://bdu.fstec.ru/vul/2025-00066" type="self" id="BDU:2025-00066" title="BDU:2025-00066" />
			<reference href="https://bdu.fstec.ru/vul/2025-03156" type="self" id="BDU:2025-03156" title="BDU:2025-03156" />
			<reference href="https://bdu.fstec.ru/vul/2025-03157" type="self" id="BDU:2025-03157" title="BDU:2025-03157" />
			<reference href="https://bdu.fstec.ru/vul/2025-00153" type="self" id="BDU:2025-00153" title="BDU:2025-00153" />
			<reference href="https://bdu.fstec.ru/vul/2025-00152" type="self" id="BDU:2025-00152" title="BDU:2025-00152" />
			<reference href="https://bdu.fstec.ru/vul/2025-02383" type="self" id="BDU:2025-02383" title="BDU:2025-02383" />
			<reference href="https://bdu.fstec.ru/vul/2024-11659" type="self" id="BDU:2024-11659" title="BDU:2024-11659" />
			<reference href="https://bdu.fstec.ru/vul/2025-00699" type="self" id="BDU:2025-00699" title="BDU:2025-00699" />
			<reference href="https://bdu.fstec.ru/vul/2025-00149" type="self" id="BDU:2025-00149" title="BDU:2025-00149" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250320-01</id>
		<issued date="2025-03-20" />
		<updated date="2025-03-20" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-200325/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-200325/" type="self" id="ROS-20250320-01" title="ROS-20250320-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53106" type="cve" id="CVE-2024-53106" title="CVE-2024-53106" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53110" type="cve" id="CVE-2024-53110" title="CVE-2024-53110" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53112" type="cve" id="CVE-2024-53112" title="CVE-2024-53112" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53113" type="cve" id="CVE-2024-53113" title="CVE-2024-53113" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53119" type="cve" id="CVE-2024-53119" title="CVE-2024-53119" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53120" type="cve" id="CVE-2024-53120" title="CVE-2024-53120" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53121" type="cve" id="CVE-2024-53121" title="CVE-2024-53121" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53122" type="cve" id="CVE-2024-53122" title="CVE-2024-53122" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53123" type="cve" id="CVE-2024-53123" title="CVE-2024-53123" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53124" type="cve" id="CVE-2024-53124" title="CVE-2024-53124" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53125" type="cve" id="CVE-2024-53125" title="CVE-2024-53125" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53126" type="cve" id="CVE-2024-53126" title="CVE-2024-53126" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53127" type="cve" id="CVE-2024-53127" title="CVE-2024-53127" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53129" type="cve" id="CVE-2024-53129" title="CVE-2024-53129" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53130" type="cve" id="CVE-2024-53130" title="CVE-2024-53130" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53131" type="cve" id="CVE-2024-53131" title="CVE-2024-53131" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53135" type="cve" id="CVE-2024-53135" title="CVE-2024-53135" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53136" type="cve" id="CVE-2024-53136" title="CVE-2024-53136" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53138" type="cve" id="CVE-2024-53138" title="CVE-2024-53138" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53140" type="cve" id="CVE-2024-53140" title="CVE-2024-53140" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53141" type="cve" id="CVE-2024-53141" title="CVE-2024-53141" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53142" type="cve" id="CVE-2024-53142" title="CVE-2024-53142" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53240" type="cve" id="CVE-2024-53240" title="CVE-2024-53240" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53241" type="cve" id="CVE-2024-53241" title="CVE-2024-53241" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53145" type="cve" id="CVE-2024-53145" title="CVE-2024-53145" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53146" type="cve" id="CVE-2024-53146" title="CVE-2024-53146" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53148" type="cve" id="CVE-2024-53148" title="CVE-2024-53148" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53150" type="cve" id="CVE-2024-53150" title="CVE-2024-53150" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53151" type="cve" id="CVE-2024-53151" title="CVE-2024-53151" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53154" type="cve" id="CVE-2024-53154" title="CVE-2024-53154" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53155" type="cve" id="CVE-2024-53155" title="CVE-2024-53155" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53156" type="cve" id="CVE-2024-53156" title="CVE-2024-53156" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53157" type="cve" id="CVE-2024-53157" title="CVE-2024-53157" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53158" type="cve" id="CVE-2024-53158" title="CVE-2024-53158" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53159" type="cve" id="CVE-2024-53159" title="CVE-2024-53159" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53161" type="cve" id="CVE-2024-53161" title="CVE-2024-53161" />
			<reference href="https://bdu.fstec.ru/vul/2025-03318" type="self" id="BDU:2025-03318" title="BDU:2025-03318" />
			<reference href="https://bdu.fstec.ru/vul/2025-03327" type="self" id="BDU:2025-03327" title="BDU:2025-03327" />
			<reference href="https://bdu.fstec.ru/vul/2025-03326" type="self" id="BDU:2025-03326" title="BDU:2025-03326" />
			<reference href="https://bdu.fstec.ru/vul/2025-03317" type="self" id="BDU:2025-03317" title="BDU:2025-03317" />
			<reference href="https://bdu.fstec.ru/vul/2025-03325" type="self" id="BDU:2025-03325" title="BDU:2025-03325" />
			<reference href="https://bdu.fstec.ru/vul/2025-03315" type="self" id="BDU:2025-03315" title="BDU:2025-03315" />
			<reference href="https://bdu.fstec.ru/vul/2025-03324" type="self" id="BDU:2025-03324" title="BDU:2025-03324" />
			<reference href="https://bdu.fstec.ru/vul/2025-03323" type="self" id="BDU:2025-03323" title="BDU:2025-03323" />
			<reference href="https://bdu.fstec.ru/vul/2025-03308" type="self" id="BDU:2025-03308" title="BDU:2025-03308" />
			<reference href="https://bdu.fstec.ru/vul/2025-03314" type="self" id="BDU:2025-03314" title="BDU:2025-03314" />
			<reference href="https://bdu.fstec.ru/vul/2025-03303" type="self" id="BDU:2025-03303" title="BDU:2025-03303" />
			<reference href="https://bdu.fstec.ru/vul/2025-03159" type="self" id="BDU:2025-03159" title="BDU:2025-03159" />
			<reference href="https://bdu.fstec.ru/vul/2025-03322" type="self" id="BDU:2025-03322" title="BDU:2025-03322" />
			<reference href="https://bdu.fstec.ru/vul/2025-03313" type="self" id="BDU:2025-03313" title="BDU:2025-03313" />
			<reference href="https://bdu.fstec.ru/vul/2024-07534" type="self" id="BDU:2024-07534" title="BDU:2024-07534" />
			<reference href="https://bdu.fstec.ru/vul/2025-03321" type="self" id="BDU:2025-03321" title="BDU:2025-03321" />
			<reference href="https://bdu.fstec.ru/vul/2025-03443" type="self" id="BDU:2025-03443" title="BDU:2025-03443" />
			<reference href="https://bdu.fstec.ru/vul/2025-03312" type="self" id="BDU:2025-03312" title="BDU:2025-03312" />
			<reference href="https://bdu.fstec.ru/vul/2025-03320" type="self" id="BDU:2025-03320" title="BDU:2025-03320" />
			<reference href="https://bdu.fstec.ru/vul/2025-03319" type="self" id="BDU:2025-03319" title="BDU:2025-03319" />
			<reference href="https://bdu.fstec.ru/vul/2025-00150" type="self" id="BDU:2025-00150" title="BDU:2025-00150" />
			<reference href="https://bdu.fstec.ru/vul/2025-03160" type="self" id="BDU:2025-03160" title="BDU:2025-03160" />
			<reference href="https://bdu.fstec.ru/vul/2024-11483" type="self" id="BDU:2024-11483" title="BDU:2024-11483" />
			<reference href="https://bdu.fstec.ru/vul/2024-11480" type="self" id="BDU:2024-11480" title="BDU:2024-11480" />
			<reference href="https://bdu.fstec.ru/vul/2025-00524" type="self" id="BDU:2025-00524" title="BDU:2025-00524" />
			<reference href="https://bdu.fstec.ru/vul/2025-00532" type="self" id="BDU:2025-00532" title="BDU:2025-00532" />
			<reference href="https://bdu.fstec.ru/vul/2025-00533" type="self" id="BDU:2025-00533" title="BDU:2025-00533" />
			<reference href="https://bdu.fstec.ru/vul/2025-00530" type="self" id="BDU:2025-00530" title="BDU:2025-00530" />
			<reference href="https://bdu.fstec.ru/vul/2025-00525" type="self" id="BDU:2025-00525" title="BDU:2025-00525" />
			<reference href="https://bdu.fstec.ru/vul/2025-00528" type="self" id="BDU:2025-00528" title="BDU:2025-00528" />
			<reference href="https://bdu.fstec.ru/vul/2025-00527" type="self" id="BDU:2025-00527" title="BDU:2025-00527" />
			<reference href="https://bdu.fstec.ru/vul/2025-00536" type="self" id="BDU:2025-00536" title="BDU:2025-00536" />
			<reference href="https://bdu.fstec.ru/vul/2025-00141" type="self" id="BDU:2025-00141" title="BDU:2025-00141" />
			<reference href="https://bdu.fstec.ru/vul/2025-00039" type="self" id="BDU:2025-00039" title="BDU:2025-00039" />
			<reference href="https://bdu.fstec.ru/vul/2025-00038" type="self" id="BDU:2025-00038" title="BDU:2025-00038" />
			<reference href="https://bdu.fstec.ru/vul/2025-00138" type="self" id="BDU:2025-00138" title="BDU:2025-00138" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250325-01</id>
		<issued date="2025-03-25" />
		<updated date="2025-03-25" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-250325/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-250325/" type="self" id="ROS-20250325-01" title="ROS-20250325-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49973" type="cve" id="CVE-2024-49973" title="CVE-2024-49973" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49974" type="cve" id="CVE-2024-49974" title="CVE-2024-49974" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49975" type="cve" id="CVE-2024-49975" title="CVE-2024-49975" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50041" type="cve" id="CVE-2024-50041" title="CVE-2024-50041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50044" type="cve" id="CVE-2024-50044" title="CVE-2024-50044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50045" type="cve" id="CVE-2024-50045" title="CVE-2024-50045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50046" type="cve" id="CVE-2024-50046" title="CVE-2024-50046" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50049" type="cve" id="CVE-2024-50049" title="CVE-2024-50049" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50124" type="cve" id="CVE-2024-50124" title="CVE-2024-50124" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50126" type="cve" id="CVE-2024-50126" title="CVE-2024-50126" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50127" type="cve" id="CVE-2024-50127" title="CVE-2024-50127" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50128" type="cve" id="CVE-2024-50128" title="CVE-2024-50128" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50131" type="cve" id="CVE-2024-50131" title="CVE-2024-50131" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50133" type="cve" id="CVE-2024-50133" title="CVE-2024-50133" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50134" type="cve" id="CVE-2024-50134" title="CVE-2024-50134" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50136" type="cve" id="CVE-2024-50136" title="CVE-2024-50136" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50194" type="cve" id="CVE-2024-50194" title="CVE-2024-50194" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50195" type="cve" id="CVE-2024-50195" title="CVE-2024-50195" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50196" type="cve" id="CVE-2024-50196" title="CVE-2024-50196" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50198" type="cve" id="CVE-2024-50198" title="CVE-2024-50198" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50199" type="cve" id="CVE-2024-50199" title="CVE-2024-50199" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50200" type="cve" id="CVE-2024-50200" title="CVE-2024-50200" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50201" type="cve" id="CVE-2024-50201" title="CVE-2024-50201" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50202" type="cve" id="CVE-2024-50202" title="CVE-2024-50202" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50205" type="cve" id="CVE-2024-50205" title="CVE-2024-50205" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53082" type="cve" id="CVE-2024-53082" title="CVE-2024-53082" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53088" type="cve" id="CVE-2024-53088" title="CVE-2024-53088" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53096" type="cve" id="CVE-2024-53096" title="CVE-2024-53096" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53097" type="cve" id="CVE-2024-53097" title="CVE-2024-53097" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53099" type="cve" id="CVE-2024-53099" title="CVE-2024-53099" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53101" type="cve" id="CVE-2024-53101" title="CVE-2024-53101" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56546" type="cve" id="CVE-2024-56546" title="CVE-2024-56546" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56548" type="cve" id="CVE-2024-56548" title="CVE-2024-56548" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56558" type="cve" id="CVE-2024-56558" title="CVE-2024-56558" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56562" type="cve" id="CVE-2024-56562" title="CVE-2024-56562" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56567" type="cve" id="CVE-2024-56567" title="CVE-2024-56567" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56568" type="cve" id="CVE-2024-56568" title="CVE-2024-56568" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56569" type="cve" id="CVE-2024-56569" title="CVE-2024-56569" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56570" type="cve" id="CVE-2024-56570" title="CVE-2024-56570" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56572" type="cve" id="CVE-2024-56572" title="CVE-2024-56572" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56574" type="cve" id="CVE-2024-56574" title="CVE-2024-56574" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56575" type="cve" id="CVE-2024-56575" title="CVE-2024-56575" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56576" type="cve" id="CVE-2024-56576" title="CVE-2024-56576" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56578" type="cve" id="CVE-2024-56578" title="CVE-2024-56578" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56579" type="cve" id="CVE-2024-56579" title="CVE-2024-56579" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56581" type="cve" id="CVE-2024-56581" title="CVE-2024-56581" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56582" type="cve" id="CVE-2024-56582" title="CVE-2024-56582" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56586" type="cve" id="CVE-2024-56586" title="CVE-2024-56586" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56587" type="cve" id="CVE-2024-56587" title="CVE-2024-56587" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56589" type="cve" id="CVE-2024-56589" title="CVE-2024-56589" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56590" type="cve" id="CVE-2024-56590" title="CVE-2024-56590" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56593" type="cve" id="CVE-2024-56593" title="CVE-2024-56593" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56594" type="cve" id="CVE-2024-56594" title="CVE-2024-56594" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56595" type="cve" id="CVE-2024-56595" title="CVE-2024-56595" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56596" type="cve" id="CVE-2024-56596" title="CVE-2024-56596" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56597" type="cve" id="CVE-2024-56597" title="CVE-2024-56597" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56598" type="cve" id="CVE-2024-56598" title="CVE-2024-56598" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56600" type="cve" id="CVE-2024-56600" title="CVE-2024-56600" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56601" type="cve" id="CVE-2024-56601" title="CVE-2024-56601" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56602" type="cve" id="CVE-2024-56602" title="CVE-2024-56602" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56603" type="cve" id="CVE-2024-56603" title="CVE-2024-56603" />
			<reference href="https://bdu.fstec.ru/vul/2025-04513" type="self" id="BDU:2025-04513" title="BDU:2025-04513" />
			<reference href="https://bdu.fstec.ru/vul/2025-04512" type="self" id="BDU:2025-04512" title="BDU:2025-04512" />
			<reference href="https://bdu.fstec.ru/vul/2025-04511" type="self" id="BDU:2025-04511" title="BDU:2025-04511" />
			<reference href="https://bdu.fstec.ru/vul/2025-04486" type="self" id="BDU:2025-04486" title="BDU:2025-04486" />
			<reference href="https://bdu.fstec.ru/vul/2025-04484" type="self" id="BDU:2025-04484" title="BDU:2025-04484" />
			<reference href="https://bdu.fstec.ru/vul/2025-04480" type="self" id="BDU:2025-04480" title="BDU:2025-04480" />
			<reference href="https://bdu.fstec.ru/vul/2025-04510" type="self" id="BDU:2025-04510" title="BDU:2025-04510" />
			<reference href="https://bdu.fstec.ru/vul/2025-04482" type="self" id="BDU:2025-04482" title="BDU:2025-04482" />
			<reference href="https://bdu.fstec.ru/vul/2024-10093" type="self" id="BDU:2024-10093" title="BDU:2024-10093" />
			<reference href="https://bdu.fstec.ru/vul/2025-03603" type="self" id="BDU:2025-03603" title="BDU:2025-03603" />
			<reference href="https://bdu.fstec.ru/vul/2024-10096" type="self" id="BDU:2024-10096" title="BDU:2024-10096" />
			<reference href="https://bdu.fstec.ru/vul/2025-03590" type="self" id="BDU:2025-03590" title="BDU:2025-03590" />
			<reference href="https://bdu.fstec.ru/vul/2025-03604" type="self" id="BDU:2025-03604" title="BDU:2025-03604" />
			<reference href="https://bdu.fstec.ru/vul/2025-04491" type="self" id="BDU:2025-04491" title="BDU:2025-04491" />
			<reference href="https://bdu.fstec.ru/vul/2025-04479" type="self" id="BDU:2025-04479" title="BDU:2025-04479" />
			<reference href="https://bdu.fstec.ru/vul/2025-04333" type="self" id="BDU:2025-04333" title="BDU:2025-04333" />
			<reference href="https://bdu.fstec.ru/vul/2025-04509" type="self" id="BDU:2025-04509" title="BDU:2025-04509" />
			<reference href="https://bdu.fstec.ru/vul/2025-04361" type="self" id="BDU:2025-04361" title="BDU:2025-04361" />
			<reference href="https://bdu.fstec.ru/vul/2025-04412" type="self" id="BDU:2025-04412" title="BDU:2025-04412" />
			<reference href="https://bdu.fstec.ru/vul/2025-04508" type="self" id="BDU:2025-04508" title="BDU:2025-04508" />
			<reference href="https://bdu.fstec.ru/vul/2025-04507" type="self" id="BDU:2025-04507" title="BDU:2025-04507" />
			<reference href="https://bdu.fstec.ru/vul/2025-04332" type="self" id="BDU:2025-04332" title="BDU:2025-04332" />
			<reference href="https://bdu.fstec.ru/vul/2025-04506" type="self" id="BDU:2025-04506" title="BDU:2025-04506" />
			<reference href="https://bdu.fstec.ru/vul/2025-04505" type="self" id="BDU:2025-04505" title="BDU:2025-04505" />
			<reference href="https://bdu.fstec.ru/vul/2025-04418" type="self" id="BDU:2025-04418" title="BDU:2025-04418" />
			<reference href="https://bdu.fstec.ru/vul/2025-03602" type="self" id="BDU:2025-03602" title="BDU:2025-03602" />
			<reference href="https://bdu.fstec.ru/vul/2025-04504" type="self" id="BDU:2025-04504" title="BDU:2025-04504" />
			<reference href="https://bdu.fstec.ru/vul/2025-03591" type="self" id="BDU:2025-03591" title="BDU:2025-03591" />
			<reference href="https://bdu.fstec.ru/vul/2025-04503" type="self" id="BDU:2025-04503" title="BDU:2025-04503" />
			<reference href="https://bdu.fstec.ru/vul/2025-03593" type="self" id="BDU:2025-03593" title="BDU:2025-03593" />
			<reference href="https://bdu.fstec.ru/vul/2025-04451" type="self" id="BDU:2025-04451" title="BDU:2025-04451" />
			<reference href="https://bdu.fstec.ru/vul/2025-04492" type="self" id="BDU:2025-04492" title="BDU:2025-04492" />
			<reference href="https://bdu.fstec.ru/vul/2025-04454" type="self" id="BDU:2025-04454" title="BDU:2025-04454" />
			<reference href="https://bdu.fstec.ru/vul/2025-03592" type="self" id="BDU:2025-03592" title="BDU:2025-03592" />
			<reference href="https://bdu.fstec.ru/vul/2025-04463" type="self" id="BDU:2025-04463" title="BDU:2025-04463" />
			<reference href="https://bdu.fstec.ru/vul/2025-04502" type="self" id="BDU:2025-04502" title="BDU:2025-04502" />
			<reference href="https://bdu.fstec.ru/vul/2025-04501" type="self" id="BDU:2025-04501" title="BDU:2025-04501" />
			<reference href="https://bdu.fstec.ru/vul/2025-04521" type="self" id="BDU:2025-04521" title="BDU:2025-04521" />
			<reference href="https://bdu.fstec.ru/vul/2025-04500" type="self" id="BDU:2025-04500" title="BDU:2025-04500" />
			<reference href="https://bdu.fstec.ru/vul/2025-04520" type="self" id="BDU:2025-04520" title="BDU:2025-04520" />
			<reference href="https://bdu.fstec.ru/vul/2025-04499" type="self" id="BDU:2025-04499" title="BDU:2025-04499" />
			<reference href="https://bdu.fstec.ru/vul/2025-04519" type="self" id="BDU:2025-04519" title="BDU:2025-04519" />
			<reference href="https://bdu.fstec.ru/vul/2025-04498" type="self" id="BDU:2025-04498" title="BDU:2025-04498" />
			<reference href="https://bdu.fstec.ru/vul/2025-04497" type="self" id="BDU:2025-04497" title="BDU:2025-04497" />
			<reference href="https://bdu.fstec.ru/vul/2025-04493" type="self" id="BDU:2025-04493" title="BDU:2025-04493" />
			<reference href="https://bdu.fstec.ru/vul/2025-03594" type="self" id="BDU:2025-03594" title="BDU:2025-03594" />
			<reference href="https://bdu.fstec.ru/vul/2025-03595" type="self" id="BDU:2025-03595" title="BDU:2025-03595" />
			<reference href="https://bdu.fstec.ru/vul/2025-04496" type="self" id="BDU:2025-04496" title="BDU:2025-04496" />
			<reference href="https://bdu.fstec.ru/vul/2025-04518" type="self" id="BDU:2025-04518" title="BDU:2025-04518" />
			<reference href="https://bdu.fstec.ru/vul/2025-04495" type="self" id="BDU:2025-04495" title="BDU:2025-04495" />
			<reference href="https://bdu.fstec.ru/vul/2025-04517" type="self" id="BDU:2025-04517" title="BDU:2025-04517" />
			<reference href="https://bdu.fstec.ru/vul/2025-04515" type="self" id="BDU:2025-04515" title="BDU:2025-04515" />
			<reference href="https://bdu.fstec.ru/vul/2025-04514" type="self" id="BDU:2025-04514" title="BDU:2025-04514" />
			<reference href="https://bdu.fstec.ru/vul/2025-03598" type="self" id="BDU:2025-03598" title="BDU:2025-03598" />
			<reference href="https://bdu.fstec.ru/vul/2025-03596" type="self" id="BDU:2025-03596" title="BDU:2025-03596" />
			<reference href="https://bdu.fstec.ru/vul/2025-04516" type="self" id="BDU:2025-04516" title="BDU:2025-04516" />
			<reference href="https://bdu.fstec.ru/vul/2025-03599" type="self" id="BDU:2025-03599" title="BDU:2025-03599" />
			<reference href="https://bdu.fstec.ru/vul/2025-03600" type="self" id="BDU:2025-03600" title="BDU:2025-03600" />
			<reference href="https://bdu.fstec.ru/vul/2025-03597" type="self" id="BDU:2025-03597" title="BDU:2025-03597" />
			<reference href="https://bdu.fstec.ru/vul/2025-03601" type="self" id="BDU:2025-03601" title="BDU:2025-03601" />
			<reference href="https://bdu.fstec.ru/vul/2025-06983" type="self" id="BDU:2025-06983" title="BDU:2025-06983" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250326-01</id>
		<issued date="2025-03-26" />
		<updated date="2025-03-26" />
		<title>Уязвимость pidgin </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в pidgin</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pidgin-cve-2022-26491/</description>
               <solution>
                    Запретить использование в ОС пакета pidgin
                или
                    Установить обновление для пакета(ов) pidgin
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pidgin-cve-2022-26491/" type="self" id="ROS-20250326-01" title="ROS-20250326-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26491" type="cve" id="CVE-2022-26491" title="CVE-2022-26491" />
			<reference href="https://bdu.fstec.ru/vul/2025-03801" type="self" id="BDU:2025-03801" title="BDU:2025-03801" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pidgin" epoch="0" version="2.14.14" release="4.el7" arch="x86_64" src="">
					<filename>pidgin-0:2.14.14-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250326-02</id>
		<issued date="2025-03-26" />
		<updated date="2025-03-26" />
		<title>Уязвимость mongodb-org </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2024-6375/</description>
               <solution>
                    Запретить использование в ОС пакета mongodb-org
                или
                    Установить обновление для пакета(ов) mongodb-org
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2024-6375/" type="self" id="ROS-20250326-02" title="ROS-20250326-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6375" type="cve" id="CVE-2024-6375" title="CVE-2024-6375" />
			<reference href="https://bdu.fstec.ru/vul/2025-03802" type="self" id="BDU:2025-03802" title="BDU:2025-03802" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mongodb-org" epoch="0" version="5.0.31" release="1.el7" arch="x86_64" src="">
					<filename>mongodb-org-0:5.0.31-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250326-03</id>
		<issued date="2025-03-26" />
		<updated date="2025-03-26" />
		<title>Уязвимость mongodb-org </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2024-8013/</description>
               <solution>
                    Запретить использование в ОС пакета mongodb-org
                или
                    Установить обновление для пакета(ов) mongodb-org
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2024-8013/" type="self" id="ROS-20250326-03" title="ROS-20250326-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8013" type="cve" id="CVE-2024-8013" title="CVE-2024-8013" />
			<reference href="https://bdu.fstec.ru/vul/2025-03803" type="self" id="BDU:2025-03803" title="BDU:2025-03803" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mongodb-org" epoch="0" version="7.0.16" release="1.el7" arch="x86_64" src="">
					<filename>mongodb-org-0:7.0.16-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250326-04</id>
		<issued date="2025-03-26" />
		<updated date="2025-03-26" />
		<title>Уязвимость rubygem-sinatra </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в rubygem-sinatra</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-sinatra-cve-2024-21510/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-sinatra
                или
                    Установить обновление для пакета(ов) rubygem-sinatra
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-sinatra-cve-2024-21510/" type="self" id="ROS-20250326-04" title="ROS-20250326-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21510" type="cve" id="CVE-2024-21510" title="CVE-2024-21510" />
			<reference href="https://bdu.fstec.ru/vul/2025-03808" type="self" id="BDU:2025-03808" title="BDU:2025-03808" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-sinatra" epoch="1" version="2.2.4" release="2.el7" arch="noarch" src="">
					<filename>rubygem-sinatra-1:2.2.4-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250326-05</id>
		<issued date="2025-03-26" />
		<updated date="2025-03-26" />
		<title>Уязвимость mariadb </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mariadb</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mariadb-cve-2023-39593/</description>
               <solution>
                    Запретить использование в ОС пакета MariaDB
                или
                    Установить обновление для пакета(ов) MariaDB
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mariadb-cve-2023-39593/" type="self" id="ROS-20250326-05" title="ROS-20250326-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39593" type="cve" id="CVE-2023-39593" title="CVE-2023-39593" />
			<reference href="https://bdu.fstec.ru/vul/2025-03804" type="self" id="BDU:2025-03804" title="BDU:2025-03804" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mariadb" epoch="3" version="10.6.15" release="1.el7" arch="x86_64" src="">
					<filename>mariadb-3:10.6.15-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250326-06</id>
		<issued date="2025-03-26" />
		<updated date="2025-03-26" />
		<title>Множественные уязвимости python3-twisted </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в python3-twisted</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-twisted-cve-2020-10108-cve-2020-10109/</description>
               <solution>
                    Запретить использование в ОС пакета python3-twisted
                или
                    Установить обновление для пакета(ов) python3-twisted
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-twisted-cve-2020-10108-cve-2020-10109/" type="self" id="ROS-20250326-06" title="ROS-20250326-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10108" type="cve" id="CVE-2020-10108" title="CVE-2020-10108" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10109" type="cve" id="CVE-2020-10109" title="CVE-2020-10109" />
			<reference href="https://bdu.fstec.ru/vul/2020-05644" type="self" id="BDU:2020-05644" title="BDU:2020-05644" />
			<reference href="https://bdu.fstec.ru/vul/2020-05699" type="self" id="BDU:2020-05699" title="BDU:2020-05699" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-twisted" epoch="0" version="20.3.0" release="2.el7" arch="x86_64" src="">
					<filename>python3-twisted-0:20.3.0-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250326-07</id>
		<issued date="2025-03-26" />
		<updated date="2025-03-26" />
		<title>Множественные уязвимости zabbix7-lts-server-mysql </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в zabbix7-lts-server-mysql</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix7-lts-server-mysql-cve-2024-42330-cve-2024-42333-cve-2024-42332/</description>
               <solution>
                    Запретить использование в ОС пакета zabbix7-lts-server-mysql
                или
                    Установить обновление для пакета(ов) zabbix7-lts-server-mysql
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix7-lts-server-mysql-cve-2024-42330-cve-2024-42333-cve-2024-42332/" type="self" id="ROS-20250326-07" title="ROS-20250326-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42330" type="cve" id="CVE-2024-42330" title="CVE-2024-42330" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42333" type="cve" id="CVE-2024-42333" title="CVE-2024-42333" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42332" type="cve" id="CVE-2024-42332" title="CVE-2024-42332" />
			<reference href="https://bdu.fstec.ru/vul/2024-10774" type="self" id="BDU:2024-10774" title="BDU:2024-10774" />
			<reference href="https://bdu.fstec.ru/vul/2024-10775" type="self" id="BDU:2024-10775" title="BDU:2024-10775" />
			<reference href="https://bdu.fstec.ru/vul/2024-10773" type="self" id="BDU:2024-10773" title="BDU:2024-10773" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix7-lts-server-mysql" epoch="1" version="7.0.5" release="1.el7" arch="x86_64" src="">
					<filename>zabbix7-lts-server-mysql-1:7.0.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250326-08</id>
		<issued date="2025-03-26" />
		<updated date="2025-03-26" />
		<title>Множественные уязвимости zabbix7-lts-server-pgsql </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в zabbix7-lts-server-pgsql</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix7-lts-server-pgsql-cve-2024-42330-cve-2024-42333-cve-2024-423329178/</description>
               <solution>
                    Запретить использование в ОС пакета zabbix7-lts-server-pgsql
                или
                    Установить обновление для пакета(ов) zabbix7-lts-server-pgsql
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix7-lts-server-pgsql-cve-2024-42330-cve-2024-42333-cve-2024-423329178/" type="self" id="ROS-20250326-08" title="ROS-20250326-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42330" type="cve" id="CVE-2024-42330" title="CVE-2024-42330" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42333" type="cve" id="CVE-2024-42333" title="CVE-2024-42333" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42332" type="cve" id="CVE-2024-42332" title="CVE-2024-42332" />
			<reference href="https://bdu.fstec.ru/vul/2024-10774" type="self" id="BDU:2024-10774" title="BDU:2024-10774" />
			<reference href="https://bdu.fstec.ru/vul/2024-10775" type="self" id="BDU:2024-10775" title="BDU:2024-10775" />
			<reference href="https://bdu.fstec.ru/vul/2024-10773" type="self" id="BDU:2024-10773" title="BDU:2024-10773" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix7-lts-server-pgsql" epoch="1" version="7.0.5" release="1.el7" arch="x86_64" src="">
					<filename>zabbix7-lts-server-pgsql-1:7.0.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250326-09</id>
		<issued date="2025-03-26" />
		<updated date="2025-03-26" />
		<title>Уязвимость ruby </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ruby</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ruby-cve-2025-0306/</description>
               <solution>
                    Запретить использование в ОС пакета Ruby
                или
                    Установить обновление для пакета(ов) Ruby
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ruby-cve-2025-0306/" type="self" id="ROS-20250326-09" title="ROS-20250326-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0306" type="cve" id="CVE-2025-0306" title="CVE-2025-0306" />
			<reference href="https://bdu.fstec.ru/vul/2025-03806" type="self" id="BDU:2025-03806" title="BDU:2025-03806" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ruby" epoch="0" version="2.7.6" release="133.el7" arch="x86_64" src="">
					<filename>ruby-0:2.7.6-133.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250326-10</id>
		<issued date="2025-03-26" />
		<updated date="2025-03-26" />
		<title>Уязвимость nextcloud </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в nextcloud</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nextcloud-cve-2022-24838/</description>
               <solution>
                    Запретить использование в ОС пакета nextcloud
                или
                    Установить обновление для пакета(ов) nextcloud
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nextcloud-cve-2022-24838/" type="self" id="ROS-20250326-10" title="ROS-20250326-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24838" type="cve" id="CVE-2022-24838" title="CVE-2022-24838" />
			<reference href="https://bdu.fstec.ru/vul/2025-03807" type="self" id="BDU:2025-03807" title="BDU:2025-03807" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nextcloud" epoch="0" version="29.0.12" release="1.el7" arch="noarch" src="">
					<filename>nextcloud-0:29.0.12-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250326-11</id>
		<issued date="2025-03-26" />
		<updated date="2025-03-26" />
		<title>Множественные уязвимости virtuoso-opensource</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в virtuoso-opensource</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-virtuoso-opensource-260325/</description>
               <solution>
                    Запретить использование в ОС пакета Virtuoso-opensource
                или
                    Установить обновление для пакета(ов) Virtuoso-opensource
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-virtuoso-opensource-260325/" type="self" id="ROS-20250326-11" title="ROS-20250326-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57657" type="cve" id="CVE-2024-57657" title="CVE-2024-57657" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57638" type="cve" id="CVE-2024-57638" title="CVE-2024-57638" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57639" type="cve" id="CVE-2024-57639" title="CVE-2024-57639" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57640" type="cve" id="CVE-2024-57640" title="CVE-2024-57640" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57641" type="cve" id="CVE-2024-57641" title="CVE-2024-57641" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57642" type="cve" id="CVE-2024-57642" title="CVE-2024-57642" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57643" type="cve" id="CVE-2024-57643" title="CVE-2024-57643" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57644" type="cve" id="CVE-2024-57644" title="CVE-2024-57644" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57645" type="cve" id="CVE-2024-57645" title="CVE-2024-57645" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57646" type="cve" id="CVE-2024-57646" title="CVE-2024-57646" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57647" type="cve" id="CVE-2024-57647" title="CVE-2024-57647" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57664" type="cve" id="CVE-2024-57664" title="CVE-2024-57664" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57636" type="cve" id="CVE-2024-57636" title="CVE-2024-57636" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57658" type="cve" id="CVE-2024-57658" title="CVE-2024-57658" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57654" type="cve" id="CVE-2024-57654" title="CVE-2024-57654" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57661" type="cve" id="CVE-2024-57661" title="CVE-2024-57661" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57637" type="cve" id="CVE-2024-57637" title="CVE-2024-57637" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57635" type="cve" id="CVE-2024-57635" title="CVE-2024-57635" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57663" type="cve" id="CVE-2024-57663" title="CVE-2024-57663" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57662" type="cve" id="CVE-2024-57662" title="CVE-2024-57662" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57660" type="cve" id="CVE-2024-57660" title="CVE-2024-57660" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57659" type="cve" id="CVE-2024-57659" title="CVE-2024-57659" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57656" type="cve" id="CVE-2024-57656" title="CVE-2024-57656" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57653" type="cve" id="CVE-2024-57653" title="CVE-2024-57653" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57651" type="cve" id="CVE-2024-57651" title="CVE-2024-57651" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57649" type="cve" id="CVE-2024-57649" title="CVE-2024-57649" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57648" type="cve" id="CVE-2024-57648" title="CVE-2024-57648" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57650" type="cve" id="CVE-2024-57650" title="CVE-2024-57650" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57652" type="cve" id="CVE-2024-57652" title="CVE-2024-57652" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="virtuoso-opensource" epoch="1" version="7.2.14" release="1.el7" arch="x86_64" src="">
					<filename>virtuoso-opensource-1:7.2.14-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250402-01</id>
		<issued date="2025-04-02" />
		<updated date="2025-04-02" />
		<title>Уязвимость python3 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2025-0938/</description>
               <solution>
                    Запретить использование в ОС пакета Python3
                или
                    Установить обновление для пакета(ов) Python3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2025-0938/" type="self" id="ROS-20250402-01" title="ROS-20250402-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0938" type="cve" id="CVE-2025-0938" title="CVE-2025-0938" />
			<reference href="https://bdu.fstec.ru/vul/2025-04572" type="self" id="BDU:2025-04572" title="BDU:2025-04572" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3" epoch="0" version="3.8.20" release="3.el7" arch="x86_64" src="">
					<filename>python3-0:3.8.20-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250402-02</id>
		<issued date="2025-04-02" />
		<updated date="2025-04-02" />
		<title>Множественные уязвимости firefox</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-020425/</description>
               <solution>
                    Запретить использование в ОС пакета Firefox
                или
                    Установить обновление для пакета(ов) Firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-020425/" type="self" id="ROS-20250402-02" title="ROS-20250402-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1935" type="cve" id="CVE-2025-1935" title="CVE-2025-1935" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1009" type="cve" id="CVE-2025-1009" title="CVE-2025-1009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26696" type="cve" id="CVE-2025-26696" title="CVE-2025-26696" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1010" type="cve" id="CVE-2025-1010" title="CVE-2025-1010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1011" type="cve" id="CVE-2025-1011" title="CVE-2025-1011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1012" type="cve" id="CVE-2025-1012" title="CVE-2025-1012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1013" type="cve" id="CVE-2025-1013" title="CVE-2025-1013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1014" type="cve" id="CVE-2025-1014" title="CVE-2025-1014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1016" type="cve" id="CVE-2025-1016" title="CVE-2025-1016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1930" type="cve" id="CVE-2025-1930" title="CVE-2025-1930" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1931" type="cve" id="CVE-2025-1931" title="CVE-2025-1931" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1933" type="cve" id="CVE-2025-1933" title="CVE-2025-1933" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1934" type="cve" id="CVE-2025-1934" title="CVE-2025-1934" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1936" type="cve" id="CVE-2025-1936" title="CVE-2025-1936" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1937" type="cve" id="CVE-2025-1937" title="CVE-2025-1937" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1938" type="cve" id="CVE-2025-1938" title="CVE-2025-1938" />
			<reference href="https://bdu.fstec.ru/vul/2025-02313" type="self" id="BDU:2025-02313" title="BDU:2025-02313" />
			<reference href="https://bdu.fstec.ru/vul/2025-02512" type="self" id="BDU:2025-02512" title="BDU:2025-02512" />
			<reference href="https://bdu.fstec.ru/vul/2025-02314" type="self" id="BDU:2025-02314" title="BDU:2025-02314" />
			<reference href="https://bdu.fstec.ru/vul/2025-02310" type="self" id="BDU:2025-02310" title="BDU:2025-02310" />
			<reference href="https://bdu.fstec.ru/vul/2025-02312" type="self" id="BDU:2025-02312" title="BDU:2025-02312" />
			<reference href="https://bdu.fstec.ru/vul/2025-02311" type="self" id="BDU:2025-02311" title="BDU:2025-02311" />
			<reference href="https://bdu.fstec.ru/vul/2025-02309" type="self" id="BDU:2025-02309" title="BDU:2025-02309" />
			<reference href="https://bdu.fstec.ru/vul/2025-02317" type="self" id="BDU:2025-02317" title="BDU:2025-02317" />
			<reference href="https://bdu.fstec.ru/vul/2025-02599" type="self" id="BDU:2025-02599" title="BDU:2025-02599" />
			<reference href="https://bdu.fstec.ru/vul/2025-02603" type="self" id="BDU:2025-02603" title="BDU:2025-02603" />
			<reference href="https://bdu.fstec.ru/vul/2025-02877" type="self" id="BDU:2025-02877" title="BDU:2025-02877" />
			<reference href="https://bdu.fstec.ru/vul/2025-02605" type="self" id="BDU:2025-02605" title="BDU:2025-02605" />
			<reference href="https://bdu.fstec.ru/vul/2025-02600" type="self" id="BDU:2025-02600" title="BDU:2025-02600" />
			<reference href="https://bdu.fstec.ru/vul/2025-02604" type="self" id="BDU:2025-02604" title="BDU:2025-02604" />
			<reference href="https://bdu.fstec.ru/vul/2025-02606" type="self" id="BDU:2025-02606" title="BDU:2025-02606" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.21.0" release="1.el7" arch="x86_64" src="">
					<filename>firefox-0:115.21.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250402-03</id>
		<issued date="2025-04-02" />
		<updated date="2025-04-02" />
		<title>Множественные уязвимости thunderbird</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-0204251795/</description>
               <solution>
                    Запретить использование в ОС пакета thunderbird
                или
                    Установить обновление для пакета(ов) thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-0204251795/" type="self" id="ROS-20250402-03" title="ROS-20250402-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1935" type="cve" id="CVE-2025-1935" title="CVE-2025-1935" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1009" type="cve" id="CVE-2025-1009" title="CVE-2025-1009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26696" type="cve" id="CVE-2025-26696" title="CVE-2025-26696" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1010" type="cve" id="CVE-2025-1010" title="CVE-2025-1010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1011" type="cve" id="CVE-2025-1011" title="CVE-2025-1011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1012" type="cve" id="CVE-2025-1012" title="CVE-2025-1012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1013" type="cve" id="CVE-2025-1013" title="CVE-2025-1013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1014" type="cve" id="CVE-2025-1014" title="CVE-2025-1014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1016" type="cve" id="CVE-2025-1016" title="CVE-2025-1016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1930" type="cve" id="CVE-2025-1930" title="CVE-2025-1930" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1931" type="cve" id="CVE-2025-1931" title="CVE-2025-1931" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1933" type="cve" id="CVE-2025-1933" title="CVE-2025-1933" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1934" type="cve" id="CVE-2025-1934" title="CVE-2025-1934" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1936" type="cve" id="CVE-2025-1936" title="CVE-2025-1936" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1937" type="cve" id="CVE-2025-1937" title="CVE-2025-1937" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1938" type="cve" id="CVE-2025-1938" title="CVE-2025-1938" />
			<reference href="https://bdu.fstec.ru/vul/2025-02313" type="self" id="BDU:2025-02313" title="BDU:2025-02313" />
			<reference href="https://bdu.fstec.ru/vul/2025-02512" type="self" id="BDU:2025-02512" title="BDU:2025-02512" />
			<reference href="https://bdu.fstec.ru/vul/2025-02314" type="self" id="BDU:2025-02314" title="BDU:2025-02314" />
			<reference href="https://bdu.fstec.ru/vul/2025-02310" type="self" id="BDU:2025-02310" title="BDU:2025-02310" />
			<reference href="https://bdu.fstec.ru/vul/2025-02312" type="self" id="BDU:2025-02312" title="BDU:2025-02312" />
			<reference href="https://bdu.fstec.ru/vul/2025-02311" type="self" id="BDU:2025-02311" title="BDU:2025-02311" />
			<reference href="https://bdu.fstec.ru/vul/2025-02309" type="self" id="BDU:2025-02309" title="BDU:2025-02309" />
			<reference href="https://bdu.fstec.ru/vul/2025-02317" type="self" id="BDU:2025-02317" title="BDU:2025-02317" />
			<reference href="https://bdu.fstec.ru/vul/2025-02599" type="self" id="BDU:2025-02599" title="BDU:2025-02599" />
			<reference href="https://bdu.fstec.ru/vul/2025-02603" type="self" id="BDU:2025-02603" title="BDU:2025-02603" />
			<reference href="https://bdu.fstec.ru/vul/2025-02877" type="self" id="BDU:2025-02877" title="BDU:2025-02877" />
			<reference href="https://bdu.fstec.ru/vul/2025-02605" type="self" id="BDU:2025-02605" title="BDU:2025-02605" />
			<reference href="https://bdu.fstec.ru/vul/2025-02600" type="self" id="BDU:2025-02600" title="BDU:2025-02600" />
			<reference href="https://bdu.fstec.ru/vul/2025-02604" type="self" id="BDU:2025-02604" title="BDU:2025-02604" />
			<reference href="https://bdu.fstec.ru/vul/2025-02606" type="self" id="BDU:2025-02606" title="BDU:2025-02606" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="128.8.0" release="1.el7" arch="x86_64" src="">
					<filename>thunderbird-0:128.8.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250402-04</id>
		<issued date="2025-04-02" />
		<updated date="2025-04-02" />
		<title>Множественные уязвимости glpi</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-glpi-020425/</description>
               <solution>
                    Запретить использование в ОС пакета GLPI
                или
                    Установить обновление для пакета(ов) GLPI
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-glpi-020425/" type="self" id="ROS-20250402-04" title="ROS-20250402-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-25192" type="cve" id="CVE-2025-25192" title="CVE-2025-25192" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21626" type="cve" id="CVE-2025-21626" title="CVE-2025-21626" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21627" type="cve" id="CVE-2025-21627" title="CVE-2025-21627" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23024" type="cve" id="CVE-2025-23024" title="CVE-2025-23024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23046" type="cve" id="CVE-2025-23046" title="CVE-2025-23046" />
			<reference href="https://bdu.fstec.ru/vul/2025-04583" type="self" id="BDU:2025-04583" title="BDU:2025-04583" />
			<reference href="https://bdu.fstec.ru/vul/2025-04043" type="self" id="BDU:2025-04043" title="BDU:2025-04043" />
			<reference href="https://bdu.fstec.ru/vul/2025-04581" type="self" id="BDU:2025-04581" title="BDU:2025-04581" />
			<reference href="https://bdu.fstec.ru/vul/2025-04042" type="self" id="BDU:2025-04042" title="BDU:2025-04042" />
			<reference href="https://bdu.fstec.ru/vul/2025-04582" type="self" id="BDU:2025-04582" title="BDU:2025-04582" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi" epoch="0" version="10.0.18" release="1.el7" arch="noarch" src="">
					<filename>glpi-0:10.0.18-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250402-05</id>
		<issued date="2025-04-02" />
		<updated date="2025-04-02" />
		<title>Множественные уязвимости rubygem-rails-html-sanitizer</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в rubygem-rails-html-sanitizer</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rubygem-rails-html-sanitizer-020425/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-rails-html-sanitizer
                или
                    Установить обновление для пакета(ов) rubygem-rails-html-sanitizer
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rubygem-rails-html-sanitizer-020425/" type="self" id="ROS-20250402-05" title="ROS-20250402-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53985" type="cve" id="CVE-2024-53985" title="CVE-2024-53985" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53986" type="cve" id="CVE-2024-53986" title="CVE-2024-53986" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53987" type="cve" id="CVE-2024-53987" title="CVE-2024-53987" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53988" type="cve" id="CVE-2024-53988" title="CVE-2024-53988" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53989" type="cve" id="CVE-2024-53989" title="CVE-2024-53989" />
			<reference href="https://bdu.fstec.ru/vul/2025-04579" type="self" id="BDU:2025-04579" title="BDU:2025-04579" />
			<reference href="https://bdu.fstec.ru/vul/2025-04578" type="self" id="BDU:2025-04578" title="BDU:2025-04578" />
			<reference href="https://bdu.fstec.ru/vul/2025-04577" type="self" id="BDU:2025-04577" title="BDU:2025-04577" />
			<reference href="https://bdu.fstec.ru/vul/2025-04576" type="self" id="BDU:2025-04576" title="BDU:2025-04576" />
			<reference href="https://bdu.fstec.ru/vul/2025-04580" type="self" id="BDU:2025-04580" title="BDU:2025-04580" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-rails-html-sanitizer" epoch="0" version="1.6.2" release="1.el7" arch="noarch" src="">
					<filename>rubygem-rails-html-sanitizer-0:1.6.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250402-06</id>
		<issued date="2025-04-02" />
		<updated date="2025-04-02" />
		<title>Уязвимость pam_pkcs11 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в pam_pkcs11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pam-pkcs11-cve-2025-24531/</description>
               <solution>
                    Запретить использование в ОС пакета pam_pkcs11
                или
                    Установить обновление для пакета(ов) pam_pkcs11
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pam-pkcs11-cve-2025-24531/" type="self" id="ROS-20250402-06" title="ROS-20250402-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24531" type="cve" id="CVE-2025-24531" title="CVE-2025-24531" />
			<reference href="https://bdu.fstec.ru/vul/2025-01619" type="self" id="BDU:2025-01619" title="BDU:2025-01619" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pam_pkcs11" epoch="0" version="0.6.13" release="1.el7" arch="x86_64" src="">
					<filename>pam_pkcs11-0:0.6.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250402-07</id>
		<issued date="2025-04-02" />
		<updated date="2025-04-02" />
		<title>Множественные уязвимости consul </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в consul</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-consul-cve-2022-29153-cve-2021-41803/</description>
               <solution>
                    Запретить использование в ОС пакета consul
                или
                    Установить обновление для пакета(ов) consul
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-consul-cve-2022-29153-cve-2021-41803/" type="self" id="ROS-20250402-07" title="ROS-20250402-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29153" type="cve" id="CVE-2022-29153" title="CVE-2022-29153" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41803" type="cve" id="CVE-2021-41803" title="CVE-2021-41803" />
			<reference href="https://bdu.fstec.ru/vul/2025-04575" type="self" id="BDU:2025-04575" title="BDU:2025-04575" />
			<reference href="https://bdu.fstec.ru/vul/2025-04574" type="self" id="BDU:2025-04574" title="BDU:2025-04574" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="consul" epoch="0" version="1.13.6" release="1.el7" arch="x86_64" src="">
					<filename>consul-0:1.13.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250402-08</id>
		<issued date="2025-04-02" />
		<updated date="2025-04-02" />
		<title>Уязвимость vault </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в vault</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vault-cve-2022-40186/</description>
               <solution>
                    Запретить использование в ОС пакета vault
                или
                    Установить обновление для пакета(ов) vault
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vault-cve-2022-40186/" type="self" id="ROS-20250402-08" title="ROS-20250402-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40186" type="cve" id="CVE-2022-40186" title="CVE-2022-40186" />
			<reference href="https://bdu.fstec.ru/vul/2025-04009" type="self" id="BDU:2025-04009" title="BDU:2025-04009" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vault" epoch="0" version="1.11.6" release="1.el7" arch="x86_64" src="">
					<filename>vault-0:1.11.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250402-09</id>
		<issued date="2025-04-02" />
		<updated date="2025-04-02" />
		<title>Уязвимость expat </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в expat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-expat-cve-2024-8176/</description>
               <solution>
                    Запретить использование в ОС пакета expat
                или
                    Установить обновление для пакета(ов) expat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-expat-cve-2024-8176/" type="self" id="ROS-20250402-09" title="ROS-20250402-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8176" type="cve" id="CVE-2024-8176" title="CVE-2024-8176" />
			<reference href="https://bdu.fstec.ru/vul/2025-04573" type="self" id="BDU:2025-04573" title="BDU:2025-04573" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="expat" epoch="0" version="2.7.0" release="1.el7" arch="x86_64" src="">
					<filename>expat-0:2.7.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250403-01</id>
		<issued date="2025-04-03" />
		<updated date="2025-04-03" />
		<title>Множественные уязвимости expat</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в expat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-expat-030425/</description>
               <solution>
                    Запретить использование в ОС пакета expat
                или
                    Установить обновление для пакета(ов) expat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-expat-030425/" type="self" id="ROS-20250403-01" title="ROS-20250403-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22824" type="cve" id="CVE-2022-22824" title="CVE-2022-22824" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22825" type="cve" id="CVE-2022-22825" title="CVE-2022-22825" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45960" type="cve" id="CVE-2021-45960" title="CVE-2021-45960" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22827" type="cve" id="CVE-2022-22827" title="CVE-2022-22827" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22826" type="cve" id="CVE-2022-22826" title="CVE-2022-22826" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22823" type="cve" id="CVE-2022-22823" title="CVE-2022-22823" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22822" type="cve" id="CVE-2022-22822" title="CVE-2022-22822" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46143" type="cve" id="CVE-2021-46143" title="CVE-2021-46143" />
			<reference href="https://bdu.fstec.ru/vul/2022-00800" type="self" id="BDU:2022-00800" title="BDU:2022-00800" />
			<reference href="https://bdu.fstec.ru/vul/2022-00805" type="self" id="BDU:2022-00805" title="BDU:2022-00805" />
			<reference href="https://bdu.fstec.ru/vul/2022-01003" type="self" id="BDU:2022-01003" title="BDU:2022-01003" />
			<reference href="https://bdu.fstec.ru/vul/2022-01058" type="self" id="BDU:2022-01058" title="BDU:2022-01058" />
			<reference href="https://bdu.fstec.ru/vul/2022-01059" type="self" id="BDU:2022-01059" title="BDU:2022-01059" />
			<reference href="https://bdu.fstec.ru/vul/2022-01060" type="self" id="BDU:2022-01060" title="BDU:2022-01060" />
			<reference href="https://bdu.fstec.ru/vul/2022-02823" type="self" id="BDU:2022-02823" title="BDU:2022-02823" />
			<reference href="https://bdu.fstec.ru/vul/2022-01052" type="self" id="BDU:2022-01052" title="BDU:2022-01052" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="expat" epoch="0" version="2.5.0" release="1.el7" arch="x86_64" src="">
					<filename>expat-0:2.5.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250403-02</id>
		<issued date="2025-04-03" />
		<updated date="2025-04-03" />
		<title>Уязвимость qpdf </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в qpdf</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qpdf-cve-2021-25786/</description>
               <solution>
                    Запретить использование в ОС пакета qpdf
                или
                    Установить обновление для пакета(ов) qpdf
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qpdf-cve-2021-25786/" type="self" id="ROS-20250403-02" title="ROS-20250403-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25786" type="cve" id="CVE-2021-25786" title="CVE-2021-25786" />
			<reference href="https://bdu.fstec.ru/vul/2025-04290" type="self" id="BDU:2025-04290" title="BDU:2025-04290" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="qpdf" epoch="0" version="10.6.3" release="1.el7" arch="x86_64" src="">
					<filename>qpdf-0:10.6.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250403-03</id>
		<issued date="2025-04-03" />
		<updated date="2025-04-03" />
		<title>Уязвимость exim </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в exim</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-exim-cve-2025-26794/</description>
               <solution>
                    Запретить использование в ОС пакета exim
                или
                    Установить обновление для пакета(ов) exim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-exim-cve-2025-26794/" type="self" id="ROS-20250403-03" title="ROS-20250403-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26794" type="cve" id="CVE-2025-26794" title="CVE-2025-26794" />
			<reference href="https://bdu.fstec.ru/vul/2025-01904" type="self" id="BDU:2025-01904" title="BDU:2025-01904" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="exim" epoch="0" version="4.98.1" release="1.el7" arch="x86_64" src="">
					<filename>exim-0:4.98.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250403-04</id>
		<issued date="2025-04-03" />
		<updated date="2025-04-03" />
		<title>Уязвимость golang-x-oauth2-devel </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang-x-oauth2-devel</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-x-oauth2-devel-cve-2025-22868/</description>
               <solution>
                    Запретить использование в ОС пакета golang-x-oauth2-devel
                или
                    Установить обновление для пакета(ов) golang-x-oauth2-devel
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-x-oauth2-devel-cve-2025-22868/" type="self" id="ROS-20250403-04" title="ROS-20250403-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22868" type="cve" id="CVE-2025-22868" title="CVE-2025-22868" />
			<reference href="https://bdu.fstec.ru/vul/2025-03638" type="self" id="BDU:2025-03638" title="BDU:2025-03638" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang-x-oauth2-devel" epoch="0" version="0.27.0" release="1.el7" arch="noarch" src="">
					<filename>golang-x-oauth2-devel-0:0.27.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250403-05</id>
		<issued date="2025-04-03" />
		<updated date="2025-04-03" />
		<title>Множественные уязвимости chromium</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-030425/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-030425/" type="self" id="ROS-20250403-05" title="ROS-20250403-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2137" type="cve" id="CVE-2025-2137" title="CVE-2025-2137" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2136" type="cve" id="CVE-2025-2136" title="CVE-2025-2136" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1914" type="cve" id="CVE-2025-1914" title="CVE-2025-1914" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1915" type="cve" id="CVE-2025-1915" title="CVE-2025-1915" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1916" type="cve" id="CVE-2025-1916" title="CVE-2025-1916" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1917" type="cve" id="CVE-2025-1917" title="CVE-2025-1917" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1918" type="cve" id="CVE-2025-1918" title="CVE-2025-1918" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1919" type="cve" id="CVE-2025-1919" title="CVE-2025-1919" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1921" type="cve" id="CVE-2025-1921" title="CVE-2025-1921" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1922" type="cve" id="CVE-2025-1922" title="CVE-2025-1922" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1923" type="cve" id="CVE-2025-1923" title="CVE-2025-1923" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1920" type="cve" id="CVE-2025-1920" title="CVE-2025-1920" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2135" type="cve" id="CVE-2025-2135" title="CVE-2025-2135" />
			<reference href="https://bdu.fstec.ru/vul/2025-02571" type="self" id="BDU:2025-02571" title="BDU:2025-02571" />
			<reference href="https://bdu.fstec.ru/vul/2025-02574" type="self" id="BDU:2025-02574" title="BDU:2025-02574" />
			<reference href="https://bdu.fstec.ru/vul/2025-02674" type="self" id="BDU:2025-02674" title="BDU:2025-02674" />
			<reference href="https://bdu.fstec.ru/vul/2025-02670" type="self" id="BDU:2025-02670" title="BDU:2025-02670" />
			<reference href="https://bdu.fstec.ru/vul/2025-02675" type="self" id="BDU:2025-02675" title="BDU:2025-02675" />
			<reference href="https://bdu.fstec.ru/vul/2025-02672" type="self" id="BDU:2025-02672" title="BDU:2025-02672" />
			<reference href="https://bdu.fstec.ru/vul/2025-02673" type="self" id="BDU:2025-02673" title="BDU:2025-02673" />
			<reference href="https://bdu.fstec.ru/vul/2025-02676" type="self" id="BDU:2025-02676" title="BDU:2025-02676" />
			<reference href="https://bdu.fstec.ru/vul/2025-02677" type="self" id="BDU:2025-02677" title="BDU:2025-02677" />
			<reference href="https://bdu.fstec.ru/vul/2025-02669" type="self" id="BDU:2025-02669" title="BDU:2025-02669" />
			<reference href="https://bdu.fstec.ru/vul/2025-02671" type="self" id="BDU:2025-02671" title="BDU:2025-02671" />
			<reference href="https://bdu.fstec.ru/vul/2025-02573" type="self" id="BDU:2025-02573" title="BDU:2025-02573" />
			<reference href="https://bdu.fstec.ru/vul/2025-02572" type="self" id="BDU:2025-02572" title="BDU:2025-02572" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="134.0.6998.89" release="1.el7" arch="x86_64" src="">
					<filename>chromium-0:134.0.6998.89-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250403-06</id>
		<issued date="2025-04-03" />
		<updated date="2025-04-03" />
		<title>Уязвимость mariadb </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mariadb</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mariadb-cve-2025-21490/</description>
               <solution>
                    Запретить использование в ОС пакета mariadb
                или
                    Установить обновление для пакета(ов) mariadb
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mariadb-cve-2025-21490/" type="self" id="ROS-20250403-06" title="ROS-20250403-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21490" type="cve" id="CVE-2025-21490" title="CVE-2025-21490" />
			<reference href="https://bdu.fstec.ru/vul/2025-00625" type="self" id="BDU:2025-00625" title="BDU:2025-00625" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mariadb" epoch="3" version="10.11.11" release="1.el7" arch="x86_64" src="">
					<filename>mariadb-3:10.11.11-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250403-07</id>
		<issued date="2025-04-03" />
		<updated date="2025-04-03" />
		<title>Уязвимость mariadb11.4 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mariadb11.4</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mariadb-cve-2025-214902758/</description>
               <solution>
                    Запретить использование в ОС пакета mariadb11.4
                или
                    Установить обновление для пакета(ов) mariadb11.4
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mariadb-cve-2025-214902758/" type="self" id="ROS-20250403-07" title="ROS-20250403-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21490" type="cve" id="CVE-2025-21490" title="CVE-2025-21490" />
			<reference href="https://bdu.fstec.ru/vul/2025-00625" type="self" id="BDU:2025-00625" title="BDU:2025-00625" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mariadb11.4" epoch="3" version="11.4.5" release="2.el7" arch="x86_64" src="">
					<filename>mariadb11.4-3:11.4.5-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250403-08</id>
		<issued date="2025-04-03" />
		<updated date="2025-04-03" />
		<title>Уязвимость crun </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в crun</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-crun-cve-2025-24965/</description>
               <solution>
                    Запретить использование в ОС пакета crun
                или
                    Установить обновление для пакета(ов) crun
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-crun-cve-2025-24965/" type="self" id="ROS-20250403-08" title="ROS-20250403-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24965" type="cve" id="CVE-2025-24965" title="CVE-2025-24965" />
			<reference href="https://bdu.fstec.ru/vul/2025-04195" type="self" id="BDU:2025-04195" title="BDU:2025-04195" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="crun" epoch="0" version="1.20" release="1.el7" arch="x86_64" src="">
					<filename>crun-0:1.20-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250403-09</id>
		<issued date="2025-04-03" />
		<updated date="2025-04-03" />
		<title>Уязвимость tomcat </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2025-24813/</description>
               <solution>
                    Запретить использование в ОС пакета tomcat
                или
                    Установить обновление для пакета(ов) tomcat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2025-24813/" type="self" id="ROS-20250403-09" title="ROS-20250403-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24813" type="cve" id="CVE-2025-24813" title="CVE-2025-24813" />
			<reference href="https://bdu.fstec.ru/vul/2025-02511" type="self" id="BDU:2025-02511" title="BDU:2025-02511" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat" epoch="1" version="9.0.99" release="1.el7" arch="noarch" src="">
					<filename>tomcat-1:9.0.99-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250403-10</id>
		<issued date="2025-04-03" />
		<updated date="2025-04-03" />
		<title>Уязвимость rubygem-rack </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в rubygem-rack</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-rack-cve-2025-27610/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-rack
                или
                    Установить обновление для пакета(ов) rubygem-rack
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-rack-cve-2025-27610/" type="self" id="ROS-20250403-10" title="ROS-20250403-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27610" type="cve" id="CVE-2025-27610" title="CVE-2025-27610" />
			<reference href="https://bdu.fstec.ru/vul/2025-02581" type="self" id="BDU:2025-02581" title="BDU:2025-02581" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-rack" epoch="1" version="2.2.8.1" release="3.el7" arch="noarch" src="">
					<filename>rubygem-rack-1:2.2.8.1-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250403-11</id>
		<issued date="2025-04-03" />
		<updated date="2025-04-03" />
		<title>Уязвимость opensearch </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в opensearch</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opensearch-cve-2023-25806/</description>
               <solution>
                    Запретить использование в ОС пакета opensearch
                или
                    Установить обновление для пакета(ов) opensearch
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opensearch-cve-2023-25806/" type="self" id="ROS-20250403-11" title="ROS-20250403-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25806" type="cve" id="CVE-2023-25806" title="CVE-2023-25806" />
			<reference href="https://bdu.fstec.ru/vul/2025-04194" type="self" id="BDU:2025-04194" title="BDU:2025-04194" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="opensearch" epoch="0" version="2.7.0" release="1" arch="x86_64" src="">
					<filename>opensearch-0:2.7.0-1.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250403-12</id>
		<issued date="2025-04-03" />
		<updated date="2025-04-03" />
		<title>Уязвимость opensearch </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в opensearch</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opensearch-cve-2023-23933/</description>
               <solution>
                    Запретить использование в ОС пакета opensearch
                или
                    Установить обновление для пакета(ов) opensearch
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opensearch-cve-2023-23933/" type="self" id="ROS-20250403-12" title="ROS-20250403-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23933" type="cve" id="CVE-2023-23933" title="CVE-2023-23933" />
			<reference href="https://bdu.fstec.ru/vul/2025-04292" type="self" id="BDU:2025-04292" title="BDU:2025-04292" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="opensearch" epoch="0" version="2.7.0" release="1" arch="x86_64" src="">
					<filename>opensearch-0:2.7.0-1.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250403-13</id>
		<issued date="2025-04-03" />
		<updated date="2025-04-03" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2025-22870/</description>
               <solution>
                    Запретить использование в ОС пакета golang
                или
                    Установить обновление для пакета(ов) golang
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2025-22870/" type="self" id="ROS-20250403-13" title="ROS-20250403-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22870" type="cve" id="CVE-2025-22870" title="CVE-2025-22870" />
			<reference href="https://bdu.fstec.ru/vul/2025-02476" type="self" id="BDU:2025-02476" title="BDU:2025-02476" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.24.1" release="1.el7" arch="x86_64" src="">
					<filename>golang-0:1.24.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250403-14</id>
		<issued date="2025-04-03" />
		<updated date="2025-04-03" />
		<title>Множественные уязвимости opensearch </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в opensearch</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-opensearch-cve-2023-23612-cve-2023-23613/</description>
               <solution>
                    Запретить использование в ОС пакета opensearch
                или
                    Установить обновление для пакета(ов) opensearch
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-opensearch-cve-2023-23612-cve-2023-23613/" type="self" id="ROS-20250403-14" title="ROS-20250403-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23612" type="cve" id="CVE-2023-23612" title="CVE-2023-23612" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23613" type="cve" id="CVE-2023-23613" title="CVE-2023-23613" />
			<reference href="https://bdu.fstec.ru/vul/2025-04295" type="self" id="BDU:2025-04295" title="BDU:2025-04295" />
			<reference href="https://bdu.fstec.ru/vul/2025-04294" type="self" id="BDU:2025-04294" title="BDU:2025-04294" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="opensearch" epoch="0" version="2.7.0" release="1" arch="x86_64" src="">
					<filename>opensearch-0:2.7.0-1.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250403-15</id>
		<issued date="2025-04-03" />
		<updated date="2025-04-03" />
		<title>Уязвимость glpi-plugin-glpiinventory </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в glpi-plugin-glpiinventory</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-plugin-glpiinventory-cve-2025-27147/</description>
               <solution>
                    Запретить использование в ОС пакета glpi-plugin-glpiinventory
                или
                    Установить обновление для пакета(ов) glpi-plugin-glpiinventory
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-plugin-glpiinventory-cve-2025-27147/" type="self" id="ROS-20250403-15" title="ROS-20250403-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27147" type="cve" id="CVE-2025-27147" title="CVE-2025-27147" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi-plugin-glpiinventory" epoch="0" version="1.5.0" release="1.el7" arch="noarch" src="">
					<filename>glpi-plugin-glpiinventory-0:1.5.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250403-16</id>
		<issued date="2025-04-03" />
		<updated date="2025-04-03" />
		<title>Уязвимость rubygem-rack </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в rubygem-rack</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-rack-cve-2025-27111/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-rack
                или
                    Установить обновление для пакета(ов) rubygem-rack
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-rack-cve-2025-27111/" type="self" id="ROS-20250403-16" title="ROS-20250403-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27111" type="cve" id="CVE-2025-27111" title="CVE-2025-27111" />
			<reference href="https://bdu.fstec.ru/vul/2025-04293" type="self" id="BDU:2025-04293" title="BDU:2025-04293" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-rack" epoch="1" version="2.2.8.1" release="3.el7" arch="noarch" src="">
					<filename>rubygem-rack-1:2.2.8.1-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250409-01</id>
		<issued date="2025-04-09" />
		<updated date="2025-04-09" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-090425/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-090425/" type="self" id="ROS-20250409-01" title="ROS-20250409-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53174" type="cve" id="CVE-2024-53174" title="CVE-2024-53174" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53175" type="cve" id="CVE-2024-53175" title="CVE-2024-53175" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53180" type="cve" id="CVE-2024-53180" title="CVE-2024-53180" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53181" type="cve" id="CVE-2024-53181" title="CVE-2024-53181" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53183" type="cve" id="CVE-2024-53183" title="CVE-2024-53183" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53184" type="cve" id="CVE-2024-53184" title="CVE-2024-53184" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53185" type="cve" id="CVE-2024-53185" title="CVE-2024-53185" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53194" type="cve" id="CVE-2024-53194" title="CVE-2024-53194" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53197" type="cve" id="CVE-2024-53197" title="CVE-2024-53197" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53198" type="cve" id="CVE-2024-53198" title="CVE-2024-53198" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53206" type="cve" id="CVE-2024-53206" title="CVE-2024-53206" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53207" type="cve" id="CVE-2024-53207" title="CVE-2024-53207" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53208" type="cve" id="CVE-2024-53208" title="CVE-2024-53208" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53213" type="cve" id="CVE-2024-53213" title="CVE-2024-53213" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53214" type="cve" id="CVE-2024-53214" title="CVE-2024-53214" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53215" type="cve" id="CVE-2024-53215" title="CVE-2024-53215" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53217" type="cve" id="CVE-2024-53217" title="CVE-2024-53217" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53226" type="cve" id="CVE-2024-53226" title="CVE-2024-53226" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53227" type="cve" id="CVE-2024-53227" title="CVE-2024-53227" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53229" type="cve" id="CVE-2024-53229" title="CVE-2024-53229" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53230" type="cve" id="CVE-2024-53230" title="CVE-2024-53230" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53231" type="cve" id="CVE-2024-53231" title="CVE-2024-53231" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53233" type="cve" id="CVE-2024-53233" title="CVE-2024-53233" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53237" type="cve" id="CVE-2024-53237" title="CVE-2024-53237" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53239" type="cve" id="CVE-2024-53239" title="CVE-2024-53239" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56531" type="cve" id="CVE-2024-56531" title="CVE-2024-56531" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56532" type="cve" id="CVE-2024-56532" title="CVE-2024-56532" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56533" type="cve" id="CVE-2024-56533" title="CVE-2024-56533" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56539" type="cve" id="CVE-2024-56539" title="CVE-2024-56539" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56605" type="cve" id="CVE-2024-56605" title="CVE-2024-56605" />
			<reference href="https://bdu.fstec.ru/vul/2025-04556" type="self" id="BDU:2025-04556" title="BDU:2025-04556" />
			<reference href="https://bdu.fstec.ru/vul/2025-04145" type="self" id="BDU:2025-04145" title="BDU:2025-04145" />
			<reference href="https://bdu.fstec.ru/vul/2025-04320" type="self" id="BDU:2025-04320" title="BDU:2025-04320" />
			<reference href="https://bdu.fstec.ru/vul/2025-04319" type="self" id="BDU:2025-04319" title="BDU:2025-04319" />
			<reference href="https://bdu.fstec.ru/vul/2025-04318" type="self" id="BDU:2025-04318" title="BDU:2025-04318" />
			<reference href="https://bdu.fstec.ru/vul/2025-04317" type="self" id="BDU:2025-04317" title="BDU:2025-04317" />
			<reference href="https://bdu.fstec.ru/vul/2025-04316" type="self" id="BDU:2025-04316" title="BDU:2025-04316" />
			<reference href="https://bdu.fstec.ru/vul/2025-04567" type="self" id="BDU:2025-04567" title="BDU:2025-04567" />
			<reference href="https://bdu.fstec.ru/vul/2025-02681" type="self" id="BDU:2025-02681" title="BDU:2025-02681" />
			<reference href="https://bdu.fstec.ru/vul/2025-04314" type="self" id="BDU:2025-04314" title="BDU:2025-04314" />
			<reference href="https://bdu.fstec.ru/vul/2025-04565" type="self" id="BDU:2025-04565" title="BDU:2025-04565" />
			<reference href="https://bdu.fstec.ru/vul/2025-04313" type="self" id="BDU:2025-04313" title="BDU:2025-04313" />
			<reference href="https://bdu.fstec.ru/vul/2025-04555" type="self" id="BDU:2025-04555" title="BDU:2025-04555" />
			<reference href="https://bdu.fstec.ru/vul/2025-04561" type="self" id="BDU:2025-04561" title="BDU:2025-04561" />
			<reference href="https://bdu.fstec.ru/vul/2025-04322" type="self" id="BDU:2025-04322" title="BDU:2025-04322" />
			<reference href="https://bdu.fstec.ru/vul/2025-04312" type="self" id="BDU:2025-04312" title="BDU:2025-04312" />
			<reference href="https://bdu.fstec.ru/vul/2025-04315" type="self" id="BDU:2025-04315" title="BDU:2025-04315" />
			<reference href="https://bdu.fstec.ru/vul/2025-04324" type="self" id="BDU:2025-04324" title="BDU:2025-04324" />
			<reference href="https://bdu.fstec.ru/vul/2025-04566" type="self" id="BDU:2025-04566" title="BDU:2025-04566" />
			<reference href="https://bdu.fstec.ru/vul/2025-04311" type="self" id="BDU:2025-04311" title="BDU:2025-04311" />
			<reference href="https://bdu.fstec.ru/vul/2025-04144" type="self" id="BDU:2025-04144" title="BDU:2025-04144" />
			<reference href="https://bdu.fstec.ru/vul/2025-04142" type="self" id="BDU:2025-04142" title="BDU:2025-04142" />
			<reference href="https://bdu.fstec.ru/vul/2025-04140" type="self" id="BDU:2025-04140" title="BDU:2025-04140" />
			<reference href="https://bdu.fstec.ru/vul/2025-04558" type="self" id="BDU:2025-04558" title="BDU:2025-04558" />
			<reference href="https://bdu.fstec.ru/vul/2025-06976" type="self" id="BDU:2025-06976" title="BDU:2025-06976" />
			<reference href="https://bdu.fstec.ru/vul/2025-04310" type="self" id="BDU:2025-04310" title="BDU:2025-04310" />
			<reference href="https://bdu.fstec.ru/vul/2025-04321" type="self" id="BDU:2025-04321" title="BDU:2025-04321" />
			<reference href="https://bdu.fstec.ru/vul/2025-04296" type="self" id="BDU:2025-04296" title="BDU:2025-04296" />
			<reference href="https://bdu.fstec.ru/vul/2025-04323" type="self" id="BDU:2025-04323" title="BDU:2025-04323" />
			<reference href="https://bdu.fstec.ru/vul/2025-04564" type="self" id="BDU:2025-04564" title="BDU:2025-04564" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250410-01</id>
		<issued date="2025-04-10" />
		<updated date="2025-04-10" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-100425/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-100425/" type="self" id="ROS-20250410-01" title="ROS-20250410-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49962" type="cve" id="CVE-2024-49962" title="CVE-2024-49962" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49963" type="cve" id="CVE-2024-49963" title="CVE-2024-49963" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49965" type="cve" id="CVE-2024-49965" title="CVE-2024-49965" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49966" type="cve" id="CVE-2024-49966" title="CVE-2024-49966" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49969" type="cve" id="CVE-2024-49969" title="CVE-2024-49969" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53103" type="cve" id="CVE-2024-53103" title="CVE-2024-53103" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53104" type="cve" id="CVE-2024-53104" title="CVE-2024-53104" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53105" type="cve" id="CVE-2024-53105" title="CVE-2024-53105" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56708" type="cve" id="CVE-2024-56708" title="CVE-2024-56708" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56705" type="cve" id="CVE-2024-56705" title="CVE-2024-56705" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56704" type="cve" id="CVE-2024-56704" title="CVE-2024-56704" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56701" type="cve" id="CVE-2024-56701" title="CVE-2024-56701" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56700" type="cve" id="CVE-2024-56700" title="CVE-2024-56700" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56698" type="cve" id="CVE-2024-56698" title="CVE-2024-56698" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56694" type="cve" id="CVE-2024-56694" title="CVE-2024-56694" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56693" type="cve" id="CVE-2024-56693" title="CVE-2024-56693" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56691" type="cve" id="CVE-2024-56691" title="CVE-2024-56691" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56690" type="cve" id="CVE-2024-56690" title="CVE-2024-56690" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56688" type="cve" id="CVE-2024-56688" title="CVE-2024-56688" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56687" type="cve" id="CVE-2024-56687" title="CVE-2024-56687" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56683" type="cve" id="CVE-2024-56683" title="CVE-2024-56683" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56681" type="cve" id="CVE-2024-56681" title="CVE-2024-56681" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56679" type="cve" id="CVE-2024-56679" title="CVE-2024-56679" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56678" type="cve" id="CVE-2024-56678" title="CVE-2024-56678" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56677" type="cve" id="CVE-2024-56677" title="CVE-2024-56677" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49034" type="cve" id="CVE-2022-49034" title="CVE-2022-49034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53164" type="cve" id="CVE-2024-53164" title="CVE-2024-53164" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53165" type="cve" id="CVE-2024-53165" title="CVE-2024-53165" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53170" type="cve" id="CVE-2024-53170" title="CVE-2024-53170" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53171" type="cve" id="CVE-2024-53171" title="CVE-2024-53171" />
			<reference href="https://bdu.fstec.ru/vul/2025-05118" type="self" id="BDU:2025-05118" title="BDU:2025-05118" />
			<reference href="https://bdu.fstec.ru/vul/2025-05126" type="self" id="BDU:2025-05126" title="BDU:2025-05126" />
			<reference href="https://bdu.fstec.ru/vul/2025-05127" type="self" id="BDU:2025-05127" title="BDU:2025-05127" />
			<reference href="https://bdu.fstec.ru/vul/2025-04990" type="self" id="BDU:2025-04990" title="BDU:2025-04990" />
			<reference href="https://bdu.fstec.ru/vul/2025-04552" type="self" id="BDU:2025-04552" title="BDU:2025-04552" />
			<reference href="https://bdu.fstec.ru/vul/2025-04997" type="self" id="BDU:2025-04997" title="BDU:2025-04997" />
			<reference href="https://bdu.fstec.ru/vul/2025-01147" type="self" id="BDU:2025-01147" title="BDU:2025-01147" />
			<reference href="https://bdu.fstec.ru/vul/2025-04147" type="self" id="BDU:2025-04147" title="BDU:2025-04147" />
			<reference href="https://bdu.fstec.ru/vul/2025-04993" type="self" id="BDU:2025-04993" title="BDU:2025-04993" />
			<reference href="https://bdu.fstec.ru/vul/2025-05117" type="self" id="BDU:2025-05117" title="BDU:2025-05117" />
			<reference href="https://bdu.fstec.ru/vul/2025-05000" type="self" id="BDU:2025-05000" title="BDU:2025-05000" />
			<reference href="https://bdu.fstec.ru/vul/2025-05120" type="self" id="BDU:2025-05120" title="BDU:2025-05120" />
			<reference href="https://bdu.fstec.ru/vul/2025-05005" type="self" id="BDU:2025-05005" title="BDU:2025-05005" />
			<reference href="https://bdu.fstec.ru/vul/2025-05122" type="self" id="BDU:2025-05122" title="BDU:2025-05122" />
			<reference href="https://bdu.fstec.ru/vul/2025-05121" type="self" id="BDU:2025-05121" title="BDU:2025-05121" />
			<reference href="https://bdu.fstec.ru/vul/2025-04998" type="self" id="BDU:2025-04998" title="BDU:2025-04998" />
			<reference href="https://bdu.fstec.ru/vul/2025-05124" type="self" id="BDU:2025-05124" title="BDU:2025-05124" />
			<reference href="https://bdu.fstec.ru/vul/2025-05125" type="self" id="BDU:2025-05125" title="BDU:2025-05125" />
			<reference href="https://bdu.fstec.ru/vul/2025-05123" type="self" id="BDU:2025-05123" title="BDU:2025-05123" />
			<reference href="https://bdu.fstec.ru/vul/2025-04133" type="self" id="BDU:2025-04133" title="BDU:2025-04133" />
			<reference href="https://bdu.fstec.ru/vul/2025-04134" type="self" id="BDU:2025-04134" title="BDU:2025-04134" />
			<reference href="https://bdu.fstec.ru/vul/2025-05007" type="self" id="BDU:2025-05007" title="BDU:2025-05007" />
			<reference href="https://bdu.fstec.ru/vul/2025-05006" type="self" id="BDU:2025-05006" title="BDU:2025-05006" />
			<reference href="https://bdu.fstec.ru/vul/2025-04992" type="self" id="BDU:2025-04992" title="BDU:2025-04992" />
			<reference href="https://bdu.fstec.ru/vul/2025-05119" type="self" id="BDU:2025-05119" title="BDU:2025-05119" />
			<reference href="https://bdu.fstec.ru/vul/2025-04434" type="self" id="BDU:2025-04434" title="BDU:2025-04434" />
			<reference href="https://bdu.fstec.ru/vul/2025-04146" type="self" id="BDU:2025-04146" title="BDU:2025-04146" />
			<reference href="https://bdu.fstec.ru/vul/2025-04996" type="self" id="BDU:2025-04996" title="BDU:2025-04996" />
			<reference href="https://bdu.fstec.ru/vul/2025-04995" type="self" id="BDU:2025-04995" title="BDU:2025-04995" />
			<reference href="https://bdu.fstec.ru/vul/2025-04991" type="self" id="BDU:2025-04991" title="BDU:2025-04991" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250414-01</id>
		<issued date="2025-04-14" />
		<updated date="2025-04-14" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-140425/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-140425/" type="self" id="ROS-20250414-01" title="ROS-20250414-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47679" type="cve" id="CVE-2024-47679" title="CVE-2024-47679" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35964" type="cve" id="CVE-2024-35964" title="CVE-2024-35964" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38544" type="cve" id="CVE-2024-38544" title="CVE-2024-38544" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47674" type="cve" id="CVE-2024-47674" title="CVE-2024-47674" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49924" type="cve" id="CVE-2024-49924" title="CVE-2024-49924" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49927" type="cve" id="CVE-2024-49927" title="CVE-2024-49927" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49930" type="cve" id="CVE-2024-49930" title="CVE-2024-49930" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49933" type="cve" id="CVE-2024-49933" title="CVE-2024-49933" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49935" type="cve" id="CVE-2024-49935" title="CVE-2024-49935" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49936" type="cve" id="CVE-2024-49936" title="CVE-2024-49936" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49938" type="cve" id="CVE-2024-49938" title="CVE-2024-49938" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49944" type="cve" id="CVE-2024-49944" title="CVE-2024-49944" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49946" type="cve" id="CVE-2024-49946" title="CVE-2024-49946" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49948" type="cve" id="CVE-2024-49948" title="CVE-2024-49948" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49949" type="cve" id="CVE-2024-49949" title="CVE-2024-49949" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49950" type="cve" id="CVE-2024-49950" title="CVE-2024-49950" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49951" type="cve" id="CVE-2024-49951" title="CVE-2024-49951" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49952" type="cve" id="CVE-2024-49952" title="CVE-2024-49952" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49954" type="cve" id="CVE-2024-49954" title="CVE-2024-49954" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49955" type="cve" id="CVE-2024-49955" title="CVE-2024-49955" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49957" type="cve" id="CVE-2024-49957" title="CVE-2024-49957" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49958" type="cve" id="CVE-2024-49958" title="CVE-2024-49958" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49959" type="cve" id="CVE-2024-49959" title="CVE-2024-49959" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49961" type="cve" id="CVE-2024-49961" title="CVE-2024-49961" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53172" type="cve" id="CVE-2024-53172" title="CVE-2024-53172" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53173" type="cve" id="CVE-2024-53173" title="CVE-2024-53173" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56606" type="cve" id="CVE-2024-56606" title="CVE-2024-56606" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56610" type="cve" id="CVE-2024-56610" title="CVE-2024-56610" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56614" type="cve" id="CVE-2024-56614" title="CVE-2024-56614" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56615" type="cve" id="CVE-2024-56615" title="CVE-2024-56615" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56616" type="cve" id="CVE-2024-56616" title="CVE-2024-56616" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56619" type="cve" id="CVE-2024-56619" title="CVE-2024-56619" />
			<reference href="https://bdu.fstec.ru/vul/2025-05135" type="self" id="BDU:2025-05135" title="BDU:2025-05135" />
			<reference href="https://bdu.fstec.ru/vul/2025-03915" type="self" id="BDU:2025-03915" title="BDU:2025-03915" />
			<reference href="https://bdu.fstec.ru/vul/2025-03282" type="self" id="BDU:2025-03282" title="BDU:2025-03282" />
			<reference href="https://bdu.fstec.ru/vul/2025-00021" type="self" id="BDU:2025-00021" title="BDU:2025-00021" />
			<reference href="https://bdu.fstec.ru/vul/2024-09003" type="self" id="BDU:2024-09003" title="BDU:2024-09003" />
			<reference href="https://bdu.fstec.ru/vul/2025-07592" type="self" id="BDU:2025-07592" title="BDU:2025-07592" />
			<reference href="https://bdu.fstec.ru/vul/2025-04550" type="self" id="BDU:2025-04550" title="BDU:2025-04550" />
			<reference href="https://bdu.fstec.ru/vul/2025-05139" type="self" id="BDU:2025-05139" title="BDU:2025-05139" />
			<reference href="https://bdu.fstec.ru/vul/2024-09004" type="self" id="BDU:2024-09004" title="BDU:2024-09004" />
			<reference href="https://bdu.fstec.ru/vul/2025-05138" type="self" id="BDU:2025-05138" title="BDU:2025-05138" />
			<reference href="https://bdu.fstec.ru/vul/2024-09792" type="self" id="BDU:2024-09792" title="BDU:2024-09792" />
			<reference href="https://bdu.fstec.ru/vul/2025-04160" type="self" id="BDU:2025-04160" title="BDU:2025-04160" />
			<reference href="https://bdu.fstec.ru/vul/2025-05137" type="self" id="BDU:2025-05137" title="BDU:2025-05137" />
			<reference href="https://bdu.fstec.ru/vul/2025-05136" type="self" id="BDU:2025-05136" title="BDU:2025-05136" />
			<reference href="https://bdu.fstec.ru/vul/2025-04159" type="self" id="BDU:2025-04159" title="BDU:2025-04159" />
			<reference href="https://bdu.fstec.ru/vul/2025-04994" type="self" id="BDU:2025-04994" title="BDU:2025-04994" />
			<reference href="https://bdu.fstec.ru/vul/2025-04675" type="self" id="BDU:2025-04675" title="BDU:2025-04675" />
			<reference href="https://bdu.fstec.ru/vul/2025-01119" type="self" id="BDU:2025-01119" title="BDU:2025-01119" />
			<reference href="https://bdu.fstec.ru/vul/2025-04670" type="self" id="BDU:2025-04670" title="BDU:2025-04670" />
			<reference href="https://bdu.fstec.ru/vul/2025-04999" type="self" id="BDU:2025-04999" title="BDU:2025-04999" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241212-24</id>
		<issued date="2025-04-17" />
		<updated date="2025-04-17" />
		<title>Уязвимость zabbix7-lts-server-pgsql </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в zabbix7-lts-server-pgsql</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-lts-server-pgsql-cve-2024-423271708/</description>
               <solution>
                    Запретить использование в ОС пакета zabbix7-lts-server-pgsql
                или
                    Установить обновление для пакета(ов) zabbix7-lts-server-pgsql
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-lts-server-pgsql-cve-2024-423271708/" type="self" id="ROS-20241212-24" title="ROS-20241212-24" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42327" type="cve" id="CVE-2024-42327" title="CVE-2024-42327" />
			<reference href="https://bdu.fstec.ru/vul/2024-10543" type="self" id="BDU:2024-10543" title="BDU:2024-10543" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix7-lts-server-pgsql" epoch="1" version="7.0.2" release="1.el7" arch="x86_64" src="">
					<filename>zabbix7-lts-server-pgsql-1:7.0.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241212-22</id>
		<issued date="2025-04-17" />
		<updated date="2025-04-17" />
		<title>Уязвимость zabbix7-lts-server-mysql </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в zabbix7-lts-server-mysql</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-lts-server-mysql-cve-2024-423277137/</description>
               <solution>
                    Запретить использование в ОС пакета zabbix7-lts-server-mysql
                или
                    Установить обновление для пакета(ов) zabbix7-lts-server-mysql
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-lts-server-mysql-cve-2024-423277137/" type="self" id="ROS-20241212-22" title="ROS-20241212-22" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42327" type="cve" id="CVE-2024-42327" title="CVE-2024-42327" />
			<reference href="https://bdu.fstec.ru/vul/2024-10543" type="self" id="BDU:2024-10543" title="BDU:2024-10543" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix7-lts-server-mysql" epoch="1" version="7.0.2" release="1.el7" arch="x86_64" src="">
					<filename>zabbix7-lts-server-mysql-1:7.0.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250417-01</id>
		<issued date="2025-04-17" />
		<updated date="2025-04-17" />
		<title>Уязвимость nextcloud-app-calendar </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nextcloud-app-calendar</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nextcloud-app-calendar-cve-2023-33183/</description>
               <solution>
                    Запретить использование в ОС пакета nextcloud-app-calendar
                или
                    Установить обновление для пакета(ов) nextcloud-app-calendar
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nextcloud-app-calendar-cve-2023-33183/" type="self" id="ROS-20250417-01" title="ROS-20250417-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33183" type="cve" id="CVE-2023-33183" title="CVE-2023-33183" />
			<reference href="https://bdu.fstec.ru/vul/2025-05130" type="self" id="BDU:2025-05130" title="BDU:2025-05130" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nextcloud-app-calendar" epoch="0" version="4.7.16" release="1.el7" arch="noarch" src="">
					<filename>nextcloud-app-calendar-0:4.7.16-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250417-02</id>
		<issued date="2025-04-17" />
		<updated date="2025-04-17" />
		<title>Множественные уязвимости pgadmin4 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в pgadmin4</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-pgadmin4-cve-2022-4223-cve-2024-4215-cve-2023-0241-cve-2024-4216/</description>
               <solution>
                    Запретить использование в ОС пакета Pgadmin4
                или
                    Установить обновление для пакета(ов) Pgadmin4
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-pgadmin4-cve-2022-4223-cve-2024-4215-cve-2023-0241-cve-2024-4216/" type="self" id="ROS-20250417-02" title="ROS-20250417-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4223" type="cve" id="CVE-2022-4223" title="CVE-2022-4223" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4215" type="cve" id="CVE-2024-4215" title="CVE-2024-4215" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0241" type="cve" id="CVE-2023-0241" title="CVE-2023-0241" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4216" type="cve" id="CVE-2024-4216" title="CVE-2024-4216" />
			<reference href="https://bdu.fstec.ru/vul/2025-04744" type="self" id="BDU:2025-04744" title="BDU:2025-04744" />
			<reference href="https://bdu.fstec.ru/vul/2024-11497" type="self" id="BDU:2024-11497" title="BDU:2024-11497" />
			<reference href="https://bdu.fstec.ru/vul/2023-01743" type="self" id="BDU:2023-01743" title="BDU:2023-01743" />
			<reference href="https://bdu.fstec.ru/vul/2024-05720" type="self" id="BDU:2024-05720" title="BDU:2024-05720" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pgadmin4" epoch="0" version="8.6" release="1.el7" arch="x86_64" src="">
					<filename>pgadmin4-0:8.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250417-03</id>
		<issued date="2025-04-17" />
		<updated date="2025-04-17" />
		<title>Множественные уязвимости jenkins</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в jenkins</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-jenkins-170425/</description>
               <solution>
                    Запретить использование в ОС пакета Jenkins
                или
                    Установить обновление для пакета(ов) Jenkins
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-jenkins-170425/" type="self" id="ROS-20250417-03" title="ROS-20250417-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27622" type="cve" id="CVE-2025-27622" title="CVE-2025-27622" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31720" type="cve" id="CVE-2025-31720" title="CVE-2025-31720" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31721" type="cve" id="CVE-2025-31721" title="CVE-2025-31721" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27623" type="cve" id="CVE-2025-27623" title="CVE-2025-27623" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27624" type="cve" id="CVE-2025-27624" title="CVE-2025-27624" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27625" type="cve" id="CVE-2025-27625" title="CVE-2025-27625" />
			<reference href="https://bdu.fstec.ru/vul/2025-04961" type="self" id="BDU:2025-04961" title="BDU:2025-04961" />
			<reference href="https://bdu.fstec.ru/vul/2025-03792" type="self" id="BDU:2025-03792" title="BDU:2025-03792" />
			<reference href="https://bdu.fstec.ru/vul/2025-03793" type="self" id="BDU:2025-03793" title="BDU:2025-03793" />
			<reference href="https://bdu.fstec.ru/vul/2025-04962" type="self" id="BDU:2025-04962" title="BDU:2025-04962" />
			<reference href="https://bdu.fstec.ru/vul/2025-04960" type="self" id="BDU:2025-04960" title="BDU:2025-04960" />
			<reference href="https://bdu.fstec.ru/vul/2025-04959" type="self" id="BDU:2025-04959" title="BDU:2025-04959" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jenkins" epoch="0" version="2.492.3" release="1.el7" arch="noarch" src="">
					<filename>jenkins-0:2.492.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250417-04</id>
		<issued date="2025-04-17" />
		<updated date="2025-04-17" />
		<title>Множественные уязвимости libxslt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libxslt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libxslt-cve-2024-55549-cve-2025-24855/</description>
               <solution>
                    Запретить использование в ОС пакета libxslt
                или
                    Установить обновление для пакета(ов) libxslt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libxslt-cve-2024-55549-cve-2025-24855/" type="self" id="ROS-20250417-04" title="ROS-20250417-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-55549" type="cve" id="CVE-2024-55549" title="CVE-2024-55549" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24855" type="cve" id="CVE-2025-24855" title="CVE-2025-24855" />
			<reference href="https://bdu.fstec.ru/vul/2025-03641" type="self" id="BDU:2025-03641" title="BDU:2025-03641" />
			<reference href="https://bdu.fstec.ru/vul/2025-03640" type="self" id="BDU:2025-03640" title="BDU:2025-03640" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libxslt" epoch="0" version="1.1.43" release="1.el7" arch="x86_64" src="">
					<filename>libxslt-0:1.1.43-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250417-05</id>
		<issued date="2025-04-17" />
		<updated date="2025-04-17" />
		<title>Множественные уязвимости golang-k8s-ingress-nginx</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в golang-k8s-ingress-nginx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-golang-k8s-ingress-nginx/</description>
               <solution>
                    Запретить использование в ОС пакета golang-k8s-ingress-nginx
                или
                    Установить обновление для пакета(ов) golang-k8s-ingress-nginx
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-golang-k8s-ingress-nginx/" type="self" id="ROS-20250417-05" title="ROS-20250417-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1097" type="cve" id="CVE-2025-1097" title="CVE-2025-1097" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1974" type="cve" id="CVE-2025-1974" title="CVE-2025-1974" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1098" type="cve" id="CVE-2025-1098" title="CVE-2025-1098" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24513" type="cve" id="CVE-2025-24513" title="CVE-2025-24513" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24514" type="cve" id="CVE-2025-24514" title="CVE-2025-24514" />
			<reference href="https://bdu.fstec.ru/vul/2025-05140" type="self" id="BDU:2025-05140" title="BDU:2025-05140" />
			<reference href="https://bdu.fstec.ru/vul/2025-03219" type="self" id="BDU:2025-03219" title="BDU:2025-03219" />
			<reference href="https://bdu.fstec.ru/vul/2025-05133" type="self" id="BDU:2025-05133" title="BDU:2025-05133" />
			<reference href="https://bdu.fstec.ru/vul/2025-05134" type="self" id="BDU:2025-05134" title="BDU:2025-05134" />
			<reference href="https://bdu.fstec.ru/vul/2025-03220" type="self" id="BDU:2025-03220" title="BDU:2025-03220" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang-k8s-ingress-nginx" epoch="0" version="1.12.1" release="1.el7" arch="x86_64" src="">
					<filename>golang-k8s-ingress-nginx-0:1.12.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250417-06</id>
		<issued date="2025-04-17" />
		<updated date="2025-04-17" />
		<title>Уязвимость moodle </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-moodle-cve-2024-38276/</description>
               <solution>
                    Запретить использование в ОС пакета moodle
                или
                    Установить обновление для пакета(ов) moodle
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-moodle-cve-2024-38276/" type="self" id="ROS-20250417-06" title="ROS-20250417-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38276" type="cve" id="CVE-2024-38276" title="CVE-2024-38276" />
			<reference href="https://bdu.fstec.ru/vul/2025-04743" type="self" id="BDU:2025-04743" title="BDU:2025-04743" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="moodle" epoch="0" version="4.3.10" release="1.el7" arch="noarch" src="">
					<filename>moodle-0:4.3.10-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250417-07</id>
		<issued date="2025-04-17" />
		<updated date="2025-04-17" />
		<title>Уязвимость exim </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в exim</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-exim-cve-2025-30232/</description>
               <solution>
                    Запретить использование в ОС пакета exim
                или
                    Установить обновление для пакета(ов) exim
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-exim-cve-2025-30232/" type="self" id="ROS-20250417-07" title="ROS-20250417-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30232" type="cve" id="CVE-2025-30232" title="CVE-2025-30232" />
			<reference href="https://bdu.fstec.ru/vul/2025-03534" type="self" id="BDU:2025-03534" title="BDU:2025-03534" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="exim" epoch="0" version="4.98.2" release="1.el7" arch="x86_64" src="">
					<filename>exim-0:4.98.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250417-08</id>
		<issued date="2025-04-17" />
		<updated date="2025-04-17" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2025-22871/</description>
               <solution>
                    Запретить использование в ОС пакета golang
                или
                    Установить обновление для пакета(ов) golang
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2025-22871/" type="self" id="ROS-20250417-08" title="ROS-20250417-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22871" type="cve" id="CVE-2025-22871" title="CVE-2025-22871" />
			<reference href="https://bdu.fstec.ru/vul/2025-04014" type="self" id="BDU:2025-04014" title="BDU:2025-04014" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.24.2" release="1.el7" arch="x86_64" src="">
					<filename>golang-0:1.24.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250417-09</id>
		<issued date="2025-04-17" />
		<updated date="2025-04-17" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2025-3028/</description>
               <solution>
                    Запретить использование в ОС пакета firefox
                или
                    Установить обновление для пакета(ов) firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2025-3028/" type="self" id="ROS-20250417-09" title="ROS-20250417-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3028" type="cve" id="CVE-2025-3028" title="CVE-2025-3028" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.22.0" release="1.el7" arch="x86_64" src="">
					<filename>firefox-0:115.22.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250417-10</id>
		<issued date="2025-04-17" />
		<updated date="2025-04-17" />
		<title>Уязвимость thunderbird </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-thunderbird-cve-2025-30285729/</description>
               <solution>
                    Запретить использование в ОС пакета thunderbird
                или
                    Установить обновление для пакета(ов) thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-thunderbird-cve-2025-30285729/" type="self" id="ROS-20250417-10" title="ROS-20250417-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3028" type="cve" id="CVE-2025-3028" title="CVE-2025-3028" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="128.9.0" release="3.el7" arch="x86_64" src="">
					<filename>thunderbird-0:128.9.0-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250417-11</id>
		<issued date="2025-04-17" />
		<updated date="2025-04-17" />
		<title>Уязвимость php-phpseclib </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в php-phpseclib</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-phpseclib-cve-2024-27355/</description>
               <solution>
                    Запретить использование в ОС пакета phpseclib
                или
                    Установить обновление для пакета(ов) phpseclib
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-phpseclib-cve-2024-27355/" type="self" id="ROS-20250417-11" title="ROS-20250417-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27355" type="cve" id="CVE-2024-27355" title="CVE-2024-27355" />
			<reference href="https://bdu.fstec.ru/vul/2025-05131" type="self" id="BDU:2025-05131" title="BDU:2025-05131" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php-phpseclib" epoch="0" version="2.0.47" release="1.el7" arch="noarch" src="">
					<filename>php-phpseclib-0:2.0.47-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250417-12</id>
		<issued date="2025-04-17" />
		<updated date="2025-04-17" />
		<title>Множественные уязвимости ruby </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ruby</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-ruby-cve-2025-27220-cve-2025-27219/</description>
               <solution>
                    Запретить использование в ОС пакета ruby
                или
                    Установить обновление для пакета(ов) ruby
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-ruby-cve-2025-27220-cve-2025-27219/" type="self" id="ROS-20250417-12" title="ROS-20250417-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27220" type="cve" id="CVE-2025-27220" title="CVE-2025-27220" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27219" type="cve" id="CVE-2025-27219" title="CVE-2025-27219" />
			<reference href="https://bdu.fstec.ru/vul/2025-05132" type="self" id="BDU:2025-05132" title="BDU:2025-05132" />
			<reference href="https://bdu.fstec.ru/vul/2025-05128" type="self" id="BDU:2025-05128" title="BDU:2025-05128" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ruby" epoch="0" version="2.7.6" release="134.el7" arch="x86_64" src="">
					<filename>ruby-0:2.7.6-134.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250417-13</id>
		<issued date="2025-04-17" />
		<updated date="2025-04-17" />
		<title>Уязвимость ruby </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в ruby</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ruby-cve-2025-27221/</description>
               <solution>
                    Запретить использование в ОС пакета ruby
                или
                    Установить обновление для пакета(ов) ruby
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ruby-cve-2025-27221/" type="self" id="ROS-20250417-13" title="ROS-20250417-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27221" type="cve" id="CVE-2025-27221" title="CVE-2025-27221" />
			<reference href="https://bdu.fstec.ru/vul/2025-05129" type="self" id="BDU:2025-05129" title="BDU:2025-05129" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ruby" epoch="0" version="2.7.6" release="134.el7" arch="x86_64" src="">
					<filename>ruby-0:2.7.6-134.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250418-01</id>
		<issued date="2025-04-18" />
		<updated date="2025-04-18" />
		<title>Множественные уязвимости qt6 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в qt6</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-qt64414/</description>
               <solution>
                    Запретить использование в ОС пакета qt6
                или
                    Установить обновление для пакета(ов) qt6
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-qt64414/" type="self" id="ROS-20250418-01" title="ROS-20250418-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25580" type="cve" id="CVE-2024-25580" title="CVE-2024-25580" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30161" type="cve" id="CVE-2024-30161" title="CVE-2024-30161" />
			<reference href="https://bdu.fstec.ru/vul/2024-02875" type="self" id="BDU:2024-02875" title="BDU:2024-02875" />
			<reference href="https://bdu.fstec.ru/vul/2025-01018" type="self" id="BDU:2025-01018" title="BDU:2025-01018" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="qt6-qtbase" epoch="0" version="6.6.3" release="2.el7" arch="x86_64" src="">
					<filename>qt6-qtbase-0:6.6.3-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250421-01</id>
		<issued date="2025-04-21" />
		<updated date="2025-04-21" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-210425/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-210425/" type="self" id="ROS-20250421-01" title="ROS-20250421-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56670" type="cve" id="CVE-2024-56670" title="CVE-2024-56670" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56672" type="cve" id="CVE-2024-56672" title="CVE-2024-56672" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56675" type="cve" id="CVE-2024-56675" title="CVE-2024-56675" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56715" type="cve" id="CVE-2024-56715" title="CVE-2024-56715" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56716" type="cve" id="CVE-2024-56716" title="CVE-2024-56716" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56717" type="cve" id="CVE-2024-56717" title="CVE-2024-56717" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56720" type="cve" id="CVE-2024-56720" title="CVE-2024-56720" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56723" type="cve" id="CVE-2024-56723" title="CVE-2024-56723" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56725" type="cve" id="CVE-2024-56725" title="CVE-2024-56725" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56726" type="cve" id="CVE-2024-56726" title="CVE-2024-56726" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56728" type="cve" id="CVE-2024-56728" title="CVE-2024-56728" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56739" type="cve" id="CVE-2024-56739" title="CVE-2024-56739" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56745" type="cve" id="CVE-2024-56745" title="CVE-2024-56745" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56746" type="cve" id="CVE-2024-56746" title="CVE-2024-56746" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56747" type="cve" id="CVE-2024-56747" title="CVE-2024-56747" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56748" type="cve" id="CVE-2024-56748" title="CVE-2024-56748" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56754" type="cve" id="CVE-2024-56754" title="CVE-2024-56754" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56755" type="cve" id="CVE-2024-56755" title="CVE-2024-56755" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56756" type="cve" id="CVE-2024-56756" title="CVE-2024-56756" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56759" type="cve" id="CVE-2024-56759" title="CVE-2024-56759" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56763" type="cve" id="CVE-2024-56763" title="CVE-2024-56763" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56765" type="cve" id="CVE-2024-56765" title="CVE-2024-56765" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56766" type="cve" id="CVE-2024-56766" title="CVE-2024-56766" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56767" type="cve" id="CVE-2024-56767" title="CVE-2024-56767" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56769" type="cve" id="CVE-2024-56769" title="CVE-2024-56769" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56770" type="cve" id="CVE-2024-56770" title="CVE-2024-56770" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56774" type="cve" id="CVE-2024-56774" title="CVE-2024-56774" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56776" type="cve" id="CVE-2024-56776" title="CVE-2024-56776" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56777" type="cve" id="CVE-2024-56777" title="CVE-2024-56777" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56778" type="cve" id="CVE-2024-56778" title="CVE-2024-56778" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56779" type="cve" id="CVE-2024-56779" title="CVE-2024-56779" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56780" type="cve" id="CVE-2024-56780" title="CVE-2024-56780" />
			<reference href="https://bdu.fstec.ru/vul/2025-05096" type="self" id="BDU:2025-05096" title="BDU:2025-05096" />
			<reference href="https://bdu.fstec.ru/vul/2025-00389" type="self" id="BDU:2025-00389" title="BDU:2025-00389" />
			<reference href="https://bdu.fstec.ru/vul/2025-00390" type="self" id="BDU:2025-00390" title="BDU:2025-00390" />
			<reference href="https://bdu.fstec.ru/vul/2025-05095" type="self" id="BDU:2025-05095" title="BDU:2025-05095" />
			<reference href="https://bdu.fstec.ru/vul/2025-05094" type="self" id="BDU:2025-05094" title="BDU:2025-05094" />
			<reference href="https://bdu.fstec.ru/vul/2025-04132" type="self" id="BDU:2025-04132" title="BDU:2025-04132" />
			<reference href="https://bdu.fstec.ru/vul/2025-05093" type="self" id="BDU:2025-05093" title="BDU:2025-05093" />
			<reference href="https://bdu.fstec.ru/vul/2025-05092" type="self" id="BDU:2025-05092" title="BDU:2025-05092" />
			<reference href="https://bdu.fstec.ru/vul/2025-04131" type="self" id="BDU:2025-04131" title="BDU:2025-04131" />
			<reference href="https://bdu.fstec.ru/vul/2025-05091" type="self" id="BDU:2025-05091" title="BDU:2025-05091" />
			<reference href="https://bdu.fstec.ru/vul/2025-05090" type="self" id="BDU:2025-05090" title="BDU:2025-05090" />
			<reference href="https://bdu.fstec.ru/vul/2025-05089" type="self" id="BDU:2025-05089" title="BDU:2025-05089" />
			<reference href="https://bdu.fstec.ru/vul/2025-05088" type="self" id="BDU:2025-05088" title="BDU:2025-05088" />
			<reference href="https://bdu.fstec.ru/vul/2025-02793" type="self" id="BDU:2025-02793" title="BDU:2025-02793" />
			<reference href="https://bdu.fstec.ru/vul/2025-05087" type="self" id="BDU:2025-05087" title="BDU:2025-05087" />
			<reference href="https://bdu.fstec.ru/vul/2025-05086" type="self" id="BDU:2025-05086" title="BDU:2025-05086" />
			<reference href="https://bdu.fstec.ru/vul/2025-05085" type="self" id="BDU:2025-05085" title="BDU:2025-05085" />
			<reference href="https://bdu.fstec.ru/vul/2025-04130" type="self" id="BDU:2025-04130" title="BDU:2025-04130" />
			<reference href="https://bdu.fstec.ru/vul/2025-05084" type="self" id="BDU:2025-05084" title="BDU:2025-05084" />
			<reference href="https://bdu.fstec.ru/vul/2025-02811" type="self" id="BDU:2025-02811" title="BDU:2025-02811" />
			<reference href="https://bdu.fstec.ru/vul/2025-05083" type="self" id="BDU:2025-05083" title="BDU:2025-05083" />
			<reference href="https://bdu.fstec.ru/vul/2025-02815" type="self" id="BDU:2025-02815" title="BDU:2025-02815" />
			<reference href="https://bdu.fstec.ru/vul/2025-02837" type="self" id="BDU:2025-02837" title="BDU:2025-02837" />
			<reference href="https://bdu.fstec.ru/vul/2025-05082" type="self" id="BDU:2025-05082" title="BDU:2025-05082" />
			<reference href="https://bdu.fstec.ru/vul/2025-05081" type="self" id="BDU:2025-05081" title="BDU:2025-05081" />
			<reference href="https://bdu.fstec.ru/vul/2025-05080" type="self" id="BDU:2025-05080" title="BDU:2025-05080" />
			<reference href="https://bdu.fstec.ru/vul/2025-05079" type="self" id="BDU:2025-05079" title="BDU:2025-05079" />
			<reference href="https://bdu.fstec.ru/vul/2025-05077" type="self" id="BDU:2025-05077" title="BDU:2025-05077" />
			<reference href="https://bdu.fstec.ru/vul/2025-05076" type="self" id="BDU:2025-05076" title="BDU:2025-05076" />
			<reference href="https://bdu.fstec.ru/vul/2025-05075" type="self" id="BDU:2025-05075" title="BDU:2025-05075" />
			<reference href="https://bdu.fstec.ru/vul/2025-05074" type="self" id="BDU:2025-05074" title="BDU:2025-05074" />
			<reference href="https://bdu.fstec.ru/vul/2025-05078" type="self" id="BDU:2025-05078" title="BDU:2025-05078" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250422-01</id>
		<issued date="2025-04-22" />
		<updated date="2025-04-22" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-31083/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-31083/" type="self" id="ROS-20250422-01" title="ROS-20250422-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31083" type="cve" id="CVE-2023-31083" title="CVE-2023-31083" />
			<reference href="https://bdu.fstec.ru/vul/2023-02519" type="self" id="BDU:2023-02519" title="BDU:2023-02519" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250424-01</id>
		<issued date="2025-04-24" />
		<updated date="2025-04-24" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-2404251/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-2404251/" type="self" id="ROS-20250424-01" title="ROS-20250424-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0646" type="cve" id="CVE-2024-0646" title="CVE-2024-0646" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0639" type="cve" id="CVE-2024-0639" title="CVE-2024-0639" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0641" type="cve" id="CVE-2024-0641" title="CVE-2024-0641" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0193" type="cve" id="CVE-2024-0193" title="CVE-2024-0193" />
			<reference href="https://bdu.fstec.ru/vul/2024-00674" type="self" id="BDU:2024-00674" title="BDU:2024-00674" />
			<reference href="https://bdu.fstec.ru/vul/2024-00673" type="self" id="BDU:2024-00673" title="BDU:2024-00673" />
			<reference href="https://bdu.fstec.ru/vul/2024-00636" type="self" id="BDU:2024-00636" title="BDU:2024-00636" />
			<reference href="https://bdu.fstec.ru/vul/2024-00096" type="self" id="BDU:2024-00096" title="BDU:2024-00096" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250424-02</id>
		<issued date="2025-04-24" />
		<updated date="2025-04-24" />
		<title>Уязвимость prometheus-jmx-exporter </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в prometheus-jmx-exporter</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-prometheus-jmx-exporter-cve-2022-1471/</description>
               <solution>
                    Запретить использование в ОС пакета prometheus-jmx-exporter
                или
                    Установить обновление для пакета(ов) prometheus-jmx-exporter
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-prometheus-jmx-exporter-cve-2022-1471/" type="self" id="ROS-20250424-02" title="ROS-20250424-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1471" type="cve" id="CVE-2022-1471" title="CVE-2022-1471" />
			<reference href="https://bdu.fstec.ru/vul/2023-00013" type="self" id="BDU:2023-00013" title="BDU:2023-00013" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="prometheus-jmx-exporter" epoch="0" version="0.12.0" release="3.el7" arch="noarch" src="">
					<filename>prometheus-jmx-exporter-0:0.12.0-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250424-03</id>
		<issued date="2025-04-24" />
		<updated date="2025-04-24" />
		<title>Множественные уязвимости libarchive </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libarchive</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libarchive-cve-2024-48958-cve-2024-48957/</description>
               <solution>
                    Запретить использование в ОС пакета libarchive
                или
                    Установить обновление для пакета(ов) libarchive
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libarchive-cve-2024-48958-cve-2024-48957/" type="self" id="ROS-20250424-03" title="ROS-20250424-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48958" type="cve" id="CVE-2024-48958" title="CVE-2024-48958" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48957" type="cve" id="CVE-2024-48957" title="CVE-2024-48957" />
			<reference href="https://bdu.fstec.ru/vul/2024-09441" type="self" id="BDU:2024-09441" title="BDU:2024-09441" />
			<reference href="https://bdu.fstec.ru/vul/2024-09446" type="self" id="BDU:2024-09446" title="BDU:2024-09446" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libarchive" epoch="0" version="3.7.9" release="1.el7" arch="x86_64" src="">
					<filename>libarchive-0:3.7.9-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250424-04</id>
		<issued date="2025-04-24" />
		<updated date="2025-04-24" />
		<title>Множественные уязвимости gpac</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gpac</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gpac/</description>
               <solution>
                    Запретить использование в ОС пакета gpac
                или
                    Установить обновление для пакета(ов) gpac
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gpac/" type="self" id="ROS-20250424-04" title="ROS-20250424-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4679" type="cve" id="CVE-2023-4679" title="CVE-2023-4679" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3012" type="cve" id="CVE-2023-3012" title="CVE-2023-3012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3013" type="cve" id="CVE-2023-3013" title="CVE-2023-3013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57184" type="cve" id="CVE-2024-57184" title="CVE-2024-57184" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1654" type="cve" id="CVE-2023-1654" title="CVE-2023-1654" />
			<reference href="https://bdu.fstec.ru/vul/2025-05205" type="self" id="BDU:2025-05205" title="BDU:2025-05205" />
			<reference href="https://bdu.fstec.ru/vul/2025-05201" type="self" id="BDU:2025-05201" title="BDU:2025-05201" />
			<reference href="https://bdu.fstec.ru/vul/2025-05200" type="self" id="BDU:2025-05200" title="BDU:2025-05200" />
			<reference href="https://bdu.fstec.ru/vul/2025-05202" type="self" id="BDU:2025-05202" title="BDU:2025-05202" />
			<reference href="https://bdu.fstec.ru/vul/2025-05208" type="self" id="BDU:2025-05208" title="BDU:2025-05208" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gpac" epoch="0" version="2.4.0" release="1.el7" arch="x86_64" src="">
					<filename>gpac-0:2.4.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250424-05</id>
		<issued date="2025-04-24" />
		<updated date="2025-04-24" />
		<title>Множественные уязвимости curl </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-curl-cve-2025-0167-cve-2024-11053/</description>
               <solution>
                    Запретить использование в ОС пакета curl
                или
                    Установить обновление для пакета(ов) curl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-curl-cve-2025-0167-cve-2024-11053/" type="self" id="ROS-20250424-05" title="ROS-20250424-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0167" type="cve" id="CVE-2025-0167" title="CVE-2025-0167" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11053" type="cve" id="CVE-2024-11053" title="CVE-2024-11053" />
			<reference href="https://bdu.fstec.ru/vul/2025-05209" type="self" id="BDU:2025-05209" title="BDU:2025-05209" />
			<reference href="https://bdu.fstec.ru/vul/2024-11106" type="self" id="BDU:2024-11106" title="BDU:2024-11106" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="curl" epoch="0" version="7.86.0" release="4.el7" arch="x86_64" src="">
					<filename>curl-0:7.86.0-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250424-06</id>
		<issued date="2025-04-24" />
		<updated date="2025-04-24" />
		<title>Множественные уязвимости libarchive </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в libarchive</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libarchive-cve-2024-57970-cve-2025-1632-cve-2025-25724/</description>
               <solution>
                    Запретить использование в ОС пакета libarchive
                или
                    Установить обновление для пакета(ов) libarchive
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libarchive-cve-2024-57970-cve-2025-1632-cve-2025-25724/" type="self" id="ROS-20250424-06" title="ROS-20250424-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57970" type="cve" id="CVE-2024-57970" title="CVE-2024-57970" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1632" type="cve" id="CVE-2025-1632" title="CVE-2025-1632" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-25724" type="cve" id="CVE-2025-25724" title="CVE-2025-25724" />
			<reference href="https://bdu.fstec.ru/vul/2025-05207" type="self" id="BDU:2025-05207" title="BDU:2025-05207" />
			<reference href="https://bdu.fstec.ru/vul/2025-05203" type="self" id="BDU:2025-05203" title="BDU:2025-05203" />
			<reference href="https://bdu.fstec.ru/vul/2025-05210" type="self" id="BDU:2025-05210" title="BDU:2025-05210" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libarchive" epoch="0" version="3.7.9" release="1.el7" arch="x86_64" src="">
					<filename>libarchive-0:3.7.9-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250424-07</id>
		<issued date="2025-04-24" />
		<updated date="2025-04-24" />
		<title>Множественные уязвимости libxml2 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libxml2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libxml2-cve-2025-24928-cve-2025-27113/</description>
               <solution>
                    Запретить использование в ОС пакета libxml2
                или
                    Установить обновление для пакета(ов) libxml2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libxml2-cve-2025-24928-cve-2025-27113/" type="self" id="ROS-20250424-07" title="ROS-20250424-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24928" type="cve" id="CVE-2025-24928" title="CVE-2025-24928" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27113" type="cve" id="CVE-2025-27113" title="CVE-2025-27113" />
			<reference href="https://bdu.fstec.ru/vul/2025-05193" type="self" id="BDU:2025-05193" title="BDU:2025-05193" />
			<reference href="https://bdu.fstec.ru/vul/2025-03138" type="self" id="BDU:2025-03138" title="BDU:2025-03138" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libxml2" epoch="0" version="2.9.8" release="18.el7.3" arch="x86_64" src="">
					<filename>libxml2-0:2.9.8-18.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250424-08</id>
		<issued date="2025-04-24" />
		<updated date="2025-04-24" />
		<title>Уязвимость containerd </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в containerd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-containerd-cve-2024-40635/</description>
               <solution>
                    Запретить использование в ОС пакета containerd
                или
                    Установить обновление для пакета(ов) containerd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-containerd-cve-2024-40635/" type="self" id="ROS-20250424-08" title="ROS-20250424-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40635" type="cve" id="CVE-2024-40635" title="CVE-2024-40635" />
			<reference href="https://bdu.fstec.ru/vul/2025-05194" type="self" id="BDU:2025-05194" title="BDU:2025-05194" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="containerd" epoch="0" version="1.7.17" release="5.el7" arch="x86_64" src="">
					<filename>containerd-0:1.7.17-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250424-09</id>
		<issued date="2025-04-24" />
		<updated date="2025-04-24" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-2476/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-2476/" type="self" id="ROS-20250424-09" title="ROS-20250424-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2476" type="cve" id="CVE-2025-2476" title="CVE-2025-2476" />
			<reference href="https://bdu.fstec.ru/vul/2025-03995" type="self" id="BDU:2025-03995" title="BDU:2025-03995" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="134.0.6998.117" release="1.el7" arch="x86_64" src="">
					<filename>chromium-0:134.0.6998.117-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250424-10</id>
		<issued date="2025-04-24" />
		<updated date="2025-04-24" />
		<title>Множественные уязвимости libtar </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в libtar</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libtar-cve-2021-33643-cve-2021-33644-cve-2021-33645-cve-2021-33646/</description>
               <solution>
                    Запретить использование в ОС пакета libtar
                или
                    Установить обновление для пакета(ов) libtar
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libtar-cve-2021-33643-cve-2021-33644-cve-2021-33645-cve-2021-33646/" type="self" id="ROS-20250424-10" title="ROS-20250424-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33643" type="cve" id="CVE-2021-33643" title="CVE-2021-33643" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33644" type="cve" id="CVE-2021-33644" title="CVE-2021-33644" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33645" type="cve" id="CVE-2021-33645" title="CVE-2021-33645" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33646" type="cve" id="CVE-2021-33646" title="CVE-2021-33646" />
			<reference href="https://bdu.fstec.ru/vul/2025-05004" type="self" id="BDU:2025-05004" title="BDU:2025-05004" />
			<reference href="https://bdu.fstec.ru/vul/2025-05003" type="self" id="BDU:2025-05003" title="BDU:2025-05003" />
			<reference href="https://bdu.fstec.ru/vul/2025-05002" type="self" id="BDU:2025-05002" title="BDU:2025-05002" />
			<reference href="https://bdu.fstec.ru/vul/2025-05001" type="self" id="BDU:2025-05001" title="BDU:2025-05001" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libtar" epoch="0" version="1.2.20" release="29.el7" arch="x86_64" src="">
					<filename>libtar-0:1.2.20-29.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250424-11</id>
		<issued date="2025-04-24" />
		<updated date="2025-04-24" />
		<title>Уязвимость lapack </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в lapack</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-lapack-cve-2021-4048/</description>
               <solution>
                    Запретить использование в ОС пакета lapack
                или
                    Установить обновление для пакета(ов) lapack
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-lapack-cve-2021-4048/" type="self" id="ROS-20250424-11" title="ROS-20250424-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4048" type="cve" id="CVE-2021-4048" title="CVE-2021-4048" />
			<reference href="https://bdu.fstec.ru/vul/2025-03980" type="self" id="BDU:2025-03980" title="BDU:2025-03980" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="lapack" epoch="0" version="3.12.0" release="1.el7" arch="x86_64" src="">
					<filename>lapack-0:3.12.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250424-12</id>
		<issued date="2025-04-24" />
		<updated date="2025-04-24" />
		<title>Уязвимость pgadmin4 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в pgadmin4</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pgadmin4-cve-2025-2945/</description>
               <solution>
                    Запретить использование в ОС пакета pgadmin4
                или
                    Установить обновление для пакета(ов) pgadmin4
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pgadmin4-cve-2025-2945/" type="self" id="ROS-20250424-12" title="ROS-20250424-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2945" type="cve" id="CVE-2025-2945" title="CVE-2025-2945" />
			<reference href="https://bdu.fstec.ru/vul/2025-03867" type="self" id="BDU:2025-03867" title="BDU:2025-03867" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pgadmin4" epoch="0" version="8.6" release="2.el7" arch="x86_64" src="">
					<filename>pgadmin4-0:8.6-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250424-13</id>
		<issued date="2025-04-24" />
		<updated date="2025-04-24" />
		<title>Уязвимость libxml2 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libxml2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libxml2-cve-2025-32414/</description>
               <solution>
                    Запретить использование в ОС пакета libxml2
                или
                    Установить обновление для пакета(ов) libxml2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libxml2-cve-2025-32414/" type="self" id="ROS-20250424-13" title="ROS-20250424-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32414" type="cve" id="CVE-2025-32414" title="CVE-2025-32414" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libxml2" epoch="0" version="2.9.8" release="17.el7.3" arch="x86_64" src="">
					<filename>libxml2-0:2.9.8-17.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250424-14</id>
		<issued date="2025-04-24" />
		<updated date="2025-04-24" />
		<title>Уязвимость tomcat </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в tomcat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2021-30640/</description>
               <solution>
                    Запретить использование в ОС пакета tomcat
                или
                    Установить обновление для пакета(ов) tomcat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2021-30640/" type="self" id="ROS-20250424-14" title="ROS-20250424-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30640" type="cve" id="CVE-2021-30640" title="CVE-2021-30640" />
			<reference href="https://bdu.fstec.ru/vul/2021-03686" type="self" id="BDU:2021-03686" title="BDU:2021-03686" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat" epoch="1" version="9.0.52" release="1.el7" arch="noarch" src="">
					<filename>tomcat-1:9.0.52-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250430-01</id>
		<issued date="2025-04-30" />
		<updated date="2025-04-30" />
		<title>Множественные уязвимости busybox</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в busybox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-busybox-300425/</description>
               <solution>
                    Запретить использование в ОС пакета busybox
                или
                    Установить обновление для пакета(ов) busybox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-busybox-300425/" type="self" id="ROS-20250430-01" title="ROS-20250430-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42375" type="cve" id="CVE-2021-42375" title="CVE-2021-42375" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42383" type="cve" id="CVE-2021-42383" title="CVE-2021-42383" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42373" type="cve" id="CVE-2021-42373" title="CVE-2021-42373" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42376" type="cve" id="CVE-2021-42376" title="CVE-2021-42376" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42377" type="cve" id="CVE-2021-42377" title="CVE-2021-42377" />
			<reference href="https://bdu.fstec.ru/vul/2025-05995" type="self" id="BDU:2025-05995" title="BDU:2025-05995" />
			<reference href="https://bdu.fstec.ru/vul/2025-05991" type="self" id="BDU:2025-05991" title="BDU:2025-05991" />
			<reference href="https://bdu.fstec.ru/vul/2025-05992" type="self" id="BDU:2025-05992" title="BDU:2025-05992" />
			<reference href="https://bdu.fstec.ru/vul/2025-06000" type="self" id="BDU:2025-06000" title="BDU:2025-06000" />
			<reference href="https://bdu.fstec.ru/vul/2025-05993" type="self" id="BDU:2025-05993" title="BDU:2025-05993" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="busybox" epoch="1" version="1.34.1" release="1.el7.3" arch="x86_64" src="">
					<filename>busybox-1:1.34.1-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250430-02</id>
		<issued date="2025-04-30" />
		<updated date="2025-04-30" />
		<title>Множественные уязвимости ffmpeg</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в ffmpeg</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-ffmpeg-300425/</description>
               <solution>
                    Запретить использование в ОС пакета Ffmpeg
                или
                    Установить обновление для пакета(ов) Ffmpeg
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-ffmpeg-300425/" type="self" id="ROS-20250430-02" title="ROS-20250430-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0518" type="cve" id="CVE-2025-0518" title="CVE-2025-0518" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36613" type="cve" id="CVE-2024-36613" title="CVE-2024-36613" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36616" type="cve" id="CVE-2024-36616" title="CVE-2024-36616" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36618" type="cve" id="CVE-2024-36618" title="CVE-2024-36618" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36617" type="cve" id="CVE-2024-36617" title="CVE-2024-36617" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35369" type="cve" id="CVE-2024-35369" title="CVE-2024-35369" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31585" type="cve" id="CVE-2024-31585" title="CVE-2024-31585" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35365" type="cve" id="CVE-2024-35365" title="CVE-2024-35365" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35368" type="cve" id="CVE-2024-35368" title="CVE-2024-35368" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35367" type="cve" id="CVE-2024-35367" title="CVE-2024-35367" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35366" type="cve" id="CVE-2024-35366" title="CVE-2024-35366" />
			<reference href="https://bdu.fstec.ru/vul/2025-06052" type="self" id="BDU:2025-06052" title="BDU:2025-06052" />
			<reference href="https://bdu.fstec.ru/vul/2025-00946" type="self" id="BDU:2025-00946" title="BDU:2025-00946" />
			<reference href="https://bdu.fstec.ru/vul/2025-00951" type="self" id="BDU:2025-00951" title="BDU:2025-00951" />
			<reference href="https://bdu.fstec.ru/vul/2025-06054" type="self" id="BDU:2025-06054" title="BDU:2025-06054" />
			<reference href="https://bdu.fstec.ru/vul/2025-00950" type="self" id="BDU:2025-00950" title="BDU:2025-00950" />
			<reference href="https://bdu.fstec.ru/vul/2025-06055" type="self" id="BDU:2025-06055" title="BDU:2025-06055" />
			<reference href="https://bdu.fstec.ru/vul/2024-09447" type="self" id="BDU:2024-09447" title="BDU:2024-09447" />
			<reference href="https://bdu.fstec.ru/vul/2025-02247" type="self" id="BDU:2025-02247" title="BDU:2025-02247" />
			<reference href="https://bdu.fstec.ru/vul/2025-00006" type="self" id="BDU:2025-00006" title="BDU:2025-00006" />
			<reference href="https://bdu.fstec.ru/vul/2025-06064" type="self" id="BDU:2025-06064" title="BDU:2025-06064" />
			<reference href="https://bdu.fstec.ru/vul/2025-00954" type="self" id="BDU:2025-00954" title="BDU:2025-00954" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ffmpeg" epoch="0" version="4.4.3" release="5.el7" arch="x86_64" src="">
					<filename>ffmpeg-0:4.4.3-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250430-03</id>
		<issued date="2025-04-30" />
		<updated date="2025-04-30" />
		<title>Множественные уязвимости gpac </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gpac</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gpac-cve-2024-6062-cve-2024-50664-cve-2024-50665/</description>
               <solution>
                    Запретить использование в ОС пакета gpac
                или
                    Установить обновление для пакета(ов) gpac
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gpac-cve-2024-6062-cve-2024-50664-cve-2024-50665/" type="self" id="ROS-20250430-03" title="ROS-20250430-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6062" type="cve" id="CVE-2024-6062" title="CVE-2024-6062" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50664" type="cve" id="CVE-2024-50664" title="CVE-2024-50664" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50665" type="cve" id="CVE-2024-50665" title="CVE-2024-50665" />
			<reference href="https://bdu.fstec.ru/vul/2025-07586" type="self" id="BDU:2025-07586" title="BDU:2025-07586" />
			<reference href="https://bdu.fstec.ru/vul/2025-07587" type="self" id="BDU:2025-07587" title="BDU:2025-07587" />
			<reference href="https://bdu.fstec.ru/vul/2025-07588" type="self" id="BDU:2025-07588" title="BDU:2025-07588" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gpac" epoch="0" version="2.4.0" release="3.el7" arch="x86_64" src="">
					<filename>gpac-0:2.4.0-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250430-04</id>
		<issued date="2025-04-30" />
		<updated date="2025-10-15" />
		<title>Множественные уязвимости libsoup</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libsoup</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libsoup/</description>
               <solution>
                    Запретить использование в ОС пакета libsoup
                или
                    Установить обновление для пакета(ов) libsoup
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libsoup/" type="self" id="ROS-20250430-04" title="ROS-20250430-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52530" type="cve" id="CVE-2024-52530" title="CVE-2024-52530" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52531" type="cve" id="CVE-2024-52531" title="CVE-2024-52531" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52532" type="cve" id="CVE-2024-52532" title="CVE-2024-52532" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32911" type="cve" id="CVE-2025-32911" title="CVE-2025-32911" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32913" type="cve" id="CVE-2025-32913" title="CVE-2025-32913" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32906" type="cve" id="CVE-2025-32906" title="CVE-2025-32906" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32912" type="cve" id="CVE-2025-32912" title="CVE-2025-32912" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32914" type="cve" id="CVE-2025-32914" title="CVE-2025-32914" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32909" type="cve" id="CVE-2025-32909" title="CVE-2025-32909" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32910" type="cve" id="CVE-2025-32910" title="CVE-2025-32910" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32053" type="cve" id="CVE-2025-32053" title="CVE-2025-32053" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32052" type="cve" id="CVE-2025-32052" title="CVE-2025-32052" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32050" type="cve" id="CVE-2025-32050" title="CVE-2025-32050" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2784" type="cve" id="CVE-2025-2784" title="CVE-2025-2784" />
			<reference href="https://bdu.fstec.ru/vul/2025-00232" type="self" id="BDU:2025-00232" title="BDU:2025-00232" />
			<reference href="https://bdu.fstec.ru/vul/2025-04723" type="self" id="BDU:2025-04723" title="BDU:2025-04723" />
			<reference href="https://bdu.fstec.ru/vul/2025-06242" type="self" id="BDU:2025-06242" title="BDU:2025-06242" />
			<reference href="https://bdu.fstec.ru/vul/2025-04551" type="self" id="BDU:2025-04551" title="BDU:2025-04551" />
			<reference href="https://bdu.fstec.ru/vul/2025-04853" type="self" id="BDU:2025-04853" title="BDU:2025-04853" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libsoup" epoch="0" version="2.74.3" release="2.el7" arch="x86_64" src="">
					<filename>libsoup-0:2.74.3-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250430-05</id>
		<issued date="2025-04-30" />
		<updated date="2025-04-30" />
		<title>Множественные уязвимости erlang </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в erlang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-erlang-cve-2025-30211-cve-2025-32433-cve-2025-26618/</description>
               <solution>
                    Запретить использование в ОС пакета erlang
                или
                    Установить обновление для пакета(ов) erlang
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-erlang-cve-2025-30211-cve-2025-32433-cve-2025-26618/" type="self" id="ROS-20250430-05" title="ROS-20250430-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30211" type="cve" id="CVE-2025-30211" title="CVE-2025-30211" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32433" type="cve" id="CVE-2025-32433" title="CVE-2025-32433" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26618" type="cve" id="CVE-2025-26618" title="CVE-2025-26618" />
			<reference href="https://bdu.fstec.ru/vul/2025-05984" type="self" id="BDU:2025-05984" title="BDU:2025-05984" />
			<reference href="https://bdu.fstec.ru/vul/2025-04706" type="self" id="BDU:2025-04706" title="BDU:2025-04706" />
			<reference href="https://bdu.fstec.ru/vul/2025-05988" type="self" id="BDU:2025-05988" title="BDU:2025-05988" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="erlang" epoch="0" version="26.2.5.11" release="1.el7" arch="x86_64" src="">
					<filename>erlang-0:26.2.5.11-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250430-06</id>
		<issued date="2025-04-30" />
		<updated date="2025-04-30" />
		<title>Множественные уязвимости vim-common </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в vim-common</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim-common-cve-2025-29768-cve-2025-27423/</description>
               <solution>
                    Запретить использование в ОС пакета vim-common
                или
                    Установить обновление для пакета(ов) vim-common
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim-common-cve-2025-29768-cve-2025-27423/" type="self" id="ROS-20250430-06" title="ROS-20250430-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29768" type="cve" id="CVE-2025-29768" title="CVE-2025-29768" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27423" type="cve" id="CVE-2025-27423" title="CVE-2025-27423" />
			<reference href="https://bdu.fstec.ru/vul/2025-06563" type="self" id="BDU:2025-06563" title="BDU:2025-06563" />
			<reference href="https://bdu.fstec.ru/vul/2025-06069" type="self" id="BDU:2025-06069" title="BDU:2025-06069" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-common" epoch="2" version="9.1.1291" release="2.el7" arch="x86_64" src="">
					<filename>vim-common-2:9.1.1291-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250430-07</id>
		<issued date="2025-04-30" />
		<updated date="2025-04-30" />
		<title>Уязвимость python3-jinja2 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-jinja2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-jinja2-cve-2025-27516/</description>
               <solution>
                    Запретить использование в ОС пакета python3-jinja2
                или
                    Установить обновление для пакета(ов) python3-jinja2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-jinja2-cve-2025-27516/" type="self" id="ROS-20250430-07" title="ROS-20250430-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27516" type="cve" id="CVE-2025-27516" title="CVE-2025-27516" />
			<reference href="https://bdu.fstec.ru/vul/2025-06562" type="self" id="BDU:2025-06562" title="BDU:2025-06562" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-jinja2" epoch="0" version="3.1.5" release="2.el7" arch="noarch" src="">
					<filename>python3-jinja2-0:3.1.5-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250430-08</id>
		<issued date="2025-04-30" />
		<updated date="2025-04-30" />
		<title>Уязвимость nomad </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nomad</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nomad-cve-2025-1296/</description>
               <solution>
                    Запретить использование в ОС пакета Nomad
                или
                    Установить обновление для пакета(ов) Nomad
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nomad-cve-2025-1296/" type="self" id="ROS-20250430-08" title="ROS-20250430-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1296" type="cve" id="CVE-2025-1296" title="CVE-2025-1296" />
			<reference href="https://bdu.fstec.ru/vul/2025-06561" type="self" id="BDU:2025-06561" title="BDU:2025-06561" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nomad" epoch="0" version="1.9.7" release="1.el7" arch="x86_64" src="">
					<filename>nomad-0:1.9.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250430-09</id>
		<issued date="2025-04-30" />
		<updated date="2025-04-30" />
		<title>Множественные уязвимости zvbi</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в zvbi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zvbi/</description>
               <solution>
                    Запретить использование в ОС пакета zvbi
                или
                    Установить обновление для пакета(ов) zvbi
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zvbi/" type="self" id="ROS-20250430-09" title="ROS-20250430-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2173" type="cve" id="CVE-2025-2173" title="CVE-2025-2173" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2174" type="cve" id="CVE-2025-2174" title="CVE-2025-2174" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2175" type="cve" id="CVE-2025-2175" title="CVE-2025-2175" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2176" type="cve" id="CVE-2025-2176" title="CVE-2025-2176" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2177" type="cve" id="CVE-2025-2177" title="CVE-2025-2177" />
			<reference href="https://bdu.fstec.ru/vul/2025-06066" type="self" id="BDU:2025-06066" title="BDU:2025-06066" />
			<reference href="https://bdu.fstec.ru/vul/2025-05982" type="self" id="BDU:2025-05982" title="BDU:2025-05982" />
			<reference href="https://bdu.fstec.ru/vul/2025-05983" type="self" id="BDU:2025-05983" title="BDU:2025-05983" />
			<reference href="https://bdu.fstec.ru/vul/2025-05986" type="self" id="BDU:2025-05986" title="BDU:2025-05986" />
			<reference href="https://bdu.fstec.ru/vul/2025-06068" type="self" id="BDU:2025-06068" title="BDU:2025-06068" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zvbi" epoch="0" version="0.2.44" release="1.el7" arch="x86_64" src="">
					<filename>zvbi-0:0.2.44-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250430-10</id>
		<issued date="2025-04-30" />
		<updated date="2025-04-30" />
		<title>Множественные уязвимости php 8.1 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в php</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-8-1-300425/</description>
               <solution>
                    Запретить использование в ОС пакета PHP
                или
                    Установка и обновление пакетов PHP до версии 8.Х на РЕД ОС производится по инструкции:
                        https://redos.red-soft.ru/base/arm/arm-other/php-8-redos-73/
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-8-1-300425/" type="self" id="ROS-20250430-10" title="ROS-20250430-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11235" type="cve" id="CVE-2024-11235" title="CVE-2024-11235" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1219" type="cve" id="CVE-2025-1219" title="CVE-2025-1219" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1736" type="cve" id="CVE-2025-1736" title="CVE-2025-1736" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1861" type="cve" id="CVE-2025-1861" title="CVE-2025-1861" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1734" type="cve" id="CVE-2025-1734" title="CVE-2025-1734" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1217" type="cve" id="CVE-2025-1217" title="CVE-2025-1217" />
			<reference href="https://bdu.fstec.ru/vul/2025-02829" type="self" id="BDU:2025-02829" title="BDU:2025-02829" />
			<reference href="https://bdu.fstec.ru/vul/2025-02834" type="self" id="BDU:2025-02834" title="BDU:2025-02834" />
			<reference href="https://bdu.fstec.ru/vul/2025-02835" type="self" id="BDU:2025-02835" title="BDU:2025-02835" />
			<reference href="https://bdu.fstec.ru/vul/2025-02827" type="self" id="BDU:2025-02827" title="BDU:2025-02827" />
			<reference href="https://bdu.fstec.ru/vul/2025-02828" type="self" id="BDU:2025-02828" title="BDU:2025-02828" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php" epoch="0" version="8.1.32" release="1.el7" arch="x86_64" src="">
					<filename>php-0:8.1.32-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250430-11</id>
		<issued date="2025-04-30" />
		<updated date="2025-04-30" />
		<title>Множественные уязвимости php 8.2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в php</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-8-2-3004255561/</description>
               <solution>
                    Запретить использование в ОС пакета PHP
                или
                    Установка и обновление пакетов PHP до версии 8.Х на РЕД ОС производится по инструкции:
                        https://redos.red-soft.ru/base/arm/arm-other/php-8-redos-73/
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-8-2-3004255561/" type="self" id="ROS-20250430-11" title="ROS-20250430-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11235" type="cve" id="CVE-2024-11235" title="CVE-2024-11235" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1219" type="cve" id="CVE-2025-1219" title="CVE-2025-1219" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1736" type="cve" id="CVE-2025-1736" title="CVE-2025-1736" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1861" type="cve" id="CVE-2025-1861" title="CVE-2025-1861" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1734" type="cve" id="CVE-2025-1734" title="CVE-2025-1734" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1217" type="cve" id="CVE-2025-1217" title="CVE-2025-1217" />
			<reference href="https://bdu.fstec.ru/vul/2025-02829" type="self" id="BDU:2025-02829" title="BDU:2025-02829" />
			<reference href="https://bdu.fstec.ru/vul/2025-02834" type="self" id="BDU:2025-02834" title="BDU:2025-02834" />
			<reference href="https://bdu.fstec.ru/vul/2025-02835" type="self" id="BDU:2025-02835" title="BDU:2025-02835" />
			<reference href="https://bdu.fstec.ru/vul/2025-02827" type="self" id="BDU:2025-02827" title="BDU:2025-02827" />
			<reference href="https://bdu.fstec.ru/vul/2025-02828" type="self" id="BDU:2025-02828" title="BDU:2025-02828" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php" epoch="0" version="8.2.28" release="1.el7" arch="x86_64" src="">
					<filename>php-0:8.2.28-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250430-12</id>
		<issued date="2025-04-30" />
		<updated date="2025-04-30" />
		<title>Множественные уязвимости php 8.3</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в php</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-8-3-3004256409/</description>
               <solution>
                    Запретить использование в ОС пакета PHP
                или
                    Установка и обновление пакетов PHP до версии 8.Х на РЕД ОС производится по инструкции:
                        https://redos.red-soft.ru/base/arm/arm-other/php-8-redos-73/
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-8-3-3004256409/" type="self" id="ROS-20250430-12" title="ROS-20250430-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11235" type="cve" id="CVE-2024-11235" title="CVE-2024-11235" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1219" type="cve" id="CVE-2025-1219" title="CVE-2025-1219" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1736" type="cve" id="CVE-2025-1736" title="CVE-2025-1736" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1861" type="cve" id="CVE-2025-1861" title="CVE-2025-1861" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1734" type="cve" id="CVE-2025-1734" title="CVE-2025-1734" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1217" type="cve" id="CVE-2025-1217" title="CVE-2025-1217" />
			<reference href="https://bdu.fstec.ru/vul/2025-02829" type="self" id="BDU:2025-02829" title="BDU:2025-02829" />
			<reference href="https://bdu.fstec.ru/vul/2025-02834" type="self" id="BDU:2025-02834" title="BDU:2025-02834" />
			<reference href="https://bdu.fstec.ru/vul/2025-02835" type="self" id="BDU:2025-02835" title="BDU:2025-02835" />
			<reference href="https://bdu.fstec.ru/vul/2025-02827" type="self" id="BDU:2025-02827" title="BDU:2025-02827" />
			<reference href="https://bdu.fstec.ru/vul/2025-02828" type="self" id="BDU:2025-02828" title="BDU:2025-02828" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php" epoch="0" version="8.3.19" release="1.el7" arch="x86_64" src="">
					<filename>php-0:8.3.19-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250430-13</id>
		<issued date="2025-04-30" />
		<updated date="2025-04-30" />
		<title>Уязвимость haproxy </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в haproxy</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-haproxy-cve-2025-32464/</description>
               <solution>
                    Запретить использование в ОС пакета HAProxy
                или
                    Установить обновление для пакета(ов) HAProxy
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-haproxy-cve-2025-32464/" type="self" id="ROS-20250430-13" title="ROS-20250430-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32464" type="cve" id="CVE-2025-32464" title="CVE-2025-32464" />
			<reference href="https://bdu.fstec.ru/vul/2025-06570" type="self" id="BDU:2025-06570" title="BDU:2025-06570" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="haproxy" epoch="0" version="3.0.9" release="1.el7" arch="x86_64" src="">
					<filename>haproxy-0:3.0.9-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250430-14</id>
		<issued date="2025-04-30" />
		<updated date="2025-04-30" />
		<title>Уязвимость dotnet </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dotnet</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet-cve-2025-26682/</description>
               <solution>
                    Запретить использование в ОС пакета dotnet
                или
                    Установить обновление для пакета(ов) dotnet
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet-cve-2025-26682/" type="self" id="ROS-20250430-14" title="ROS-20250430-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26682" type="cve" id="CVE-2025-26682" title="CVE-2025-26682" />
			<reference href="https://bdu.fstec.ru/vul/2025-04038" type="self" id="BDU:2025-04038" title="BDU:2025-04038" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dotnet" epoch="0" version="8.0.115" release="1.el7" arch="x86_64" src="">
					<filename>dotnet-0:8.0.115-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250430-15</id>
		<issued date="2025-04-30" />
		<updated date="2025-04-30" />
		<title>Уязвимость openssh </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openssh</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssh-cve-2025-32728/</description>
               <solution>
                    Запретить использование в ОС пакета openssh
                или
                    Установить обновление для пакета(ов) openssh
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssh-cve-2025-32728/" type="self" id="ROS-20250430-15" title="ROS-20250430-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32728" type="cve" id="CVE-2025-32728" title="CVE-2025-32728" />
			<reference href="https://bdu.fstec.ru/vul/2025-04768" type="self" id="BDU:2025-04768" title="BDU:2025-04768" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssh" epoch="0" version="8.9p1" release="15.el7" arch="x86_64" src="">
					<filename>openssh-0:8.9p1-15.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250430-16</id>
		<issued date="2025-04-30" />
		<updated date="2025-04-30" />
		<title>Множественные уязвимости helm </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в helm</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-helm-cve-2025-32387-cve-2025-32386/</description>
               <solution>
                    Запретить использование в ОС пакета Helm
                или
                    Установить обновление для пакета(ов) Helm
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-helm-cve-2025-32387-cve-2025-32386/" type="self" id="ROS-20250430-16" title="ROS-20250430-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32387" type="cve" id="CVE-2025-32387" title="CVE-2025-32387" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32386" type="cve" id="CVE-2025-32386" title="CVE-2025-32386" />
			<reference href="https://bdu.fstec.ru/vul/2025-06056" type="self" id="BDU:2025-06056" title="BDU:2025-06056" />
			<reference href="https://bdu.fstec.ru/vul/2025-06057" type="self" id="BDU:2025-06057" title="BDU:2025-06057" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="helm" epoch="0" version="3.12.3" release="2.el7" arch="x86_64" src="">
					<filename>helm-0:3.12.3-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250505-01</id>
		<issued date="2025-05-06" />
		<updated date="2025-05-06" />
		<title>Уязвимость golang-x-crypto-devel </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang-x-crypto-devel</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-x-crypto-devel-cve-2025-22869/</description>
               <solution>
                    Запретить использование в ОС пакета golang-x-crypto-devel
                или
                    Установить обновление для пакета(ов) golang-x-crypto-devel
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-x-crypto-devel-cve-2025-22869/" type="self" id="ROS-20250505-01" title="ROS-20250505-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22869" type="cve" id="CVE-2025-22869" title="CVE-2025-22869" />
			<reference href="https://bdu.fstec.ru/vul/2025-06560" type="self" id="BDU:2025-06560" title="BDU:2025-06560" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang-x-crypto-devel" epoch="0" version="0.31.0" release="2.el7" arch="noarch" src="">
					<filename>golang-x-crypto-devel-0:0.31.0-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250505-02</id>
		<issued date="2025-05-06" />
		<updated date="2025-05-06" />
		<title>Уязвимость xorg-x11-server-common </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в xorg-x11-server-common</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-xorg-x11-server-common-cve-2025-26594/</description>
               <solution>
                    Запретить использование в ОС пакета xorg-x11-server-common
                или
                    Установить обновление для пакета(ов) xorg-x11-server-common
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-xorg-x11-server-common-cve-2025-26594/" type="self" id="ROS-20250505-02" title="ROS-20250505-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26594" type="cve" id="CVE-2025-26594" title="CVE-2025-26594" />
			<reference href="https://bdu.fstec.ru/vul/2025-04129" type="self" id="BDU:2025-04129" title="BDU:2025-04129" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="xorg-x11-server-common" epoch="0" version="1.20.14" release="16.el7.3" arch="x86_64" src="">
					<filename>xorg-x11-server-common-0:1.20.14-16.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250505-03</id>
		<issued date="2025-05-06" />
		<updated date="2025-05-06" />
		<title>Уязвимость mariadb </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mariadb</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mariadb-cve-2023-52968/</description>
               <solution>
                    Запретить использование в ОС пакета MariaDB
                или
                    Установить обновление для пакета(ов) MariaDB
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mariadb-cve-2023-52968/" type="self" id="ROS-20250505-03" title="ROS-20250505-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52968" type="cve" id="CVE-2023-52968" title="CVE-2023-52968" />
			<reference href="https://bdu.fstec.ru/vul/2025-06571" type="self" id="BDU:2025-06571" title="BDU:2025-06571" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mariadb" epoch="3" version="10.11.11" release="1.el7" arch="x86_64" src="">
					<filename>mariadb-3:10.11.11-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250505-04</id>
		<issued date="2025-05-06" />
		<updated date="2025-05-06" />
		<title>Уязвимость zabbix7-lts-server-pgsql </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в zabbix7-lts-server-pgsql</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-lts-server-pgsql-cve-2024-36465/</description>
               <solution>
                    Запретить использование в ОС пакета zabbix7-lts-server-pgsql
                или
                    Установить обновление для пакета(ов) zabbix7-lts-server-pgsql
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-lts-server-pgsql-cve-2024-36465/" type="self" id="ROS-20250505-04" title="ROS-20250505-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36465" type="cve" id="CVE-2024-36465" title="CVE-2024-36465" />
			<reference href="https://bdu.fstec.ru/vul/2025-05633" type="self" id="BDU:2025-05633" title="BDU:2025-05633" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix7-lts-server-pgsql" epoch="1" version="7.0.9" release="1.el7" arch="x86_64" src="">
					<filename>zabbix7-lts-server-pgsql-1:7.0.9-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250505-05</id>
		<issued date="2025-05-06" />
		<updated date="2025-05-06" />
		<title>Уязвимость zabbix7-lts-server-mysql </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в zabbix7-lts-server-mysql</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-lts-server-mysql-cve-2024-364652621/</description>
               <solution>
                    Запретить использование в ОС пакета zabbix7-lts-server-mysql
                или
                    Установить обновление для пакета(ов) zabbix7-lts-server-mysql
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-lts-server-mysql-cve-2024-364652621/" type="self" id="ROS-20250505-05" title="ROS-20250505-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36465" type="cve" id="CVE-2024-36465" title="CVE-2024-36465" />
			<reference href="https://bdu.fstec.ru/vul/2025-05633" type="self" id="BDU:2025-05633" title="BDU:2025-05633" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix7-lts-server-mysql" epoch="1" version="7.0.9" release="1.el7" arch="x86_64" src="">
					<filename>zabbix7-lts-server-mysql-1:7.0.9-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250505-06</id>
		<issued date="2025-05-06" />
		<updated date="2025-05-06" />
		<title>Уязвимость openvpn </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в openvpn</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openvpn-cve-2025-2704/</description>
               <solution>
                    Запретить использование в ОС пакета openvpn
                или
                    Установить обновление для пакета(ов) openvpn
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openvpn-cve-2025-2704/" type="self" id="ROS-20250505-06" title="ROS-20250505-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2704" type="cve" id="CVE-2025-2704" title="CVE-2025-2704" />
			<reference href="https://bdu.fstec.ru/vul/2025-05051" type="self" id="BDU:2025-05051" title="BDU:2025-05051" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openvpn" epoch="0" version="2.6.14" release="2.el7" arch="x86_64" src="">
					<filename>openvpn-0:2.6.14-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250505-07</id>
		<issued date="2025-05-06" />
		<updated date="2025-05-06" />
		<title>Множественные уязвимости mongodb-org </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mongodb-org-cve-2025-3082-cve-2025-3083-cve-2025-3084-cve-2025-3085/</description>
               <solution>
                    Запретить использование в ОС пакета mongodb-org
                или
                    Установить обновление для пакета(ов) mongodb-org
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mongodb-org-cve-2025-3082-cve-2025-3083-cve-2025-3084-cve-2025-3085/" type="self" id="ROS-20250505-07" title="ROS-20250505-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3082" type="cve" id="CVE-2025-3082" title="CVE-2025-3082" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3083" type="cve" id="CVE-2025-3083" title="CVE-2025-3083" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3084" type="cve" id="CVE-2025-3084" title="CVE-2025-3084" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3085" type="cve" id="CVE-2025-3085" title="CVE-2025-3085" />
			<reference href="https://bdu.fstec.ru/vul/2025-03885" type="self" id="BDU:2025-03885" title="BDU:2025-03885" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mongodb-org" epoch="0" version="7.0.16" release="1.el7" arch="x86_64" src="">
					<filename>mongodb-org-0:7.0.16-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250505-08</id>
		<issued date="2025-05-06" />
		<updated date="2025-05-06" />
		<title>Множественные уязвимости mongodb-org </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mongodb-org-cve-2025-3082-cve-2025-3083-cve-2025-3084-cve-2025-30856016/</description>
               <solution>
                    Запретить использование в ОС пакета mongodb-org
                или
                    Установить обновление для пакета(ов) mongodb-org
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mongodb-org-cve-2025-3082-cve-2025-3083-cve-2025-3084-cve-2025-30856016/" type="self" id="ROS-20250505-08" title="ROS-20250505-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3082" type="cve" id="CVE-2025-3082" title="CVE-2025-3082" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3083" type="cve" id="CVE-2025-3083" title="CVE-2025-3083" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3084" type="cve" id="CVE-2025-3084" title="CVE-2025-3084" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3085" type="cve" id="CVE-2025-3085" title="CVE-2025-3085" />
			<reference href="https://bdu.fstec.ru/vul/2025-03885" type="self" id="BDU:2025-03885" title="BDU:2025-03885" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mongodb-org" epoch="0" version="6.0.20" release="1.el7" arch="x86_64" src="">
					<filename>mongodb-org-0:6.0.20-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250505-09</id>
		<issued date="2025-05-06" />
		<updated date="2025-05-06" />
		<title>Множественные уязвимости mongodb-org </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mongodb-org-cve-2025-3082-cve-2025-3083-cve-2025-3084-cve-2025-30856238/</description>
               <solution>
                    Запретить использование в ОС пакета mongodb-org
                или
                    Установить обновление для пакета(ов) mongodb-org
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mongodb-org-cve-2025-3082-cve-2025-3083-cve-2025-3084-cve-2025-30856238/" type="self" id="ROS-20250505-09" title="ROS-20250505-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3082" type="cve" id="CVE-2025-3082" title="CVE-2025-3082" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3083" type="cve" id="CVE-2025-3083" title="CVE-2025-3083" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3084" type="cve" id="CVE-2025-3084" title="CVE-2025-3084" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3085" type="cve" id="CVE-2025-3085" title="CVE-2025-3085" />
			<reference href="https://bdu.fstec.ru/vul/2025-03885" type="self" id="BDU:2025-03885" title="BDU:2025-03885" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mongodb-org" epoch="0" version="5.0.31" release="1.el7" arch="x86_64" src="">
					<filename>mongodb-org-0:5.0.31-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250505-10</id>
		<issued date="2025-05-06" />
		<updated date="2025-05-06" />
		<title>Уязвимость libxml2 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libxml2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libxml2-cve-2025-32415/</description>
               <solution>
                    Запретить использование в ОС пакета libxml2
                или
                    Установить обновление для пакета(ов) libxml2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libxml2-cve-2025-32415/" type="self" id="ROS-20250505-10" title="ROS-20250505-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32415" type="cve" id="CVE-2025-32415" title="CVE-2025-32415" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libxml2" epoch="0" version="2.9.8" release="19.el7.3" arch="x86_64" src="">
					<filename>libxml2-0:2.9.8-19.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250505-11</id>
		<issued date="2025-05-06" />
		<updated date="2025-05-06" />
		<title>Уязвимость redis </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в redis</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-redis-cve-2025-21605/</description>
               <solution>
                    Запретить использование в ОС пакета Redis
                или
                    Установить обновление для пакета(ов) Redis
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-redis-cve-2025-21605/" type="self" id="ROS-20250505-11" title="ROS-20250505-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21605" type="cve" id="CVE-2025-21605" title="CVE-2025-21605" />
			<reference href="https://bdu.fstec.ru/vul/2025-05997" type="self" id="BDU:2025-05997" title="BDU:2025-05997" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="redis" epoch="0" version="7.4.3" release="1.el7" arch="x86_64" src="">
					<filename>redis-0:7.4.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250505-12</id>
		<issued date="2025-05-06" />
		<updated date="2025-05-06" />
		<title>Уязвимость openssh </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openssh</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssh-cve-2016-20012/</description>
               <solution>
                    Запретить использование в ОС пакета openssh
                или
                    Установить обновление для пакета(ов) openssh
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssh-cve-2016-20012/" type="self" id="ROS-20250505-12" title="ROS-20250505-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20012" type="cve" id="CVE-2016-20012" title="CVE-2016-20012" />
			<reference href="https://bdu.fstec.ru/vul/2022-01880" type="self" id="BDU:2022-01880" title="BDU:2022-01880" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssh" epoch="0" version="8.9p1" release="5.el7" arch="x86_64" src="">
					<filename>openssh-0:8.9p1-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250506-01</id>
		<issued date="2025-05-06" />
		<updated date="2025-05-06" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-060525/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-060525/" type="self" id="ROS-20250506-01" title="ROS-20250506-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56622" type="cve" id="CVE-2024-56622" title="CVE-2024-56622" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56623" type="cve" id="CVE-2024-56623" title="CVE-2024-56623" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56625" type="cve" id="CVE-2024-56625" title="CVE-2024-56625" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56626" type="cve" id="CVE-2024-56626" title="CVE-2024-56626" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56628" type="cve" id="CVE-2024-56628" title="CVE-2024-56628" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56629" type="cve" id="CVE-2024-56629" title="CVE-2024-56629" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56630" type="cve" id="CVE-2024-56630" title="CVE-2024-56630" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56631" type="cve" id="CVE-2024-56631" title="CVE-2024-56631" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56633" type="cve" id="CVE-2024-56633" title="CVE-2024-56633" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56634" type="cve" id="CVE-2024-56634" title="CVE-2024-56634" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56636" type="cve" id="CVE-2024-56636" title="CVE-2024-56636" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56637" type="cve" id="CVE-2024-56637" title="CVE-2024-56637" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56640" type="cve" id="CVE-2024-56640" title="CVE-2024-56640" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56642" type="cve" id="CVE-2024-56642" title="CVE-2024-56642" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56643" type="cve" id="CVE-2024-56643" title="CVE-2024-56643" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56644" type="cve" id="CVE-2024-56644" title="CVE-2024-56644" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56645" type="cve" id="CVE-2024-56645" title="CVE-2024-56645" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56648" type="cve" id="CVE-2024-56648" title="CVE-2024-56648" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56650" type="cve" id="CVE-2024-56650" title="CVE-2024-56650" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56659" type="cve" id="CVE-2024-56659" title="CVE-2024-56659" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56660" type="cve" id="CVE-2024-56660" title="CVE-2024-56660" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56661" type="cve" id="CVE-2024-56661" title="CVE-2024-56661" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56662" type="cve" id="CVE-2024-56662" title="CVE-2024-56662" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56663" type="cve" id="CVE-2024-56663" title="CVE-2024-56663" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56781" type="cve" id="CVE-2024-56781" title="CVE-2024-56781" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56783" type="cve" id="CVE-2024-56783" title="CVE-2024-56783" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56785" type="cve" id="CVE-2024-56785" title="CVE-2024-56785" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56787" type="cve" id="CVE-2024-56787" title="CVE-2024-56787" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57874" type="cve" id="CVE-2024-57874" title="CVE-2024-57874" />
			<reference href="https://bdu.fstec.ru/vul/2025-06081" type="self" id="BDU:2025-06081" title="BDU:2025-06081" />
			<reference href="https://bdu.fstec.ru/vul/2025-06080" type="self" id="BDU:2025-06080" title="BDU:2025-06080" />
			<reference href="https://bdu.fstec.ru/vul/2025-06106" type="self" id="BDU:2025-06106" title="BDU:2025-06106" />
			<reference href="https://bdu.fstec.ru/vul/2025-00880" type="self" id="BDU:2025-00880" title="BDU:2025-00880" />
			<reference href="https://bdu.fstec.ru/vul/2025-04138" type="self" id="BDU:2025-04138" title="BDU:2025-04138" />
			<reference href="https://bdu.fstec.ru/vul/2025-06164" type="self" id="BDU:2025-06164" title="BDU:2025-06164" />
			<reference href="https://bdu.fstec.ru/vul/2025-06105" type="self" id="BDU:2025-06105" title="BDU:2025-06105" />
			<reference href="https://bdu.fstec.ru/vul/2025-04677" type="self" id="BDU:2025-04677" title="BDU:2025-04677" />
			<reference href="https://bdu.fstec.ru/vul/2025-06100" type="self" id="BDU:2025-06100" title="BDU:2025-06100" />
			<reference href="https://bdu.fstec.ru/vul/2025-06101" type="self" id="BDU:2025-06101" title="BDU:2025-06101" />
			<reference href="https://bdu.fstec.ru/vul/2025-06030" type="self" id="BDU:2025-06030" title="BDU:2025-06030" />
			<reference href="https://bdu.fstec.ru/vul/2025-06102" type="self" id="BDU:2025-06102" title="BDU:2025-06102" />
			<reference href="https://bdu.fstec.ru/vul/2025-06577" type="self" id="BDU:2025-06577" title="BDU:2025-06577" />
			<reference href="https://bdu.fstec.ru/vul/2025-06580" type="self" id="BDU:2025-06580" title="BDU:2025-06580" />
			<reference href="https://bdu.fstec.ru/vul/2025-06090" type="self" id="BDU:2025-06090" title="BDU:2025-06090" />
			<reference href="https://bdu.fstec.ru/vul/2025-06094" type="self" id="BDU:2025-06094" title="BDU:2025-06094" />
			<reference href="https://bdu.fstec.ru/vul/2025-06089" type="self" id="BDU:2025-06089" title="BDU:2025-06089" />
			<reference href="https://bdu.fstec.ru/vul/2025-06091" type="self" id="BDU:2025-06091" title="BDU:2025-06091" />
			<reference href="https://bdu.fstec.ru/vul/2025-06579" type="self" id="BDU:2025-06579" title="BDU:2025-06579" />
			<reference href="https://bdu.fstec.ru/vul/2025-06165" type="self" id="BDU:2025-06165" title="BDU:2025-06165" />
			<reference href="https://bdu.fstec.ru/vul/2025-06104" type="self" id="BDU:2025-06104" title="BDU:2025-06104" />
			<reference href="https://bdu.fstec.ru/vul/2025-04136" type="self" id="BDU:2025-04136" title="BDU:2025-04136" />
			<reference href="https://bdu.fstec.ru/vul/2025-06550" type="self" id="BDU:2025-06550" title="BDU:2025-06550" />
			<reference href="https://bdu.fstec.ru/vul/2025-04554" type="self" id="BDU:2025-04554" title="BDU:2025-04554" />
			<reference href="https://bdu.fstec.ru/vul/2025-06082" type="self" id="BDU:2025-06082" title="BDU:2025-06082" />
			<reference href="https://bdu.fstec.ru/vul/2025-06096" type="self" id="BDU:2025-06096" title="BDU:2025-06096" />
			<reference href="https://bdu.fstec.ru/vul/2025-05778" type="self" id="BDU:2025-05778" title="BDU:2025-05778" />
			<reference href="https://bdu.fstec.ru/vul/2025-06099" type="self" id="BDU:2025-06099" title="BDU:2025-06099" />
			<reference href="https://bdu.fstec.ru/vul/2025-04468" type="self" id="BDU:2025-04468" title="BDU:2025-04468" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250513-01</id>
		<issued date="2025-05-13" />
		<updated date="2025-05-16" />
		<title>Уязвимость share_directory </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в share_directory</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-share-directory-130525/</description>
               <solution>
                    Запретить использование в ОС пакета share_directory
                или
                    Установить обновление для пакета(ов) share_directory
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-share-directory-130525/" type="self" id="ROS-20250513-01" title="ROS-20250513-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=" type="cve" id="" title="" />
			<reference href="https://bdu.fstec.ru/vul/2025-04864" type="self" id="BDU:2025-04864" title="BDU:2025-04864" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="share_directory" epoch="0" version="6.5.3" release="1.el7" arch="noarch" src="">
					<filename>share_directory-0:6.5.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250513-02</id>
		<issued date="2025-05-13" />
		<updated date="2025-05-16" />
		<title>Уязвимость redos-kiosk-utils </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в redos-kiosk-utils</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-redos-kiosk-utils-130525/</description>
               <solution>
                    Запретить использование в ОС пакета redos-kiosk-utils
                или
                    Установить обновление для пакета(ов) redos-kiosk-utils
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-redos-kiosk-utils-130525/" type="self" id="ROS-20250513-02" title="ROS-20250513-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=" type="cve" id="" title="" />
			<reference href="https://bdu.fstec.ru/vul/2025-04865" type="self" id="BDU:2025-04865" title="BDU:2025-04865" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="redos-kiosk-utils" epoch="0" version="0.20" release="1.el7" arch="x86_64" src="">
					<filename>redos-kiosk-utils-0:0.20-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250513-03</id>
		<issued date="2025-05-13" />
		<updated date="2025-05-13" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-130525/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-130525/" type="self" id="ROS-20250513-03" title="ROS-20250513-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49571" type="cve" id="CVE-2024-49571" title="CVE-2024-49571" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46896" type="cve" id="CVE-2024-46896" title="CVE-2024-46896" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47143" type="cve" id="CVE-2024-47143" title="CVE-2024-47143" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47408" type="cve" id="CVE-2024-47408" title="CVE-2024-47408" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48881" type="cve" id="CVE-2024-48881" title="CVE-2024-48881" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50051" type="cve" id="CVE-2024-50051" title="CVE-2024-50051" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52332" type="cve" id="CVE-2024-52332" title="CVE-2024-52332" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53680" type="cve" id="CVE-2024-53680" title="CVE-2024-53680" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53685" type="cve" id="CVE-2024-53685" title="CVE-2024-53685" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53690" type="cve" id="CVE-2024-53690" title="CVE-2024-53690" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-55881" type="cve" id="CVE-2024-55881" title="CVE-2024-55881" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-55916" type="cve" id="CVE-2024-55916" title="CVE-2024-55916" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56369" type="cve" id="CVE-2024-56369" title="CVE-2024-56369" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57791" type="cve" id="CVE-2024-57791" title="CVE-2024-57791" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57792" type="cve" id="CVE-2024-57792" title="CVE-2024-57792" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57807" type="cve" id="CVE-2024-57807" title="CVE-2024-57807" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57838" type="cve" id="CVE-2024-57838" title="CVE-2024-57838" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36476" type="cve" id="CVE-2024-36476" title="CVE-2024-36476" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39282" type="cve" id="CVE-2024-39282" title="CVE-2024-39282" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54031" type="cve" id="CVE-2024-54031" title="CVE-2024-54031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57802" type="cve" id="CVE-2024-57802" title="CVE-2024-57802" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57841" type="cve" id="CVE-2024-57841" title="CVE-2024-57841" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57882" type="cve" id="CVE-2024-57882" title="CVE-2024-57882" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57884" type="cve" id="CVE-2024-57884" title="CVE-2024-57884" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57889" type="cve" id="CVE-2024-57889" title="CVE-2024-57889" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57890" type="cve" id="CVE-2024-57890" title="CVE-2024-57890" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57892" type="cve" id="CVE-2024-57892" title="CVE-2024-57892" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57896" type="cve" id="CVE-2024-57896" title="CVE-2024-57896" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57897" type="cve" id="CVE-2024-57897" title="CVE-2024-57897" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57900" type="cve" id="CVE-2024-57900" title="CVE-2024-57900" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57901" type="cve" id="CVE-2024-57901" title="CVE-2024-57901" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57902" type="cve" id="CVE-2024-57902" title="CVE-2024-57902" />
			<reference href="https://bdu.fstec.ru/vul/2025-08001" type="self" id="BDU:2025-08001" title="BDU:2025-08001" />
			<reference href="https://bdu.fstec.ru/vul/2025-04571" type="self" id="BDU:2025-04571" title="BDU:2025-04571" />
			<reference href="https://bdu.fstec.ru/vul/2025-03225" type="self" id="BDU:2025-03225" title="BDU:2025-03225" />
			<reference href="https://bdu.fstec.ru/vul/2025-04711" type="self" id="BDU:2025-04711" title="BDU:2025-04711" />
			<reference href="https://bdu.fstec.ru/vul/2025-04712" type="self" id="BDU:2025-04712" title="BDU:2025-04712" />
			<reference href="https://bdu.fstec.ru/vul/2025-06985" type="self" id="BDU:2025-06985" title="BDU:2025-06985" />
			<reference href="https://bdu.fstec.ru/vul/2025-07884" type="self" id="BDU:2025-07884" title="BDU:2025-07884" />
			<reference href="https://bdu.fstec.ru/vul/2025-07003" type="self" id="BDU:2025-07003" title="BDU:2025-07003" />
			<reference href="https://bdu.fstec.ru/vul/2025-12026" type="self" id="BDU:2025-12026" title="BDU:2025-12026" />
			<reference href="https://bdu.fstec.ru/vul/2025-07750" type="self" id="BDU:2025-07750" title="BDU:2025-07750" />
			<reference href="https://bdu.fstec.ru/vul/2025-07753" type="self" id="BDU:2025-07753" title="BDU:2025-07753" />
			<reference href="https://bdu.fstec.ru/vul/2025-07754" type="self" id="BDU:2025-07754" title="BDU:2025-07754" />
			<reference href="https://bdu.fstec.ru/vul/2025-07794" type="self" id="BDU:2025-07794" title="BDU:2025-07794" />
			<reference href="https://bdu.fstec.ru/vul/2025-07839" type="self" id="BDU:2025-07839" title="BDU:2025-07839" />
			<reference href="https://bdu.fstec.ru/vul/2025-07838" type="self" id="BDU:2025-07838" title="BDU:2025-07838" />
			<reference href="https://bdu.fstec.ru/vul/2025-07837" type="self" id="BDU:2025-07837" title="BDU:2025-07837" />
			<reference href="https://bdu.fstec.ru/vul/2025-07836" type="self" id="BDU:2025-07836" title="BDU:2025-07836" />
			<reference href="https://bdu.fstec.ru/vul/2025-03060" type="self" id="BDU:2025-03060" title="BDU:2025-03060" />
			<reference href="https://bdu.fstec.ru/vul/2025-04490" type="self" id="BDU:2025-04490" title="BDU:2025-04490" />
			<reference href="https://bdu.fstec.ru/vul/2025-04489" type="self" id="BDU:2025-04489" title="BDU:2025-04489" />
			<reference href="https://bdu.fstec.ru/vul/2025-04481" type="self" id="BDU:2025-04481" title="BDU:2025-04481" />
			<reference href="https://bdu.fstec.ru/vul/2025-04478" type="self" id="BDU:2025-04478" title="BDU:2025-04478" />
			<reference href="https://bdu.fstec.ru/vul/2025-04483" type="self" id="BDU:2025-04483" title="BDU:2025-04483" />
			<reference href="https://bdu.fstec.ru/vul/2025-04487" type="self" id="BDU:2025-04487" title="BDU:2025-04487" />
			<reference href="https://bdu.fstec.ru/vul/2025-03510" type="self" id="BDU:2025-03510" title="BDU:2025-03510" />
			<reference href="https://bdu.fstec.ru/vul/2025-03512" type="self" id="BDU:2025-03512" title="BDU:2025-03512" />
			<reference href="https://bdu.fstec.ru/vul/2025-02844" type="self" id="BDU:2025-02844" title="BDU:2025-02844" />
			<reference href="https://bdu.fstec.ru/vul/2025-02812" type="self" id="BDU:2025-02812" title="BDU:2025-02812" />
			<reference href="https://bdu.fstec.ru/vul/2025-03524" type="self" id="BDU:2025-03524" title="BDU:2025-03524" />
			<reference href="https://bdu.fstec.ru/vul/2025-02845" type="self" id="BDU:2025-02845" title="BDU:2025-02845" />
			<reference href="https://bdu.fstec.ru/vul/2025-04662" type="self" id="BDU:2025-04662" title="BDU:2025-04662" />
			<reference href="https://bdu.fstec.ru/vul/2025-06427" type="self" id="BDU:2025-06427" title="BDU:2025-06427" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250514-01</id>
		<issued date="2025-05-14" />
		<updated date="2025-05-14" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-140525/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-140525/" type="self" id="ROS-20250514-01" title="ROS-20250514-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57904" type="cve" id="CVE-2024-57904" title="CVE-2024-57904" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57906" type="cve" id="CVE-2024-57906" title="CVE-2024-57906" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57907" type="cve" id="CVE-2024-57907" title="CVE-2024-57907" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57908" type="cve" id="CVE-2024-57908" title="CVE-2024-57908" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57910" type="cve" id="CVE-2024-57910" title="CVE-2024-57910" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57911" type="cve" id="CVE-2024-57911" title="CVE-2024-57911" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57912" type="cve" id="CVE-2024-57912" title="CVE-2024-57912" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57913" type="cve" id="CVE-2024-57913" title="CVE-2024-57913" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57916" type="cve" id="CVE-2024-57916" title="CVE-2024-57916" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57917" type="cve" id="CVE-2024-57917" title="CVE-2024-57917" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57922" type="cve" id="CVE-2024-57922" title="CVE-2024-57922" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57925" type="cve" id="CVE-2024-57925" title="CVE-2024-57925" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57929" type="cve" id="CVE-2024-57929" title="CVE-2024-57929" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21655" type="cve" id="CVE-2025-21655" title="CVE-2025-21655" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57930" type="cve" id="CVE-2024-57930" title="CVE-2024-57930" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57931" type="cve" id="CVE-2024-57931" title="CVE-2024-57931" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57938" type="cve" id="CVE-2024-57938" title="CVE-2024-57938" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57939" type="cve" id="CVE-2024-57939" title="CVE-2024-57939" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57940" type="cve" id="CVE-2024-57940" title="CVE-2024-57940" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57946" type="cve" id="CVE-2024-57946" title="CVE-2024-57946" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21660" type="cve" id="CVE-2025-21660" title="CVE-2025-21660" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21662" type="cve" id="CVE-2025-21662" title="CVE-2025-21662" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21664" type="cve" id="CVE-2025-21664" title="CVE-2025-21664" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57948" type="cve" id="CVE-2024-57948" title="CVE-2024-57948" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21665" type="cve" id="CVE-2025-21665" title="CVE-2025-21665" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21666" type="cve" id="CVE-2025-21666" title="CVE-2025-21666" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21668" type="cve" id="CVE-2025-21668" title="CVE-2025-21668" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21669" type="cve" id="CVE-2025-21669" title="CVE-2025-21669" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21671" type="cve" id="CVE-2025-21671" title="CVE-2025-21671" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21675" type="cve" id="CVE-2025-21675" title="CVE-2025-21675" />
			<reference href="https://bdu.fstec.ru/vul/2025-06574" type="self" id="BDU:2025-06574" title="BDU:2025-06574" />
			<reference href="https://bdu.fstec.ru/vul/2025-06559" type="self" id="BDU:2025-06559" title="BDU:2025-06559" />
			<reference href="https://bdu.fstec.ru/vul/2025-06575" type="self" id="BDU:2025-06575" title="BDU:2025-06575" />
			<reference href="https://bdu.fstec.ru/vul/2025-02791" type="self" id="BDU:2025-02791" title="BDU:2025-02791" />
			<reference href="https://bdu.fstec.ru/vul/2025-02792" type="self" id="BDU:2025-02792" title="BDU:2025-02792" />
			<reference href="https://bdu.fstec.ru/vul/2025-06558" type="self" id="BDU:2025-06558" title="BDU:2025-06558" />
			<reference href="https://bdu.fstec.ru/vul/2025-04366" type="self" id="BDU:2025-04366" title="BDU:2025-04366" />
			<reference href="https://bdu.fstec.ru/vul/2025-06557" type="self" id="BDU:2025-06557" title="BDU:2025-06557" />
			<reference href="https://bdu.fstec.ru/vul/2025-01866" type="self" id="BDU:2025-01866" title="BDU:2025-01866" />
			<reference href="https://bdu.fstec.ru/vul/2025-01776" type="self" id="BDU:2025-01776" title="BDU:2025-01776" />
			<reference href="https://bdu.fstec.ru/vul/2025-01842" type="self" id="BDU:2025-01842" title="BDU:2025-01842" />
			<reference href="https://bdu.fstec.ru/vul/2025-01773" type="self" id="BDU:2025-01773" title="BDU:2025-01773" />
			<reference href="https://bdu.fstec.ru/vul/2025-01868" type="self" id="BDU:2025-01868" title="BDU:2025-01868" />
			<reference href="https://bdu.fstec.ru/vul/2025-06549" type="self" id="BDU:2025-06549" title="BDU:2025-06549" />
			<reference href="https://bdu.fstec.ru/vul/2025-06556" type="self" id="BDU:2025-06556" title="BDU:2025-06556" />
			<reference href="https://bdu.fstec.ru/vul/2025-06548" type="self" id="BDU:2025-06548" title="BDU:2025-06548" />
			<reference href="https://bdu.fstec.ru/vul/2025-01483" type="self" id="BDU:2025-01483" title="BDU:2025-01483" />
			<reference href="https://bdu.fstec.ru/vul/2025-01392" type="self" id="BDU:2025-01392" title="BDU:2025-01392" />
			<reference href="https://bdu.fstec.ru/vul/2025-01463" type="self" id="BDU:2025-01463" title="BDU:2025-01463" />
			<reference href="https://bdu.fstec.ru/vul/2025-01466" type="self" id="BDU:2025-01466" title="BDU:2025-01466" />
			<reference href="https://bdu.fstec.ru/vul/2025-01393" type="self" id="BDU:2025-01393" title="BDU:2025-01393" />
			<reference href="https://bdu.fstec.ru/vul/2025-01394" type="self" id="BDU:2025-01394" title="BDU:2025-01394" />
			<reference href="https://bdu.fstec.ru/vul/2025-01476" type="self" id="BDU:2025-01476" title="BDU:2025-01476" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250515-01</id>
		<issued date="2025-05-15" />
		<updated date="2025-05-15" />
		<title>Уязвимость php-twig3 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в php-twig3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-twig3-cve-2024-45411/</description>
               <solution>
                    Запретить использование в ОС пакета php-twig3
                или
                    Установить обновление для пакета(ов) php-twig3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-twig3-cve-2024-45411/" type="self" id="ROS-20250515-01" title="ROS-20250515-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45411" type="cve" id="CVE-2024-45411" title="CVE-2024-45411" />
			<reference href="https://bdu.fstec.ru/vul/2025-06075" type="self" id="BDU:2025-06075" title="BDU:2025-06075" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php-twig3" epoch="0" version="3.4.3" release="3.el7" arch="noarch" src="">
					<filename>php-twig3-0:3.4.3-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250515-02</id>
		<issued date="2025-05-15" />
		<updated date="2025-05-15" />
		<title>Уязвимость php-twig2 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в php-twig2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-twig2-cve-2024-454111648/</description>
               <solution>
                    Запретить использование в ОС пакета php-twig2
                или
                    Установить обновление для пакета(ов) php-twig2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-twig2-cve-2024-454111648/" type="self" id="ROS-20250515-02" title="ROS-20250515-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45411" type="cve" id="CVE-2024-45411" title="CVE-2024-45411" />
			<reference href="https://bdu.fstec.ru/vul/2025-06075" type="self" id="BDU:2025-06075" title="BDU:2025-06075" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php-twig2" epoch="0" version="2.14.7" release="4.el7" arch="noarch" src="">
					<filename>php-twig2-0:2.14.7-4.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250515-03</id>
		<issued date="2025-05-15" />
		<updated date="2025-05-15" />
		<title>Уязвимость libsndfile </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libsndfile</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libsndfile-cve-2021-4156/</description>
               <solution>
                    Запретить использование в ОС пакета libsndfile
                или
                    Установить обновление для пакета(ов) libsndfile
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libsndfile-cve-2021-4156/" type="self" id="ROS-20250515-03" title="ROS-20250515-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4156" type="cve" id="CVE-2021-4156" title="CVE-2021-4156" />
			<reference href="https://bdu.fstec.ru/vul/2022-05796" type="self" id="BDU:2022-05796" title="BDU:2022-05796" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libsndfile" epoch="0" version="1.0.28" release="15.el7" arch="x86_64" src="">
					<filename>libsndfile-0:1.0.28-15.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250515-04</id>
		<issued date="2025-05-15" />
		<updated date="2025-05-15" />
		<title>Уязвимость docker-ce </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в docker-ce</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-docker-ce-cve-2025-0495/</description>
               <solution>
                    Запретить использование в ОС пакета docker-ce
                или
                    Установить обновление для пакета(ов) docker-ce
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-docker-ce-cve-2025-0495/" type="self" id="ROS-20250515-04" title="ROS-20250515-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0495" type="cve" id="CVE-2025-0495" title="CVE-2025-0495" />
			<reference href="https://bdu.fstec.ru/vul/2025-06572" type="self" id="BDU:2025-06572" title="BDU:2025-06572" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="docker-ce" epoch="4" version="25.0.7" release="3.el7" arch="x86_64" src="">
					<filename>docker-ce-4:25.0.7-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250515-05</id>
		<issued date="2025-05-15" />
		<updated date="2025-05-15" />
		<title>Множественные уязвимости poppler </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в poppler</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-poppler-cve-2025-43903-cve-2025-32364-cve-2025-32365/</description>
               <solution>
                    Запретить использование в ОС пакета Poppler
                или
                    Установить обновление для пакета(ов) Poppler
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-poppler-cve-2025-43903-cve-2025-32364-cve-2025-32365/" type="self" id="ROS-20250515-05" title="ROS-20250515-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43903" type="cve" id="CVE-2025-43903" title="CVE-2025-43903" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32364" type="cve" id="CVE-2025-32364" title="CVE-2025-32364" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32365" type="cve" id="CVE-2025-32365" title="CVE-2025-32365" />
			<reference href="https://bdu.fstec.ru/vul/2025-06076" type="self" id="BDU:2025-06076" title="BDU:2025-06076" />
			<reference href="https://bdu.fstec.ru/vul/2025-06077" type="self" id="BDU:2025-06077" title="BDU:2025-06077" />
			<reference href="https://bdu.fstec.ru/vul/2025-06078" type="self" id="BDU:2025-06078" title="BDU:2025-06078" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="poppler" epoch="0" version="21.08.0" release="16.el7" arch="x86_64" src="">
					<filename>poppler-0:21.08.0-16.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250515-06</id>
		<issued date="2025-05-15" />
		<updated date="2025-05-15" />
		<title>Уязвимость tomcat </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2023-44487/</description>
               <solution>
                    Запретить использование в ОС пакета tomcat
                или
                    Установить обновление для пакета(ов) tomcat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2023-44487/" type="self" id="ROS-20250515-06" title="ROS-20250515-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487" type="cve" id="CVE-2023-44487" title="CVE-2023-44487" />
			<reference href="https://bdu.fstec.ru/vul/2023-06559" type="self" id="BDU:2023-06559" title="BDU:2023-06559" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat" epoch="1" version="9.0.99" release="1.el7" arch="noarch" src="">
					<filename>tomcat-1:9.0.99-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250515-07</id>
		<issued date="2025-05-15" />
		<updated date="2025-05-15" />
		<title>Множественные уязвимости mediawiki</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в mediawiki</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mediawiki-150525/</description>
               <solution>
                    Запретить использование в ОС пакета MediaWiki
                или
                    Установить обновление для пакета(ов) MediaWiki
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mediawiki-150525/" type="self" id="ROS-20250515-07" title="ROS-20250515-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3469" type="cve" id="CVE-2025-3469" title="CVE-2025-3469" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32696" type="cve" id="CVE-2025-32696" title="CVE-2025-32696" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32697" type="cve" id="CVE-2025-32697" title="CVE-2025-32697" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32698" type="cve" id="CVE-2025-32698" title="CVE-2025-32698" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32699" type="cve" id="CVE-2025-32699" title="CVE-2025-32699" />
			<reference href="https://bdu.fstec.ru/vul/2025-06072" type="self" id="BDU:2025-06072" title="BDU:2025-06072" />
			<reference href="https://bdu.fstec.ru/vul/2025-06074" type="self" id="BDU:2025-06074" title="BDU:2025-06074" />
			<reference href="https://bdu.fstec.ru/vul/2025-06079" type="self" id="BDU:2025-06079" title="BDU:2025-06079" />
			<reference href="https://bdu.fstec.ru/vul/2025-06073" type="self" id="BDU:2025-06073" title="BDU:2025-06073" />
			<reference href="https://bdu.fstec.ru/vul/2025-06070" type="self" id="BDU:2025-06070" title="BDU:2025-06070" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mediawiki" epoch="0" version="1.40.3" release="4.el7" arch="noarch" src="">
					<filename>mediawiki-0:1.40.3-4.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250515-08</id>
		<issued date="2025-05-15" />
		<updated date="2025-05-15" />
		<title>Множественные уязвимости thunderbird </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-cve-2025-2830-cve-2025-3523-cve-2025-3522/</description>
               <solution>
                    Запретить использование в ОС пакета Thunderbird
                или
                    Установить обновление для пакета(ов) Thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-cve-2025-2830-cve-2025-3523-cve-2025-3522/" type="self" id="ROS-20250515-08" title="ROS-20250515-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2830" type="cve" id="CVE-2025-2830" title="CVE-2025-2830" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3523" type="cve" id="CVE-2025-3523" title="CVE-2025-3523" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3522" type="cve" id="CVE-2025-3522" title="CVE-2025-3522" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="128.9.2" release="1.el7" arch="x86_64" src="">
					<filename>thunderbird-0:128.9.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250515-09</id>
		<issued date="2025-05-15" />
		<updated date="2025-05-15" />
		<title>Уязвимость fcgi </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в fcgi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-fcgi-cve-2025-23016/</description>
               <solution>
                    Запретить использование в ОС пакета fcgi
                или
                    Установить обновление для пакета(ов) fcgi
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-fcgi-cve-2025-23016/" type="self" id="ROS-20250515-09" title="ROS-20250515-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23016" type="cve" id="CVE-2025-23016" title="CVE-2025-23016" />
			<reference href="https://bdu.fstec.ru/vul/2025-05008" type="self" id="BDU:2025-05008" title="BDU:2025-05008" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="fcgi" epoch="0" version="2.4.6" release="1.el7" arch="x86_64" src="">
					<filename>fcgi-0:2.4.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250515-10</id>
		<issued date="2025-05-15" />
		<updated date="2025-05-15" />
		<title>Множественные уязвимости tomcat </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в tomcat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-tomcat-cve-2025-31650-cve-2025-31651/</description>
               <solution>
                    Запретить использование в ОС пакета tomcat
                или
                    Установить обновление для пакета(ов) tomcat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-tomcat-cve-2025-31650-cve-2025-31651/" type="self" id="ROS-20250515-10" title="ROS-20250515-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31650" type="cve" id="CVE-2025-31650" title="CVE-2025-31650" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31651" type="cve" id="CVE-2025-31651" title="CVE-2025-31651" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat" epoch="1" version="9.0.102" release="1.el7" arch="noarch" src="">
					<filename>tomcat-1:9.0.102-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250515-11</id>
		<issued date="2025-05-15" />
		<updated date="2025-05-15" />
		<title>Множественные уязвимости moodle</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-moodle-150525/</description>
               <solution>
                    Запретить использование в ОС пакета moodle
                или
                    Установить обновление для пакета(ов) moodle
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-moodle-150525/" type="self" id="ROS-20250515-11" title="ROS-20250515-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3644" type="cve" id="CVE-2025-3644" title="CVE-2025-3644" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3645" type="cve" id="CVE-2025-3645" title="CVE-2025-3645" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3638" type="cve" id="CVE-2025-3638" title="CVE-2025-3638" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3637" type="cve" id="CVE-2025-3637" title="CVE-2025-3637" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3636" type="cve" id="CVE-2025-3636" title="CVE-2025-3636" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3647" type="cve" id="CVE-2025-3647" title="CVE-2025-3647" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3643" type="cve" id="CVE-2025-3643" title="CVE-2025-3643" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3642" type="cve" id="CVE-2025-3642" title="CVE-2025-3642" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3641" type="cve" id="CVE-2025-3641" title="CVE-2025-3641" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3640" type="cve" id="CVE-2025-3640" title="CVE-2025-3640" />
			<reference href="https://bdu.fstec.ru/vul/2025-05099" type="self" id="BDU:2025-05099" title="BDU:2025-05099" />
			<reference href="https://bdu.fstec.ru/vul/2025-05098" type="self" id="BDU:2025-05098" title="BDU:2025-05098" />
			<reference href="https://bdu.fstec.ru/vul/2025-05104" type="self" id="BDU:2025-05104" title="BDU:2025-05104" />
			<reference href="https://bdu.fstec.ru/vul/2025-05105" type="self" id="BDU:2025-05105" title="BDU:2025-05105" />
			<reference href="https://bdu.fstec.ru/vul/2025-05106" type="self" id="BDU:2025-05106" title="BDU:2025-05106" />
			<reference href="https://bdu.fstec.ru/vul/2025-05097" type="self" id="BDU:2025-05097" title="BDU:2025-05097" />
			<reference href="https://bdu.fstec.ru/vul/2025-05100" type="self" id="BDU:2025-05100" title="BDU:2025-05100" />
			<reference href="https://bdu.fstec.ru/vul/2025-05101" type="self" id="BDU:2025-05101" title="BDU:2025-05101" />
			<reference href="https://bdu.fstec.ru/vul/2025-05102" type="self" id="BDU:2025-05102" title="BDU:2025-05102" />
			<reference href="https://bdu.fstec.ru/vul/2025-05103" type="self" id="BDU:2025-05103" title="BDU:2025-05103" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="moodle" epoch="0" version="4.3.12" release="1.el7" arch="noarch" src="">
					<filename>moodle-0:4.3.12-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250515-12</id>
		<issued date="2025-05-15" />
		<updated date="2025-05-15" />
		<title>Уязвимость java-21-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в java-21-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-21-openjdk-cve-2024-54534/</description>
               <solution>
                    Запретить использование в ОС пакета java-21-openjdk
                или
                    Установить обновление для пакета(ов) java-21-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-21-openjdk-cve-2024-54534/" type="self" id="ROS-20250515-12" title="ROS-20250515-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54534" type="cve" id="CVE-2024-54534" title="CVE-2024-54534" />
			<reference href="https://bdu.fstec.ru/vul/2025-04091" type="self" id="BDU:2025-04091" title="BDU:2025-04091" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-21-openjdk" epoch="1" version="21.0.7.0.6" release="1.el7" arch="x86_64" src="">
					<filename>java-21-openjdk-1:21.0.7.0.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250515-13</id>
		<issued date="2025-05-15" />
		<updated date="2025-05-15" />
		<title>Уязвимость java-17-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в java-17-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-17-openjdk-cve-2024-545347093/</description>
               <solution>
                    Запретить использование в ОС пакета java-17-openjdk
                или
                    Установить обновление для пакета(ов) java-17-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-17-openjdk-cve-2024-545347093/" type="self" id="ROS-20250515-13" title="ROS-20250515-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54534" type="cve" id="CVE-2024-54534" title="CVE-2024-54534" />
			<reference href="https://bdu.fstec.ru/vul/2025-04091" type="self" id="BDU:2025-04091" title="BDU:2025-04091" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-17-openjdk" epoch="1" version="17.0.15.0.6" release="1.el7" arch="x86_64" src="">
					<filename>java-17-openjdk-1:17.0.15.0.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250515-14</id>
		<issued date="2025-05-15" />
		<updated date="2025-05-15" />
		<title>Уязвимость java-11-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в java-11-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-11-openjdk-cve-2024-5453470938600/</description>
               <solution>
                    Запретить использование в ОС пакета java-11-openjdk
                или
                    Установить обновление для пакета(ов) java-11-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-11-openjdk-cve-2024-5453470938600/" type="self" id="ROS-20250515-14" title="ROS-20250515-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54534" type="cve" id="CVE-2024-54534" title="CVE-2024-54534" />
			<reference href="https://bdu.fstec.ru/vul/2025-04091" type="self" id="BDU:2025-04091" title="BDU:2025-04091" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-11-openjdk" epoch="1" version="11.0.27.0.6" release="1.el7" arch="x86_64" src="">
					<filename>java-11-openjdk-1:11.0.27.0.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250515-15</id>
		<issued date="2025-05-15" />
		<updated date="2025-05-15" />
		<title>Уязвимость java-1.8.0-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в java-1.8.0-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-180-openjdk-cve-2024-54534709386001472/</description>
               <solution>
                    Запретить использование в ОС пакета java-1.8.0-openjdk
                или
                    Установить обновление для пакета(ов) java-1.8.0-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-180-openjdk-cve-2024-54534709386001472/" type="self" id="ROS-20250515-15" title="ROS-20250515-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54534" type="cve" id="CVE-2024-54534" title="CVE-2024-54534" />
			<reference href="https://bdu.fstec.ru/vul/2025-04091" type="self" id="BDU:2025-04091" title="BDU:2025-04091" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-1.8.0-openjdk" epoch="1" version="1.8.0.452.b09" release="1.el7" arch="x86_64" src="">
					<filename>java-1.8.0-openjdk-1:1.8.0.452.b09-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250520-01</id>
		<issued date="2025-05-20" />
		<updated date="2025-05-20" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-200525/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-200525/" type="self" id="ROS-20250520-01" title="ROS-20250520-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26718" type="cve" id="CVE-2024-26718" title="CVE-2024-26718" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52530" type="cve" id="CVE-2023-52530" title="CVE-2023-52530" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26921" type="cve" id="CVE-2024-26921" title="CVE-2024-26921" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27017" type="cve" id="CVE-2024-27017" title="CVE-2024-27017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50049" type="cve" id="CVE-2024-50049" title="CVE-2024-50049" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35963" type="cve" id="CVE-2024-35963" title="CVE-2024-35963" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35968" type="cve" id="CVE-2024-35968" title="CVE-2024-35968" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47267" type="cve" id="CVE-2021-47267" title="CVE-2021-47267" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47400" type="cve" id="CVE-2021-47400" title="CVE-2021-47400" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47406" type="cve" id="CVE-2021-47406" title="CVE-2021-47406" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46691" type="cve" id="CVE-2024-46691" title="CVE-2024-46691" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57850" type="cve" id="CVE-2024-57850" title="CVE-2024-57850" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57849" type="cve" id="CVE-2024-57849" title="CVE-2024-57849" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43098" type="cve" id="CVE-2024-43098" title="CVE-2024-43098" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45828" type="cve" id="CVE-2024-45828" title="CVE-2024-45828" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57903" type="cve" id="CVE-2024-57903" title="CVE-2024-57903" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21631" type="cve" id="CVE-2025-21631" title="CVE-2025-21631" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21636" type="cve" id="CVE-2025-21636" title="CVE-2025-21636" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21637" type="cve" id="CVE-2025-21637" title="CVE-2025-21637" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21638" type="cve" id="CVE-2025-21638" title="CVE-2025-21638" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21639" type="cve" id="CVE-2025-21639" title="CVE-2025-21639" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21640" type="cve" id="CVE-2025-21640" title="CVE-2025-21640" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21646" type="cve" id="CVE-2025-21646" title="CVE-2025-21646" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21648" type="cve" id="CVE-2025-21648" title="CVE-2025-21648" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21653" type="cve" id="CVE-2025-21653" title="CVE-2025-21653" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21678" type="cve" id="CVE-2025-21678" title="CVE-2025-21678" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21680" type="cve" id="CVE-2025-21680" title="CVE-2025-21680" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21681" type="cve" id="CVE-2025-21681" title="CVE-2025-21681" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21683" type="cve" id="CVE-2025-21683" title="CVE-2025-21683" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52924" type="cve" id="CVE-2023-52924" title="CVE-2023-52924" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52925" type="cve" id="CVE-2023-52925" title="CVE-2023-52925" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57949" type="cve" id="CVE-2024-57949" title="CVE-2024-57949" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21687" type="cve" id="CVE-2025-21687" title="CVE-2025-21687" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21688" type="cve" id="CVE-2025-21688" title="CVE-2025-21688" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21689" type="cve" id="CVE-2025-21689" title="CVE-2025-21689" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21690" type="cve" id="CVE-2025-21690" title="CVE-2025-21690" />
			<reference href="https://bdu.fstec.ru/vul/2025-06409" type="self" id="BDU:2025-06409" title="BDU:2025-06409" />
			<reference href="https://bdu.fstec.ru/vul/2025-00782" type="self" id="BDU:2025-00782" title="BDU:2025-00782" />
			<reference href="https://bdu.fstec.ru/vul/2024-03703" type="self" id="BDU:2024-03703" title="BDU:2024-03703" />
			<reference href="https://bdu.fstec.ru/vul/2025-02926" type="self" id="BDU:2025-02926" title="BDU:2025-02926" />
			<reference href="https://bdu.fstec.ru/vul/2025-04482" type="self" id="BDU:2025-04482" title="BDU:2025-04482" />
			<reference href="https://bdu.fstec.ru/vul/2025-06407" type="self" id="BDU:2025-06407" title="BDU:2025-06407" />
			<reference href="https://bdu.fstec.ru/vul/2025-03076" type="self" id="BDU:2025-03076" title="BDU:2025-03076" />
			<reference href="https://bdu.fstec.ru/vul/2025-06554" type="self" id="BDU:2025-06554" title="BDU:2025-06554" />
			<reference href="https://bdu.fstec.ru/vul/2025-05165" type="self" id="BDU:2025-05165" title="BDU:2025-05165" />
			<reference href="https://bdu.fstec.ru/vul/2025-06160" type="self" id="BDU:2025-06160" title="BDU:2025-06160" />
			<reference href="https://bdu.fstec.ru/vul/2025-03763" type="self" id="BDU:2025-03763" title="BDU:2025-03763" />
			<reference href="https://bdu.fstec.ru/vul/2025-06150" type="self" id="BDU:2025-06150" title="BDU:2025-06150" />
			<reference href="https://bdu.fstec.ru/vul/2025-06153" type="self" id="BDU:2025-06153" title="BDU:2025-06153" />
			<reference href="https://bdu.fstec.ru/vul/2025-02964" type="self" id="BDU:2025-02964" title="BDU:2025-02964" />
			<reference href="https://bdu.fstec.ru/vul/2025-03695" type="self" id="BDU:2025-03695" title="BDU:2025-03695" />
			<reference href="https://bdu.fstec.ru/vul/2025-04727" type="self" id="BDU:2025-04727" title="BDU:2025-04727" />
			<reference href="https://bdu.fstec.ru/vul/2025-02798" type="self" id="BDU:2025-02798" title="BDU:2025-02798" />
			<reference href="https://bdu.fstec.ru/vul/2025-06158" type="self" id="BDU:2025-06158" title="BDU:2025-06158" />
			<reference href="https://bdu.fstec.ru/vul/2025-06157" type="self" id="BDU:2025-06157" title="BDU:2025-06157" />
			<reference href="https://bdu.fstec.ru/vul/2025-06107" type="self" id="BDU:2025-06107" title="BDU:2025-06107" />
			<reference href="https://bdu.fstec.ru/vul/2025-06108" type="self" id="BDU:2025-06108" title="BDU:2025-06108" />
			<reference href="https://bdu.fstec.ru/vul/2025-06155" type="self" id="BDU:2025-06155" title="BDU:2025-06155" />
			<reference href="https://bdu.fstec.ru/vul/2025-06159" type="self" id="BDU:2025-06159" title="BDU:2025-06159" />
			<reference href="https://bdu.fstec.ru/vul/2025-06154" type="self" id="BDU:2025-06154" title="BDU:2025-06154" />
			<reference href="https://bdu.fstec.ru/vul/2025-06162" type="self" id="BDU:2025-06162" title="BDU:2025-06162" />
			<reference href="https://bdu.fstec.ru/vul/2025-01477" type="self" id="BDU:2025-01477" title="BDU:2025-01477" />
			<reference href="https://bdu.fstec.ru/vul/2025-01464" type="self" id="BDU:2025-01464" title="BDU:2025-01464" />
			<reference href="https://bdu.fstec.ru/vul/2025-01478" type="self" id="BDU:2025-01478" title="BDU:2025-01478" />
			<reference href="https://bdu.fstec.ru/vul/2025-01462" type="self" id="BDU:2025-01462" title="BDU:2025-01462" />
			<reference href="https://bdu.fstec.ru/vul/2025-06576" type="self" id="BDU:2025-06576" title="BDU:2025-06576" />
			<reference href="https://bdu.fstec.ru/vul/2025-01442" type="self" id="BDU:2025-01442" title="BDU:2025-01442" />
			<reference href="https://bdu.fstec.ru/vul/2025-01843" type="self" id="BDU:2025-01843" title="BDU:2025-01843" />
			<reference href="https://bdu.fstec.ru/vul/2025-01803" type="self" id="BDU:2025-01803" title="BDU:2025-01803" />
			<reference href="https://bdu.fstec.ru/vul/2025-01844" type="self" id="BDU:2025-01844" title="BDU:2025-01844" />
			<reference href="https://bdu.fstec.ru/vul/2025-01845" type="self" id="BDU:2025-01845" title="BDU:2025-01845" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250521-01</id>
		<issued date="2025-05-21" />
		<updated date="2025-05-22" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-210525/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-210525/" type="self" id="ROS-20250521-01" title="ROS-20250521-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57951" type="cve" id="CVE-2024-57951" title="CVE-2024-57951" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21692" type="cve" id="CVE-2025-21692" title="CVE-2025-21692" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21694" type="cve" id="CVE-2025-21694" title="CVE-2025-21694" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21697" type="cve" id="CVE-2025-21697" title="CVE-2025-21697" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21699" type="cve" id="CVE-2025-21699" title="CVE-2025-21699" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4453" type="cve" id="CVE-2021-4453" title="CVE-2021-4453" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47631" type="cve" id="CVE-2021-47631" title="CVE-2021-47631" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47632" type="cve" id="CVE-2021-47632" title="CVE-2021-47632" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47633" type="cve" id="CVE-2021-47633" title="CVE-2021-47633" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47634" type="cve" id="CVE-2021-47634" title="CVE-2021-47634" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47635" type="cve" id="CVE-2021-47635" title="CVE-2021-47635" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47636" type="cve" id="CVE-2021-47636" title="CVE-2021-47636" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47637" type="cve" id="CVE-2021-47637" title="CVE-2021-47637" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47638" type="cve" id="CVE-2021-47638" title="CVE-2021-47638" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47639" type="cve" id="CVE-2021-47639" title="CVE-2021-47639" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47640" type="cve" id="CVE-2021-47640" title="CVE-2021-47640" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47641" type="cve" id="CVE-2021-47641" title="CVE-2021-47641" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47642" type="cve" id="CVE-2021-47642" title="CVE-2021-47642" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47643" type="cve" id="CVE-2021-47643" title="CVE-2021-47643" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47644" type="cve" id="CVE-2021-47644" title="CVE-2021-47644" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47645" type="cve" id="CVE-2021-47645" title="CVE-2021-47645" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47646" type="cve" id="CVE-2021-47646" title="CVE-2021-47646" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47647" type="cve" id="CVE-2021-47647" title="CVE-2021-47647" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47648" type="cve" id="CVE-2021-47648" title="CVE-2021-47648" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47649" type="cve" id="CVE-2021-47649" title="CVE-2021-47649" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47650" type="cve" id="CVE-2021-47650" title="CVE-2021-47650" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47651" type="cve" id="CVE-2021-47651" title="CVE-2021-47651" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47652" type="cve" id="CVE-2021-47652" title="CVE-2021-47652" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47653" type="cve" id="CVE-2021-47653" title="CVE-2021-47653" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47654" type="cve" id="CVE-2021-47654" title="CVE-2021-47654" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47655" type="cve" id="CVE-2021-47655" title="CVE-2021-47655" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47656" type="cve" id="CVE-2021-47656" title="CVE-2021-47656" />
			<reference href="https://bdu.fstec.ru/vul/2025-12104" type="self" id="BDU:2025-12104" title="BDU:2025-12104" />
			<reference href="https://bdu.fstec.ru/vul/2025-01841" type="self" id="BDU:2025-01841" title="BDU:2025-01841" />
			<reference href="https://bdu.fstec.ru/vul/2025-11807" type="self" id="BDU:2025-11807" title="BDU:2025-11807" />
			<reference href="https://bdu.fstec.ru/vul/2025-12205" type="self" id="BDU:2025-12205" title="BDU:2025-12205" />
			<reference href="https://bdu.fstec.ru/vul/2025-11846" type="self" id="BDU:2025-11846" title="BDU:2025-11846" />
			<reference href="https://bdu.fstec.ru/vul/2026-02250" type="self" id="BDU:2026-02250" title="BDU:2026-02250" />
			<reference href="https://bdu.fstec.ru/vul/2025-10565" type="self" id="BDU:2025-10565" title="BDU:2025-10565" />
			<reference href="https://bdu.fstec.ru/vul/2026-03928" type="self" id="BDU:2026-03928" title="BDU:2026-03928" />
			<reference href="https://bdu.fstec.ru/vul/2025-04346" type="self" id="BDU:2025-04346" title="BDU:2025-04346" />
			<reference href="https://bdu.fstec.ru/vul/2026-03648" type="self" id="BDU:2026-03648" title="BDU:2026-03648" />
			<reference href="https://bdu.fstec.ru/vul/2026-03892" type="self" id="BDU:2026-03892" title="BDU:2026-03892" />
			<reference href="https://bdu.fstec.ru/vul/2026-04478" type="self" id="BDU:2026-04478" title="BDU:2026-04478" />
			<reference href="https://bdu.fstec.ru/vul/2025-04433" type="self" id="BDU:2025-04433" title="BDU:2025-04433" />
			<reference href="https://bdu.fstec.ru/vul/2026-03927" type="self" id="BDU:2026-03927" title="BDU:2026-03927" />
			<reference href="https://bdu.fstec.ru/vul/2026-03649" type="self" id="BDU:2026-03649" title="BDU:2026-03649" />
			<reference href="https://bdu.fstec.ru/vul/2025-04345" type="self" id="BDU:2025-04345" title="BDU:2025-04345" />
			<reference href="https://bdu.fstec.ru/vul/2026-03241" type="self" id="BDU:2026-03241" title="BDU:2026-03241" />
			<reference href="https://bdu.fstec.ru/vul/2025-04432" type="self" id="BDU:2025-04432" title="BDU:2025-04432" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250522-01</id>
		<issued date="2025-05-22" />
		<updated date="2025-05-22" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-220525/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-220525/" type="self" id="ROS-20250522-01" title="ROS-20250522-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49057" type="cve" id="CVE-2022-49057" title="CVE-2022-49057" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49058" type="cve" id="CVE-2022-49058" title="CVE-2022-49058" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49059" type="cve" id="CVE-2022-49059" title="CVE-2022-49059" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49060" type="cve" id="CVE-2022-49060" title="CVE-2022-49060" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49061" type="cve" id="CVE-2022-49061" title="CVE-2022-49061" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49062" type="cve" id="CVE-2022-49062" title="CVE-2022-49062" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49064" type="cve" id="CVE-2022-49064" title="CVE-2022-49064" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49065" type="cve" id="CVE-2022-49065" title="CVE-2022-49065" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49066" type="cve" id="CVE-2022-49066" title="CVE-2022-49066" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49067" type="cve" id="CVE-2022-49067" title="CVE-2022-49067" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49068" type="cve" id="CVE-2022-49068" title="CVE-2022-49068" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49070" type="cve" id="CVE-2022-49070" title="CVE-2022-49070" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49071" type="cve" id="CVE-2022-49071" title="CVE-2022-49071" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49072" type="cve" id="CVE-2022-49072" title="CVE-2022-49072" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49073" type="cve" id="CVE-2022-49073" title="CVE-2022-49073" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49074" type="cve" id="CVE-2022-49074" title="CVE-2022-49074" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49075" type="cve" id="CVE-2022-49075" title="CVE-2022-49075" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49077" type="cve" id="CVE-2022-49077" title="CVE-2022-49077" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49078" type="cve" id="CVE-2022-49078" title="CVE-2022-49078" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49080" type="cve" id="CVE-2022-49080" title="CVE-2022-49080" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49081" type="cve" id="CVE-2022-49081" title="CVE-2022-49081" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49082" type="cve" id="CVE-2022-49082" title="CVE-2022-49082" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49083" type="cve" id="CVE-2022-49083" title="CVE-2022-49083" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49084" type="cve" id="CVE-2022-49084" title="CVE-2022-49084" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49085" type="cve" id="CVE-2022-49085" title="CVE-2022-49085" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49086" type="cve" id="CVE-2022-49086" title="CVE-2022-49086" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49087" type="cve" id="CVE-2022-49087" title="CVE-2022-49087" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49088" type="cve" id="CVE-2022-49088" title="CVE-2022-49088" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49089" type="cve" id="CVE-2022-49089" title="CVE-2022-49089" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49090" type="cve" id="CVE-2022-49090" title="CVE-2022-49090" />
			<reference href="https://bdu.fstec.ru/vul/2025-04430" type="self" id="BDU:2025-04430" title="BDU:2025-04430" />
			<reference href="https://bdu.fstec.ru/vul/2025-06553" type="self" id="BDU:2025-06553" title="BDU:2025-06553" />
			<reference href="https://bdu.fstec.ru/vul/2025-06551" type="self" id="BDU:2025-06551" title="BDU:2025-06551" />
			<reference href="https://bdu.fstec.ru/vul/2025-06573" type="self" id="BDU:2025-06573" title="BDU:2025-06573" />
			<reference href="https://bdu.fstec.ru/vul/2025-06552" type="self" id="BDU:2025-06552" title="BDU:2025-06552" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250526-01</id>
		<issued date="2025-05-26" />
		<updated date="2025-05-26" />
		<title>Множественные уязвимости linux-firmware </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в linux-firmware</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-linux-firmware-cve-2024-23984-cve-2024-24968/</description>
               <solution>
                    Запретить использование в ОС пакета linux-firmware
                или
                    Установить обновление для пакета(ов) linux-firmware
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-linux-firmware-cve-2024-23984-cve-2024-24968/" type="self" id="ROS-20250526-01" title="ROS-20250526-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23984" type="cve" id="CVE-2024-23984" title="CVE-2024-23984" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24968" type="cve" id="CVE-2024-24968" title="CVE-2024-24968" />
			<reference href="https://bdu.fstec.ru/vul/2024-08651" type="self" id="BDU:2024-08651" title="BDU:2024-08651" />
			<reference href="https://bdu.fstec.ru/vul/2024-08654" type="self" id="BDU:2024-08654" title="BDU:2024-08654" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="linux-firmware" epoch="0" version="20250109" release="1.el7.3" arch="noarch" src="">
					<filename>linux-firmware-0:20250109-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250526-02</id>
		<issued date="2025-05-26" />
		<updated date="2025-05-26" />
		<title>Уязвимость nomad </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nomad</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nomad-cve-2024-24789/</description>
               <solution>
                    Запретить использование в ОС пакета nomad
                или
                    Установить обновление для пакета(ов) nomad
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nomad-cve-2024-24789/" type="self" id="ROS-20250526-02" title="ROS-20250526-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24789" type="cve" id="CVE-2024-24789" title="CVE-2024-24789" />
			<reference href="https://bdu.fstec.ru/vul/2024-04485" type="self" id="BDU:2024-04485" title="BDU:2024-04485" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nomad" epoch="0" version="1.8.2" release="1.el7" arch="x86_64" src="">
					<filename>nomad-0:1.8.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250526-03</id>
		<issued date="2025-05-26" />
		<updated date="2025-05-26" />
		<title>Уязвимость nomad </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nomad</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nomad-cve-2024-6717/</description>
               <solution>
                    Запретить использование в ОС пакета Nomad
                или
                    Установить обновление для пакета(ов) Nomad
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nomad-cve-2024-6717/" type="self" id="ROS-20250526-03" title="ROS-20250526-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6717" type="cve" id="CVE-2024-6717" title="CVE-2024-6717" />
			<reference href="https://bdu.fstec.ru/vul/2025-06168" type="self" id="BDU:2025-06168" title="BDU:2025-06168" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nomad" epoch="0" version="1.9.7" release="1.el7" arch="x86_64" src="">
					<filename>nomad-0:1.9.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250526-04</id>
		<issued date="2025-05-26" />
		<updated date="2025-05-26" />
		<title>Уязвимость nomad </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в nomad</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nomad-cve-2023-3072/</description>
               <solution>
                    Запретить использование в ОС пакета Nomad
                или
                    Установить обновление для пакета(ов) Nomad
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nomad-cve-2023-3072/" type="self" id="ROS-20250526-04" title="ROS-20250526-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3072" type="cve" id="CVE-2023-3072" title="CVE-2023-3072" />
			<reference href="https://bdu.fstec.ru/vul/2025-06166" type="self" id="BDU:2025-06166" title="BDU:2025-06166" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nomad" epoch="0" version="1.9.7" release="1.el7" arch="x86_64" src="">
					<filename>nomad-0:1.9.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250526-05</id>
		<issued date="2025-05-26" />
		<updated date="2025-05-26" />
		<title>Множественные уязвимости nomad</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nomad</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nomad-260525/</description>
               <solution>
                    Запретить использование в ОС пакета Nomad
                или
                    Установить обновление для пакета(ов) Nomad
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nomad-260525/" type="self" id="ROS-20250526-05" title="ROS-20250526-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1296" type="cve" id="CVE-2023-1296" title="CVE-2023-1296" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3300" type="cve" id="CVE-2023-3300" title="CVE-2023-3300" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3299" type="cve" id="CVE-2023-3299" title="CVE-2023-3299" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0821" type="cve" id="CVE-2023-0821" title="CVE-2023-0821" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41606" type="cve" id="CVE-2022-41606" title="CVE-2022-41606" />
			<reference href="https://bdu.fstec.ru/vul/2025-06173" type="self" id="BDU:2025-06173" title="BDU:2025-06173" />
			<reference href="https://bdu.fstec.ru/vul/2025-06167" type="self" id="BDU:2025-06167" title="BDU:2025-06167" />
			<reference href="https://bdu.fstec.ru/vul/2025-06176" type="self" id="BDU:2025-06176" title="BDU:2025-06176" />
			<reference href="https://bdu.fstec.ru/vul/2023-01744" type="self" id="BDU:2023-01744" title="BDU:2023-01744" />
			<reference href="https://bdu.fstec.ru/vul/2025-06169" type="self" id="BDU:2025-06169" title="BDU:2025-06169" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nomad" epoch="0" version="1.9.7" release="1.el7" arch="x86_64" src="">
					<filename>nomad-0:1.9.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250526-06</id>
		<issued date="2025-05-26" />
		<updated date="2025-05-26" />
		<title>Множественные уязвимости vault</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в vault</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vault-260525/</description>
               <solution>
                    Запретить использование в ОС пакета vault
                или
                    Установить обновление для пакета(ов) vault
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vault-260525/" type="self" id="ROS-20250526-06" title="ROS-20250526-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25000" type="cve" id="CVE-2023-25000" title="CVE-2023-25000" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41316" type="cve" id="CVE-2022-41316" title="CVE-2022-41316" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2121" type="cve" id="CVE-2023-2121" title="CVE-2023-2121" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0620" type="cve" id="CVE-2023-0620" title="CVE-2023-0620" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0665" type="cve" id="CVE-2023-0665" title="CVE-2023-0665" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24999" type="cve" id="CVE-2023-24999" title="CVE-2023-24999" />
			<reference href="https://bdu.fstec.ru/vul/2025-06185" type="self" id="BDU:2025-06185" title="BDU:2025-06185" />
			<reference href="https://bdu.fstec.ru/vul/2025-06184" type="self" id="BDU:2025-06184" title="BDU:2025-06184" />
			<reference href="https://bdu.fstec.ru/vul/2025-06183" type="self" id="BDU:2025-06183" title="BDU:2025-06183" />
			<reference href="https://bdu.fstec.ru/vul/2024-01786" type="self" id="BDU:2024-01786" title="BDU:2024-01786" />
			<reference href="https://bdu.fstec.ru/vul/2025-06181" type="self" id="BDU:2025-06181" title="BDU:2025-06181" />
			<reference href="https://bdu.fstec.ru/vul/2025-06177" type="self" id="BDU:2025-06177" title="BDU:2025-06177" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vault" epoch="0" version="1.18.1" release="1.el7" arch="x86_64" src="">
					<filename>vault-0:1.18.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250526-07</id>
		<issued date="2025-05-26" />
		<updated date="2025-05-26" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-3066/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-3066/" type="self" id="ROS-20250526-07" title="ROS-20250526-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3066" type="cve" id="CVE-2025-3066" title="CVE-2025-3066" />
			<reference href="https://bdu.fstec.ru/vul/2025-04006" type="self" id="BDU:2025-04006" title="BDU:2025-04006" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="135.0.7049.114" release="1.el7" arch="x86_64" src="">
					<filename>chromium-0:135.0.7049.114-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250505-31</id>
		<issued date="2025-05-26" />
		<updated date="2025-05-26" />
		<title>Уязвимость python2-libxml2 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python2-libxml2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python2-libxml2-cve-2025-324153277/</description>
               <solution>
                    Запретить использование в ОС пакета python2-libxml2
                или
                    Установить обновление для пакета(ов) python2-libxml2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python2-libxml2-cve-2025-324153277/" type="self" id="ROS-20250505-31" title="ROS-20250505-31" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32415" type="cve" id="CVE-2025-32415" title="CVE-2025-32415" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python2-libxml2" epoch="0" version="2.9.8" release="19.el7.3" arch="x86_64" src="">
					<filename>python2-libxml2-0:2.9.8-19.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250505-32</id>
		<issued date="2025-05-26" />
		<updated date="2025-05-26" />
		<title>Уязвимость python3-libxml2 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-libxml2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-libxml2-cve-2025-3241532778241/</description>
               <solution>
                    Запретить использование в ОС пакета python3-libxml2
                или
                    Установить обновление для пакета(ов) python3-libxml2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-libxml2-cve-2025-3241532778241/" type="self" id="ROS-20250505-32" title="ROS-20250505-32" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32415" type="cve" id="CVE-2025-32415" title="CVE-2025-32415" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-libxml2" epoch="0" version="2.9.8" release="19.el7.3" arch="x86_64" src="">
					<filename>python3-libxml2-0:2.9.8-19.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250424-33</id>
		<issued date="2025-05-26" />
		<updated date="2025-05-26" />
		<title>Уязвимость python3-libxml2 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-libxml2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-libxml2-cve-2025-324143990/</description>
               <solution>
                    Запретить использование в ОС пакета python3-libxml2
                или
                    Установить обновление для пакета(ов) python3-libxml2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-libxml2-cve-2025-324143990/" type="self" id="ROS-20250424-33" title="ROS-20250424-33" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32414" type="cve" id="CVE-2025-32414" title="CVE-2025-32414" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-libxml2" epoch="0" version="2.9.8" release="17.el7.3" arch="x86_64" src="">
					<filename>python3-libxml2-0:2.9.8-17.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250526-08</id>
		<issued date="2025-05-26" />
		<updated date="2025-05-26" />
		<title>Уязвимость libsoup </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libsoup</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libsoup-cve-2025-46420/</description>
               <solution>
                    Запретить использование в ОС пакета libsoup
                или
                    Установить обновление для пакета(ов) libsoup
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libsoup-cve-2025-46420/" type="self" id="ROS-20250526-08" title="ROS-20250526-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46420" type="cve" id="CVE-2025-46420" title="CVE-2025-46420" />
			<reference href="https://bdu.fstec.ru/vul/2025-06114" type="self" id="BDU:2025-06114" title="BDU:2025-06114" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libsoup" epoch="0" version="2.74.3" release="3.el7" arch="x86_64" src="">
					<filename>libsoup-0:2.74.3-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250526-09</id>
		<issued date="2025-05-26" />
		<updated date="2025-05-26" />
		<title>Множественные уязвимости moodle </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-moodle-cve-2025-32045-cve-2025-3635-cve-2025-3634-cve-2025-3627/</description>
               <solution>
                    Запретить использование в ОС пакета Moodle
                или
                    Установить обновление для пакета(ов) Moodle
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-moodle-cve-2025-32045-cve-2025-3635-cve-2025-3634-cve-2025-3627/" type="self" id="ROS-20250526-09" title="ROS-20250526-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32045" type="cve" id="CVE-2025-32045" title="CVE-2025-32045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3635" type="cve" id="CVE-2025-3635" title="CVE-2025-3635" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3634" type="cve" id="CVE-2025-3634" title="CVE-2025-3634" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3627" type="cve" id="CVE-2025-3627" title="CVE-2025-3627" />
			<reference href="https://bdu.fstec.ru/vul/2025-06112" type="self" id="BDU:2025-06112" title="BDU:2025-06112" />
			<reference href="https://bdu.fstec.ru/vul/2025-05107" type="self" id="BDU:2025-05107" title="BDU:2025-05107" />
			<reference href="https://bdu.fstec.ru/vul/2025-05108" type="self" id="BDU:2025-05108" title="BDU:2025-05108" />
			<reference href="https://bdu.fstec.ru/vul/2025-05110" type="self" id="BDU:2025-05110" title="BDU:2025-05110" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="moodle" epoch="0" version="4.3.12" release="1.el7" arch="noarch" src="">
					<filename>moodle-0:4.3.12-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250424-34</id>
		<issued date="2025-05-27" />
		<updated date="2025-05-27" />
		<title>Уязвимость python2-libxml2 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python2-libxml2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python2-libxml2-cve-2025-3241439901528/</description>
               <solution>
                    Запретить использование в ОС пакета python2-libxml2
                или
                    Установить обновление для пакета(ов) python2-libxml2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python2-libxml2-cve-2025-3241439901528/" type="self" id="ROS-20250424-34" title="ROS-20250424-34" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32414" type="cve" id="CVE-2025-32414" title="CVE-2025-32414" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python2-libxml2" epoch="0" version="2.9.8" release="17.el7.3" arch="x86_64" src="">
					<filename>python2-libxml2-0:2.9.8-17.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250528-01</id>
		<issued date="2025-05-28" />
		<updated date="2025-05-28" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-280525/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-280525/" type="self" id="ROS-20250528-01" title="ROS-20250528-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52936" type="cve" id="CVE-2023-52936" title="CVE-2023-52936" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52937" type="cve" id="CVE-2023-52937" title="CVE-2023-52937" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52938" type="cve" id="CVE-2023-52938" title="CVE-2023-52938" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52940" type="cve" id="CVE-2023-52940" title="CVE-2023-52940" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52941" type="cve" id="CVE-2023-52941" title="CVE-2023-52941" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52942" type="cve" id="CVE-2023-52942" title="CVE-2023-52942" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52973" type="cve" id="CVE-2023-52973" title="CVE-2023-52973" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52974" type="cve" id="CVE-2023-52974" title="CVE-2023-52974" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52975" type="cve" id="CVE-2023-52975" title="CVE-2023-52975" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52976" type="cve" id="CVE-2023-52976" title="CVE-2023-52976" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52977" type="cve" id="CVE-2023-52977" title="CVE-2023-52977" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52978" type="cve" id="CVE-2023-52978" title="CVE-2023-52978" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52979" type="cve" id="CVE-2023-52979" title="CVE-2023-52979" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52980" type="cve" id="CVE-2023-52980" title="CVE-2023-52980" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52982" type="cve" id="CVE-2023-52982" title="CVE-2023-52982" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52983" type="cve" id="CVE-2023-52983" title="CVE-2023-52983" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52984" type="cve" id="CVE-2023-52984" title="CVE-2023-52984" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52985" type="cve" id="CVE-2023-52985" title="CVE-2023-52985" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52986" type="cve" id="CVE-2023-52986" title="CVE-2023-52986" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52987" type="cve" id="CVE-2023-52987" title="CVE-2023-52987" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52988" type="cve" id="CVE-2023-52988" title="CVE-2023-52988" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52989" type="cve" id="CVE-2023-52989" title="CVE-2023-52989" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52991" type="cve" id="CVE-2023-52991" title="CVE-2023-52991" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52992" type="cve" id="CVE-2023-52992" title="CVE-2023-52992" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52993" type="cve" id="CVE-2023-52993" title="CVE-2023-52993" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52994" type="cve" id="CVE-2023-52994" title="CVE-2023-52994" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52995" type="cve" id="CVE-2023-52995" title="CVE-2023-52995" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52996" type="cve" id="CVE-2023-52996" title="CVE-2023-52996" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52997" type="cve" id="CVE-2023-52997" title="CVE-2023-52997" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52998" type="cve" id="CVE-2023-52998" title="CVE-2023-52998" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250529-01</id>
		<issued date="2025-05-29" />
		<updated date="2025-05-29" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-290525/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-290525/" type="self" id="ROS-20250529-01" title="ROS-20250529-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49738" type="cve" id="CVE-2022-49738" title="CVE-2022-49738" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49739" type="cve" id="CVE-2022-49739" title="CVE-2022-49739" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49740" type="cve" id="CVE-2022-49740" title="CVE-2022-49740" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49741" type="cve" id="CVE-2022-49741" title="CVE-2022-49741" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49743" type="cve" id="CVE-2022-49743" title="CVE-2022-49743" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49744" type="cve" id="CVE-2022-49744" title="CVE-2022-49744" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49745" type="cve" id="CVE-2022-49745" title="CVE-2022-49745" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49746" type="cve" id="CVE-2022-49746" title="CVE-2022-49746" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49747" type="cve" id="CVE-2022-49747" title="CVE-2022-49747" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49748" type="cve" id="CVE-2022-49748" title="CVE-2022-49748" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49749" type="cve" id="CVE-2022-49749" title="CVE-2022-49749" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49751" type="cve" id="CVE-2022-49751" title="CVE-2022-49751" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49752" type="cve" id="CVE-2022-49752" title="CVE-2022-49752" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49753" type="cve" id="CVE-2022-49753" title="CVE-2022-49753" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49754" type="cve" id="CVE-2022-49754" title="CVE-2022-49754" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49755" type="cve" id="CVE-2022-49755" title="CVE-2022-49755" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49756" type="cve" id="CVE-2022-49756" title="CVE-2022-49756" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49757" type="cve" id="CVE-2022-49757" title="CVE-2022-49757" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49758" type="cve" id="CVE-2022-49758" title="CVE-2022-49758" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49759" type="cve" id="CVE-2022-49759" title="CVE-2022-49759" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49760" type="cve" id="CVE-2022-49760" title="CVE-2022-49760" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49761" type="cve" id="CVE-2022-49761" title="CVE-2022-49761" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52928" type="cve" id="CVE-2023-52928" title="CVE-2023-52928" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52929" type="cve" id="CVE-2023-52929" title="CVE-2023-52929" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52930" type="cve" id="CVE-2023-52930" title="CVE-2023-52930" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52931" type="cve" id="CVE-2023-52931" title="CVE-2023-52931" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52932" type="cve" id="CVE-2023-52932" title="CVE-2023-52932" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52933" type="cve" id="CVE-2023-52933" title="CVE-2023-52933" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52934" type="cve" id="CVE-2023-52934" title="CVE-2023-52934" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52999" type="cve" id="CVE-2023-52999" title="CVE-2023-52999" />
			<reference href="https://bdu.fstec.ru/vul/2025-06286" type="self" id="BDU:2025-06286" title="BDU:2025-06286" />
			<reference href="https://bdu.fstec.ru/vul/2025-06291" type="self" id="BDU:2025-06291" title="BDU:2025-06291" />
			<reference href="https://bdu.fstec.ru/vul/2025-06292" type="self" id="BDU:2025-06292" title="BDU:2025-06292" />
			<reference href="https://bdu.fstec.ru/vul/2025-06293" type="self" id="BDU:2025-06293" title="BDU:2025-06293" />
			<reference href="https://bdu.fstec.ru/vul/2025-06212" type="self" id="BDU:2025-06212" title="BDU:2025-06212" />
			<reference href="https://bdu.fstec.ru/vul/2025-06294" type="self" id="BDU:2025-06294" title="BDU:2025-06294" />
			<reference href="https://bdu.fstec.ru/vul/2025-06295" type="self" id="BDU:2025-06295" title="BDU:2025-06295" />
			<reference href="https://bdu.fstec.ru/vul/2025-06296" type="self" id="BDU:2025-06296" title="BDU:2025-06296" />
			<reference href="https://bdu.fstec.ru/vul/2025-06297" type="self" id="BDU:2025-06297" title="BDU:2025-06297" />
			<reference href="https://bdu.fstec.ru/vul/2025-06287" type="self" id="BDU:2025-06287" title="BDU:2025-06287" />
			<reference href="https://bdu.fstec.ru/vul/2025-06288" type="self" id="BDU:2025-06288" title="BDU:2025-06288" />
			<reference href="https://bdu.fstec.ru/vul/2025-06289" type="self" id="BDU:2025-06289" title="BDU:2025-06289" />
			<reference href="https://bdu.fstec.ru/vul/2025-06298" type="self" id="BDU:2025-06298" title="BDU:2025-06298" />
			<reference href="https://bdu.fstec.ru/vul/2025-06299" type="self" id="BDU:2025-06299" title="BDU:2025-06299" />
			<reference href="https://bdu.fstec.ru/vul/2025-06300" type="self" id="BDU:2025-06300" title="BDU:2025-06300" />
			<reference href="https://bdu.fstec.ru/vul/2025-06301" type="self" id="BDU:2025-06301" title="BDU:2025-06301" />
			<reference href="https://bdu.fstec.ru/vul/2025-06302" type="self" id="BDU:2025-06302" title="BDU:2025-06302" />
			<reference href="https://bdu.fstec.ru/vul/2025-06303" type="self" id="BDU:2025-06303" title="BDU:2025-06303" />
			<reference href="https://bdu.fstec.ru/vul/2025-06304" type="self" id="BDU:2025-06304" title="BDU:2025-06304" />
			<reference href="https://bdu.fstec.ru/vul/2025-06216" type="self" id="BDU:2025-06216" title="BDU:2025-06216" />
			<reference href="https://bdu.fstec.ru/vul/2025-06305" type="self" id="BDU:2025-06305" title="BDU:2025-06305" />
			<reference href="https://bdu.fstec.ru/vul/2025-06308" type="self" id="BDU:2025-06308" title="BDU:2025-06308" />
			<reference href="https://bdu.fstec.ru/vul/2025-06309" type="self" id="BDU:2025-06309" title="BDU:2025-06309" />
			<reference href="https://bdu.fstec.ru/vul/2025-06310" type="self" id="BDU:2025-06310" title="BDU:2025-06310" />
			<reference href="https://bdu.fstec.ru/vul/2025-06311" type="self" id="BDU:2025-06311" title="BDU:2025-06311" />
			<reference href="https://bdu.fstec.ru/vul/2025-06313" type="self" id="BDU:2025-06313" title="BDU:2025-06313" />
			<reference href="https://bdu.fstec.ru/vul/2025-06290" type="self" id="BDU:2025-06290" title="BDU:2025-06290" />
			<reference href="https://bdu.fstec.ru/vul/2025-06315" type="self" id="BDU:2025-06315" title="BDU:2025-06315" />
			<reference href="https://bdu.fstec.ru/vul/2025-06317" type="self" id="BDU:2025-06317" title="BDU:2025-06317" />
			<reference href="https://bdu.fstec.ru/vul/2025-06318" type="self" id="BDU:2025-06318" title="BDU:2025-06318" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250602-01</id>
		<issued date="2025-06-02" />
		<updated date="2025-06-02" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-020625/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-020625/" type="self" id="ROS-20250602-01" title="ROS-20250602-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58087" type="cve" id="CVE-2024-58087" title="CVE-2024-58087" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4454" type="cve" id="CVE-2021-4454" title="CVE-2021-4454" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53000" type="cve" id="CVE-2023-53000" title="CVE-2023-53000" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53003" type="cve" id="CVE-2023-53003" title="CVE-2023-53003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53004" type="cve" id="CVE-2023-53004" title="CVE-2023-53004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53005" type="cve" id="CVE-2023-53005" title="CVE-2023-53005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53006" type="cve" id="CVE-2023-53006" title="CVE-2023-53006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53007" type="cve" id="CVE-2023-53007" title="CVE-2023-53007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53011" type="cve" id="CVE-2023-53011" title="CVE-2023-53011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53012" type="cve" id="CVE-2023-53012" title="CVE-2023-53012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53013" type="cve" id="CVE-2023-53013" title="CVE-2023-53013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53014" type="cve" id="CVE-2023-53014" title="CVE-2023-53014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53015" type="cve" id="CVE-2023-53015" title="CVE-2023-53015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53016" type="cve" id="CVE-2023-53016" title="CVE-2023-53016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53017" type="cve" id="CVE-2023-53017" title="CVE-2023-53017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53018" type="cve" id="CVE-2023-53018" title="CVE-2023-53018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53019" type="cve" id="CVE-2023-53019" title="CVE-2023-53019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53020" type="cve" id="CVE-2023-53020" title="CVE-2023-53020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53021" type="cve" id="CVE-2023-53021" title="CVE-2023-53021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53022" type="cve" id="CVE-2023-53022" title="CVE-2023-53022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53023" type="cve" id="CVE-2023-53023" title="CVE-2023-53023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53024" type="cve" id="CVE-2023-53024" title="CVE-2023-53024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53025" type="cve" id="CVE-2023-53025" title="CVE-2023-53025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53026" type="cve" id="CVE-2023-53026" title="CVE-2023-53026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53028" type="cve" id="CVE-2023-53028" title="CVE-2023-53028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53029" type="cve" id="CVE-2023-53029" title="CVE-2023-53029" />
			<reference href="https://bdu.fstec.ru/vul/2025-03943" type="self" id="BDU:2025-03943" title="BDU:2025-03943" />
			<reference href="https://bdu.fstec.ru/vul/2025-06340" type="self" id="BDU:2025-06340" title="BDU:2025-06340" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250609-01</id>
		<issued date="2025-06-09" />
		<updated date="2025-06-09" />
		<title>Уязвимость jackson-databind </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в jackson-databind</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jackson-databind-cve-2020-25649/</description>
               <solution>
                    Запретить использование в ОС пакета jackson-databind
                или
                    Установить обновление для пакета(ов) jackson-databind
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jackson-databind-cve-2020-25649/" type="self" id="ROS-20250609-01" title="ROS-20250609-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25649" type="cve" id="CVE-2020-25649" title="CVE-2020-25649" />
			<reference href="https://bdu.fstec.ru/vul/2022-05602" type="self" id="BDU:2022-05602" title="BDU:2022-05602" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jackson-databind" epoch="0" version="2.11.4" release="1.el7" arch="noarch" src="">
					<filename>jackson-databind-0:2.11.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250616-01</id>
		<issued date="2025-06-16" />
		<updated date="2025-06-16" />
		<title>Уязвимость gstreamer1-plugins-base </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gstreamer1-plugins-base</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gstreamer1-plugins-base-cve-2024-47835/</description>
               <solution>
                    Запретить использование в ОС пакета gstreamer1-plugins-base
                или
                    Установить обновление для пакета(ов) gstreamer1-plugins-base
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gstreamer1-plugins-base-cve-2024-47835/" type="self" id="ROS-20250616-01" title="ROS-20250616-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47835" type="cve" id="CVE-2024-47835" title="CVE-2024-47835" />
			<reference href="https://bdu.fstec.ru/vul/2024-11294" type="self" id="BDU:2024-11294" title="BDU:2024-11294" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gstreamer1-plugins-base" epoch="0" version="1.16.3" release="4.el7" arch="x86_64" src="">
					<filename>gstreamer1-plugins-base-0:1.16.3-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250616-02</id>
		<issued date="2025-06-16" />
		<updated date="2025-06-16" />
		<title>Уязвимость poppler </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в poppler</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-poppler-cve-2024-56378/</description>
               <solution>
                    Запретить использование в ОС пакета Poppler
                или
                    Установить обновление для пакета(ов) Poppler
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-poppler-cve-2024-56378/" type="self" id="ROS-20250616-02" title="ROS-20250616-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56378" type="cve" id="CVE-2024-56378" title="CVE-2024-56378" />
			<reference href="https://bdu.fstec.ru/vul/2025-06968" type="self" id="BDU:2025-06968" title="BDU:2025-06968" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="poppler" epoch="0" version="21.08.0" release="17.el7" arch="x86_64" src="">
					<filename>poppler-0:21.08.0-17.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250616-03</id>
		<issued date="2025-06-16" />
		<updated date="2025-06-16" />
		<title>Уязвимость rubygem-rack </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в rubygem-rack</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-rack-cve-2025-25184/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-rack
                или
                    Установить обновление для пакета(ов) rubygem-rack
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-rack-cve-2025-25184/" type="self" id="ROS-20250616-03" title="ROS-20250616-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-25184" type="cve" id="CVE-2025-25184" title="CVE-2025-25184" />
			<reference href="https://bdu.fstec.ru/vul/2025-07021" type="self" id="BDU:2025-07021" title="BDU:2025-07021" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-rack" epoch="1" version="2.2.16" release="1.el7" arch="noarch" src="">
					<filename>rubygem-rack-1:2.2.16-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250616-04</id>
		<issued date="2025-06-16" />
		<updated date="2025-06-16" />
		<title>Уязвимость libxml2 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libxml2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libxml2-cve-2024-56171/</description>
               <solution>
                    Запретить использование в ОС пакета libxml2
                или
                    Установить обновление для пакета(ов) libxml2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libxml2-cve-2024-56171/" type="self" id="ROS-20250616-04" title="ROS-20250616-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56171" type="cve" id="CVE-2024-56171" title="CVE-2024-56171" />
			<reference href="https://bdu.fstec.ru/vul/2025-06438" type="self" id="BDU:2025-06438" title="BDU:2025-06438" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libxml2" epoch="0" version="2.9.8" release="20.el7.3" arch="x86_64" src="">
					<filename>libxml2-0:2.9.8-20.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250616-05</id>
		<issued date="2025-06-16" />
		<updated date="2025-06-16" />
		<title>Множественные уязвимости assimp</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в assimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-assimp-160625/</description>
               <solution>
                    Запретить использование в ОС пакета Assimp
                или
                    Установить обновление для пакета(ов) Assimp
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-assimp-160625/" type="self" id="ROS-20250616-05" title="ROS-20250616-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3548" type="cve" id="CVE-2025-3548" title="CVE-2025-3548" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3159" type="cve" id="CVE-2025-3159" title="CVE-2025-3159" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2152" type="cve" id="CVE-2025-2152" title="CVE-2025-2152" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2151" type="cve" id="CVE-2025-2151" title="CVE-2025-2151" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48423" type="cve" id="CVE-2024-48423" title="CVE-2024-48423" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53425" type="cve" id="CVE-2024-53425" title="CVE-2024-53425" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3196" type="cve" id="CVE-2025-3196" title="CVE-2025-3196" />
			<reference href="https://bdu.fstec.ru/vul/2025-07019" type="self" id="BDU:2025-07019" title="BDU:2025-07019" />
			<reference href="https://bdu.fstec.ru/vul/2025-07008" type="self" id="BDU:2025-07008" title="BDU:2025-07008" />
			<reference href="https://bdu.fstec.ru/vul/2025-07007" type="self" id="BDU:2025-07007" title="BDU:2025-07007" />
			<reference href="https://bdu.fstec.ru/vul/2025-07006" type="self" id="BDU:2025-07006" title="BDU:2025-07006" />
			<reference href="https://bdu.fstec.ru/vul/2025-07005" type="self" id="BDU:2025-07005" title="BDU:2025-07005" />
			<reference href="https://bdu.fstec.ru/vul/2025-02258" type="self" id="BDU:2025-02258" title="BDU:2025-02258" />
			<reference href="https://bdu.fstec.ru/vul/2025-07004" type="self" id="BDU:2025-07004" title="BDU:2025-07004" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="assimp" epoch="0" version="5.4.3" release="2.el7" arch="x86_64" src="">
					<filename>assimp-0:5.4.3-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250616-06</id>
		<issued date="2025-06-16" />
		<updated date="2025-06-16" />
		<title>Уязвимость upx </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в upx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-upx-cve-2025-2849/</description>
               <solution>
                    Запретить использование в ОС пакета upx
                или
                    Установить обновление для пакета(ов) upx
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-upx-cve-2025-2849/" type="self" id="ROS-20250616-06" title="ROS-20250616-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2849" type="cve" id="CVE-2025-2849" title="CVE-2025-2849" />
			<reference href="https://bdu.fstec.ru/vul/2025-06969" type="self" id="BDU:2025-06969" title="BDU:2025-06969" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="upx" epoch="0" version="5.0.1" release="1.el7" arch="x86_64" src="">
					<filename>upx-0:5.0.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250616-07</id>
		<issued date="2025-06-16" />
		<updated date="2025-06-16" />
		<title>Множественные уязвимости mbedtls </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mbedtls</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mbedtls-cve-2025-27809-cve-2025-27810/</description>
               <solution>
                    Запретить использование в ОС пакета MbedTLS
                или
                    Установить обновление для пакета(ов) MbedTLS
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mbedtls-cve-2025-27809-cve-2025-27810/" type="self" id="ROS-20250616-07" title="ROS-20250616-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27809" type="cve" id="CVE-2025-27809" title="CVE-2025-27809" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27810" type="cve" id="CVE-2025-27810" title="CVE-2025-27810" />
			<reference href="https://bdu.fstec.ru/vul/2025-06869" type="self" id="BDU:2025-06869" title="BDU:2025-06869" />
			<reference href="https://bdu.fstec.ru/vul/2025-06868" type="self" id="BDU:2025-06868" title="BDU:2025-06868" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mbedtls" epoch="0" version="2.28.10" release="1.el7" arch="x86_64" src="">
					<filename>mbedtls-0:2.28.10-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250616-08</id>
		<issued date="2025-06-16" />
		<updated date="2025-06-16" />
		<title>Множественные уязвимости firefox</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-160625/</description>
               <solution>
                    Запретить использование в ОС пакета firefox
                или
                    Установить обновление для пакета(ов) firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-160625/" type="self" id="ROS-20250616-08" title="ROS-20250616-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4083" type="cve" id="CVE-2025-4083" title="CVE-2025-4083" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4918" type="cve" id="CVE-2025-4918" title="CVE-2025-4918" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4919" type="cve" id="CVE-2025-4919" title="CVE-2025-4919" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5263" type="cve" id="CVE-2025-5263" title="CVE-2025-5263" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5264" type="cve" id="CVE-2025-5264" title="CVE-2025-5264" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.24.0" release="1.el7" arch="x86_64" src="">
					<filename>firefox-0:115.24.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250616-09</id>
		<issued date="2025-06-16" />
		<updated date="2025-06-16" />
		<title>Уязвимость php-adodb </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в php-adodb</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-adodb-cve-2025-46337/</description>
               <solution>
                    Запретить использование в ОС пакета php-adodb
                или
                    Установить обновление для пакета(ов) php-adodb
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-adodb-cve-2025-46337/" type="self" id="ROS-20250616-09" title="ROS-20250616-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46337" type="cve" id="CVE-2025-46337" title="CVE-2025-46337" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php-adodb" epoch="0" version="5.22.7" release="2.el7" arch="noarch" src="">
					<filename>php-adodb-0:5.22.7-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250616-10</id>
		<issued date="2025-06-16" />
		<updated date="2025-06-16" />
		<title>Уязвимость vault </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в vault</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vault-cve-2025-4166/</description>
               <solution>
                    Запретить использование в ОС пакета Vault
                или
                    Установить обновление для пакета(ов) Vault
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vault-cve-2025-4166/" type="self" id="ROS-20250616-10" title="ROS-20250616-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4166" type="cve" id="CVE-2025-4166" title="CVE-2025-4166" />
			<reference href="https://bdu.fstec.ru/vul/2025-06973" type="self" id="BDU:2025-06973" title="BDU:2025-06973" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vault" epoch="0" version="1.19.3" release="1.el7" arch="x86_64" src="">
					<filename>vault-0:1.19.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250616-11</id>
		<issued date="2025-06-16" />
		<updated date="2025-06-16" />
		<title>Множественные уязвимости moodle </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-moodle-cve-2025-32044-cve-2025-3628/</description>
               <solution>
                    Запретить использование в ОС пакета Moodle
                или
                    Установить обновление для пакета(ов) Moodle
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-moodle-cve-2025-32044-cve-2025-3628/" type="self" id="ROS-20250616-11" title="ROS-20250616-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32044" type="cve" id="CVE-2025-32044" title="CVE-2025-32044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3628" type="cve" id="CVE-2025-3628" title="CVE-2025-3628" />
			<reference href="https://bdu.fstec.ru/vul/2025-06871" type="self" id="BDU:2025-06871" title="BDU:2025-06871" />
			<reference href="https://bdu.fstec.ru/vul/2025-05109" type="self" id="BDU:2025-05109" title="BDU:2025-05109" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="moodle" epoch="0" version="4.5.4" release="1.el7" arch="noarch" src="">
					<filename>moodle-0:4.5.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250616-12</id>
		<issued date="2025-06-16" />
		<updated date="2025-06-16" />
		<title>Уязвимость postgresql13 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в postgresql13</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql13-cve-2025-4207/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql13
                или
                    Установить обновление для пакета(ов) postgresql13
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql13-cve-2025-4207/" type="self" id="ROS-20250616-12" title="ROS-20250616-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4207" type="cve" id="CVE-2025-4207" title="CVE-2025-4207" />
			<reference href="https://bdu.fstec.ru/vul/2025-05405" type="self" id="BDU:2025-05405" title="BDU:2025-05405" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql13" epoch="0" version="13.21" release="1.el7" arch="x86_64" src="">
					<filename>postgresql13-0:13.21-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250616-13</id>
		<issued date="2025-06-16" />
		<updated date="2025-06-16" />
		<title>Уязвимость postgresql14 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в postgresql14</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql14-cve-2025-42078210/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql14
                или
                    Установить обновление для пакета(ов) postgresql14
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql14-cve-2025-42078210/" type="self" id="ROS-20250616-13" title="ROS-20250616-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4207" type="cve" id="CVE-2025-4207" title="CVE-2025-4207" />
			<reference href="https://bdu.fstec.ru/vul/2025-05405" type="self" id="BDU:2025-05405" title="BDU:2025-05405" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql14" epoch="0" version="14.18" release="1.el7" arch="x86_64" src="">
					<filename>postgresql14-0:14.18-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250616-14</id>
		<issued date="2025-06-16" />
		<updated date="2025-06-16" />
		<title>Уязвимость postgresql15 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в postgresql15</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql15-cve-2025-420782107457/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql15
                или
                    Установить обновление для пакета(ов) postgresql15
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql15-cve-2025-420782107457/" type="self" id="ROS-20250616-14" title="ROS-20250616-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4207" type="cve" id="CVE-2025-4207" title="CVE-2025-4207" />
			<reference href="https://bdu.fstec.ru/vul/2025-05405" type="self" id="BDU:2025-05405" title="BDU:2025-05405" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql15" epoch="0" version="15.13" release="1.el7" arch="x86_64" src="">
					<filename>postgresql15-0:15.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250616-15</id>
		<issued date="2025-06-16" />
		<updated date="2025-06-16" />
		<title>Уязвимость postgresql16 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в postgresql16</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql16-cve-2025-4207821074573713/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql16
                или
                    Установить обновление для пакета(ов) postgresql16
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql16-cve-2025-4207821074573713/" type="self" id="ROS-20250616-15" title="ROS-20250616-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4207" type="cve" id="CVE-2025-4207" title="CVE-2025-4207" />
			<reference href="https://bdu.fstec.ru/vul/2025-05405" type="self" id="BDU:2025-05405" title="BDU:2025-05405" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql16" epoch="0" version="16.9" release="1.el7" arch="x86_64" src="">
					<filename>postgresql16-0:16.9-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250616-16</id>
		<issued date="2025-06-16" />
		<updated date="2025-06-16" />
		<title>Уязвимость postgresql17 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в postgresql17</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql17-cve-2025-42078210745737139240/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql17
                или
                    Установить обновление для пакета(ов) postgresql17
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql17-cve-2025-42078210745737139240/" type="self" id="ROS-20250616-16" title="ROS-20250616-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4207" type="cve" id="CVE-2025-4207" title="CVE-2025-4207" />
			<reference href="https://bdu.fstec.ru/vul/2025-05405" type="self" id="BDU:2025-05405" title="BDU:2025-05405" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql17" epoch="0" version="17.5" release="1.el7" arch="x86_64" src="">
					<filename>postgresql17-0:17.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250616-17</id>
		<issued date="2025-06-16" />
		<updated date="2025-06-16" />
		<title>Уязвимость postgresql-1c </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в postgresql-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql1c-cve-2025-420782107457371392402339/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql-1c
                или
                    Установить обновление для пакета(ов) postgresql-1c
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql1c-cve-2025-420782107457371392402339/" type="self" id="ROS-20250616-17" title="ROS-20250616-17" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4207" type="cve" id="CVE-2025-4207" title="CVE-2025-4207" />
			<reference href="https://bdu.fstec.ru/vul/2025-05405" type="self" id="BDU:2025-05405" title="BDU:2025-05405" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql-1c" epoch="0" version="14.18" release="1.el7" arch="x86_64" src="">
					<filename>postgresql-1c-0:14.18-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250616-18</id>
		<issued date="2025-06-16" />
		<updated date="2025-06-16" />
		<title>Уязвимость postgresql15-1c </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в postgresql15-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql151c-cve-2025-4207821074573713924023394217/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql15-1c
                или
                    Установить обновление для пакета(ов) postgresql15-1c
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql151c-cve-2025-4207821074573713924023394217/" type="self" id="ROS-20250616-18" title="ROS-20250616-18" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4207" type="cve" id="CVE-2025-4207" title="CVE-2025-4207" />
			<reference href="https://bdu.fstec.ru/vul/2025-05405" type="self" id="BDU:2025-05405" title="BDU:2025-05405" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql15-1c" epoch="0" version="15.13" release="1.el7" arch="x86_64" src="">
					<filename>postgresql15-1c-0:15.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250616-19</id>
		<issued date="2025-06-16" />
		<updated date="2025-06-16" />
		<title>Уязвимость postgresql17-1c </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в postgresql17-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql171c-cve-2025-42078210745737139240233942178555/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql17-1c
                или
                    Установить обновление для пакета(ов) postgresql17-1c
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql171c-cve-2025-42078210745737139240233942178555/" type="self" id="ROS-20250616-19" title="ROS-20250616-19" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4207" type="cve" id="CVE-2025-4207" title="CVE-2025-4207" />
			<reference href="https://bdu.fstec.ru/vul/2025-05405" type="self" id="BDU:2025-05405" title="BDU:2025-05405" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql17-1c" epoch="0" version="17.5" release="1.el7" arch="x86_64" src="">
					<filename>postgresql17-1c-0:17.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250616-20</id>
		<issued date="2025-06-16" />
		<updated date="2025-06-16" />
		<title>Уязвимость libpq </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libpq</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpq-cve-2025-420782107457371392402339421785555839/</description>
               <solution>
                    Запретить использование в ОС пакета libpq
                или
                    Установить обновление для пакета(ов) libpq
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpq-cve-2025-420782107457371392402339421785555839/" type="self" id="ROS-20250616-20" title="ROS-20250616-20" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4207" type="cve" id="CVE-2025-4207" title="CVE-2025-4207" />
			<reference href="https://bdu.fstec.ru/vul/2025-05405" type="self" id="BDU:2025-05405" title="BDU:2025-05405" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libpq" epoch="1" version="17.5" release="1.el7" arch="x86_64" src="">
					<filename>libpq-1:17.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250616-21</id>
		<issued date="2025-06-19" />
		<updated date="2025-06-19" />
		<title>Множественные уязвимости zabbix-lts-server-mysql </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в zabbix-lts-server-mysql</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix-lts-server-mysql-cve-2024-36469-cve-2024-45700-cve-2024-42325-cve-/</description>
               <solution>
                    Запретить использование в ОС пакета zabbix-lts-server-mysql
                или
                    Установить обновление для пакета(ов) zabbix-lts-server-mysql
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix-lts-server-mysql-cve-2024-36469-cve-2024-45700-cve-2024-42325-cve-/" type="self" id="ROS-20250616-21" title="ROS-20250616-21" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36469" type="cve" id="CVE-2024-36469" title="CVE-2024-36469" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45700" type="cve" id="CVE-2024-45700" title="CVE-2024-45700" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42325" type="cve" id="CVE-2024-42325" title="CVE-2024-42325" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45699" type="cve" id="CVE-2024-45699" title="CVE-2024-45699" />
			<reference href="https://bdu.fstec.ru/vul/2025-07164" type="self" id="BDU:2025-07164" title="BDU:2025-07164" />
			<reference href="https://bdu.fstec.ru/vul/2025-05632" type="self" id="BDU:2025-05632" title="BDU:2025-05632" />
			<reference href="https://bdu.fstec.ru/vul/2025-05635" type="self" id="BDU:2025-05635" title="BDU:2025-05635" />
			<reference href="https://bdu.fstec.ru/vul/2025-05634" type="self" id="BDU:2025-05634" title="BDU:2025-05634" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix-lts-server-mysql" epoch="1" version="6.0.40" release="1.el7" arch="x86_64" src="">
					<filename>zabbix-lts-server-mysql-1:6.0.40-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250616-22</id>
		<issued date="2025-06-19" />
		<updated date="2025-06-19" />
		<title>Множественные уязвимости zabbix-lts-server-pgsql </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в zabbix-lts-server-pgsql</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix-lts-server-pgsql-cve-2024-36469-cve-2024-45700-cve-2024-42325-cve-5304/</description>
               <solution>
                    Запретить использование в ОС пакета zabbix-lts-server-pgsql
                или
                    Установить обновление для пакета(ов) zabbix-lts-server-pgsql
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix-lts-server-pgsql-cve-2024-36469-cve-2024-45700-cve-2024-42325-cve-5304/" type="self" id="ROS-20250616-22" title="ROS-20250616-22" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36469" type="cve" id="CVE-2024-36469" title="CVE-2024-36469" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45700" type="cve" id="CVE-2024-45700" title="CVE-2024-45700" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42325" type="cve" id="CVE-2024-42325" title="CVE-2024-42325" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45699" type="cve" id="CVE-2024-45699" title="CVE-2024-45699" />
			<reference href="https://bdu.fstec.ru/vul/2025-07164" type="self" id="BDU:2025-07164" title="BDU:2025-07164" />
			<reference href="https://bdu.fstec.ru/vul/2025-05632" type="self" id="BDU:2025-05632" title="BDU:2025-05632" />
			<reference href="https://bdu.fstec.ru/vul/2025-05635" type="self" id="BDU:2025-05635" title="BDU:2025-05635" />
			<reference href="https://bdu.fstec.ru/vul/2025-05634" type="self" id="BDU:2025-05634" title="BDU:2025-05634" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix-lts-server-pgsql" epoch="1" version="6.0.40" release="1.el7" arch="x86_64" src="">
					<filename>zabbix-lts-server-pgsql-1:6.0.40-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250616-23</id>
		<issued date="2025-06-19" />
		<updated date="2025-06-19" />
		<title>Уязвимость zabbix-server-mysql </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в zabbix-server-mysql</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix-server-mysql-cve-2024-45699/</description>
               <solution>
                    Запретить использование в ОС пакета zabbix-server-mysql
                или
                    Установить обновление для пакета(ов) zabbix-server-mysql
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix-server-mysql-cve-2024-45699/" type="self" id="ROS-20250616-23" title="ROS-20250616-23" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45699" type="cve" id="CVE-2024-45699" title="CVE-2024-45699" />
			<reference href="https://bdu.fstec.ru/vul/2025-05634" type="self" id="BDU:2025-05634" title="BDU:2025-05634" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix-server-mysql" epoch="1" version="6.4.21" release="1.el7" arch="x86_64" src="">
					<filename>zabbix-server-mysql-1:6.4.21-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250616-24</id>
		<issued date="2025-06-19" />
		<updated date="2025-06-19" />
		<title>Уязвимость zabbix-server-pgsql </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в zabbix-server-pgsql</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix-server-pgsql-cve-2024-456993676/</description>
               <solution>
                    Запретить использование в ОС пакета zabbix-server-pgsql
                или
                    Установить обновление для пакета(ов) zabbix-server-pgsql
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix-server-pgsql-cve-2024-456993676/" type="self" id="ROS-20250616-24" title="ROS-20250616-24" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45699" type="cve" id="CVE-2024-45699" title="CVE-2024-45699" />
			<reference href="https://bdu.fstec.ru/vul/2025-05634" type="self" id="BDU:2025-05634" title="BDU:2025-05634" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix-server-pgsql" epoch="1" version="6.4.21" release="1.el7" arch="x86_64" src="">
					<filename>zabbix-server-pgsql-1:6.4.21-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250616-25</id>
		<issued date="2025-06-19" />
		<updated date="2025-06-19" />
		<title>Множественные уязвимости zabbix7-lts-server-mysql </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в zabbix7-lts-server-mysql</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix7-lts-server-mysql-cve-2024-36469-cve-2024-45700-cve-2024-42325-cve-53043099/</description>
               <solution>
                    Запретить использование в ОС пакета zabbix7-lts-server-mysql
                или
                    Установить обновление для пакета(ов) zabbix7-lts-server-mysql
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix7-lts-server-mysql-cve-2024-36469-cve-2024-45700-cve-2024-42325-cve-53043099/" type="self" id="ROS-20250616-25" title="ROS-20250616-25" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36469" type="cve" id="CVE-2024-36469" title="CVE-2024-36469" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45700" type="cve" id="CVE-2024-45700" title="CVE-2024-45700" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42325" type="cve" id="CVE-2024-42325" title="CVE-2024-42325" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45699" type="cve" id="CVE-2024-45699" title="CVE-2024-45699" />
			<reference href="https://bdu.fstec.ru/vul/2025-07164" type="self" id="BDU:2025-07164" title="BDU:2025-07164" />
			<reference href="https://bdu.fstec.ru/vul/2025-05632" type="self" id="BDU:2025-05632" title="BDU:2025-05632" />
			<reference href="https://bdu.fstec.ru/vul/2025-05635" type="self" id="BDU:2025-05635" title="BDU:2025-05635" />
			<reference href="https://bdu.fstec.ru/vul/2025-05634" type="self" id="BDU:2025-05634" title="BDU:2025-05634" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix7-lts-server-mysql" epoch="1" version="7.0.12" release="1.el7" arch="x86_64" src="">
					<filename>zabbix7-lts-server-mysql-1:7.0.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250616-26</id>
		<issued date="2025-06-19" />
		<updated date="2025-06-19" />
		<title>Множественные уязвимости zabbix7-lts-server-pgsql </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в zabbix7-lts-server-pgsql</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix7-lts-server-pgsql-cve-2024-36469-cve-2024-45700-cve-2024-42325-cve-530430995292/</description>
               <solution>
                    Запретить использование в ОС пакета zabbix7-lts-server-pgsql
                или
                    Установить обновление для пакета(ов) zabbix7-lts-server-pgsql
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix7-lts-server-pgsql-cve-2024-36469-cve-2024-45700-cve-2024-42325-cve-530430995292/" type="self" id="ROS-20250616-26" title="ROS-20250616-26" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36469" type="cve" id="CVE-2024-36469" title="CVE-2024-36469" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45700" type="cve" id="CVE-2024-45700" title="CVE-2024-45700" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42325" type="cve" id="CVE-2024-42325" title="CVE-2024-42325" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45699" type="cve" id="CVE-2024-45699" title="CVE-2024-45699" />
			<reference href="https://bdu.fstec.ru/vul/2025-07164" type="self" id="BDU:2025-07164" title="BDU:2025-07164" />
			<reference href="https://bdu.fstec.ru/vul/2025-05632" type="self" id="BDU:2025-05632" title="BDU:2025-05632" />
			<reference href="https://bdu.fstec.ru/vul/2025-05635" type="self" id="BDU:2025-05635" title="BDU:2025-05635" />
			<reference href="https://bdu.fstec.ru/vul/2025-05634" type="self" id="BDU:2025-05634" title="BDU:2025-05634" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix7-lts-server-pgsql" epoch="1" version="7.0.12" release="1.el7" arch="x86_64" src="">
					<filename>zabbix7-lts-server-pgsql-1:7.0.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250616-27</id>
		<issued date="2025-06-19" />
		<updated date="2025-06-19" />
		<title>Уязвимость zabbix7.2-server-mysql </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в zabbix7.2-server-mysql</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-2-server-mysql-cve-2024-45700/</description>
               <solution>
                    Запретить использование в ОС пакета zabbix7.2-server-mysql
                или
                    Установить обновление для пакета(ов) zabbix7.2-server-mysql
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-2-server-mysql-cve-2024-45700/" type="self" id="ROS-20250616-27" title="ROS-20250616-27" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45700" type="cve" id="CVE-2024-45700" title="CVE-2024-45700" />
			<reference href="https://bdu.fstec.ru/vul/2025-05632" type="self" id="BDU:2025-05632" title="BDU:2025-05632" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix7.2-server-mysql" epoch="1" version="7.2.4" release="1.el7" arch="x86_64" src="">
					<filename>zabbix7.2-server-mysql-1:7.2.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250616-28</id>
		<issued date="2025-06-19" />
		<updated date="2025-06-19" />
		<title>Уязвимость zabbix7.2-server-pgsql </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в zabbix7.2-server-pgsql</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7.2-server-pgsql-cve-2024-457002939/</description>
               <solution>
                    Запретить использование в ОС пакета zabbix7.2-server-pgsql
                или
                    Установить обновление для пакета(ов) zabbix7.2-server-pgsql
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7.2-server-pgsql-cve-2024-457002939/" type="self" id="ROS-20250616-28" title="ROS-20250616-28" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45700" type="cve" id="CVE-2024-45700" title="CVE-2024-45700" />
			<reference href="https://bdu.fstec.ru/vul/2025-05632" type="self" id="BDU:2025-05632" title="BDU:2025-05632" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix7.2-server-pgsql" epoch="1" version="7.2.4" release="1.el7" arch="x86_64" src="">
					<filename>zabbix7.2-server-pgsql-1:7.2.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250619-01</id>
		<issued date="2025-06-19" />
		<updated date="2025-06-19" />
		<title>Множественные уязвимости rubygem-rack </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в rubygem-rack</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rubygem-rack-cve-2025-32441-cve-2025-46727-cve-2025-46336/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-rack
                или
                    Установить обновление для пакета(ов) rubygem-rack
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rubygem-rack-cve-2025-32441-cve-2025-46727-cve-2025-46336/" type="self" id="ROS-20250619-01" title="ROS-20250619-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32441" type="cve" id="CVE-2025-32441" title="CVE-2025-32441" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46727" type="cve" id="CVE-2025-46727" title="CVE-2025-46727" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46336" type="cve" id="CVE-2025-46336" title="CVE-2025-46336" />
			<reference href="https://bdu.fstec.ru/vul/2025-07359" type="self" id="BDU:2025-07359" title="BDU:2025-07359" />
			<reference href="https://bdu.fstec.ru/vul/2025-07426" type="self" id="BDU:2025-07426" title="BDU:2025-07426" />
			<reference href="https://bdu.fstec.ru/vul/2025-07427" type="self" id="BDU:2025-07427" title="BDU:2025-07427" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-rack" epoch="1" version="2.2.8.1" release="4.el7" arch="noarch" src="">
					<filename>rubygem-rack-1:2.2.8.1-4.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250619-02</id>
		<issued date="2025-06-19" />
		<updated date="2025-06-19" />
		<title>Уязвимость ruby </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ruby</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ruby-cve-2025-43857/</description>
               <solution>
                    Запретить использование в ОС пакета ruby
                или
                    Установить обновление для пакета(ов) ruby
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ruby-cve-2025-43857/" type="self" id="ROS-20250619-02" title="ROS-20250619-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43857" type="cve" id="CVE-2025-43857" title="CVE-2025-43857" />
			<reference href="https://bdu.fstec.ru/vul/2025-05909" type="self" id="BDU:2025-05909" title="BDU:2025-05909" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ruby" epoch="0" version="2.7.6" release="136.el7" arch="x86_64" src="">
					<filename>ruby-0:2.7.6-136.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250619-03</id>
		<issued date="2025-06-19" />
		<updated date="2025-06-19" />
		<title>Уязвимость dotnet </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dotnet</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet-cve-2025-26646/</description>
               <solution>
                    Запретить использование в ОС пакета dotnet
                или
                    Установить обновление для пакета(ов) dotnet
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet-cve-2025-26646/" type="self" id="ROS-20250619-03" title="ROS-20250619-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26646" type="cve" id="CVE-2025-26646" title="CVE-2025-26646" />
			<reference href="https://bdu.fstec.ru/vul/2025-05444" type="self" id="BDU:2025-05444" title="BDU:2025-05444" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dotnet" epoch="0" version="8.0.116" release="1.el7" arch="x86_64" src="">
					<filename>dotnet-0:8.0.116-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250619-04</id>
		<issued date="2025-06-19" />
		<updated date="2025-06-19" />
		<title>Множественные уязвимости kubernetes </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kubernetes</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kubernetes-cve-2023-39325-cve-2023-44487/</description>
               <solution>
                    Запретить использование в ОС пакета kubernetes
                или
                    Установить обновление для пакета(ов) kubernetes
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kubernetes-cve-2023-39325-cve-2023-44487/" type="self" id="ROS-20250619-04" title="ROS-20250619-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39325" type="cve" id="CVE-2023-39325" title="CVE-2023-39325" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487" type="cve" id="CVE-2023-44487" title="CVE-2023-44487" />
			<reference href="https://bdu.fstec.ru/vul/2023-07013" type="self" id="BDU:2023-07013" title="BDU:2023-07013" />
			<reference href="https://bdu.fstec.ru/vul/2023-06559" type="self" id="BDU:2023-06559" title="BDU:2023-06559" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kubernetes" epoch="0" version="1.24.17" release="8.el7" arch="x86_64" src="">
					<filename>kubernetes-0:1.24.17-8.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250619-05</id>
		<issued date="2025-06-19" />
		<updated date="2025-06-19" />
		<title>Уязвимость pgbouncer </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в pgbouncer</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pgbouncer-cve-2025-2291/</description>
               <solution>
                    Запретить использование в ОС пакета PgBouncer
                или
                    Установить обновление для пакета(ов) PgBouncer
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pgbouncer-cve-2025-2291/" type="self" id="ROS-20250619-05" title="ROS-20250619-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2291" type="cve" id="CVE-2025-2291" title="CVE-2025-2291" />
			<reference href="https://bdu.fstec.ru/vul/2025-07307" type="self" id="BDU:2025-07307" title="BDU:2025-07307" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pgbouncer" epoch="0" version="1.24.1" release="1.el7" arch="x86_64" src="">
					<filename>pgbouncer-0:1.24.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250619-06</id>
		<issued date="2025-06-19" />
		<updated date="2025-06-19" />
		<title>Уязвимость dante </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в dante</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dante-cve-2024-54662/</description>
               <solution>
                    Запретить использование в ОС пакета Dante
                или
                    Установить обновление для пакета(ов) Dante
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dante-cve-2024-54662/" type="self" id="ROS-20250619-06" title="ROS-20250619-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54662" type="cve" id="CVE-2024-54662" title="CVE-2024-54662" />
			<reference href="https://bdu.fstec.ru/vul/2025-07336" type="self" id="BDU:2025-07336" title="BDU:2025-07336" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dante" epoch="0" version="1.4.4" release="1.el7" arch="x86_64" src="">
					<filename>dante-0:1.4.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250619-07</id>
		<issued date="2025-06-19" />
		<updated date="2025-06-19" />
		<title>Множественные уязвимости nextcloud </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nextcloud</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nextcloud-cve-2025-47793-cve-2025-47791/</description>
               <solution>
                    Запретить использование в ОС пакета Nextcloud
                или
                    Установить обновление для пакета(ов) Nextcloud
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nextcloud-cve-2025-47793-cve-2025-47791/" type="self" id="ROS-20250619-07" title="ROS-20250619-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47793" type="cve" id="CVE-2025-47793" title="CVE-2025-47793" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47791" type="cve" id="CVE-2025-47791" title="CVE-2025-47791" />
			<reference href="https://bdu.fstec.ru/vul/2025-07167" type="self" id="BDU:2025-07167" title="BDU:2025-07167" />
			<reference href="https://bdu.fstec.ru/vul/2025-07168" type="self" id="BDU:2025-07168" title="BDU:2025-07168" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nextcloud" epoch="0" version="28.0.12" release="1.el7" arch="noarch" src="">
					<filename>nextcloud-0:28.0.12-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250619-08</id>
		<issued date="2025-06-19" />
		<updated date="2025-06-19" />
		<title>Уязвимость python3-h11 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в python3-h11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-h11-cve-2025-43859/</description>
               <solution>
                    Запретить использование в ОС пакета python3-h11
                или
                    Установить обновление для пакета(ов) python3-h11
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-h11-cve-2025-43859/" type="self" id="ROS-20250619-08" title="ROS-20250619-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43859" type="cve" id="CVE-2025-43859" title="CVE-2025-43859" />
			<reference href="https://bdu.fstec.ru/vul/2025-06251" type="self" id="BDU:2025-06251" title="BDU:2025-06251" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-h11" epoch="0" version="0.16.0" release="1.el7" arch="noarch" src="">
					<filename>python3-h11-0:0.16.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250619-09</id>
		<issued date="2025-06-19" />
		<updated date="2025-06-19" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2025-22873/</description>
               <solution>
                    Запретить использование в ОС пакета golang
                или
                    Установить обновление для пакета(ов) golang
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2025-22873/" type="self" id="ROS-20250619-09" title="ROS-20250619-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22873" type="cve" id="CVE-2025-22873" title="CVE-2025-22873" />
			<reference href="https://bdu.fstec.ru/vul/2025-07316" type="self" id="BDU:2025-07316" title="BDU:2025-07316" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.24.3" release="1.el7" arch="x86_64" src="">
					<filename>golang-0:1.24.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250619-10</id>
		<issued date="2025-06-19" />
		<updated date="2025-06-19" />
		<title>Уязвимость postgresql-pgpool-II </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в postgresql-pgpool-II</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-pgpool-ii-cve-2025-46801/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql-pgpool-II
                или
                    Установить обновление для пакета(ов) postgresql-pgpool-II
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-pgpool-ii-cve-2025-46801/" type="self" id="ROS-20250619-10" title="ROS-20250619-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46801" type="cve" id="CVE-2025-46801" title="CVE-2025-46801" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql-pgpool-II" epoch="0" version="4.5.7" release="1.el7" arch="x86_64" src="">
					<filename>postgresql-pgpool-II-0:4.5.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250619-11</id>
		<issued date="2025-06-19" />
		<updated date="2025-06-19" />
		<title>Уязвимость postgresql13-pgpool-II </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в postgresql13-pgpool-II</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql13-pgpool-ii-cve-2025-468019798/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql13-pgpool-II
                или
                    Установить обновление для пакета(ов) postgresql13-pgpool-II
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql13-pgpool-ii-cve-2025-468019798/" type="self" id="ROS-20250619-11" title="ROS-20250619-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46801" type="cve" id="CVE-2025-46801" title="CVE-2025-46801" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql13-pgpool-II" epoch="0" version="4.5.7" release="1.el7" arch="x86_64" src="">
					<filename>postgresql13-pgpool-II-0:4.5.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250619-12</id>
		<issued date="2025-06-19" />
		<updated date="2025-06-19" />
		<title>Уязвимость postgresql14-pgpool-II </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в postgresql14-pgpool-II</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql14-pgpool-ii-cve-2025-4680197987195/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql14-pgpool-II
                или
                    Установить обновление для пакета(ов) postgresql14-pgpool-II
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql14-pgpool-ii-cve-2025-4680197987195/" type="self" id="ROS-20250619-12" title="ROS-20250619-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46801" type="cve" id="CVE-2025-46801" title="CVE-2025-46801" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql14-pgpool-II" epoch="0" version="4.5.7" release="1.el7" arch="x86_64" src="">
					<filename>postgresql14-pgpool-II-0:4.5.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250619-13</id>
		<issued date="2025-06-19" />
		<updated date="2025-06-19" />
		<title>Уязвимость postgresql15-pgpool-II </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в postgresql15-pgpool-II</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql15-pgpool-ii-cve-2025-46801979871958233/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql15-pgpool-II
                или
                    Установить обновление для пакета(ов) postgresql15-pgpool-II
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql15-pgpool-ii-cve-2025-46801979871958233/" type="self" id="ROS-20250619-13" title="ROS-20250619-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46801" type="cve" id="CVE-2025-46801" title="CVE-2025-46801" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql15-pgpool-II" epoch="0" version="4.5.7" release="1.el7" arch="x86_64" src="">
					<filename>postgresql15-pgpool-II-0:4.5.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250619-14</id>
		<issued date="2025-06-19" />
		<updated date="2025-06-19" />
		<title>Уязвимость postgresql16-pgpool-II </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в postgresql16-pgpool-II</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql16-pgpool-ii-cve-2025-468019798719582339926/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql16-pgpool-II
                или
                    Установить обновление для пакета(ов) postgresql16-pgpool-II
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql16-pgpool-ii-cve-2025-468019798719582339926/" type="self" id="ROS-20250619-14" title="ROS-20250619-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46801" type="cve" id="CVE-2025-46801" title="CVE-2025-46801" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql16-pgpool-II" epoch="0" version="4.5.7" release="1.el7" arch="x86_64" src="">
					<filename>postgresql16-pgpool-II-0:4.5.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250619-15</id>
		<issued date="2025-06-19" />
		<updated date="2025-06-19" />
		<title>Множественные уязвимости grafana </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в grafana</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-grafana-cve-2025-2703-cve-2025-4123-cve-2025-3580-cve-2025-3260/</description>
               <solution>
                    Запретить использование в ОС пакета Grafana
                или
                    Установить обновление для пакета(ов) Grafana
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-grafana-cve-2025-2703-cve-2025-4123-cve-2025-3580-cve-2025-3260/" type="self" id="ROS-20250619-15" title="ROS-20250619-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2703" type="cve" id="CVE-2025-2703" title="CVE-2025-2703" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4123" type="cve" id="CVE-2025-4123" title="CVE-2025-4123" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3580" type="cve" id="CVE-2025-3580" title="CVE-2025-3580" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3260" type="cve" id="CVE-2025-3260" title="CVE-2025-3260" />
			<reference href="https://bdu.fstec.ru/vul/2025-07172" type="self" id="BDU:2025-07172" title="BDU:2025-07172" />
			<reference href="https://bdu.fstec.ru/vul/2025-06809" type="self" id="BDU:2025-06809" title="BDU:2025-06809" />
			<reference href="https://bdu.fstec.ru/vul/2025-06002" type="self" id="BDU:2025-06002" title="BDU:2025-06002" />
			<reference href="https://bdu.fstec.ru/vul/2025-06343" type="self" id="BDU:2025-06343" title="BDU:2025-06343" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="grafana" epoch="0" version="11.5.5" release="1.el7" arch="x86_64" src="">
					<filename>grafana-0:11.5.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250619-16</id>
		<issued date="2025-06-19" />
		<updated date="2025-06-19" />
		<title>Уязвимость yasm </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в yasm</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-yasm-cve-2024-22653/</description>
               <solution>
                    Запретить использование в ОС пакета yasm
                или
                    Установить обновление для пакета(ов) yasm
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-yasm-cve-2024-22653/" type="self" id="ROS-20250619-16" title="ROS-20250619-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22653" type="cve" id="CVE-2024-22653" title="CVE-2024-22653" />
			<reference href="https://bdu.fstec.ru/vul/2025-07593" type="self" id="BDU:2025-07593" title="BDU:2025-07593" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="yasm" epoch="0" version="1.3.0" release="8.el7" arch="x86_64" src="">
					<filename>yasm-0:1.3.0-8.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250619-17</id>
		<issued date="2025-06-19" />
		<updated date="2025-06-19" />
		<title>Уязвимость apache-commons-compress </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в apache-commons-compress</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-commons-compress-cve-2023-42503/</description>
               <solution>
                    Запретить использование в ОС пакета apache-commons-compress
                или
                    Установить обновление для пакета(ов) apache-commons-compress
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-commons-compress-cve-2023-42503/" type="self" id="ROS-20250619-17" title="ROS-20250619-17" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42503" type="cve" id="CVE-2023-42503" title="CVE-2023-42503" />
			<reference href="https://bdu.fstec.ru/vul/2023-05808" type="self" id="BDU:2023-05808" title="BDU:2023-05808" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="apache-commons-compress" epoch="0" version="1.25.0" release="1.el7" arch="noarch" src="">
					<filename>apache-commons-compress-0:1.25.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250623-01</id>
		<issued date="2025-06-23" />
		<updated date="2025-06-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53033/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53033/" type="self" id="ROS-20250623-01" title="ROS-20250623-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53033" type="cve" id="CVE-2023-53033" title="CVE-2023-53033" />
			<reference href="https://bdu.fstec.ru/vul/2025-06025" type="self" id="BDU:2025-06025" title="BDU:2025-06025" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250624-01</id>
		<issued date="2025-06-24" />
		<updated date="2025-06-24" />
		<title>Уязвимость linux-firmware </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в linux-firmware</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-linux-firmware-cve-2024-21944/</description>
               <solution>
                    Запретить использование в ОС пакета Linux-firmware
                или
                    Установить обновление для пакета(ов) Linux-firmware
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-linux-firmware-cve-2024-21944/" type="self" id="ROS-20250624-01" title="ROS-20250624-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21944" type="cve" id="CVE-2024-21944" title="CVE-2024-21944" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="linux-firmware" epoch="0" version="20250311" release="1.el7.3" arch="noarch" src="">
					<filename>linux-firmware-0:20250311-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250624-02</id>
		<issued date="2025-06-24" />
		<updated date="2025-06-24" />
		<title>Уязвимость opensearch </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в opensearch</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opensearch-cve-2024-54160/</description>
               <solution>
                    Запретить использование в ОС пакета OpenSearch
                или
                    Установить обновление для пакета(ов) OpenSearch
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opensearch-cve-2024-54160/" type="self" id="ROS-20250624-02" title="ROS-20250624-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54160" type="cve" id="CVE-2024-54160" title="CVE-2024-54160" />
			<reference href="https://bdu.fstec.ru/vul/2025-08195" type="self" id="BDU:2025-08195" title="BDU:2025-08195" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="opensearch" epoch="0" version="2.19.2" release="2.el7" arch="x86_64" src="">
					<filename>opensearch-0:2.19.2-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250624-03</id>
		<issued date="2025-06-24" />
		<updated date="2025-06-24" />
		<title>Множественные уязвимости linux-firmware </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в linux-firmware</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-linux-firmware-cve-2024-31068-cve-2024-39279/</description>
               <solution>
                    Запретить использование в ОС пакета Linux-firmware
                или
                    Установить обновление для пакета(ов) Linux-firmware
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-linux-firmware-cve-2024-31068-cve-2024-39279/" type="self" id="ROS-20250624-03" title="ROS-20250624-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31068" type="cve" id="CVE-2024-31068" title="CVE-2024-31068" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39279" type="cve" id="CVE-2024-39279" title="CVE-2024-39279" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="linux-firmware" epoch="0" version="20250311" release="1.el7.3" arch="noarch" src="">
					<filename>linux-firmware-0:20250311-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250624-04</id>
		<issued date="2025-06-24" />
		<updated date="2025-06-24" />
		<title>Уязвимость lua </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в lua</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-lua-cve-2020-15945/</description>
               <solution>
                    Запретить использование в ОС пакета lua
                или
                    Установить обновление для пакета(ов) lua
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-lua-cve-2020-15945/" type="self" id="ROS-20250624-04" title="ROS-20250624-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15945" type="cve" id="CVE-2020-15945" title="CVE-2020-15945" />
			<reference href="https://bdu.fstec.ru/vul/2025-08605" type="self" id="BDU:2025-08605" title="BDU:2025-08605" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="lua" epoch="0" version="5.4.7" release="3.el7" arch="x86_64" src="">
					<filename>lua-0:5.4.7-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250624-05</id>
		<issued date="2025-06-24" />
		<updated date="2025-06-24" />
		<title>Множественные уязвимости consul </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в consul</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-consul-cve-2022-40716-cve-2022-3920/</description>
               <solution>
                    Запретить использование в ОС пакета consul
                или
                    Установить обновление для пакета(ов) consul
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-consul-cve-2022-40716-cve-2022-3920/" type="self" id="ROS-20250624-05" title="ROS-20250624-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40716" type="cve" id="CVE-2022-40716" title="CVE-2022-40716" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3920" type="cve" id="CVE-2022-3920" title="CVE-2022-3920" />
			<reference href="https://bdu.fstec.ru/vul/2025-08591" type="self" id="BDU:2025-08591" title="BDU:2025-08591" />
			<reference href="https://bdu.fstec.ru/vul/2025-08592" type="self" id="BDU:2025-08592" title="BDU:2025-08592" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="consul" epoch="0" version="1.20.5" release="1.el7" arch="x86_64" src="">
					<filename>consul-0:1.20.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250624-06</id>
		<issued date="2025-06-24" />
		<updated date="2025-06-24" />
		<title>Множественные уязвимости python3-django </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-django</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-django-cve-2025-26699-cve-2025-32873/</description>
               <solution>
                    Запретить использование в ОС пакета python3-django
                или
                    Установить обновление для пакета(ов) python3-django
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-django-cve-2025-26699-cve-2025-32873/" type="self" id="ROS-20250624-06" title="ROS-20250624-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26699" type="cve" id="CVE-2025-26699" title="CVE-2025-26699" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32873" type="cve" id="CVE-2025-32873" title="CVE-2025-32873" />
			<reference href="https://bdu.fstec.ru/vul/2025-08584" type="self" id="BDU:2025-08584" title="BDU:2025-08584" />
			<reference href="https://bdu.fstec.ru/vul/2025-08558" type="self" id="BDU:2025-08558" title="BDU:2025-08558" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-django" epoch="0" version="4.2.21" release="1.el7" arch="noarch" src="">
					<filename>python3-django-0:4.2.21-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250624-07</id>
		<issued date="2025-06-24" />
		<updated date="2025-06-24" />
		<title>Уязвимость mercurial </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mercurial</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mercurial-cve-2025-2361/</description>
               <solution>
                    Запретить использование в ОС пакета Mercurial
                или
                    Установить обновление для пакета(ов) Mercurial
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mercurial-cve-2025-2361/" type="self" id="ROS-20250624-07" title="ROS-20250624-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2361" type="cve" id="CVE-2025-2361" title="CVE-2025-2361" />
			<reference href="https://bdu.fstec.ru/vul/2025-08597" type="self" id="BDU:2025-08597" title="BDU:2025-08597" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mercurial" epoch="0" version="6.9.4" release="1.el7" arch="x86_64" src="">
					<filename>mercurial-0:6.9.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250624-08</id>
		<issued date="2025-06-24" />
		<updated date="2025-06-24" />
		<title>Уязвимость giflib </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в giflib</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-giflib-cve-2025-31344/</description>
               <solution>
                    Запретить использование в ОС пакета giflib
                или
                    Установить обновление для пакета(ов) giflib
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-giflib-cve-2025-31344/" type="self" id="ROS-20250624-08" title="ROS-20250624-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31344" type="cve" id="CVE-2025-31344" title="CVE-2025-31344" />
			<reference href="https://bdu.fstec.ru/vul/2025-08561" type="self" id="BDU:2025-08561" title="BDU:2025-08561" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="giflib" epoch="0" version="5.2.2" release="1.el7" arch="x86_64" src="">
					<filename>giflib-0:5.2.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250624-09</id>
		<issued date="2025-06-24" />
		<updated date="2025-06-24" />
		<title>Уязвимость aom </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в aom</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-aom-cve-2023-6879/</description>
               <solution>
                    Запретить использование в ОС пакета aom
                или
                    Установить обновление для пакета(ов) aom
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-aom-cve-2023-6879/" type="self" id="ROS-20250624-09" title="ROS-20250624-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6879" type="cve" id="CVE-2023-6879" title="CVE-2023-6879" />
			<reference href="https://bdu.fstec.ru/vul/2025-00491" type="self" id="BDU:2025-00491" title="BDU:2025-00491" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="aom" epoch="0" version="3.7.1" release="1.el7" arch="x86_64" src="">
					<filename>aom-0:3.7.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250624-10</id>
		<issued date="2025-06-24" />
		<updated date="2025-06-24" />
		<title>Уязвимость libpgf </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в libpgf</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpgf-cve-2015-6673/</description>
               <solution>
                    Запретить использование в ОС пакета libpgf
                или
                    Установить обновление для пакета(ов) libpgf
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpgf-cve-2015-6673/" type="self" id="ROS-20250624-10" title="ROS-20250624-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6673" type="cve" id="CVE-2015-6673" title="CVE-2015-6673" />
			<reference href="https://bdu.fstec.ru/vul/2025-08596" type="self" id="BDU:2025-08596" title="BDU:2025-08596" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libpgf" epoch="0" version="7.21.7" release="1.el7" arch="x86_64" src="">
					<filename>libpgf-0:7.21.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250624-11</id>
		<issued date="2025-06-24" />
		<updated date="2025-06-24" />
		<title>Уязвимость perl-Cpanel-JSON-XS </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в perl-Cpanel-JSON-XS</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-cpanel-json-xs-cve-2022-48623/</description>
               <solution>
                    Запретить использование в ОС пакета perl-Cpanel-JSON-XS
                или
                    Установить обновление для пакета(ов) perl-Cpanel-JSON-XS
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-cpanel-json-xs-cve-2022-48623/" type="self" id="ROS-20250624-11" title="ROS-20250624-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48623" type="cve" id="CVE-2022-48623" title="CVE-2022-48623" />
			<reference href="https://bdu.fstec.ru/vul/2025-08598" type="self" id="BDU:2025-08598" title="BDU:2025-08598" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="perl-Cpanel-JSON-XS" epoch="0" version="4.39" release="1.el7" arch="x86_64" src="">
					<filename>perl-Cpanel-JSON-XS-0:4.39-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250624-12</id>
		<issued date="2025-06-24" />
		<updated date="2025-06-24" />
		<title>Множественные уязвимости libde265 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libde265</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libde265-cve-2022-43244-cve-2022-43239/</description>
               <solution>
                    Запретить использование в ОС пакета libde265
                или
                    Установить обновление для пакета(ов) libde265
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libde265-cve-2022-43244-cve-2022-43239/" type="self" id="ROS-20250624-12" title="ROS-20250624-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43244" type="cve" id="CVE-2022-43244" title="CVE-2022-43244" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43239" type="cve" id="CVE-2022-43239" title="CVE-2022-43239" />
			<reference href="https://bdu.fstec.ru/vul/2024-01603" type="self" id="BDU:2024-01603" title="BDU:2024-01603" />
			<reference href="https://bdu.fstec.ru/vul/2024-06953" type="self" id="BDU:2024-06953" title="BDU:2024-06953" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libde265" epoch="0" version="1.0.11" release="1.el7" arch="x86_64" src="">
					<filename>libde265-0:1.0.11-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250624-13</id>
		<issued date="2025-06-24" />
		<updated date="2025-06-24" />
		<title>Уязвимость consul </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в consul</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-consul-cve-2023-45133/</description>
               <solution>
                    Запретить использование в ОС пакета consul
                или
                    Установить обновление для пакета(ов) consul
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-consul-cve-2023-45133/" type="self" id="ROS-20250624-13" title="ROS-20250624-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45133" type="cve" id="CVE-2023-45133" title="CVE-2023-45133" />
			<reference href="https://bdu.fstec.ru/vul/2024-07770" type="self" id="BDU:2024-07770" title="BDU:2024-07770" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="consul" epoch="0" version="1.20.2" release="1.el7" arch="x86_64" src="">
					<filename>consul-0:1.20.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250624-14</id>
		<issued date="2025-06-24" />
		<updated date="2025-06-24" />
		<title>Уязвимость consul </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в consul</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-consul-cve-2025-22869/</description>
               <solution>
                    Запретить использование в ОС пакета consul
                или
                    Установить обновление для пакета(ов) consul
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-consul-cve-2025-22869/" type="self" id="ROS-20250624-14" title="ROS-20250624-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22869" type="cve" id="CVE-2025-22869" title="CVE-2025-22869" />
			<reference href="https://bdu.fstec.ru/vul/2025-06560" type="self" id="BDU:2025-06560" title="BDU:2025-06560" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="consul" epoch="0" version="1.20.5" release="1.el7" arch="x86_64" src="">
					<filename>consul-0:1.20.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250624-15</id>
		<issued date="2025-06-24" />
		<updated date="2025-06-24" />
		<title>Уязвимость consul </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в consul</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-consul-cve-2025-27144/</description>
               <solution>
                    Запретить использование в ОС пакета consul
                или
                    Установить обновление для пакета(ов) consul
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-consul-cve-2025-27144/" type="self" id="ROS-20250624-15" title="ROS-20250624-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27144" type="cve" id="CVE-2025-27144" title="CVE-2025-27144" />
			<reference href="https://bdu.fstec.ru/vul/2025-08606" type="self" id="BDU:2025-08606" title="BDU:2025-08606" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="consul" epoch="0" version="1.20.5" release="1.el7" arch="x86_64" src="">
					<filename>consul-0:1.20.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250624-16</id>
		<issued date="2025-06-24" />
		<updated date="2025-06-24" />
		<title>Уязвимость libntlm </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в libntlm</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libntlm-cve-2019-17455/</description>
               <solution>
                    Запретить использование в ОС пакета libntlm
                или
                    Установить обновление для пакета(ов) libntlm
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libntlm-cve-2019-17455/" type="self" id="ROS-20250624-16" title="ROS-20250624-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17455" type="cve" id="CVE-2019-17455" title="CVE-2019-17455" />
			<reference href="https://bdu.fstec.ru/vul/2021-05383" type="self" id="BDU:2021-05383" title="BDU:2021-05383" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libntlm" epoch="0" version="1.8" release="1.el7" arch="x86_64" src="">
					<filename>libntlm-0:1.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250625-01</id>
		<issued date="2025-06-25" />
		<updated date="2025-06-25" />
		<title>Множественные уязвимости libde265 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libde265</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libde265-cve-2022-43243-cve-2022-43242/</description>
               <solution>
                    Запретить использование в ОС пакета libde265
                или
                    Установить обновление для пакета(ов) libde265
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libde265-cve-2022-43243-cve-2022-43242/" type="self" id="ROS-20250625-01" title="ROS-20250625-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43243" type="cve" id="CVE-2022-43243" title="CVE-2022-43243" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43242" type="cve" id="CVE-2022-43242" title="CVE-2022-43242" />
			<reference href="https://bdu.fstec.ru/vul/2024-01147" type="self" id="BDU:2024-01147" title="BDU:2024-01147" />
			<reference href="https://bdu.fstec.ru/vul/2024-01149" type="self" id="BDU:2024-01149" title="BDU:2024-01149" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libde265" epoch="0" version="1.0.11" release="1.el7" arch="x86_64" src="">
					<filename>libde265-0:1.0.11-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250625-02</id>
		<issued date="2025-06-25" />
		<updated date="2025-06-25" />
		<title>Множественные уязвимости jackson-databind </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в jackson-databind</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-jackson-databind-cve-2020-9546-cve-2020-8840-cve-2020-9548-cve-2020-9547/</description>
               <solution>
                    Запретить использование в ОС пакета jackson-databind
                или
                    Установить обновление для пакета(ов) jackson-databind
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-jackson-databind-cve-2020-9546-cve-2020-8840-cve-2020-9548-cve-2020-9547/" type="self" id="ROS-20250625-02" title="ROS-20250625-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9546" type="cve" id="CVE-2020-9546" title="CVE-2020-9546" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8840" type="cve" id="CVE-2020-8840" title="CVE-2020-8840" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9548" type="cve" id="CVE-2020-9548" title="CVE-2020-9548" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547" type="cve" id="CVE-2020-9547" title="CVE-2020-9547" />
			<reference href="https://bdu.fstec.ru/vul/2020-03618" type="self" id="BDU:2020-03618" title="BDU:2020-03618" />
			<reference href="https://bdu.fstec.ru/vul/2021-01572" type="self" id="BDU:2021-01572" title="BDU:2021-01572" />
			<reference href="https://bdu.fstec.ru/vul/2020-03616" type="self" id="BDU:2020-03616" title="BDU:2020-03616" />
			<reference href="https://bdu.fstec.ru/vul/2020-03617" type="self" id="BDU:2020-03617" title="BDU:2020-03617" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jackson-databind" epoch="0" version="2.11.4" release="1.el7" arch="noarch" src="">
					<filename>jackson-databind-0:2.11.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250625-03</id>
		<issued date="2025-06-25" />
		<updated date="2025-06-25" />
		<title>Множественные уязвимости rubygem-actionpack </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в rubygem-actionpack</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rubygem-actionpack-cve-2020-8164-cve-2020-8185-cve-2020-8166/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-actionpack
                или
                    Установить обновление для пакета(ов) rubygem-actionpack
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rubygem-actionpack-cve-2020-8164-cve-2020-8185-cve-2020-8166/" type="self" id="ROS-20250625-03" title="ROS-20250625-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8164" type="cve" id="CVE-2020-8164" title="CVE-2020-8164" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8185" type="cve" id="CVE-2020-8185" title="CVE-2020-8185" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8166" type="cve" id="CVE-2020-8166" title="CVE-2020-8166" />
			<reference href="https://bdu.fstec.ru/vul/2021-01346" type="self" id="BDU:2021-01346" title="BDU:2021-01346" />
			<reference href="https://bdu.fstec.ru/vul/2025-08594" type="self" id="BDU:2025-08594" title="BDU:2025-08594" />
			<reference href="https://bdu.fstec.ru/vul/2025-08595" type="self" id="BDU:2025-08595" title="BDU:2025-08595" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-actionpack" epoch="1" version="6.0.3.7" release="1.el7" arch="noarch" src="">
					<filename>rubygem-actionpack-1:6.0.3.7-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250625-04</id>
		<issued date="2025-06-25" />
		<updated date="2025-06-25" />
		<title>Уязвимость rubygem-actionview </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в rubygem-actionview</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-actionview-cve-2020-8167/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-actionview
                или
                    Установить обновление для пакета(ов) rubygem-actionview
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-actionview-cve-2020-8167/" type="self" id="ROS-20250625-04" title="ROS-20250625-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8167" type="cve" id="CVE-2020-8167" title="CVE-2020-8167" />
			<reference href="https://bdu.fstec.ru/vul/2025-08593" type="self" id="BDU:2025-08593" title="BDU:2025-08593" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-actionview" epoch="0" version="6.0.3.7" release="1.el7" arch="noarch" src="">
					<filename>rubygem-actionview-0:6.0.3.7-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250625-05</id>
		<issued date="2025-06-25" />
		<updated date="2025-06-25" />
		<title>Уязвимость rubygem-activesupport </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в rubygem-activesupport</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-activesupport-cve-2020-8165/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-activesupport
                или
                    Установить обновление для пакета(ов) rubygem-activesupport
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-activesupport-cve-2020-8165/" type="self" id="ROS-20250625-05" title="ROS-20250625-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8165" type="cve" id="CVE-2020-8165" title="CVE-2020-8165" />
			<reference href="https://bdu.fstec.ru/vul/2021-01345" type="self" id="BDU:2021-01345" title="BDU:2021-01345" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-activesupport" epoch="1" version="6.0.3.7" release="1.el7" arch="noarch" src="">
					<filename>rubygem-activesupport-1:6.0.3.7-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250625-06</id>
		<issued date="2025-06-25" />
		<updated date="2025-06-25" />
		<title>Множественные уязвимости rubygem-rack </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в rubygem-rack</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rubygem-rack-cve-2020-8161-cve-2020-8184/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-rack
                или
                    Установить обновление для пакета(ов) rubygem-rack
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rubygem-rack-cve-2020-8161-cve-2020-8184/" type="self" id="ROS-20250625-06" title="ROS-20250625-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8161" type="cve" id="CVE-2020-8161" title="CVE-2020-8161" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8184" type="cve" id="CVE-2020-8184" title="CVE-2020-8184" />
			<reference href="https://bdu.fstec.ru/vul/2021-01347" type="self" id="BDU:2021-01347" title="BDU:2021-01347" />
			<reference href="https://bdu.fstec.ru/vul/2021-01344" type="self" id="BDU:2021-01344" title="BDU:2021-01344" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-rack" epoch="1" version="2.2.4" release="2.el7" arch="noarch" src="">
					<filename>rubygem-rack-1:2.2.4-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250625-07</id>
		<issued date="2025-06-25" />
		<updated date="2025-06-25" />
		<title>Уязвимость rubygem-actionview </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в rubygem-actionview</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-actionview-cve-2020-15169/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-actionview
                или
                    Установить обновление для пакета(ов) rubygem-actionview
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-actionview-cve-2020-15169/" type="self" id="ROS-20250625-07" title="ROS-20250625-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15169" type="cve" id="CVE-2020-15169" title="CVE-2020-15169" />
			<reference href="https://bdu.fstec.ru/vul/2021-03552" type="self" id="BDU:2021-03552" title="BDU:2021-03552" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-actionview" epoch="0" version="6.0.3.7" release="1.el7" arch="noarch" src="">
					<filename>rubygem-actionview-0:6.0.3.7-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250625-08</id>
		<issued date="2025-06-25" />
		<updated date="2025-06-25" />
		<title>Уязвимость kubernetes </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в kubernetes</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kubernetes-250625/</description>
               <solution>
                    Запретить использование в ОС пакета kubernetes
                или
                    Установить обновление для пакета(ов) kubernetes
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kubernetes-250625/" type="self" id="ROS-20250625-08" title="ROS-20250625-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=" type="cve" id="" title="" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kubernetes" epoch="0" version="1.24.17" release="7.el7" arch="x86_64" src="">
					<filename>kubernetes-0:1.24.17-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250625-09</id>
		<issued date="2025-06-25" />
		<updated date="2025-06-25" />
		<title>Уязвимость apache-commons-configuration </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в apache-commons-configuration</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-commons-configuration-cve-2022-33980/</description>
               <solution>
                    Запретить использование в ОС пакета apache-commons-configuration
                или
                    Установить обновление для пакета(ов) apache-commons-configuration
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-commons-configuration-cve-2022-33980/" type="self" id="ROS-20250625-09" title="ROS-20250625-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33980" type="cve" id="CVE-2022-33980" title="CVE-2022-33980" />
			<reference href="https://bdu.fstec.ru/vul/2022-04278" type="self" id="BDU:2022-04278" title="BDU:2022-04278" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="apache-commons-configuration2" epoch="0" version="2.11.0" release="2.el7" arch="noarch" src="">
					<filename>apache-commons-configuration2-0:2.11.0-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250630-01</id>
		<issued date="2025-07-01" />
		<updated date="2025-07-01" />
		<title>Уязвимость pgadmin4 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в pgadmin4</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pgadmin4-cve-2024-3116/</description>
               <solution>
                    Запретить использование в ОС пакета pgadmin4
                или
                    Установить обновление для пакета(ов) pgadmin4
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pgadmin4-cve-2024-3116/" type="self" id="ROS-20250630-01" title="ROS-20250630-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3116" type="cve" id="CVE-2024-3116" title="CVE-2024-3116" />
			<reference href="https://bdu.fstec.ru/vul/2024-02704" type="self" id="BDU:2024-02704" title="BDU:2024-02704" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pgadmin4" epoch="0" version="8.6" release="2.el7" arch="x86_64" src="">
					<filename>pgadmin4-0:8.6-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250630-02</id>
		<issued date="2025-07-01" />
		<updated date="2025-07-01" />
		<title>Уязвимость vault </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в vault</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vault-cve-2024-7594/</description>
               <solution>
                    Запретить использование в ОС пакета vault
                или
                    Установить обновление для пакета(ов) vault
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vault-cve-2024-7594/" type="self" id="ROS-20250630-02" title="ROS-20250630-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7594" type="cve" id="CVE-2024-7594" title="CVE-2024-7594" />
			<reference href="https://bdu.fstec.ru/vul/2025-08603" type="self" id="BDU:2025-08603" title="BDU:2025-08603" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vault" epoch="0" version="1.19.3" release="1.el7" arch="x86_64" src="">
					<filename>vault-0:1.19.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250630-03</id>
		<issued date="2025-07-01" />
		<updated date="2025-07-01" />
		<title>Множественные уязвимости php-symfony4 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в php-symfony4</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-symfony4-cve-204-50342-cve-2024-50340-cve-2024-50343-cve-2024-50345/</description>
               <solution>
                    Запретить использование в ОС пакета php-symfony4
                или
                    Установить обновление для пакета(ов) php-symfony4
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-symfony4-cve-204-50342-cve-2024-50340-cve-2024-50343-cve-2024-50345/" type="self" id="ROS-20250630-03" title="ROS-20250630-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50342" type="cve" id="CVE-2024-50342" title="CVE-2024-50342" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50340" type="cve" id="CVE-2024-50340" title="CVE-2024-50340" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50343" type="cve" id="CVE-2024-50343" title="CVE-2024-50343" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50345" type="cve" id="CVE-2024-50345" title="CVE-2024-50345" />
			<reference href="https://bdu.fstec.ru/vul/2025-07863" type="self" id="BDU:2025-07863" title="BDU:2025-07863" />
			<reference href="https://bdu.fstec.ru/vul/2024-09513" type="self" id="BDU:2024-09513" title="BDU:2024-09513" />
			<reference href="https://bdu.fstec.ru/vul/2025-07864" type="self" id="BDU:2025-07864" title="BDU:2025-07864" />
			<reference href="https://bdu.fstec.ru/vul/2025-07865" type="self" id="BDU:2025-07865" title="BDU:2025-07865" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php-symfony4" epoch="0" version="4.4.50" release="5.el7" arch="noarch" src="">
					<filename>php-symfony4-0:4.4.50-5.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250630-04</id>
		<issued date="2025-07-01" />
		<updated date="2025-07-01" />
		<title>Множественные уязвимости jetty </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в jetty</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-jetty-cve-2024-13009-cve-2024-8184-cve-2024-6762-cve-2024-6763/</description>
               <solution>
                    Запретить использование в ОС пакета jetty
                или
                    Установить обновление для пакета(ов) jetty
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-jetty-cve-2024-13009-cve-2024-8184-cve-2024-6762-cve-2024-6763/" type="self" id="ROS-20250630-04" title="ROS-20250630-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-13009" type="cve" id="CVE-2024-13009" title="CVE-2024-13009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8184" type="cve" id="CVE-2024-8184" title="CVE-2024-8184" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6762" type="cve" id="CVE-2024-6762" title="CVE-2024-6762" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6763" type="cve" id="CVE-2024-6763" title="CVE-2024-6763" />
			<reference href="https://bdu.fstec.ru/vul/2025-08601" type="self" id="BDU:2025-08601" title="BDU:2025-08601" />
			<reference href="https://bdu.fstec.ru/vul/2025-03454" type="self" id="BDU:2025-03454" title="BDU:2025-03454" />
			<reference href="https://bdu.fstec.ru/vul/2025-08602" type="self" id="BDU:2025-08602" title="BDU:2025-08602" />
			<reference href="https://bdu.fstec.ru/vul/2024-10117" type="self" id="BDU:2024-10117" title="BDU:2024-10117" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jetty" epoch="0" version="9.4.57" release="1.el7" arch="noarch" src="">
					<filename>jetty-0:9.4.57-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250630-05</id>
		<issued date="2025-07-01" />
		<updated date="2025-07-01" />
		<title>Уязвимость apache-kafka </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в apache-kafka</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-kafka-cve-2024-56128/</description>
               <solution>
                    Запретить использование в ОС пакета apache-kafka
                или
                    Установить обновление для пакета(ов) apache-kafka
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-kafka-cve-2024-56128/" type="self" id="ROS-20250630-05" title="ROS-20250630-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56128" type="cve" id="CVE-2024-56128" title="CVE-2024-56128" />
			<reference href="https://bdu.fstec.ru/vul/2025-00027" type="self" id="BDU:2025-00027" title="BDU:2025-00027" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="apache-kafka" epoch="0" version="3.9.1" release="1.el7" arch="x86_64" src="">
					<filename>apache-kafka-0:3.9.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250630-06</id>
		<issued date="2025-07-01" />
		<updated date="2025-07-01" />
		<title>Уязвимость corosync </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в corosync</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-corosync-cve-2025-30472/</description>
               <solution>
                    Запретить использование в ОС пакета corosync
                или
                    Установить обновление для пакета(ов) corosync
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-corosync-cve-2025-30472/" type="self" id="ROS-20250630-06" title="ROS-20250630-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30472" type="cve" id="CVE-2025-30472" title="CVE-2025-30472" />
			<reference href="https://bdu.fstec.ru/vul/2025-03217" type="self" id="BDU:2025-03217" title="BDU:2025-03217" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="corosync" epoch="0" version="3.1.6" release="2.el7" arch="x86_64" src="">
					<filename>corosync-0:3.1.6-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250630-07</id>
		<issued date="2025-07-01" />
		<updated date="2025-07-01" />
		<title>Уязвимость vault </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в vault</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vault-cve-2025-3879/</description>
               <solution>
                    Запретить использование в ОС пакета vault
                или
                    Установить обновление для пакета(ов) vault
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vault-cve-2025-3879/" type="self" id="ROS-20250630-07" title="ROS-20250630-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3879" type="cve" id="CVE-2025-3879" title="CVE-2025-3879" />
			<reference href="https://bdu.fstec.ru/vul/2025-08559" type="self" id="BDU:2025-08559" title="BDU:2025-08559" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vault" epoch="0" version="1.19.3" release="1.el7" arch="x86_64" src="">
					<filename>vault-0:1.19.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250630-08</id>
		<issued date="2025-07-01" />
		<updated date="2025-07-01" />
		<title>Уязвимость python3-setuptools </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-setuptools</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-setuptools-cve-2025-47273/</description>
               <solution>
                    Запретить использование в ОС пакета python3-setuptools
                или
                    Установить обновление для пакета(ов) python3-setuptools
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-setuptools-cve-2025-47273/" type="self" id="ROS-20250630-08" title="ROS-20250630-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47273" type="cve" id="CVE-2025-47273" title="CVE-2025-47273" />
			<reference href="https://bdu.fstec.ru/vul/2025-08604" type="self" id="BDU:2025-08604" title="BDU:2025-08604" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-setuptools" epoch="0" version="75.3.1" release="1.el7" arch="noarch" src="">
					<filename>python3-setuptools-0:75.3.1-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250630-09</id>
		<issued date="2025-07-01" />
		<updated date="2025-07-01" />
		<title>Множественные уязвимости consul </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в consul</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-consul-cve-2025-22872-cve-2025-22870-cve-2025-30204/</description>
               <solution>
                    Запретить использование в ОС пакета consul
                или
                    Установить обновление для пакета(ов) consul
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-consul-cve-2025-22872-cve-2025-22870-cve-2025-30204/" type="self" id="ROS-20250630-09" title="ROS-20250630-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22872" type="cve" id="CVE-2025-22872" title="CVE-2025-22872" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22870" type="cve" id="CVE-2025-22870" title="CVE-2025-22870" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30204" type="cve" id="CVE-2025-30204" title="CVE-2025-30204" />
			<reference href="https://bdu.fstec.ru/vul/2025-08473" type="self" id="BDU:2025-08473" title="BDU:2025-08473" />
			<reference href="https://bdu.fstec.ru/vul/2025-02476" type="self" id="BDU:2025-02476" title="BDU:2025-02476" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="consul" epoch="0" version="1.20.6" release="1.el7" arch="x86_64" src="">
					<filename>consul-0:1.20.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250630-10</id>
		<issued date="2025-07-01" />
		<updated date="2025-07-01" />
		<title>Уязвимость apache-commons-beanutils </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в apache-commons-beanutils</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-commons-beanutils-cve-2019-10086/</description>
               <solution>
                    Запретить использование в ОС пакета apache-commons-beanutils
                или
                    Установить обновление для пакета(ов) apache-commons-beanutils
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-commons-beanutils-cve-2019-10086/" type="self" id="ROS-20250630-10" title="ROS-20250630-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10086" type="cve" id="CVE-2019-10086" title="CVE-2019-10086" />
			<reference href="https://bdu.fstec.ru/vul/2020-01020" type="self" id="BDU:2020-01020" title="BDU:2020-01020" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="apache-commons-beanutils" epoch="0" version="1.9.4" release="2.el7" arch="noarch" src="">
					<filename>apache-commons-beanutils-0:1.9.4-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250630-11</id>
		<issued date="2025-07-01" />
		<updated date="2025-07-01" />
		<title>Уязвимость perl-Crypt-CBC </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в perl-Crypt-CBC</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-crypt-cbc-cve-2025-2814/</description>
               <solution>
                    Запретить использование в ОС пакета perl-Crypt-CBC
                или
                    Установить обновление для пакета(ов) perl-Crypt-CBC
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-crypt-cbc-cve-2025-2814/" type="self" id="ROS-20250630-11" title="ROS-20250630-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2814" type="cve" id="CVE-2025-2814" title="CVE-2025-2814" />
			<reference href="https://bdu.fstec.ru/vul/2025-08560" type="self" id="BDU:2025-08560" title="BDU:2025-08560" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="perl-Crypt-CBC" epoch="0" version="3.04" release="1.el7" arch="noarch" src="">
					<filename>perl-Crypt-CBC-0:3.04-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250630-12</id>
		<issued date="2025-07-01" />
		<updated date="2025-07-01" />
		<title>Множественные уязвимости golang </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-golang-cve-2025-4673-cve-2025-0913-cve-2025-22874/</description>
               <solution>
                    Запретить использование в ОС пакета golang
                или
                    Установить обновление для пакета(ов) golang
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-golang-cve-2025-4673-cve-2025-0913-cve-2025-22874/" type="self" id="ROS-20250630-12" title="ROS-20250630-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4673" type="cve" id="CVE-2025-4673" title="CVE-2025-4673" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0913" type="cve" id="CVE-2025-0913" title="CVE-2025-0913" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22874" type="cve" id="CVE-2025-22874" title="CVE-2025-22874" />
			<reference href="https://bdu.fstec.ru/vul/2025-08599" type="self" id="BDU:2025-08599" title="BDU:2025-08599" />
			<reference href="https://bdu.fstec.ru/vul/2025-08600" type="self" id="BDU:2025-08600" title="BDU:2025-08600" />
			<reference href="https://bdu.fstec.ru/vul/2025-08556" type="self" id="BDU:2025-08556" title="BDU:2025-08556" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.24.4" release="1.el7" arch="x86_64" src="">
					<filename>golang-0:1.24.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250703-01</id>
		<issued date="2025-07-03" />
		<updated date="2025-07-03" />
		<title>Уязвимость pgadmin4 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в pgadmin4</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pgadmin4-cve-2023-1907/</description>
               <solution>
                    Запретить использование в ОС пакета pgadmin4
                или
                    Установить обновление для пакета(ов) pgadmin4
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pgadmin4-cve-2023-1907/" type="self" id="ROS-20250703-01" title="ROS-20250703-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1907" type="cve" id="CVE-2023-1907" title="CVE-2023-1907" />
			<reference href="https://bdu.fstec.ru/vul/2025-00245" type="self" id="BDU:2025-00245" title="BDU:2025-00245" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pgadmin4" epoch="0" version="8.6" release="1.el7" arch="x86_64" src="">
					<filename>pgadmin4-0:8.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250703-02</id>
		<issued date="2025-07-03" />
		<updated date="2025-07-03" />
		<title>Уязвимость terraform </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в terraform</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-terraform-cve-2025-22868/</description>
               <solution>
                    Запретить использование в ОС пакета terraform
                или
                    Установить обновление для пакета(ов) terraform
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-terraform-cve-2025-22868/" type="self" id="ROS-20250703-02" title="ROS-20250703-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22868" type="cve" id="CVE-2025-22868" title="CVE-2025-22868" />
			<reference href="https://bdu.fstec.ru/vul/2025-03638" type="self" id="BDU:2025-03638" title="BDU:2025-03638" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="terraform" epoch="0" version="1.11.1" release="1.el7" arch="x86_64" src="">
					<filename>terraform-0:1.11.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250703-03</id>
		<issued date="2025-07-03" />
		<updated date="2025-07-03" />
		<title>Уязвимость pgadmin4 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в pgadmin4</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pgadmin4-cve-2023-22298/</description>
               <solution>
                    Запретить использование в ОС пакета Pgadmin4
                или
                    Установить обновление для пакета(ов) Pgadmin4
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pgadmin4-cve-2023-22298/" type="self" id="ROS-20250703-03" title="ROS-20250703-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22298" type="cve" id="CVE-2023-22298" title="CVE-2023-22298" />
			<reference href="https://bdu.fstec.ru/vul/2025-08577" type="self" id="BDU:2025-08577" title="BDU:2025-08577" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pgadmin4" epoch="0" version="6.15" release="2.el7" arch="x86_64" src="">
					<filename>pgadmin4-0:6.15-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250703-04</id>
		<issued date="2025-07-03" />
		<updated date="2025-07-03" />
		<title>Уязвимость qt5-qtnetworkauth </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в qt5-qtnetworkauth</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qt5-qtnetworkauth-cve-2024-36048/</description>
               <solution>
                    Запретить использование в ОС пакета qt5-qtnetworkauth
                или
                    Установить обновление для пакета(ов) qt5-qtnetworkauth
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qt5-qtnetworkauth-cve-2024-36048/" type="self" id="ROS-20250703-04" title="ROS-20250703-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36048" type="cve" id="CVE-2024-36048" title="CVE-2024-36048" />
			<reference href="https://bdu.fstec.ru/vul/2025-08575" type="self" id="BDU:2025-08575" title="BDU:2025-08575" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="qt5-qtnetworkauth" epoch="0" version="5.15.9" release="2.el7" arch="x86_64" src="">
					<filename>qt5-qtnetworkauth-0:5.15.9-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250703-05</id>
		<issued date="2025-07-03" />
		<updated date="2025-07-03" />
		<title>Уязвимость qt6-qtnetworkauth </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в qt6-qtnetworkauth</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qt6-qtnetworkauth-cve-2024-36048/</description>
               <solution>
                    Запретить использование в ОС пакета qt6-qtnetworkauth
                или
                    Установить обновление для пакета(ов) qt6-qtnetworkauth
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qt6-qtnetworkauth-cve-2024-36048/" type="self" id="ROS-20250703-05" title="ROS-20250703-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36048" type="cve" id="CVE-2024-36048" title="CVE-2024-36048" />
			<reference href="https://bdu.fstec.ru/vul/2025-08575" type="self" id="BDU:2025-08575" title="BDU:2025-08575" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="qt6-qtnetworkauth" epoch="0" version="6.6.3" release="2.el7" arch="x86_64" src="">
					<filename>qt6-qtnetworkauth-0:6.6.3-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250703-06</id>
		<issued date="2025-07-03" />
		<updated date="2025-07-03" />
		<title>Уязвимость python3-mpmath </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-mpmath</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-mpmath-cve-2021-29063/</description>
               <solution>
                    Запретить использование в ОС пакета python3-mpmath
                или
                    Установить обновление для пакета(ов) python3-mpmath
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-mpmath-cve-2021-29063/" type="self" id="ROS-20250703-06" title="ROS-20250703-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29063" type="cve" id="CVE-2021-29063" title="CVE-2021-29063" />
			<reference href="https://bdu.fstec.ru/vul/2024-11296" type="self" id="BDU:2024-11296" title="BDU:2024-11296" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-mpmath" epoch="0" version="1.3.0" release="1.el7" arch="noarch" src="">
					<filename>python3-mpmath-0:1.3.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250703-07</id>
		<issued date="2025-07-03" />
		<updated date="2025-07-17" />
		<title>Множественные уязвимости chromium</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-03072025/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-03072025/" type="self" id="ROS-20250703-07" title="ROS-20250703-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4664" type="cve" id="CVE-2025-4664" title="CVE-2025-4664" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4052" type="cve" id="CVE-2025-4052" title="CVE-2025-4052" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4051" type="cve" id="CVE-2025-4051" title="CVE-2025-4051" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4050" type="cve" id="CVE-2025-4050" title="CVE-2025-4050" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4096" type="cve" id="CVE-2025-4096" title="CVE-2025-4096" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4372" type="cve" id="CVE-2025-4372" title="CVE-2025-4372" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4609" type="cve" id="CVE-2025-4609" title="CVE-2025-4609" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5067" type="cve" id="CVE-2025-5067" title="CVE-2025-5067" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5283" type="cve" id="CVE-2025-5283" title="CVE-2025-5283" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5281" type="cve" id="CVE-2025-5281" title="CVE-2025-5281" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5066" type="cve" id="CVE-2025-5066" title="CVE-2025-5066" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5065" type="cve" id="CVE-2025-5065" title="CVE-2025-5065" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5064" type="cve" id="CVE-2025-5064" title="CVE-2025-5064" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5280" type="cve" id="CVE-2025-5280" title="CVE-2025-5280" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5063" type="cve" id="CVE-2025-5063" title="CVE-2025-5063" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5068" type="cve" id="CVE-2025-5068" title="CVE-2025-5068" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5419" type="cve" id="CVE-2025-5419" title="CVE-2025-5419" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5959" type="cve" id="CVE-2025-5959" title="CVE-2025-5959" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5958" type="cve" id="CVE-2025-5958" title="CVE-2025-5958" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6192" type="cve" id="CVE-2025-6192" title="CVE-2025-6192" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6191" type="cve" id="CVE-2025-6191" title="CVE-2025-6191" />
			<reference href="https://bdu.fstec.ru/vul/2025-05679" type="self" id="BDU:2025-05679" title="BDU:2025-05679" />
			<reference href="https://bdu.fstec.ru/vul/2025-05693" type="self" id="BDU:2025-05693" title="BDU:2025-05693" />
			<reference href="https://bdu.fstec.ru/vul/2025-05691" type="self" id="BDU:2025-05691" title="BDU:2025-05691" />
			<reference href="https://bdu.fstec.ru/vul/2025-05690" type="self" id="BDU:2025-05690" title="BDU:2025-05690" />
			<reference href="https://bdu.fstec.ru/vul/2025-05692" type="self" id="BDU:2025-05692" title="BDU:2025-05692" />
			<reference href="https://bdu.fstec.ru/vul/2025-06211" type="self" id="BDU:2025-06211" title="BDU:2025-06211" />
			<reference href="https://bdu.fstec.ru/vul/2025-06110" type="self" id="BDU:2025-06110" title="BDU:2025-06110" />
			<reference href="https://bdu.fstec.ru/vul/2025-06461" type="self" id="BDU:2025-06461" title="BDU:2025-06461" />
			<reference href="https://bdu.fstec.ru/vul/2025-06284" type="self" id="BDU:2025-06284" title="BDU:2025-06284" />
			<reference href="https://bdu.fstec.ru/vul/2025-06283" type="self" id="BDU:2025-06283" title="BDU:2025-06283" />
			<reference href="https://bdu.fstec.ru/vul/2025-06463" type="self" id="BDU:2025-06463" title="BDU:2025-06463" />
			<reference href="https://bdu.fstec.ru/vul/2025-06462" type="self" id="BDU:2025-06462" title="BDU:2025-06462" />
			<reference href="https://bdu.fstec.ru/vul/2025-06582" type="self" id="BDU:2025-06582" title="BDU:2025-06582" />
			<reference href="https://bdu.fstec.ru/vul/2025-06282" type="self" id="BDU:2025-06282" title="BDU:2025-06282" />
			<reference href="https://bdu.fstec.ru/vul/2025-06464" type="self" id="BDU:2025-06464" title="BDU:2025-06464" />
			<reference href="https://bdu.fstec.ru/vul/2025-06391" type="self" id="BDU:2025-06391" title="BDU:2025-06391" />
			<reference href="https://bdu.fstec.ru/vul/2025-06341" type="self" id="BDU:2025-06341" title="BDU:2025-06341" />
			<reference href="https://bdu.fstec.ru/vul/2025-07100" type="self" id="BDU:2025-07100" title="BDU:2025-07100" />
			<reference href="https://bdu.fstec.ru/vul/2025-07069" type="self" id="BDU:2025-07069" title="BDU:2025-07069" />
			<reference href="https://bdu.fstec.ru/vul/2025-07023" type="self" id="BDU:2025-07023" title="BDU:2025-07023" />
			<reference href="https://bdu.fstec.ru/vul/2025-07024" type="self" id="BDU:2025-07024" title="BDU:2025-07024" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="137.0.7151.119" release="1.el7" arch="x86_64" src="">
					<filename>chromium-137.0.7151.119-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250703-08</id>
		<issued date="2025-07-03" />
		<updated date="2025-07-03" />
		<title>Множественные уязвимости Thunderbird</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-030720252/</description>
               <solution>
                    Запретить использование в ОС пакета thunderbird
                или
                    Установить обновление для пакета(ов) thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-030720252/" type="self" id="ROS-20250703-08" title="ROS-20250703-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3932" type="cve" id="CVE-2025-3932" title="CVE-2025-3932" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3875" type="cve" id="CVE-2025-3875" title="CVE-2025-3875" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3909" type="cve" id="CVE-2025-3909" title="CVE-2025-3909" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5986" type="cve" id="CVE-2025-5986" title="CVE-2025-5986" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5266" type="cve" id="CVE-2025-5266" title="CVE-2025-5266" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5267" type="cve" id="CVE-2025-5267" title="CVE-2025-5267" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5268" type="cve" id="CVE-2025-5268" title="CVE-2025-5268" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5269" type="cve" id="CVE-2025-5269" title="CVE-2025-5269" />
			<reference href="https://bdu.fstec.ru/vul/2025-04709" type="self" id="BDU:2025-04709" title="BDU:2025-04709" />
			<reference href="https://bdu.fstec.ru/vul/2025-05734" type="self" id="BDU:2025-05734" title="BDU:2025-05734" />
			<reference href="https://bdu.fstec.ru/vul/2025-06224" type="self" id="BDU:2025-06224" title="BDU:2025-06224" />
			<reference href="https://bdu.fstec.ru/vul/2025-06229" type="self" id="BDU:2025-06229" title="BDU:2025-06229" />
			<reference href="https://bdu.fstec.ru/vul/2025-06225" type="self" id="BDU:2025-06225" title="BDU:2025-06225" />
			<reference href="https://bdu.fstec.ru/vul/2025-06230" type="self" id="BDU:2025-06230" title="BDU:2025-06230" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="128.11.1" release="1.el7" arch="x86_64" src="">
					<filename>thunderbird-0:128.11.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250703-09</id>
		<issued date="2025-07-03" />
		<updated date="2025-07-03" />
		<title>Уязвимость roundcubemail </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в roundcubemail</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-roundcubemail-cve-2025-49113/</description>
               <solution>
                    Запретить использование в ОС пакета roundcubemail
                или
                    Установить обновление для пакета(ов) roundcubemail
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-roundcubemail-cve-2025-49113/" type="self" id="ROS-20250703-09" title="ROS-20250703-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49113" type="cve" id="CVE-2025-49113" title="CVE-2025-49113" />
			<reference href="https://bdu.fstec.ru/vul/2025-06366" type="self" id="BDU:2025-06366" title="BDU:2025-06366" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="roundcubemail" epoch="0" version="1.5.8" release="1.el7" arch="noarch" src="">
					<filename>roundcubemail-0:1.5.8-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250703-10</id>
		<issued date="2025-07-03" />
		<updated date="2025-07-03" />
		<title>Уязвимость drupal7 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в drupal7</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-drupal7-cve-2024-55638/</description>
               <solution>
                    Запретить использование в ОС пакета drupal7
                или
                    Установить обновление для пакета(ов) drupal7
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-drupal7-cve-2024-55638/" type="self" id="ROS-20250703-10" title="ROS-20250703-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-55638" type="cve" id="CVE-2024-55638" title="CVE-2024-55638" />
			<reference href="https://bdu.fstec.ru/vul/2024-11013" type="self" id="BDU:2024-11013" title="BDU:2024-11013" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="drupal7" epoch="0" version="7.103" release="1.el7" arch="noarch" src="">
					<filename>drupal7-0:7.103-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250703-11</id>
		<issued date="2025-07-03" />
		<updated date="2025-07-03" />
		<title>Уязвимость python2-requests </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python2-requests</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python2-requests-cve-2024-47081/</description>
               <solution>
                    Запретить использование в ОС пакета python2-requests
                или
                    Установить обновление для пакета(ов) python2-requests
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python2-requests-cve-2024-47081/" type="self" id="ROS-20250703-11" title="ROS-20250703-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47081" type="cve" id="CVE-2024-47081" title="CVE-2024-47081" />
			<reference href="https://bdu.fstec.ru/vul/2025-08576" type="self" id="BDU:2025-08576" title="BDU:2025-08576" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python2-requests" epoch="0" version="2.26.0" release="8.el7" arch="noarch" src="">
					<filename>python2-requests-0:2.26.0-8.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250703-12</id>
		<issued date="2025-07-03" />
		<updated date="2025-07-03" />
		<title>Уязвимость python2-chardet </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python2-chardet</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python2-chardet-cve-2024-47081/</description>
               <solution>
                    Запретить использование в ОС пакета python2-chardet
                или
                    Установить обновление для пакета(ов) python2-chardet
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python2-chardet-cve-2024-47081/" type="self" id="ROS-20250703-12" title="ROS-20250703-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47081" type="cve" id="CVE-2024-47081" title="CVE-2024-47081" />
			<reference href="https://bdu.fstec.ru/vul/2025-08576" type="self" id="BDU:2025-08576" title="BDU:2025-08576" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python2-chardet" epoch="0" version="4.0.0" release="1.el7" arch="noarch" src="">
					<filename>python2-chardet-0:4.0.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250707-01</id>
		<issued date="2025-07-07" />
		<updated date="2025-07-07" />
		<title>Уязвимость konsole5 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в konsole5</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-konsole5-cve-2025-49091/</description>
               <solution>
                    Запретить использование в ОС пакета konsole5
                или
                    Установить обновление для пакета(ов) konsole5
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-konsole5-cve-2025-49091/" type="self" id="ROS-20250707-01" title="ROS-20250707-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49091" type="cve" id="CVE-2025-49091" title="CVE-2025-49091" />
			<reference href="https://bdu.fstec.ru/vul/2025-06792" type="self" id="BDU:2025-06792" title="BDU:2025-06792" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="konsole5" epoch="0" version="17.12.2" release="5.el7" arch="x86_64" src="">
					<filename>konsole5-0:17.12.2-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250707-02</id>
		<issued date="2025-07-07" />
		<updated date="2025-07-07" />
		<title>Уязвимость nomad </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nomad</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nomad-cve-2025-4922/</description>
               <solution>
                    Запретить использование в ОС пакета nomad
                или
                    Установить обновление для пакета(ов) nomad
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nomad-cve-2025-4922/" type="self" id="ROS-20250707-02" title="ROS-20250707-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4922" type="cve" id="CVE-2025-4922" title="CVE-2025-4922" />
			<reference href="https://bdu.fstec.ru/vul/2025-06807" type="self" id="BDU:2025-06807" title="BDU:2025-06807" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nomad" epoch="0" version="1.10.2" release="1.el7" arch="x86_64" src="">
					<filename>nomad-0:1.10.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250707-03</id>
		<issued date="2025-07-07" />
		<updated date="2025-07-07" />
		<title>Уязвимость portainer-ce </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в portainer-ce</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-portainer-ce-cve-2025-49593/</description>
               <solution>
                    Запретить использование в ОС пакета portainer-ce
                или
                    Установить обновление для пакета(ов) portainer-ce
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-portainer-ce-cve-2025-49593/" type="self" id="ROS-20250707-03" title="ROS-20250707-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49593" type="cve" id="CVE-2025-49593" title="CVE-2025-49593" />
			<reference href="https://bdu.fstec.ru/vul/2025-08568" type="self" id="BDU:2025-08568" title="BDU:2025-08568" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="portainer-ce" epoch="0" version="2.29.2" release="2.el7" arch="x86_64" src="">
					<filename>portainer-ce-0:2.29.2-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250707-04</id>
		<issued date="2025-07-07" />
		<updated date="2025-07-07" />
		<title>Множественные уязвимости firefox </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-cve-2025-6424-cve-2025-6425/</description>
               <solution>
                    Запретить использование в ОС пакета firefox
                или
                    Установить обновление для пакета(ов) firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-cve-2025-6424-cve-2025-6425/" type="self" id="ROS-20250707-04" title="ROS-20250707-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6425" type="cve" id="CVE-2025-6425" title="CVE-2025-6425" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6424" type="cve" id="CVE-2025-6424" title="CVE-2025-6424" />
			<reference href="https://bdu.fstec.ru/vul/2025-07724" type="self" id="BDU:2025-07724" title="BDU:2025-07724" />
			<reference href="https://bdu.fstec.ru/vul/2025-07723" type="self" id="BDU:2025-07723" title="BDU:2025-07723" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.25.0" release="1.el7" arch="x86_64" src="">
					<filename>firefox-0:115.25.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250707-05</id>
		<issued date="2025-07-07" />
		<updated date="2025-07-07" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-6555/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-6555/" type="self" id="ROS-20250707-05" title="ROS-20250707-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6555" type="cve" id="CVE-2025-6555" title="CVE-2025-6555" />
			<reference href="https://bdu.fstec.ru/vul/2025-08582" type="self" id="BDU:2025-08582" title="BDU:2025-08582" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="138.0.7204.49" release="1.el7" arch="x86_64" src="">
					<filename>chromium-0:138.0.7204.49-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250707-06</id>
		<issued date="2025-07-07" />
		<updated date="2025-07-29" />
		<title>Множественные уязвимости sudo </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в sudo</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-sudo-cve-2025-32463-cve-2025-32462/</description>
               <solution>
                    Запретить использование в ОС пакета sudo
                или
                    Установить обновление для пакета(ов) sudo
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-sudo-cve-2025-32463-cve-2025-32462/" type="self" id="ROS-20250707-06" title="ROS-20250707-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32462" type="cve" id="CVE-2025-32462" title="CVE-2025-32462" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32463" type="cve" id="CVE-2025-32463" title="CVE-2025-32463" />
			<reference href="https://bdu.fstec.ru/vul/2025-07765" type="self" id="BDU:2025-07765" title="BDU:2025-07765" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="sudo" epoch="0" version="1.9.15p5" release="2.el7" arch="x86_64" src="">
					<filename>sudo-0:1.9.15p5-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250710-01</id>
		<issued date="2025-07-10" />
		<updated date="2025-07-10" />
		<title>Уязвимость bind-dyndb-ldap </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в bind-dyndb-ldap</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-bind-dyndb-ldap-cve-2024-12705/</description>
               <solution>
                    Запретить использование в ОС пакета bind-dyndb-ldap
                или
                    Установить обновление для пакета(ов) bind-dyndb-ldap
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-bind-dyndb-ldap-cve-2024-12705/" type="self" id="ROS-20250710-01" title="ROS-20250710-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12705" type="cve" id="CVE-2024-12705" title="CVE-2024-12705" />
			<reference href="https://bdu.fstec.ru/vul/2025-07734" type="self" id="BDU:2025-07734" title="BDU:2025-07734" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="bind-dyndb-ldap" epoch="0" version="11.10" release="4.el7" arch="x86_64" src="">
					<filename>bind-dyndb-ldap-0:11.10-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250710-02</id>
		<issued date="2025-07-10" />
		<updated date="2025-07-10" />
		<title>Множественные уязвимости xorg-x11-server-common</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в xorg-x11-server-common</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-xorg-x11-server-common/</description>
               <solution>
                    Запретить использование в ОС пакета xorg-x11-server-common
                или
                    Установить обновление для пакета(ов) xorg-x11-server-common
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-xorg-x11-server-common/" type="self" id="ROS-20250710-02" title="ROS-20250710-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26601" type="cve" id="CVE-2025-26601" title="CVE-2025-26601" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26595" type="cve" id="CVE-2025-26595" title="CVE-2025-26595" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26596" type="cve" id="CVE-2025-26596" title="CVE-2025-26596" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26597" type="cve" id="CVE-2025-26597" title="CVE-2025-26597" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26598" type="cve" id="CVE-2025-26598" title="CVE-2025-26598" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26599" type="cve" id="CVE-2025-26599" title="CVE-2025-26599" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26600" type="cve" id="CVE-2025-26600" title="CVE-2025-26600" />
			<reference href="https://bdu.fstec.ru/vul/2025-04569" type="self" id="BDU:2025-04569" title="BDU:2025-04569" />
			<reference href="https://bdu.fstec.ru/vul/2025-04127" type="self" id="BDU:2025-04127" title="BDU:2025-04127" />
			<reference href="https://bdu.fstec.ru/vul/2025-06970" type="self" id="BDU:2025-06970" title="BDU:2025-06970" />
			<reference href="https://bdu.fstec.ru/vul/2025-06974" type="self" id="BDU:2025-06974" title="BDU:2025-06974" />
			<reference href="https://bdu.fstec.ru/vul/2025-03976" type="self" id="BDU:2025-03976" title="BDU:2025-03976" />
			<reference href="https://bdu.fstec.ru/vul/2025-04530" type="self" id="BDU:2025-04530" title="BDU:2025-04530" />
			<reference href="https://bdu.fstec.ru/vul/2025-04531" type="self" id="BDU:2025-04531" title="BDU:2025-04531" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="xorg-x11-server-common" epoch="0" version="1.20.14" release="16.el7.3" arch="x86_64" src="">
					<filename>xorg-x11-server-common-0:1.20.14-16.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250710-03</id>
		<issued date="2025-07-10" />
		<updated date="2025-07-10" />
		<title>Уязвимость Firefox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2025-2817/</description>
               <solution>
                    Запретить использование в ОС пакета firefox
                или
                    Установить обновление для пакета(ов) firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2025-2817/" type="self" id="ROS-20250710-03" title="ROS-20250710-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2817" type="cve" id="CVE-2025-2817" title="CVE-2025-2817" />
			<reference href="https://bdu.fstec.ru/vul/2025-06662" type="self" id="BDU:2025-06662" title="BDU:2025-06662" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.23.0" release="1.el7" arch="x86_64" src="">
					<filename>firefox-0:115.23.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250710-04</id>
		<issued date="2025-07-10" />
		<updated date="2025-07-10" />
		<title>Уязвимость python3-tornado </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-tornado</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-tornado-cve-2025-47287/</description>
               <solution>
                    Запретить использование в ОС пакета python3-tornado
                или
                    Установить обновление для пакета(ов) python3-tornado
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-tornado-cve-2025-47287/" type="self" id="ROS-20250710-04" title="ROS-20250710-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47287" type="cve" id="CVE-2025-47287" title="CVE-2025-47287" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-tornado" epoch="0" version="6.3.3" release="4.el7" arch="x86_64" src="">
					<filename>python3-tornado-0:6.3.3-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250710-05</id>
		<issued date="2025-07-10" />
		<updated date="2025-07-10" />
		<title>Уязвимость Perl-Data-Entropy </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в perl-Data-Entropy</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-data-entropy-cve-2025-1860/</description>
               <solution>
                    Запретить использование в ОС пакета Perl-Data-Entropy
                или
                    Установить обновление для пакета(ов) Perl-Data-Entropy
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-data-entropy-cve-2025-1860/" type="self" id="ROS-20250710-05" title="ROS-20250710-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1860" type="cve" id="CVE-2025-1860" title="CVE-2025-1860" />
			<reference href="https://bdu.fstec.ru/vul/2025-08609" type="self" id="BDU:2025-08609" title="BDU:2025-08609" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="perl-Data-Entropy" epoch="0" version="0.008" release="1.el7" arch="noarch" src="">
					<filename>perl-Data-Entropy-0:0.008-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250710-06</id>
		<issued date="2025-07-10" />
		<updated date="2025-07-10" />
		<title>Уязвимость redis </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в redis</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-redis-cve-2025-27151/</description>
               <solution>
                    Запретить использование в ОС пакета Redis
                или
                    Установить обновление для пакета(ов) Redis
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-redis-cve-2025-27151/" type="self" id="ROS-20250710-06" title="ROS-20250710-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27151" type="cve" id="CVE-2025-27151" title="CVE-2025-27151" />
			<reference href="https://bdu.fstec.ru/vul/2025-08608" type="self" id="BDU:2025-08608" title="BDU:2025-08608" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="redis" epoch="0" version="7.4.3" release="2.el7" arch="x86_64" src="">
					<filename>redis-0:7.4.3-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250710-07</id>
		<issued date="2025-07-10" />
		<updated date="2025-07-10" />
		<title>Уязвимость libyaml </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в libyaml</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libyaml-cve-2025-40908/</description>
               <solution>
                    Запретить использование в ОС пакета libyaml
                или
                    Установить обновление для пакета(ов) libyaml
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libyaml-cve-2025-40908/" type="self" id="ROS-20250710-07" title="ROS-20250710-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40908" type="cve" id="CVE-2025-40908" title="CVE-2025-40908" />
			<reference href="https://bdu.fstec.ru/vul/2025-08363" type="self" id="BDU:2025-08363" title="BDU:2025-08363" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libyaml" epoch="0" version="0.2.5" release="1.el7" arch="x86_64" src="">
					<filename>libyaml-0:0.2.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250710-08</id>
		<issued date="2025-07-10" />
		<updated date="2025-07-10" />
		<title>Уязвимость apache-activemq </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в apache-activemq</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-activemq-cve-2025-27533/</description>
               <solution>
                    Запретить использование в ОС пакета apache-activemq
                или
                    Установить обновление для пакета(ов) apache-activemq
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-activemq-cve-2025-27533/" type="self" id="ROS-20250710-08" title="ROS-20250710-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27533" type="cve" id="CVE-2025-27533" title="CVE-2025-27533" />
			<reference href="https://bdu.fstec.ru/vul/2025-06024" type="self" id="BDU:2025-06024" title="BDU:2025-06024" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="apache-activemq" epoch="0" version="5.17.7" release="1.el7" arch="x86_64" src="">
					<filename>apache-activemq-0:5.17.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250710-09</id>
		<issued date="2025-07-10" />
		<updated date="2025-07-10" />
		<title>Уязвимость apache-mina </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в apache-mina</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-mina-cve-2019-0231/</description>
               <solution>
                    Запретить использование в ОС пакета apache-mina
                или
                    Установить обновление для пакета(ов) apache-mina
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-mina-cve-2019-0231/" type="self" id="ROS-20250710-09" title="ROS-20250710-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0231" type="cve" id="CVE-2019-0231" title="CVE-2019-0231" />
			<reference href="https://bdu.fstec.ru/vul/2025-08607" type="self" id="BDU:2025-08607" title="BDU:2025-08607" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="apache-mina" epoch="0" version="2.0.27" release="1.el7" arch="noarch" src="">
					<filename>apache-mina-0:2.0.27-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250710-11</id>
		<issued date="2025-07-10" />
		<updated date="2025-07-10" />
		<title>Уязвимость apache-commons-beanutils </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в apache-commons-beanutils</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-commons-beanutils-cve-2025-48734/</description>
               <solution>
                    Запретить использование в ОС пакета apache-commons-beanutils
                или
                    Установить обновление для пакета(ов) apache-commons-beanutils
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-commons-beanutils-cve-2025-48734/" type="self" id="ROS-20250710-11" title="ROS-20250710-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48734" type="cve" id="CVE-2025-48734" title="CVE-2025-48734" />
			<reference href="https://bdu.fstec.ru/vul/2025-06231" type="self" id="BDU:2025-06231" title="BDU:2025-06231" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="apache-commons-beanutils" epoch="0" version="1.9.4" release="11.el7" arch="noarch" src="">
					<filename>apache-commons-beanutils-0:1.9.4-11.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250710-12</id>
		<issued date="2025-07-10" />
		<updated date="2025-07-10" />
		<title>Уязвимость libexif </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в libexif</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libexif-cve-2020-0452/</description>
               <solution>
                    Запретить использование в ОС пакета libexif
                или
                    Установить обновление для пакета(ов) libexif
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libexif-cve-2020-0452/" type="self" id="ROS-20250710-12" title="ROS-20250710-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0452" type="cve" id="CVE-2020-0452" title="CVE-2020-0452" />
			<reference href="https://bdu.fstec.ru/vul/2021-03096" type="self" id="BDU:2021-03096" title="BDU:2021-03096" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libexif" epoch="0" version="0.6.22" release="12.el7" arch="x86_64" src="">
					<filename>libexif-0:0.6.22-12.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250710-13</id>
		<issued date="2025-07-10" />
		<updated date="2025-07-10" />
		<title>Множественные уязвимости jackson-databind</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в jackson-databind</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-jackson-databind/</description>
               <solution>
                    Запретить использование в ОС пакета jackson-databind
                или
                    Установить обновление для пакета(ов) jackson-databind
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-jackson-databind/" type="self" id="ROS-20250710-13" title="ROS-20250710-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11619" type="cve" id="CVE-2020-11619" title="CVE-2020-11619" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14062" type="cve" id="CVE-2020-14062" title="CVE-2020-14062" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14061" type="cve" id="CVE-2020-14061" title="CVE-2020-14061" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12086" type="cve" id="CVE-2019-12086" title="CVE-2019-12086" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14195" type="cve" id="CVE-2020-14195" title="CVE-2020-14195" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10968" type="cve" id="CVE-2020-10968" title="CVE-2020-10968" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10969" type="cve" id="CVE-2020-10969" title="CVE-2020-10969" />
			<reference href="https://bdu.fstec.ru/vul/2020-04468" type="self" id="BDU:2020-04468" title="BDU:2020-04468" />
			<reference href="https://bdu.fstec.ru/vul/2020-04626" type="self" id="BDU:2020-04626" title="BDU:2020-04626" />
			<reference href="https://bdu.fstec.ru/vul/2020-04628" type="self" id="BDU:2020-04628" title="BDU:2020-04628" />
			<reference href="https://bdu.fstec.ru/vul/2019-04253" type="self" id="BDU:2019-04253" title="BDU:2019-04253" />
			<reference href="https://bdu.fstec.ru/vul/2020-04944" type="self" id="BDU:2020-04944" title="BDU:2020-04944" />
			<reference href="https://bdu.fstec.ru/vul/2021-00725" type="self" id="BDU:2021-00725" title="BDU:2021-00725" />
			<reference href="https://bdu.fstec.ru/vul/2021-00771" type="self" id="BDU:2021-00771" title="BDU:2021-00771" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jackson-databind" epoch="0" version="2.11.4" release="1.el7" arch="noarch" src="">
					<filename>jackson-databind-0:2.11.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250710-14</id>
		<issued date="2025-07-10" />
		<updated date="2025-07-10" />
		<title>Уязвимость tomcat </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2025-48988/</description>
               <solution>
                    Запретить использование в ОС пакета tomcat
                или
                    Установить обновление для пакета(ов) tomcat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2025-48988/" type="self" id="ROS-20250710-14" title="ROS-20250710-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48988" type="cve" id="CVE-2025-48988" title="CVE-2025-48988" />
			<reference href="https://bdu.fstec.ru/vul/2025-07526" type="self" id="BDU:2025-07526" title="BDU:2025-07526" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat" epoch="1" version="9.0.106" release="1.el7" arch="noarch" src="">
					<filename>tomcat-1:9.0.106-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250716-01</id>
		<issued date="2025-07-16" />
		<updated date="2025-07-16" />
		<title>Уязвимость bind-dyndb-ldap </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в bind-dyndb-ldap</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-bind-dyndb-ldap-cve-2024-11187/</description>
               <solution>
                    Запретить использование в ОС пакета bind-dyndb-ldap
                или
                    Установить обновление для пакета(ов) bind-dyndb-ldap
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-bind-dyndb-ldap-cve-2024-11187/" type="self" id="ROS-20250716-01" title="ROS-20250716-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11187" type="cve" id="CVE-2024-11187" title="CVE-2024-11187" />
			<reference href="https://bdu.fstec.ru/vul/2025-01459" type="self" id="BDU:2025-01459" title="BDU:2025-01459" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="bind-dyndb-ldap" epoch="0" version="11.10" release="4.el7" arch="x86_64" src="">
					<filename>bind-dyndb-ldap-0:11.10-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250716-02</id>
		<issued date="2025-07-16" />
		<updated date="2025-07-16" />
		<title>Уязвимость vault </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в vault</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vault-cve-2025-4656/</description>
               <solution>
                    Запретить использование в ОС пакета vault
                или
                    Установить обновление для пакета(ов) vault
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vault-cve-2025-4656/" type="self" id="ROS-20250716-02" title="ROS-20250716-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4656" type="cve" id="CVE-2025-4656" title="CVE-2025-4656" />
			<reference href="https://bdu.fstec.ru/vul/2025-08610" type="self" id="BDU:2025-08610" title="BDU:2025-08610" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vault" epoch="0" version="1.20.0" release="1.el7" arch="x86_64" src="">
					<filename>vault-0:1.20.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250717-01</id>
		<issued date="2025-07-17" />
		<updated date="2025-07-17" />
		<title>Уязвимость glpi </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2024-38370/</description>
               <solution>
                    Запретить использование в ОС пакета glpi
                или
                    Установить обновление для пакета(ов) glpi
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2024-38370/" type="self" id="ROS-20250717-01" title="ROS-20250717-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38370" type="cve" id="CVE-2024-38370" title="CVE-2024-38370" />
			<reference href="https://bdu.fstec.ru/vul/2025-09879" type="self" id="BDU:2025-09879" title="BDU:2025-09879" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi" epoch="0" version="10.0.18" release="1.el7" arch="noarch" src="">
					<filename>glpi-0:10.0.18-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250717-02</id>
		<issued date="2025-07-17" />
		<updated date="2025-07-17" />
		<title>Уязвимость glpi </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2025-27153/</description>
               <solution>
                    Запретить использование в ОС пакета glpi
                или
                    Установить обновление для пакета(ов) glpi
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2025-27153/" type="self" id="ROS-20250717-02" title="ROS-20250717-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27153" type="cve" id="CVE-2025-27153" title="CVE-2025-27153" />
			<reference href="https://bdu.fstec.ru/vul/2025-09880" type="self" id="BDU:2025-09880" title="BDU:2025-09880" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi" epoch="0" version="10.0.18" release="1.el7" arch="noarch" src="">
					<filename>glpi-0:10.0.18-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250717-03</id>
		<issued date="2025-07-17" />
		<updated date="2025-07-17" />
		<title>Уязвимость opensc </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в opensc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opensc-cve-2023-5992/</description>
               <solution>
                    Запретить использование в ОС пакета opensc
                или
                    Установить обновление для пакета(ов) opensc
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opensc-cve-2023-5992/" type="self" id="ROS-20250717-03" title="ROS-20250717-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5992" type="cve" id="CVE-2023-5992" title="CVE-2023-5992" />
			<reference href="https://bdu.fstec.ru/vul/2025-07729" type="self" id="BDU:2025-07729" title="BDU:2025-07729" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="opensc" epoch="0" version="0.26.0" release="1.el7" arch="x86_64" src="">
					<filename>opensc-0:0.26.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250717-04</id>
		<issued date="2025-07-17" />
		<updated date="2025-07-17" />
		<title>Множественные уязвимости thunderbird </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-cve-2023-50762-cve-2023-50761/</description>
               <solution>
                    Запретить использование в ОС пакета thunderbird
                или
                    Установить обновление для пакета(ов) thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-cve-2023-50762-cve-2023-50761/" type="self" id="ROS-20250717-04" title="ROS-20250717-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762" type="cve" id="CVE-2023-50762" title="CVE-2023-50762" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761" type="cve" id="CVE-2023-50761" title="CVE-2023-50761" />
			<reference href="https://bdu.fstec.ru/vul/2023-09000" type="self" id="BDU:2023-09000" title="BDU:2023-09000" />
			<reference href="https://bdu.fstec.ru/vul/2023-09001" type="self" id="BDU:2023-09001" title="BDU:2023-09001" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="115.12.1" release="1.el7" arch="x86_64" src="">
					<filename>thunderbird-0:115.12.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250718-01</id>
		<issued date="2025-07-18" />
		<updated date="2025-07-18" />
		<title>Множественные уязвимости firefox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-cve-2024-3857-cve-2024-3854-cve-2024-3852/</description>
               <solution>
                    Запретить использование в ОС пакета firefox
                или
                    Установить обновление для пакета(ов) firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-cve-2024-3857-cve-2024-3854-cve-2024-3852/" type="self" id="ROS-20250718-01" title="ROS-20250718-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3857" type="cve" id="CVE-2024-3857" title="CVE-2024-3857" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3852" type="cve" id="CVE-2024-3852" title="CVE-2024-3852" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3854" type="cve" id="CVE-2024-3854" title="CVE-2024-3854" />
			<reference href="https://bdu.fstec.ru/vul/2024-03791" type="self" id="BDU:2024-03791" title="BDU:2024-03791" />
			<reference href="https://bdu.fstec.ru/vul/2024-03792" type="self" id="BDU:2024-03792" title="BDU:2024-03792" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.12.0" release="1.el7" arch="x86_64" src="">
					<filename>firefox-0:115.12.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250718-02</id>
		<issued date="2025-07-18" />
		<updated date="2025-07-18" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2023-6212/</description>
               <solution>
                    Запретить использование в ОС пакета firefox
                или
                    Установить обновление для пакета(ов) firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2023-6212/" type="self" id="ROS-20250718-02" title="ROS-20250718-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212" type="cve" id="CVE-2023-6212" title="CVE-2023-6212" />
			<reference href="https://bdu.fstec.ru/vul/2023-08115" type="self" id="BDU:2023-08115" title="BDU:2023-08115" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.12.0" release="1.el7" arch="x86_64" src="">
					<filename>firefox-0:115.12.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250718-03</id>
		<issued date="2025-07-18" />
		<updated date="2025-07-21" />
		<title>Уязвимость thunderbird </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-thunderbird-cve-2023-6212/</description>
               <solution>
                    Запретить использование в ОС пакета thunderbird
                или
                    Установить обновление для пакета(ов) thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-thunderbird-cve-2023-6212/" type="self" id="ROS-20250718-03" title="ROS-20250718-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212" type="cve" id="CVE-2023-6212" title="CVE-2023-6212" />
			<reference href="https://bdu.fstec.ru/vul/2023-08115" type="self" id="BDU:2023-08115" title="BDU:2023-08115" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="115.12.1" release="1.el7" arch="x86_64" src="">
					<filename>thunderbird-0:115.12.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250721-01</id>
		<issued date="2025-07-21" />
		<updated date="2025-07-22" />
		<title>Множественные уязвимости kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-cve-2023-52926-cve-2023-52572/</description>
               <solution>
                    Установить обновление для пакета(ов) kernel-lt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-cve-2023-52926-cve-2023-52572/" type="self" id="ROS-20250721-01" title="ROS-20250721-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49973" type="cve" id="CVE-2024-49973" title="CVE-2024-49973" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52926" type="cve" id="CVE-2023-52926" title="CVE-2023-52926" />
			<reference href="https://bdu.fstec.ru/vul/2024-01940" type="self" id="BDU:2024-01940" title="BDU:2024-01940" />
			<reference href="https://bdu.fstec.ru/vul/2025-04414" type="self" id="BDU:2025-04414" title="BDU:2025-04414" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250721-02</id>
		<issued date="2025-07-21" />
		<updated date="2025-07-21" />
		<title>Уязвимость glibc </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в glibc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glibc-cve-2025-0395/</description>
               <solution>
                    Запретить использование в ОС пакета glibc
                или
                    Установить обновление для пакета(ов) glibc
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glibc-cve-2025-0395/" type="self" id="ROS-20250721-02" title="ROS-20250721-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0395" type="cve" id="CVE-2025-0395" title="CVE-2025-0395" />
			<reference href="https://bdu.fstec.ru/vul/2025-01120" type="self" id="BDU:2025-01120" title="BDU:2025-01120" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glibc" epoch="0" version="2.28" release="12.el7" arch="x86_64" src="">
					<filename>glibc-0:2.28-12.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250722-01</id>
		<issued date="2025-07-22" />
		<updated date="2025-07-22" />
		<title>Уязвимость uriparser </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в uriparser</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-uriparser-cve-2024-34402/</description>
               <solution>
                    Запретить использование в ОС пакета uriparser
                или
                    Установить обновление для пакета(ов) uriparser
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-uriparser-cve-2024-34402/" type="self" id="ROS-20250722-01" title="ROS-20250722-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34402" type="cve" id="CVE-2024-34402" title="CVE-2024-34402" />
			<reference href="https://bdu.fstec.ru/vul/2024-05019" type="self" id="BDU:2024-05019" title="BDU:2024-05019" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="uriparser" epoch="0" version="0.9.8" release="1.el7" arch="x86_64" src="">
					<filename>uriparser-0:0.9.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250722-02</id>
		<issued date="2025-07-22" />
		<updated date="2025-07-22" />
		<title>Уязвимость glpi </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2024-43416/</description>
               <solution>
                    Запретить использование в ОС пакета glpi
                или
                    Установить обновление для пакета(ов) glpi
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2024-43416/" type="self" id="ROS-20250722-02" title="ROS-20250722-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43416" type="cve" id="CVE-2024-43416" title="CVE-2024-43416" />
			<reference href="https://bdu.fstec.ru/vul/2025-09881" type="self" id="BDU:2025-09881" title="BDU:2025-09881" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi" epoch="0" version="10.0.18" release="1.el7" arch="noarch" src="">
					<filename>glpi-0:10.0.18-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250722-03</id>
		<issued date="2025-07-22" />
		<updated date="2025-07-22" />
		<title>Уязвимость FreeType </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в freetype</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-freetype-cve-2025-27363/</description>
               <solution>
                    Запретить использование в ОС пакета freetype
                или
                    Установить обновление для пакета(ов) freetype
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-freetype-cve-2025-27363/" type="self" id="ROS-20250722-03" title="ROS-20250722-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27363" type="cve" id="CVE-2025-27363" title="CVE-2025-27363" />
			<reference href="https://bdu.fstec.ru/vul/2025-02719" type="self" id="BDU:2025-02719" title="BDU:2025-02719" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="freetype" epoch="0" version="2.13.2" release="1.el7" arch="x86_64" src="">
					<filename>freetype-0:2.13.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250722-04</id>
		<issued date="2025-07-22" />
		<updated date="2025-07-22" />
		<title>Уязвимость glibc </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в glibc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glibc-cve-2025-4802/</description>
               <solution>
                    Запретить использование в ОС пакета glibc
                или
                    Установить обновление для пакета(ов) glibc
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glibc-cve-2025-4802/" type="self" id="ROS-20250722-04" title="ROS-20250722-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4802" type="cve" id="CVE-2025-4802" title="CVE-2025-4802" />
			<reference href="https://bdu.fstec.ru/vul/2025-05682" type="self" id="BDU:2025-05682" title="BDU:2025-05682" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glibc" epoch="0" version="2.28" release="13.el7" arch="x86_64" src="">
					<filename>glibc-0:2.28-13.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250723-01</id>
		<issued date="2025-07-23" />
		<updated date="2025-07-23" />
		<title>Уязвимость pam_pkcs11 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в pam_pkcs11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pam-pkcs11-cve-2025-24032/</description>
               <solution>
                    Запретить использование в ОС пакета pam_pkcs11
                или
                    Установить обновление для пакета(ов) pam_pkcs11
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pam-pkcs11-cve-2025-24032/" type="self" id="ROS-20250723-01" title="ROS-20250723-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24032" type="cve" id="CVE-2025-24032" title="CVE-2025-24032" />
			<reference href="https://bdu.fstec.ru/vul/2025-09007" type="self" id="BDU:2025-09007" title="BDU:2025-09007" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pam_pkcs11" epoch="0" version="0.6.13" release="1.el7" arch="x86_64" src="">
					<filename>pam_pkcs11-0:0.6.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250724-01</id>
		<issued date="2025-07-24" />
		<updated date="2025-07-24" />
		<title>Множественные уязвимости kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-cve-2023-51042-cve-2024-22705-cve-2023-35827-cve-2023-51043/</description>
               <solution>
                    Установить обновление для пакета(ов) kernel-lt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-cve-2023-51042-cve-2024-22705-cve-2023-35827-cve-2023-51043/" type="self" id="ROS-20250724-01" title="ROS-20250724-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827" type="cve" id="CVE-2023-35827" title="CVE-2023-35827" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51042" type="cve" id="CVE-2023-51042" title="CVE-2023-51042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51043" type="cve" id="CVE-2023-51043" title="CVE-2023-51043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22705" type="cve" id="CVE-2024-22705" title="CVE-2024-22705" />
			<reference href="https://bdu.fstec.ru/vul/2023-03435" type="self" id="BDU:2023-03435" title="BDU:2023-03435" />
			<reference href="https://bdu.fstec.ru/vul/2024-00866" type="self" id="BDU:2024-00866" title="BDU:2024-00866" />
			<reference href="https://bdu.fstec.ru/vul/2024-00837" type="self" id="BDU:2024-00837" title="BDU:2024-00837" />
			<reference href="https://bdu.fstec.ru/vul/2024-00836" type="self" id="BDU:2024-00836" title="BDU:2024-00836" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250724-02</id>
		<issued date="2025-07-24" />
		<updated date="2025-07-24" />
		<title>Уязвимость Cockpit </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в cockpit</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cockpit-cve-2024-2947/</description>
               <solution>
                    Запретить использование в ОС пакета cockpit
                или
                    Установить обновление для пакета(ов) cockpit
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cockpit-cve-2024-2947/" type="self" id="ROS-20250724-02" title="ROS-20250724-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2947" type="cve" id="CVE-2024-2947" title="CVE-2024-2947" />
			<reference href="https://bdu.fstec.ru/vul/2024-02724" type="self" id="BDU:2024-02724" title="BDU:2024-02724" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cockpit" epoch="0" version="331" release="2.el7" arch="x86_64" src="">
					<filename>cockpit-0:331-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250724-03</id>
		<issued date="2025-07-24" />
		<updated date="2025-07-24" />
		<title>Множественные уязвимости ansible-core </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в ansible-core</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-ansible-core-cve-2024-11079-cve-2024-8775/</description>
               <solution>
                    Запретить использование в ОС пакета ansible-core
                или
                    Установить обновление для пакета(ов) ansible-core
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-ansible-core-cve-2024-11079-cve-2024-8775/" type="self" id="ROS-20250724-03" title="ROS-20250724-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8775" type="cve" id="CVE-2024-8775" title="CVE-2024-8775" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11079" type="cve" id="CVE-2024-11079" title="CVE-2024-11079" />
			<reference href="https://bdu.fstec.ru/vul/2025-09010" type="self" id="BDU:2025-09010" title="BDU:2025-09010" />
			<reference href="https://bdu.fstec.ru/vul/2025-09015" type="self" id="BDU:2025-09015" title="BDU:2025-09015" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ansible-core" epoch="0" version="2.13.13" release="3.el7" arch="noarch" src="">
					<filename>ansible-core-0:2.13.13-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250724-04</id>
		<issued date="2025-07-24" />
		<updated date="2025-07-24" />
		<title>Множественные уязвимости jq </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в jq</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-jq-cve-2024-53427-cve-2025-49014/</description>
               <solution>
                    Запретить использование в ОС пакета jq
                или
                    Установить обновление для пакета(ов) jq
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-jq-cve-2024-53427-cve-2025-49014/" type="self" id="ROS-20250724-04" title="ROS-20250724-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49014" type="cve" id="CVE-2025-49014" title="CVE-2025-49014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53427" type="cve" id="CVE-2024-53427" title="CVE-2024-53427" />
			<reference href="https://bdu.fstec.ru/vul/2025-07446" type="self" id="BDU:2025-07446" title="BDU:2025-07446" />
			<reference href="https://bdu.fstec.ru/vul/2025-06690" type="self" id="BDU:2025-06690" title="BDU:2025-06690" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jq" epoch="0" version="1.8.1" release="1.el7" arch="x86_64" src="">
					<filename>jq-0:1.8.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250724-05</id>
		<issued date="2025-07-24" />
		<updated date="2025-07-24" />
		<title>Уязвимость perl-FCGI </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в perl-FCGI</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-fcgi-cve-2025-40907/</description>
               <solution>
                    Запретить использование в ОС пакета perl-FCGI
                или
                    Установить обновление для пакета(ов) perl-FCGI
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-fcgi-cve-2025-40907/" type="self" id="ROS-20250724-05" title="ROS-20250724-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40907" type="cve" id="CVE-2025-40907" title="CVE-2025-40907" />
			<reference href="https://bdu.fstec.ru/vul/2025-09005" type="self" id="BDU:2025-09005" title="BDU:2025-09005" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="perl-FCGI" epoch="1" version="0.82" release="1.el7" arch="x86_64" src="">
					<filename>perl-FCGI-1:0.82-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250724-06</id>
		<issued date="2025-07-24" />
		<updated date="2025-07-24" />
		<title>Уязвимость rubygem-websocket-extensions</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в rubygem-websocket-extensions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-websocket-extensions-cve-2020-7663/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-websocket-extensions
                или
                    Установить обновление для пакета(ов) rubygem-websocket-extensions
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-websocket-extensions-cve-2020-7663/" type="self" id="ROS-20250724-06" title="ROS-20250724-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7663" type="cve" id="CVE-2020-7663" title="CVE-2020-7663" />
			<reference href="https://bdu.fstec.ru/vul/2025-09009" type="self" id="BDU:2025-09009" title="BDU:2025-09009" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-websocket-extensions" epoch="0" version="0.1.5" release="1.el7" arch="noarch" src="">
					<filename>rubygem-websocket-extensions-0:0.1.5-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250724-07</id>
		<issued date="2025-07-24" />
		<updated date="2025-07-24" />
		<title>Уязвимость dotnet </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dotnet</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet-cve-2025-30399/</description>
               <solution>
                    Запретить использование в ОС пакета dotnet
                или
                    Установить обновление для пакета(ов) dotnet
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet-cve-2025-30399/" type="self" id="ROS-20250724-07" title="ROS-20250724-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30399" type="cve" id="CVE-2025-30399" title="CVE-2025-30399" />
			<reference href="https://bdu.fstec.ru/vul/2025-07085" type="self" id="BDU:2025-07085" title="BDU:2025-07085" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dotnet" epoch="0" version="8.0.117" release="1.el7" arch="x86_64" src="">
					<filename>dotnet-0:8.0.117-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250724-08</id>
		<issued date="2025-07-24" />
		<updated date="2025-07-24" />
		<title>Уязвимость grafana </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в grafana</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grafana-cve-2025-1088/</description>
               <solution>
                    Запретить использование в ОС пакета grafana
                или
                    Установить обновление для пакета(ов) grafana
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grafana-cve-2025-1088/" type="self" id="ROS-20250724-08" title="ROS-20250724-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1088" type="cve" id="CVE-2025-1088" title="CVE-2025-1088" />
			<reference href="https://bdu.fstec.ru/vul/2025-07441" type="self" id="BDU:2025-07441" title="BDU:2025-07441" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="grafana" epoch="0" version="11.6.2" release="1.el7" arch="x86_64" src="">
					<filename>grafana-0:11.6.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250724-09</id>
		<issued date="2025-07-24" />
		<updated date="2025-07-24" />
		<title>Уязвимость python3-urllib3 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-urllib3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-urllib3-cve-2025-50181/</description>
               <solution>
                    Запретить использование в ОС пакета python3-urllib3
                или
                    Установить обновление для пакета(ов) python3-urllib3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-urllib3-cve-2025-50181/" type="self" id="ROS-20250724-09" title="ROS-20250724-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50181" type="cve" id="CVE-2025-50181" title="CVE-2025-50181" />
			<reference href="https://bdu.fstec.ru/vul/2025-09791" type="self" id="BDU:2025-09791" title="BDU:2025-09791" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-urllib3" epoch="0" version="1.26.20" release="2.el7" arch="noarch" src="">
					<filename>python3-urllib3-0:1.26.20-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250724-10</id>
		<issued date="2025-07-24" />
		<updated date="2025-07-24" />
		<title>Уязвимость libssh </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libssh</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libssh-cve-2025-5318/</description>
               <solution>
                    Запретить использование в ОС пакета libssh
                или
                    Установить обновление для пакета(ов) libssh
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libssh-cve-2025-5318/" type="self" id="ROS-20250724-10" title="ROS-20250724-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5318" type="cve" id="CVE-2025-5318" title="CVE-2025-5318" />
			<reference href="https://bdu.fstec.ru/vul/2025-09008" type="self" id="BDU:2025-09008" title="BDU:2025-09008" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libssh" epoch="0" version="0.9.8" release="2.el7" arch="x86_64" src="">
					<filename>libssh-0:0.9.8-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250724-11</id>
		<issued date="2025-07-24" />
		<updated date="2025-07-24" />
		<title>Уязвимость httpd </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в httpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-httpd-cve-2025-23048/</description>
               <solution>
                    Запретить использование в ОС пакета httpd
                или
                    Установить обновление для пакета(ов) httpd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-httpd-cve-2025-23048/" type="self" id="ROS-20250724-11" title="ROS-20250724-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23048" type="cve" id="CVE-2025-23048" title="CVE-2025-23048" />
			<reference href="https://bdu.fstec.ru/vul/2025-08976" type="self" id="BDU:2025-08976" title="BDU:2025-08976" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="httpd" epoch="0" version="2.4.64" release="2.el7" arch="x86_64" src="">
					<filename>httpd-0:2.4.64-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250729-01</id>
		<issued date="2025-07-29" />
		<updated date="2025-07-29" />
		<title>Множественные уязвимости python3-django </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-django</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-django-cve-2024-45230-cve-2024-45231/</description>
               <solution>
                    Запретить использование в ОС пакета python3-django
                или
                    Установить обновление для пакета(ов) python3-django
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-django-cve-2024-45230-cve-2024-45231/" type="self" id="ROS-20250729-01" title="ROS-20250729-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45231" type="cve" id="CVE-2024-45231" title="CVE-2024-45231" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45230" type="cve" id="CVE-2024-45230" title="CVE-2024-45230" />
			<reference href="https://bdu.fstec.ru/vul/2025-09401" type="self" id="BDU:2025-09401" title="BDU:2025-09401" />
			<reference href="https://bdu.fstec.ru/vul/2024-06736" type="self" id="BDU:2024-06736" title="BDU:2024-06736" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-django" epoch="0" version="4.2.17" release="1.el7" arch="noarch" src="">
					<filename>python3-django-0:4.2.17-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250729-02</id>
		<issued date="2025-07-29" />
		<updated date="2025-07-29" />
		<title>Уязвимость java-1.8.0-openjdk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-1.8.0-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-1-8-0-openjdk-cve-2025-21587/</description>
               <solution>
                    Запретить использование в ОС пакета java-1.8.0-openjdk
                или
                    Установить обновление для пакета(ов) java-1.8.0-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-1-8-0-openjdk-cve-2025-21587/" type="self" id="ROS-20250729-02" title="ROS-20250729-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21587" type="cve" id="CVE-2025-21587" title="CVE-2025-21587" />
			<reference href="https://bdu.fstec.ru/vul/2025-05070" type="self" id="BDU:2025-05070" title="BDU:2025-05070" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-1.8.0-openjdk" epoch="1" version="1.8.0.452.b09" release="1.el7" arch="x86_64" src="">
					<filename>java-1.8.0-openjdk-1:1.8.0.452.b09-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250729-03</id>
		<issued date="2025-07-29" />
		<updated date="2025-07-29" />
		<title>Уязвимость java-11-openjdk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-11-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-11-openjdk-cve-2025-21587/</description>
               <solution>
                    Запретить использование в ОС пакета java-11-openjdk
                или
                    Установить обновление для пакета(ов) java-11-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-11-openjdk-cve-2025-21587/" type="self" id="ROS-20250729-03" title="ROS-20250729-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21587" type="cve" id="CVE-2025-21587" title="CVE-2025-21587" />
			<reference href="https://bdu.fstec.ru/vul/2025-05070" type="self" id="BDU:2025-05070" title="BDU:2025-05070" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-11-openjdk" epoch="1" version="11.0.27.0.6" release="1.el7" arch="x86_64" src="">
					<filename>java-11-openjdk-1:11.0.27.0.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250729-04</id>
		<issued date="2025-07-29" />
		<updated date="2025-07-29" />
		<title>Уязвимость java-17-openjdk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-17-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-17-openjdk-cve-2025-21587/</description>
               <solution>
                    Запретить использование в ОС пакета java-17-openjdk
                или
                    Установить обновление для пакета(ов) java-17-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-17-openjdk-cve-2025-21587/" type="self" id="ROS-20250729-04" title="ROS-20250729-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21587" type="cve" id="CVE-2025-21587" title="CVE-2025-21587" />
			<reference href="https://bdu.fstec.ru/vul/2025-05070" type="self" id="BDU:2025-05070" title="BDU:2025-05070" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-17-openjdk" epoch="1" version="17.0.15.0.6" release="1.el7" arch="x86_64" src="">
					<filename>java-17-openjdk-1:17.0.15.0.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250729-05</id>
		<issued date="2025-07-29" />
		<updated date="2025-07-29" />
		<title>Уязвимость java-21-openjdk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-21-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-21-openjdk-cve-2025-21587/</description>
               <solution>
                    Запретить использование в ОС пакета java-21-openjdk
                или
                    Установить обновление для пакета(ов) java-21-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-21-openjdk-cve-2025-21587/" type="self" id="ROS-20250729-05" title="ROS-20250729-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21587" type="cve" id="CVE-2025-21587" title="CVE-2025-21587" />
			<reference href="https://bdu.fstec.ru/vul/2025-05070" type="self" id="BDU:2025-05070" title="BDU:2025-05070" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-21-openjdk" epoch="1" version="21.0.7.0.6" release="1.el7" arch="x86_64" src="">
					<filename>java-21-openjdk-1:21.0.7.0.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250729-06</id>
		<issued date="2025-07-29" />
		<updated date="2025-07-29" />
		<title>Уязвимость ipa-server </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в ipa-server</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ipa-server-cve-2025-4404/</description>
               <solution>
                    Запретить использование в ОС пакета ipa-server
                или
                    Установить обновление для пакета(ов) ipa-server
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ipa-server-cve-2025-4404/" type="self" id="ROS-20250729-06" title="ROS-20250729-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4404" type="cve" id="CVE-2025-4404" title="CVE-2025-4404" />
			<reference href="https://bdu.fstec.ru/vul/2025-04863" type="self" id="BDU:2025-04863" title="BDU:2025-04863" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ipa-server" epoch="0" version="4.10.3" release="11.el7" arch="x86_64" src="">
					<filename>ipa-server-0:4.10.3-11.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250729-07</id>
		<issued date="2025-07-29" />
		<updated date="2025-07-29" />
		<title>Уязвимость ipa-client </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в ipa-client</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ipa-client-cve-2025-4404/</description>
               <solution>
                    Запретить использование в ОС пакета ipa-client
                или
                    Установить обновление для пакета(ов) ipa-client
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ipa-client-cve-2025-4404/" type="self" id="ROS-20250729-07" title="ROS-20250729-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4404" type="cve" id="CVE-2025-4404" title="CVE-2025-4404" />
			<reference href="https://bdu.fstec.ru/vul/2025-04863" type="self" id="BDU:2025-04863" title="BDU:2025-04863" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ipa-client" epoch="0" version="4.10.3" release="11.el7" arch="x86_64" src="">
					<filename>ipa-client-0:4.10.3-11.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250730-01</id>
		<issued date="2025-07-30" />
		<updated date="2025-07-30" />
		<title>Множественные уязвимости chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-30072025/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-30072025/" type="self" id="ROS-20250730-01" title="ROS-20250730-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3067" type="cve" id="CVE-2025-3067" title="CVE-2025-3067" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3068" type="cve" id="CVE-2025-3068" title="CVE-2025-3068" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3069" type="cve" id="CVE-2025-3069" title="CVE-2025-3069" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3070" type="cve" id="CVE-2025-3070" title="CVE-2025-3070" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3071" type="cve" id="CVE-2025-3071" title="CVE-2025-3071" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3072" type="cve" id="CVE-2025-3072" title="CVE-2025-3072" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3073" type="cve" id="CVE-2025-3073" title="CVE-2025-3073" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3074" type="cve" id="CVE-2025-3074" title="CVE-2025-3074" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3620" type="cve" id="CVE-2025-3620" title="CVE-2025-3620" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3619" type="cve" id="CVE-2025-3619" title="CVE-2025-3619" />
			<reference href="https://bdu.fstec.ru/vul/2025-03989" type="self" id="BDU:2025-03989" title="BDU:2025-03989" />
			<reference href="https://bdu.fstec.ru/vul/2025-04007" type="self" id="BDU:2025-04007" title="BDU:2025-04007" />
			<reference href="https://bdu.fstec.ru/vul/2025-04008" type="self" id="BDU:2025-04008" title="BDU:2025-04008" />
			<reference href="https://bdu.fstec.ru/vul/2025-04668" type="self" id="BDU:2025-04668" title="BDU:2025-04668" />
			<reference href="https://bdu.fstec.ru/vul/2025-04666" type="self" id="BDU:2025-04666" title="BDU:2025-04666" />
			<reference href="https://bdu.fstec.ru/vul/2025-04665" type="self" id="BDU:2025-04665" title="BDU:2025-04665" />
			<reference href="https://bdu.fstec.ru/vul/2025-04663" type="self" id="BDU:2025-04663" title="BDU:2025-04663" />
			<reference href="https://bdu.fstec.ru/vul/2025-04661" type="self" id="BDU:2025-04661" title="BDU:2025-04661" />
			<reference href="https://bdu.fstec.ru/vul/2025-04921" type="self" id="BDU:2025-04921" title="BDU:2025-04921" />
			<reference href="https://bdu.fstec.ru/vul/2025-05424" type="self" id="BDU:2025-05424" title="BDU:2025-05424" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="135.0.7049.114" release="1.el7" arch="x86_64" src="">
					<filename>chromium-0:135.0.7049.114-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250731-01</id>
		<issued date="2025-07-31" />
		<updated date="2025-07-31" />
		<title>Уязвимость python3-oauthlib </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-oauthlib</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-oauthlib-cve-2022-36087/</description>
               <solution>
                    Запретить использование в ОС пакета python3-oauthlib
                или
                    Установить обновление для пакета(ов) python3-oauthlib
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-oauthlib-cve-2022-36087/" type="self" id="ROS-20250731-01" title="ROS-20250731-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36087" type="cve" id="CVE-2022-36087" title="CVE-2022-36087" />
			<reference href="https://bdu.fstec.ru/vul/2025-09877" type="self" id="BDU:2025-09877" title="BDU:2025-09877" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-oauthlib" epoch="0" version="3.2.2" release="1.el7" arch="noarch" src="">
					<filename>python3-oauthlib-0:3.2.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250731-02</id>
		<issued date="2025-07-31" />
		<updated date="2025-07-31" />
		<title>Уязвимость go-git </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в go-git</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-go-git-cve-2025-21613/</description>
               <solution>
                    Запретить использование в ОС пакета go-git
                или
                    Установить обновление для пакета(ов) go-git
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-go-git-cve-2025-21613/" type="self" id="ROS-20250731-02" title="ROS-20250731-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21613" type="cve" id="CVE-2025-21613" title="CVE-2025-21613" />
			<reference href="https://bdu.fstec.ru/vul/2025-00210" type="self" id="BDU:2025-00210" title="BDU:2025-00210" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="go-git" epoch="0" version="5.16.2" release="1.el7" arch="x86_64" src="">
					<filename>go-git-0:5.16.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250731-03</id>
		<issued date="2025-07-31" />
		<updated date="2025-07-31" />
		<title>Уязвимость protobuf </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в protobuf</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-protobuf-cve-2024-7254/</description>
               <solution>
                    Запретить использование в ОС пакета protobuf
                или
                    Установить обновление для пакета(ов) protobuf
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-protobuf-cve-2024-7254/" type="self" id="ROS-20250731-03" title="ROS-20250731-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7254" type="cve" id="CVE-2024-7254" title="CVE-2024-7254" />
			<reference href="https://bdu.fstec.ru/vul/2024-07527" type="self" id="BDU:2024-07527" title="BDU:2024-07527" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="protobuf" epoch="0" version="3.19.6" release="3.el7" arch="x86_64" src="">
					<filename>protobuf-0:3.19.6-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250731-04</id>
		<issued date="2025-07-31" />
		<updated date="2025-07-31" />
		<title>Множественные уязвимости grafana </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в grafana</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-grafana-cve-2025-6023-cve-2025-3415-cve-2025-6197/</description>
               <solution>
                    Запретить использование в ОС пакета grafana
                или
                    Установить обновление для пакета(ов) grafana
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-grafana-cve-2025-6023-cve-2025-3415-cve-2025-6197/" type="self" id="ROS-20250731-04" title="ROS-20250731-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6197" type="cve" id="CVE-2025-6197" title="CVE-2025-6197" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6023" type="cve" id="CVE-2025-6023" title="CVE-2025-6023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3415" type="cve" id="CVE-2025-3415" title="CVE-2025-3415" />
			<reference href="https://bdu.fstec.ru/vul/2025-09887" type="self" id="BDU:2025-09887" title="BDU:2025-09887" />
			<reference href="https://bdu.fstec.ru/vul/2025-08910" type="self" id="BDU:2025-08910" title="BDU:2025-08910" />
			<reference href="https://bdu.fstec.ru/vul/2025-08873" type="self" id="BDU:2025-08873" title="BDU:2025-08873" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="grafana" epoch="0" version="11.6.4" release="1.el7" arch="x86_64" src="">
					<filename>grafana-11.6.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250731-05</id>
		<issued date="2025-07-31" />
		<updated date="2025-07-31" />
		<title>Уязвимость docker-ce </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в docker-ce</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-docker-ce-cve-2025-54410/</description>
               <solution>
                    Запретить использование в ОС пакета docker-ce
                или
                    Установить обновление для пакета(ов) docker-ce
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-docker-ce-cve-2025-54410/" type="self" id="ROS-20250731-05" title="ROS-20250731-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54410" type="cve" id="CVE-2025-54410" title="CVE-2025-54410" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="docker-ce" epoch="4" version="28.1.1" release="1.el7" arch="x86_64" src="">
					<filename>docker-ce-4:28.1.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250801-02</id>
		<issued date="2025-08-01" />
		<updated date="2025-08-01" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-21823/</description>
               <solution>
                    Установить обновление для пакета(ов) kernel-lt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-21823/" type="self" id="ROS-20250801-02" title="ROS-20250801-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21823" type="cve" id="CVE-2024-21823" title="CVE-2024-21823" />
			<reference href="https://bdu.fstec.ru/vul/2025-06993" type="self" id="BDU:2025-06993" title="BDU:2025-06993" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250801-01</id>
		<issued date="2025-08-01" />
		<updated date="2025-08-01" />
		<title>Множественные уязвимости golang-opentelemetry-contrib-devel </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang-opentelemetry-contrib-devel</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-golang-opentelemetry-contrib-devel-cve-2023-47108-cve-2023-45142/</description>
               <solution>
                    Запретить использование в ОС пакета golang-opentelemetry-contrib-devel
                или
                    Установить обновление для пакета(ов) golang-opentelemetry-contrib-devel
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-golang-opentelemetry-contrib-devel-cve-2023-47108-cve-2023-45142/" type="self" id="ROS-20250801-01" title="ROS-20250801-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45142" type="cve" id="CVE-2023-45142" title="CVE-2023-45142" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47108" type="cve" id="CVE-2023-47108" title="CVE-2023-47108" />
			<reference href="https://bdu.fstec.ru/vul/2023-07911" type="self" id="BDU:2023-07911" title="BDU:2023-07911" />
			<reference href="https://bdu.fstec.ru/vul/2024-06663" type="self" id="BDU:2024-06663" title="BDU:2024-06663" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang-opentelemetry-contrib-devel" epoch="0" version="1.28.0" release="2.el7" arch="noarch" src="">
					<filename>golang-opentelemetry-contrib-devel-0:1.28.0-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250804-01</id>
		<issued date="2025-08-04" />
		<updated date="2025-08-04" />
		<title>Уязвимость libcurl </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libcurl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libcurl-cve-2023-38039/</description>
               <solution>
                    Запретить использование в ОС пакета libcurl
                или
                    Установить обновление для пакета(ов) libcurl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libcurl-cve-2023-38039/" type="self" id="ROS-20250804-01" title="ROS-20250804-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38039" type="cve" id="CVE-2023-38039" title="CVE-2023-38039" />
			<reference href="https://bdu.fstec.ru/vul/2023-05819" type="self" id="BDU:2023-05819" title="BDU:2023-05819" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libcurl" epoch="0" version="7.85.0" release="23.el7.3" arch="x86_64" src="">
					<filename>libcurl-0:7.85.0-23.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250804-02</id>
		<issued date="2025-08-04" />
		<updated date="2025-08-04" />
		<title>Множественные уязвимости apache-kafka </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в apache-kafka</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-apache-kafka-cve-2025-27817-cve-2025-27818-cve-2025-27819/</description>
               <solution>
                    Запретить использование в ОС пакета apache-kafka
                или
                    Установить обновление для пакета(ов) apache-kafka
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-apache-kafka-cve-2025-27817-cve-2025-27818-cve-2025-27819/" type="self" id="ROS-20250804-02" title="ROS-20250804-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27817" type="cve" id="CVE-2025-27817" title="CVE-2025-27817" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27818" type="cve" id="CVE-2025-27818" title="CVE-2025-27818" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27819" type="cve" id="CVE-2025-27819" title="CVE-2025-27819" />
			<reference href="https://bdu.fstec.ru/vul/2025-06880" type="self" id="BDU:2025-06880" title="BDU:2025-06880" />
			<reference href="https://bdu.fstec.ru/vul/2025-08198" type="self" id="BDU:2025-08198" title="BDU:2025-08198" />
			<reference href="https://bdu.fstec.ru/vul/2025-08199" type="self" id="BDU:2025-08199" title="BDU:2025-08199" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="apache-kafka" epoch="0" version="3.9.1" release="1.el7" arch="x86_64" src="">
					<filename>apache-kafka-0:3.9.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250804-03</id>
		<issued date="2025-08-04" />
		<updated date="2025-08-04" />
		<title>Множественные уязвимости 7zip </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в 7zip</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-7zip-cve-2025-53817-cve-2025-53816/</description>
               <solution>
                    Запретить использование в ОС пакета 7zip
                или
                    Установить обновление для пакета(ов) 7zip
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-7zip-cve-2025-53817-cve-2025-53816/" type="self" id="ROS-20250804-03" title="ROS-20250804-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53817" type="cve" id="CVE-2025-53817" title="CVE-2025-53817" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53816" type="cve" id="CVE-2025-53816" title="CVE-2025-53816" />
			<reference href="https://bdu.fstec.ru/vul/2025-08798" type="self" id="BDU:2025-08798" title="BDU:2025-08798" />
			<reference href="https://bdu.fstec.ru/vul/2025-08797" type="self" id="BDU:2025-08797" title="BDU:2025-08797" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="7zip" epoch="0" version="25.00" release="1.el7" arch="x86_64" src="">
					<filename>7zip-0:25.00-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250804-04</id>
		<issued date="2025-08-04" />
		<updated date="2025-08-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21756/</description>
               <solution>
                    Установить обновление для пакета(ов) kernel-lt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21756/" type="self" id="ROS-20250804-04" title="ROS-20250804-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21756" type="cve" id="CVE-2025-21756" title="CVE-2025-21756" />
			<reference href="https://bdu.fstec.ru/vul/2025-04373" type="self" id="BDU:2025-04373" title="BDU:2025-04373" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250806-01</id>
		<issued date="2025-08-06" />
		<updated date="2025-08-06" />
		<title>Уязвимость squid </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в squid</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-squid-cve-2025-54574/</description>
               <solution>
                    Запретить использование в ОС пакета squid
                или
                    Установить обновление для пакета(ов) squid
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-squid-cve-2025-54574/" type="self" id="ROS-20250806-01" title="ROS-20250806-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54574" type="cve" id="CVE-2025-54574" title="CVE-2025-54574" />
			<reference href="https://bdu.fstec.ru/vul/2025-09345" type="self" id="BDU:2025-09345" title="BDU:2025-09345" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="squid" epoch="7" version="6.5" release="1.el7" arch="x86_64" src="">
					<filename>squid-7:6.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250806-02</id>
		<issued date="2025-08-06" />
		<updated date="2025-08-06" />
		<title>Уязвимость mod_auth_openidc </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в mod_auth_openidc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mod-auth-openidc-cve-2025-3891/</description>
               <solution>
                    Запретить использование в ОС пакета mod_auth_openidc
                или
                    Установить обновление для пакета(ов) mod_auth_openidc
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mod-auth-openidc-cve-2025-3891/" type="self" id="ROS-20250806-02" title="ROS-20250806-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3891" type="cve" id="CVE-2025-3891" title="CVE-2025-3891" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mod_auth_openidc" epoch="0" version="2.4.16.11" release="1.el7" arch="x86_64" src="">
					<filename>mod_auth_openidc-0:2.4.16.11-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250806-03</id>
		<issued date="2025-08-06" />
		<updated date="2025-08-06" />
		<title>Уязвимость tcpdump </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tcpdump</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tcpdump-cve-2018-16301/</description>
               <solution>
                    Запретить использование в ОС пакета tcpdump
                или
                    Установить обновление для пакета(ов) tcpdump
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tcpdump-cve-2018-16301/" type="self" id="ROS-20250806-03" title="ROS-20250806-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16301" type="cve" id="CVE-2018-16301" title="CVE-2018-16301" />
			<reference href="https://bdu.fstec.ru/vul/2025-11760" type="self" id="BDU:2025-11760" title="BDU:2025-11760" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tcpdump" epoch="14" version="4.99.5" release="1.el7" arch="x86_64" src="">
					<filename>tcpdump-14:4.99.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250806-04</id>
		<issued date="2025-08-06" />
		<updated date="2025-08-06" />
		<title>Уязвимость mysql-connector-java </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в mysql-connector-java</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mysql-connector-java-cve-2018-3258/</description>
               <solution>
                    Запретить использование в ОС пакета mysql-connector-java
                или
                    Установить обновление для пакета(ов) mysql-connector-java
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mysql-connector-java-cve-2018-3258/" type="self" id="ROS-20250806-04" title="ROS-20250806-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3258" type="cve" id="CVE-2018-3258" title="CVE-2018-3258" />
			<reference href="https://bdu.fstec.ru/vul/2019-00097" type="self" id="BDU:2019-00097" title="BDU:2019-00097" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mysql-connector-java" epoch="1" version="8.4.0" release="2.el7" arch="noarch" src="">
					<filename>mysql-connector-java-1:8.4.0-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250806-05</id>
		<issued date="2025-08-06" />
		<updated date="2025-08-06" />
		<title>Уязвимость python3-pycurl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-pycurl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-pycurl-cve-2020-10716/</description>
               <solution>
                    Запретить использование в ОС пакета python3-pycurl
                или
                    Установить обновление для пакета(ов) python3-pycurl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-pycurl-cve-2020-10716/" type="self" id="ROS-20250806-05" title="ROS-20250806-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10716" type="cve" id="CVE-2020-10716" title="CVE-2020-10716" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-pycurl" epoch="0" version="7.45.6" release="1.el7" arch="x86_64" src="">
					<filename>python3-pycurl-0:7.45.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250806-06</id>
		<issued date="2025-08-06" />
		<updated date="2025-08-06" />
		<title>Уязвимость libxml2 </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в libxml2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libxml2-cve-2025-6170/</description>
               <solution>
                    Запретить использование в ОС пакета libxml2
                или
                    Установить обновление для пакета(ов) libxml2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libxml2-cve-2025-6170/" type="self" id="ROS-20250806-06" title="ROS-20250806-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6170" type="cve" id="CVE-2025-6170" title="CVE-2025-6170" />
			<reference href="https://bdu.fstec.ru/vul/2025-11756" type="self" id="BDU:2025-11756" title="BDU:2025-11756" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libxml2" epoch="0" version="2.9.8" release="21.el7.3" arch="x86_64" src="">
					<filename>libxml2-0:2.9.8-21.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250806-07</id>
		<issued date="2025-08-06" />
		<updated date="2025-08-06" />
		<title>Уязвимость libblockdev </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в libblockdev</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libblockdev-cve-2025-6019/</description>
               <solution>
                    Запретить использование в ОС пакета libblockdev
                или
                    Установить обновление для пакета(ов) libblockdev
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libblockdev-cve-2025-6019/" type="self" id="ROS-20250806-07" title="ROS-20250806-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6019" type="cve" id="CVE-2025-6019" title="CVE-2025-6019" />
			<reference href="https://bdu.fstec.ru/vul/2025-07084" type="self" id="BDU:2025-07084" title="BDU:2025-07084" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libblockdev" epoch="0" version="2.28" release="7.el7" arch="x86_64" src="">
					<filename>libblockdev-0:2.28-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250806-08</id>
		<issued date="2025-08-06" />
		<updated date="2025-08-06" />
		<title>Множественные уязвимости mongodb-org</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mongodb-org-060820251/</description>
               <solution>
                    Запретить использование в ОС пакета mongodb-org
                или
                    Установить обновление для пакета(ов) mongodb-org
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mongodb-org-060820251/" type="self" id="ROS-20250806-08" title="ROS-20250806-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6711" type="cve" id="CVE-2025-6711" title="CVE-2025-6711" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6713" type="cve" id="CVE-2025-6713" title="CVE-2025-6713" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6714" type="cve" id="CVE-2025-6714" title="CVE-2025-6714" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6706" type="cve" id="CVE-2025-6706" title="CVE-2025-6706" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6707" type="cve" id="CVE-2025-6707" title="CVE-2025-6707" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6709" type="cve" id="CVE-2025-6709" title="CVE-2025-6709" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6710" type="cve" id="CVE-2025-6710" title="CVE-2025-6710" />
			<reference href="https://bdu.fstec.ru/vul/2025-11757" type="self" id="BDU:2025-11757" title="BDU:2025-11757" />
			<reference href="https://bdu.fstec.ru/vul/2025-11726" type="self" id="BDU:2025-11726" title="BDU:2025-11726" />
			<reference href="https://bdu.fstec.ru/vul/2025-09086" type="self" id="BDU:2025-09086" title="BDU:2025-09086" />
			<reference href="https://bdu.fstec.ru/vul/2025-11758" type="self" id="BDU:2025-11758" title="BDU:2025-11758" />
			<reference href="https://bdu.fstec.ru/vul/2025-11759" type="self" id="BDU:2025-11759" title="BDU:2025-11759" />
			<reference href="https://bdu.fstec.ru/vul/2025-07725" type="self" id="BDU:2025-07725" title="BDU:2025-07725" />
			<reference href="https://bdu.fstec.ru/vul/2025-09089" type="self" id="BDU:2025-09089" title="BDU:2025-09089" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mongodb-org" epoch="0" version="6.0.25" release="1.el7" arch="x86_64" src="">
					<filename>mongodb-org-0:6.0.25-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250806-09</id>
		<issued date="2025-08-06" />
		<updated date="2025-08-06" />
		<title>Множественные уязвимости mongodb-org</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mongodb-org-060820252/</description>
               <solution>
                    Запретить использование в ОС пакета mongodb-org
                или
                    Установить обновление для пакета(ов) mongodb-org
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mongodb-org-060820252/" type="self" id="ROS-20250806-09" title="ROS-20250806-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6711" type="cve" id="CVE-2025-6711" title="CVE-2025-6711" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6713" type="cve" id="CVE-2025-6713" title="CVE-2025-6713" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6714" type="cve" id="CVE-2025-6714" title="CVE-2025-6714" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6706" type="cve" id="CVE-2025-6706" title="CVE-2025-6706" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6707" type="cve" id="CVE-2025-6707" title="CVE-2025-6707" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6709" type="cve" id="CVE-2025-6709" title="CVE-2025-6709" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6710" type="cve" id="CVE-2025-6710" title="CVE-2025-6710" />
			<reference href="https://bdu.fstec.ru/vul/2025-11757" type="self" id="BDU:2025-11757" title="BDU:2025-11757" />
			<reference href="https://bdu.fstec.ru/vul/2025-11726" type="self" id="BDU:2025-11726" title="BDU:2025-11726" />
			<reference href="https://bdu.fstec.ru/vul/2025-09086" type="self" id="BDU:2025-09086" title="BDU:2025-09086" />
			<reference href="https://bdu.fstec.ru/vul/2025-11758" type="self" id="BDU:2025-11758" title="BDU:2025-11758" />
			<reference href="https://bdu.fstec.ru/vul/2025-11759" type="self" id="BDU:2025-11759" title="BDU:2025-11759" />
			<reference href="https://bdu.fstec.ru/vul/2025-07725" type="self" id="BDU:2025-07725" title="BDU:2025-07725" />
			<reference href="https://bdu.fstec.ru/vul/2025-09089" type="self" id="BDU:2025-09089" title="BDU:2025-09089" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mongodb-org" epoch="0" version="7.0.21" release="1.el7" arch="x86_64" src="">
					<filename>mongodb-org-0:7.0.21-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250806-10</id>
		<issued date="2025-08-06" />
		<updated date="2025-08-06" />
		<title>Множественные уязвимости chromium</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-06082025/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-06082025/" type="self" id="ROS-20250806-10" title="ROS-20250806-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8011" type="cve" id="CVE-2025-8011" title="CVE-2025-8011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8010" type="cve" id="CVE-2025-8010" title="CVE-2025-8010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7656" type="cve" id="CVE-2025-7656" title="CVE-2025-7656" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7657" type="cve" id="CVE-2025-7657" title="CVE-2025-7657" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6558" type="cve" id="CVE-2025-6558" title="CVE-2025-6558" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6554" type="cve" id="CVE-2025-6554" title="CVE-2025-6554" />
			<reference href="https://bdu.fstec.ru/vul/2025-09418" type="self" id="BDU:2025-09418" title="BDU:2025-09418" />
			<reference href="https://bdu.fstec.ru/vul/2025-09419" type="self" id="BDU:2025-09419" title="BDU:2025-09419" />
			<reference href="https://bdu.fstec.ru/vul/2025-08887" type="self" id="BDU:2025-08887" title="BDU:2025-08887" />
			<reference href="https://bdu.fstec.ru/vul/2025-08879" type="self" id="BDU:2025-08879" title="BDU:2025-08879" />
			<reference href="https://bdu.fstec.ru/vul/2025-08785" type="self" id="BDU:2025-08785" title="BDU:2025-08785" />
			<reference href="https://bdu.fstec.ru/vul/2025-07783" type="self" id="BDU:2025-07783" title="BDU:2025-07783" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="138.0.7204.168" release="1.el7" arch="x86_64" src="">
					<filename>chromium-0:138.0.7204.168-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250806-11</id>
		<issued date="2025-08-06" />
		<updated date="2025-08-06" />
		<title>Уязвимость python3-requests </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-requests</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-requests-cve-2024-47081/</description>
               <solution>
                    Запретить использование в ОС пакета python3-requests
                или
                    Установить обновление для пакета(ов) python3-requests
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-requests-cve-2024-47081/" type="self" id="ROS-20250806-11" title="ROS-20250806-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47081" type="cve" id="CVE-2024-47081" title="CVE-2024-47081" />
			<reference href="https://bdu.fstec.ru/vul/2025-08576" type="self" id="BDU:2025-08576" title="BDU:2025-08576" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-requests" epoch="0" version="2.26.0" release="8.el7" arch="noarch" src="">
					<filename>python3-requests-0:2.26.0-8.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250806-12</id>
		<issued date="2025-08-06" />
		<updated date="2025-08-06" />
		<title>Уязвимость mtr </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в mtr</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mtr-cve-2025-49809/</description>
               <solution>
                    Запретить использование в ОС пакета mtr
                или
                    Установить обновление для пакета(ов) mtr
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mtr-cve-2025-49809/" type="self" id="ROS-20250806-12" title="ROS-20250806-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49809" type="cve" id="CVE-2025-49809" title="CVE-2025-49809" />
			<reference href="https://bdu.fstec.ru/vul/2025-11072" type="self" id="BDU:2025-11072" title="BDU:2025-11072" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mtr" epoch="2" version="0.96" release="2.el7" arch="x86_64" src="">
					<filename>mtr-2:0.96-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250806-13</id>
		<issued date="2025-08-06" />
		<updated date="2025-08-06" />
		<title>Множественные уязвимости portainer-ce</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в portainer-ce</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-portainer-ce-06082025/</description>
               <solution>
                    Запретить использование в ОС пакета portainer-ce
                или
                    Установить обновление для пакета(ов) portainer-ce
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-portainer-ce-06082025/" type="self" id="ROS-20250806-13" title="ROS-20250806-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24358" type="cve" id="CVE-2025-24358" title="CVE-2025-24358" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22868" type="cve" id="CVE-2025-22868" title="CVE-2025-22868" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32386" type="cve" id="CVE-2025-32386" title="CVE-2025-32386" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32387" type="cve" id="CVE-2025-32387" title="CVE-2025-32387" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22871" type="cve" id="CVE-2025-22871" title="CVE-2025-22871" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30204" type="cve" id="CVE-2025-30204" title="CVE-2025-30204" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22872" type="cve" id="CVE-2025-22872" title="CVE-2025-22872" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22870" type="cve" id="CVE-2025-22870" title="CVE-2025-22870" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22866" type="cve" id="CVE-2025-22866" title="CVE-2025-22866" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45338" type="cve" id="CVE-2024-45338" title="CVE-2024-45338" />
			<reference href="https://bdu.fstec.ru/vul/2025-11753" type="self" id="BDU:2025-11753" title="BDU:2025-11753" />
			<reference href="https://bdu.fstec.ru/vul/2025-03638" type="self" id="BDU:2025-03638" title="BDU:2025-03638" />
			<reference href="https://bdu.fstec.ru/vul/2025-06057" type="self" id="BDU:2025-06057" title="BDU:2025-06057" />
			<reference href="https://bdu.fstec.ru/vul/2025-06056" type="self" id="BDU:2025-06056" title="BDU:2025-06056" />
			<reference href="https://bdu.fstec.ru/vul/2025-04014" type="self" id="BDU:2025-04014" title="BDU:2025-04014" />
			<reference href="https://bdu.fstec.ru/vul/2025-08472" type="self" id="BDU:2025-08472" title="BDU:2025-08472" />
			<reference href="https://bdu.fstec.ru/vul/2025-08473" type="self" id="BDU:2025-08473" title="BDU:2025-08473" />
			<reference href="https://bdu.fstec.ru/vul/2025-02476" type="self" id="BDU:2025-02476" title="BDU:2025-02476" />
			<reference href="https://bdu.fstec.ru/vul/2025-03456" type="self" id="BDU:2025-03456" title="BDU:2025-03456" />
			<reference href="https://bdu.fstec.ru/vul/2025-01010" type="self" id="BDU:2025-01010" title="BDU:2025-01010" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="portainer-ce" epoch="0" version="2.29.2" release="2.el7" arch="x86_64" src="">
					<filename>portainer-ce-0:2.29.2-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250807-01</id>
		<issued date="2025-08-07" />
		<updated date="2025-08-07" />
		<title>Уязвимость libxml2 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libxml2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libxml2-cve-2025-6021/</description>
               <solution>
                    Запретить использование в ОС пакета libxml2
                или
                    Установить обновление для пакета(ов) libxml2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libxml2-cve-2025-6021/" type="self" id="ROS-20250807-01" title="ROS-20250807-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6021" type="cve" id="CVE-2025-6021" title="CVE-2025-6021" />
			<reference href="https://bdu.fstec.ru/vul/2025-07144" type="self" id="BDU:2025-07144" title="BDU:2025-07144" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libxml2" epoch="0" version="2.9.8" release="21.el7.3" arch="x86_64" src="">
					<filename>libxml2-0:2.9.8-21.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250807-02</id>
		<issued date="2025-08-07" />
		<updated date="2025-08-07" />
		<title>Уязвимость podman </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в podman</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-podman-cve-2025-6032/</description>
               <solution>
                    Запретить использование в ОС пакета podman
                или
                    Установить обновление для пакета(ов) podman
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-podman-cve-2025-6032/" type="self" id="ROS-20250807-02" title="ROS-20250807-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6032" type="cve" id="CVE-2025-6032" title="CVE-2025-6032" />
			<reference href="https://bdu.fstec.ru/vul/2025-09074" type="self" id="BDU:2025-09074" title="BDU:2025-09074" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="podman" epoch="0" version="4.9.5" release="5.el7" arch="x86_64" src="">
					<filename>podman-0:4.9.5-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250807-03</id>
		<issued date="2025-08-07" />
		<updated date="2025-08-07" />
		<title>Уязвимость libjxl </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в libjxl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libjxl-cve-2023-0645/</description>
               <solution>
                    Запретить использование в ОС пакета libjxl
                или
                    Установить обновление для пакета(ов) libjxl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libjxl-cve-2023-0645/" type="self" id="ROS-20250807-03" title="ROS-20250807-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0645" type="cve" id="CVE-2023-0645" title="CVE-2023-0645" />
			<reference href="https://bdu.fstec.ru/vul/2025-11754" type="self" id="BDU:2025-11754" title="BDU:2025-11754" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libjxl" epoch="1" version="0.7.0" release="4.el7" arch="x86_64" src="">
					<filename>libjxl-1:0.7.0-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250807-04</id>
		<issued date="2025-08-07" />
		<updated date="2025-08-07" />
		<title>Множественные уязвимости git</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в git</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-git-07082025/</description>
               <solution>
                    Запретить использование в ОС пакета git
                или
                    Установить обновление для пакета(ов) git
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-git-07082025/" type="self" id="ROS-20250807-04" title="ROS-20250807-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27613" type="cve" id="CVE-2025-27613" title="CVE-2025-27613" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27614" type="cve" id="CVE-2025-27614" title="CVE-2025-27614" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46335" type="cve" id="CVE-2025-46335" title="CVE-2025-46335" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48384" type="cve" id="CVE-2025-48384" title="CVE-2025-48384" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48385" type="cve" id="CVE-2025-48385" title="CVE-2025-48385" />
			<reference href="https://bdu.fstec.ru/vul/2025-09364" type="self" id="BDU:2025-09364" title="BDU:2025-09364" />
			<reference href="https://bdu.fstec.ru/vul/2025-09363" type="self" id="BDU:2025-09363" title="BDU:2025-09363" />
			<reference href="https://bdu.fstec.ru/vul/2025-09278" type="self" id="BDU:2025-09278" title="BDU:2025-09278" />
			<reference href="https://bdu.fstec.ru/vul/2025-08691" type="self" id="BDU:2025-08691" title="BDU:2025-08691" />
			<reference href="https://bdu.fstec.ru/vul/2025-08688" type="self" id="BDU:2025-08688" title="BDU:2025-08688" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="git" epoch="0" version="2.48.2" release="1.el7" arch="x86_64" src="">
					<filename>git-0:2.48.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250807-05</id>
		<issued date="2025-08-07" />
		<updated date="2025-08-07" />
		<title>Множественные уязвимости resteasy </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в resteasy</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-resteasy-cve-2020-10688-cve-2020-1695-cve-2020-25633-cve-2021-20289/</description>
               <solution>
                    Запретить использование в ОС пакета resteasy
                или
                    Установить обновление для пакета(ов) resteasy
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-resteasy-cve-2020-10688-cve-2020-1695-cve-2020-25633-cve-2021-20289/" type="self" id="ROS-20250807-05" title="ROS-20250807-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1695" type="cve" id="CVE-2020-1695" title="CVE-2020-1695" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10688" type="cve" id="CVE-2020-10688" title="CVE-2020-10688" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25633" type="cve" id="CVE-2020-25633" title="CVE-2020-25633" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20289" type="cve" id="CVE-2021-20289" title="CVE-2021-20289" />
			<reference href="https://bdu.fstec.ru/vul/2024-01095" type="self" id="BDU:2024-01095" title="BDU:2024-01095" />
			<reference href="https://bdu.fstec.ru/vul/2024-01096" type="self" id="BDU:2024-01096" title="BDU:2024-01096" />
			<reference href="https://bdu.fstec.ru/vul/2025-11755" type="self" id="BDU:2025-11755" title="BDU:2025-11755" />
			<reference href="https://bdu.fstec.ru/vul/2022-02827" type="self" id="BDU:2022-02827" title="BDU:2022-02827" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="resteasy" epoch="0" version="3.0.26" release="3.el7" arch="noarch" src="">
					<filename>resteasy-0:3.0.26-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250807-06</id>
		<issued date="2025-08-07" />
		<updated date="2025-08-07" />
		<title>Множественные уязвимости vim </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в vim-X11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim-cve-2025-53905-cve-2025-53906/</description>
               <solution>
                    Запретить использование в ОС пакета vim-X11
                или
                    Установить обновление для пакета(ов) Vvim-X11im
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim-cve-2025-53905-cve-2025-53906/" type="self" id="ROS-20250807-06" title="ROS-20250807-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53905" type="cve" id="CVE-2025-53905" title="CVE-2025-53905" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53906" type="cve" id="CVE-2025-53906" title="CVE-2025-53906" />
			<reference href="https://bdu.fstec.ru/vul/2025-11730" type="self" id="BDU:2025-11730" title="BDU:2025-11730" />
			<reference href="https://bdu.fstec.ru/vul/2025-11731" type="self" id="BDU:2025-11731" title="BDU:2025-11731" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-X11" epoch="2" version="9.1.1552" release="1.el7" arch="x86_64" src="">
					<filename>vim-X11-2:9.1.1552-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250808-01</id>
		<issued date="2025-08-08" />
		<updated date="2025-08-08" />
		<title>Уязвимость lucene </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в lucene</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-lucene-cve-2020-13956/</description>
               <solution>
                    Запретить использование в ОС пакета lucene
                или
                    Установить обновление для пакета(ов) lucene
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-lucene-cve-2020-13956/" type="self" id="ROS-20250808-01" title="ROS-20250808-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13956" type="cve" id="CVE-2020-13956" title="CVE-2020-13956" />
			<reference href="https://bdu.fstec.ru/vul/2023-05212" type="self" id="BDU:2023-05212" title="BDU:2023-05212" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="lucene" epoch="0" version="7.7.0" release="2.el7" arch="noarch" src="">
					<filename>lucene-0:7.7.0-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250808-02</id>
		<issued date="2025-08-08" />
		<updated date="2025-08-08" />
		<title>Уязвимость java-1.8.0-openjdk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-1.8.0-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-1-8-0-openjdk-cve-2025-50059/</description>
               <solution>
                    Запретить использование в ОС пакета java-1.8.0-openjdk
                или
                    Установить обновление для пакета(ов) java-1.8.0-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-1-8-0-openjdk-cve-2025-50059/" type="self" id="ROS-20250808-02" title="ROS-20250808-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50059" type="cve" id="CVE-2025-50059" title="CVE-2025-50059" />
			<reference href="https://bdu.fstec.ru/vul/2025-08906" type="self" id="BDU:2025-08906" title="BDU:2025-08906" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-1.8.0-openjdk" epoch="1" version="1.8.0.462.b08" release="1.el7" arch="x86_64" src="">
					<filename>java-1.8.0-openjdk-1:1.8.0.462.b08-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250808-03</id>
		<issued date="2025-08-08" />
		<updated date="2025-08-08" />
		<title>Уязвимость java-11-openjdk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-11-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-11-openjdk-cve-2025-50059/</description>
               <solution>
                    Запретить использование в ОС пакета java-11-openjdk
                или
                    Установить обновление для пакета(ов) java-11-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-11-openjdk-cve-2025-50059/" type="self" id="ROS-20250808-03" title="ROS-20250808-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50059" type="cve" id="CVE-2025-50059" title="CVE-2025-50059" />
			<reference href="https://bdu.fstec.ru/vul/2025-08906" type="self" id="BDU:2025-08906" title="BDU:2025-08906" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-11-openjdk" epoch="1" version="11.0.28.0.6" release="1.el7" arch="x86_64" src="">
					<filename>java-11-openjdk-1:11.0.28.0.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250808-04</id>
		<issued date="2025-08-08" />
		<updated date="2025-08-08" />
		<title>Уязвимость java-17-openjdk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-17-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-17-openjdk-cve-2025-50059/</description>
               <solution>
                    Запретить использование в ОС пакета java-17-openjdk
                или
                    Установить обновление для пакета(ов) java-17-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-17-openjdk-cve-2025-50059/" type="self" id="ROS-20250808-04" title="ROS-20250808-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50059" type="cve" id="CVE-2025-50059" title="CVE-2025-50059" />
			<reference href="https://bdu.fstec.ru/vul/2025-08906" type="self" id="BDU:2025-08906" title="BDU:2025-08906" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-17-openjdk" epoch="1" version="17.0.16.0.8" release="1.el7" arch="x86_64" src="">
					<filename>java-17-openjdk-1:17.0.16.0.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250808-05</id>
		<issued date="2025-08-08" />
		<updated date="2025-08-08" />
		<title>Уязвимость java-21-openjdk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-21-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-21-openjdk-cve-2025-50059/</description>
               <solution>
                    Запретить использование в ОС пакета java-21-openjdk
                или
                    Установить обновление для пакета(ов) java-21-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-21-openjdk-cve-2025-50059/" type="self" id="ROS-20250808-05" title="ROS-20250808-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50059" type="cve" id="CVE-2025-50059" title="CVE-2025-50059" />
			<reference href="https://bdu.fstec.ru/vul/2025-08906" type="self" id="BDU:2025-08906" title="BDU:2025-08906" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-21-openjdk" epoch="1" version="21.0.8.0.9" release="1.el7" arch="x86_64" src="">
					<filename>java-21-openjdk-1:21.0.8.0.9-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250808-06</id>
		<issued date="2025-08-08" />
		<updated date="2025-08-08" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2025-4674/</description>
               <solution>
                    Запретить использование в ОС пакета golang
                или
                    Установить обновление для пакета(ов) golang
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2025-4674/" type="self" id="ROS-20250808-06" title="ROS-20250808-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4674" type="cve" id="CVE-2025-4674" title="CVE-2025-4674" />
			<reference href="https://bdu.fstec.ru/vul/2025-09875" type="self" id="BDU:2025-09875" title="BDU:2025-09875" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.24.5" release="1.el7" arch="x86_64" src="">
					<filename>golang-0:1.24.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250808-07</id>
		<issued date="2025-08-08" />
		<updated date="2025-08-08" />
		<title>Множественные уязвимости gobgp</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в gobgp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gobgp-08082025/</description>
               <solution>
                    Запретить использование в ОС пакета gobgp
                или
                    Установить обновление для пакета(ов) gobgp
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gobgp-08082025/" type="self" id="ROS-20250808-07" title="ROS-20250808-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46565" type="cve" id="CVE-2023-46565" title="CVE-2023-46565" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43970" type="cve" id="CVE-2025-43970" title="CVE-2025-43970" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43971" type="cve" id="CVE-2025-43971" title="CVE-2025-43971" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43972" type="cve" id="CVE-2025-43972" title="CVE-2025-43972" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43973" type="cve" id="CVE-2025-43973" title="CVE-2025-43973" />
			<reference href="https://bdu.fstec.ru/vul/2025-09876" type="self" id="BDU:2025-09876" title="BDU:2025-09876" />
			<reference href="https://bdu.fstec.ru/vul/2025-09853" type="self" id="BDU:2025-09853" title="BDU:2025-09853" />
			<reference href="https://bdu.fstec.ru/vul/2025-09852" type="self" id="BDU:2025-09852" title="BDU:2025-09852" />
			<reference href="https://bdu.fstec.ru/vul/2025-09851" type="self" id="BDU:2025-09851" title="BDU:2025-09851" />
			<reference href="https://bdu.fstec.ru/vul/2025-09850" type="self" id="BDU:2025-09850" title="BDU:2025-09850" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gobgp" epoch="1" version="3.37.0" release="1.el7" arch="x86_64" src="">
					<filename>gobgp-1:3.37.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250812-01</id>
		<issued date="2025-08-12" />
		<updated date="2025-08-12" />
		<title>Множественные уязвимости php-guzzlehttp-guzzle6 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в php-guzzlehttp-guzzle6</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-guzzlehttp-guzzle6-cve-2022-31042-cve-2022-31043/</description>
               <solution>
                    Запретить использование в ОС пакета php-guzzlehttp-guzzle6
                или
                    Установить обновление для пакета(ов) php-guzzlehttp-guzzle6
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-guzzlehttp-guzzle6-cve-2022-31042-cve-2022-31043/" type="self" id="ROS-20250812-01" title="ROS-20250812-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31043" type="cve" id="CVE-2022-31043" title="CVE-2022-31043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31042" type="cve" id="CVE-2022-31042" title="CVE-2022-31042" />
			<reference href="https://bdu.fstec.ru/vul/2022-03942" type="self" id="BDU:2022-03942" title="BDU:2022-03942" />
			<reference href="https://bdu.fstec.ru/vul/2022-03953" type="self" id="BDU:2022-03953" title="BDU:2022-03953" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php-guzzlehttp-guzzle6" epoch="0" version="6.5.7" release="1.el7" arch="noarch" src="">
					<filename>php-guzzlehttp-guzzle6-0:6.5.7-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250812-02</id>
		<issued date="2025-08-12" />
		<updated date="2025-08-12" />
		<title>Множественные уязвимости liblouis </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в liblouis</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-liblouis-cve-2022-31783-cve-2022-26981/</description>
               <solution>
                    Запретить использование в ОС пакета liblouis
                или
                    Установить обновление для пакета(ов) liblouis
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-liblouis-cve-2022-31783-cve-2022-26981/" type="self" id="ROS-20250812-02" title="ROS-20250812-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31783" type="cve" id="CVE-2022-31783" title="CVE-2022-31783" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26981" type="cve" id="CVE-2022-26981" title="CVE-2022-26981" />
			<reference href="https://bdu.fstec.ru/vul/2025-09874" type="self" id="BDU:2025-09874" title="BDU:2025-09874" />
			<reference href="https://bdu.fstec.ru/vul/2025-09873" type="self" id="BDU:2025-09873" title="BDU:2025-09873" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="liblouis" epoch="0" version="3.22.0" release="1.el7" arch="x86_64" src="">
					<filename>liblouis-0:3.22.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250812-03</id>
		<issued date="2025-08-12" />
		<updated date="2025-08-12" />
		<title>Уязвимость GraphicsMagick </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в GraphicsMagick</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-graphicsmagick-cve-2022-1270/</description>
               <solution>
                    Запретить использование в ОС пакета GraphicsMagick
                или
                    Установить обновление для пакета(ов) GraphicsMagick
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-graphicsmagick-cve-2022-1270/" type="self" id="ROS-20250812-03" title="ROS-20250812-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1270" type="cve" id="CVE-2022-1270" title="CVE-2022-1270" />
			<reference href="https://bdu.fstec.ru/vul/2022-06084" type="self" id="BDU:2022-06084" title="BDU:2022-06084" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="GraphicsMagick" epoch="0" version="1.3.38" release="1.el7" arch="x86_64" src="">
					<filename>GraphicsMagick-0:1.3.38-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250812-04</id>
		<issued date="2025-08-12" />
		<updated date="2025-08-12" />
		<title>Уязвимость nodejs-decode-uri-component </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nodejs-decode-uri-component</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-decode-uri-component-cve-2022-38900/</description>
               <solution>
                    Запретить использование в ОС пакета nodejs-decode-uri-component
                или
                    Установить обновление для пакета(ов) nodejs-decode-uri-component
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-decode-uri-component-cve-2022-38900/" type="self" id="ROS-20250812-04" title="ROS-20250812-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38900" type="cve" id="CVE-2022-38900" title="CVE-2022-38900" />
			<reference href="https://bdu.fstec.ru/vul/2024-05189" type="self" id="BDU:2024-05189" title="BDU:2024-05189" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs-decode-uri-component" epoch="0" version="0.2.2" release="1.el7" arch="noarch" src="">
					<filename>nodejs-decode-uri-component-0:0.2.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250812-05</id>
		<issued date="2025-08-12" />
		<updated date="2025-08-12" />
		<title>Уязвимость resteasy </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в resteasy</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-resteasy-cve-2023-0482/</description>
               <solution>
                    Запретить использование в ОС пакета resteasy
                или
                    Установить обновление для пакета(ов) resteasy
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-resteasy-cve-2023-0482/" type="self" id="ROS-20250812-05" title="ROS-20250812-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0482" type="cve" id="CVE-2023-0482" title="CVE-2023-0482" />
			<reference href="https://bdu.fstec.ru/vul/2025-09868" type="self" id="BDU:2025-09868" title="BDU:2025-09868" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="resteasy" epoch="0" version="3.0.26" release="3.el7" arch="noarch" src="">
					<filename>resteasy-0:3.0.26-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250812-06</id>
		<issued date="2025-08-12" />
		<updated date="2025-08-12" />
		<title>Множественные уязвимости Sofia-sip</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в sofia-sip</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-sofia-sip/</description>
               <solution>
                    Запретить использование в ОС пакета Sofia-sip
                или
                    Установить обновление для пакета(ов) Sofia-sip
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-sofia-sip/" type="self" id="ROS-20250812-06" title="ROS-20250812-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32307" type="cve" id="CVE-2023-32307" title="CVE-2023-32307" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22741" type="cve" id="CVE-2023-22741" title="CVE-2023-22741" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31001" type="cve" id="CVE-2022-31001" title="CVE-2022-31001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31002" type="cve" id="CVE-2022-31002" title="CVE-2022-31002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31003" type="cve" id="CVE-2022-31003" title="CVE-2022-31003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47516" type="cve" id="CVE-2022-47516" title="CVE-2022-47516" />
			<reference href="https://bdu.fstec.ru/vul/2025-09871" type="self" id="BDU:2025-09871" title="BDU:2025-09871" />
			<reference href="https://bdu.fstec.ru/vul/2023-07137" type="self" id="BDU:2023-07137" title="BDU:2023-07137" />
			<reference href="https://bdu.fstec.ru/vul/2025-09864" type="self" id="BDU:2025-09864" title="BDU:2025-09864" />
			<reference href="https://bdu.fstec.ru/vul/2025-09872" type="self" id="BDU:2025-09872" title="BDU:2025-09872" />
			<reference href="https://bdu.fstec.ru/vul/2025-09870" type="self" id="BDU:2025-09870" title="BDU:2025-09870" />
			<reference href="https://bdu.fstec.ru/vul/2025-09869" type="self" id="BDU:2025-09869" title="BDU:2025-09869" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="sofia-sip" epoch="0" version="1.13.17" release="1.el7" arch="x86_64" src="">
					<filename>sofia-sip-0:1.13.17-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250812-07</id>
		<issued date="2025-08-12" />
		<updated date="2025-08-12" />
		<title>Уязвимость ansible </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ansible</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ansible-cve-2022-3697/</description>
               <solution>
                    Запретить использование в ОС пакета ansible
                или
                    Установить обновление для пакета(ов) ansible
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ansible-cve-2022-3697/" type="self" id="ROS-20250812-07" title="ROS-20250812-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3697" type="cve" id="CVE-2022-3697" title="CVE-2022-3697" />
			<reference href="https://bdu.fstec.ru/vul/2024-07358" type="self" id="BDU:2024-07358" title="BDU:2024-07358" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ansible" epoch="0" version="6.7.0" release="2.el7" arch="noarch" src="">
					<filename>ansible-0:6.7.0-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250812-08</id>
		<issued date="2025-08-12" />
		<updated date="2025-08-12" />
		<title>Множественные уязвимости httpd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в httpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-httpd-cve-2024-38473-cve-2024-38472/</description>
               <solution>
                    Запретить использование в ОС пакета httpd
                или
                    Установить обновление для пакета(ов) httpd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-httpd-cve-2024-38473-cve-2024-38472/" type="self" id="ROS-20250812-08" title="ROS-20250812-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38473" type="cve" id="CVE-2024-38473" title="CVE-2024-38473" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38472" type="cve" id="CVE-2024-38472" title="CVE-2024-38472" />
			<reference href="https://bdu.fstec.ru/vul/2024-06893" type="self" id="BDU:2024-06893" title="BDU:2024-06893" />
			<reference href="https://bdu.fstec.ru/vul/2024-05354" type="self" id="BDU:2024-05354" title="BDU:2024-05354" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="httpd" epoch="0" version="2.4.61" release="1.el7" arch="x86_64" src="">
					<filename>httpd-0:2.4.61-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250812-09</id>
		<issued date="2025-08-12" />
		<updated date="2025-08-12" />
		<title>Уязвимость qt6-qtbase </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в qt6-qtbase</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qt6-qtbase-cve-2024-39936/</description>
               <solution>
                    Запретить использование в ОС пакета qt6-qtbase
                или
                    Установить обновление для пакета(ов) qt6-qtbase
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qt6-qtbase-cve-2024-39936/" type="self" id="ROS-20250812-09" title="ROS-20250812-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39936" type="cve" id="CVE-2024-39936" title="CVE-2024-39936" />
			<reference href="https://bdu.fstec.ru/vul/2025-04695" type="self" id="BDU:2025-04695" title="BDU:2025-04695" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="qt6-qtbase" epoch="0" version="6.6.3" release="3.el7" arch="x86_64" src="">
					<filename>qt6-qtbase-0:6.6.3-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250813-01</id>
		<issued date="2025-08-13" />
		<updated date="2025-08-13" />
		<title>Уязвимость python3 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2024-6232/</description>
               <solution>
                    Запретить использование в ОС пакета python3
                или
                    Установить обновление для пакета(ов) python3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2024-6232/" type="self" id="ROS-20250813-01" title="ROS-20250813-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6232" type="cve" id="CVE-2024-6232" title="CVE-2024-6232" />
			<reference href="https://bdu.fstec.ru/vul/2024-08943" type="self" id="BDU:2024-08943" title="BDU:2024-08943" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3" epoch="0" version="3.8.20" release="1.el7" arch="x86_64" src="">
					<filename>python3-0:3.8.20-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250813-02</id>
		<issued date="2025-08-13" />
		<updated date="2025-08-13" />
		<title>Уязвимость linux-firmware </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в linux-firmware</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-linux-firmware-cve-2024-28947/</description>
               <solution>
                    Запретить использование в ОС пакета linux-firmware
                или
                    Установить обновление для пакета(ов) linux-firmware
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-linux-firmware-cve-2024-28947/" type="self" id="ROS-20250813-02" title="ROS-20250813-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28947" type="cve" id="CVE-2024-28947" title="CVE-2024-28947" />
			<reference href="https://bdu.fstec.ru/vul/2024-07051" type="self" id="BDU:2024-07051" title="BDU:2024-07051" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="linux-firmware" epoch="0" version="20241017" release="2.el7.3" arch="noarch" src="">
					<filename>linux-firmware-0:20241017-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250813-03</id>
		<issued date="2025-08-13" />
		<updated date="2025-08-13" />
		<title>Множественные уязвимости linux-firmware </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в linux-firmware</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-linux-firmware-cve-2024-23497-cve-2024-21871/</description>
               <solution>
                    Запретить использование в ОС пакета linux-firmware
                или
                    Установить обновление для пакета(ов) linux-firmware
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-linux-firmware-cve-2024-23497-cve-2024-21871/" type="self" id="ROS-20250813-03" title="ROS-20250813-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23497" type="cve" id="CVE-2024-23497" title="CVE-2024-23497" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21871" type="cve" id="CVE-2024-21871" title="CVE-2024-21871" />
			<reference href="https://bdu.fstec.ru/vul/2025-09866" type="self" id="BDU:2025-09866" title="BDU:2025-09866" />
			<reference href="https://bdu.fstec.ru/vul/2024-08678" type="self" id="BDU:2024-08678" title="BDU:2024-08678" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="linux-firmware" epoch="0" version="20250109" release="1.el7.3" arch="noarch" src="">
					<filename>linux-firmware-0:20250109-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250813-04</id>
		<issued date="2025-08-13" />
		<updated date="2025-08-13" />
		<title>Уязвимость open-vm-tools </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в open-vm-tools</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-open-vm-tools-cve-2022-31676/</description>
               <solution>
                    Запретить использование в ОС пакета open-vm-tools
                или
                    Установить обновление для пакета(ов) open-vm-tools
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-open-vm-tools-cve-2022-31676/" type="self" id="ROS-20250813-04" title="ROS-20250813-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31676" type="cve" id="CVE-2022-31676" title="CVE-2022-31676" />
			<reference href="https://bdu.fstec.ru/vul/2022-05274" type="self" id="BDU:2022-05274" title="BDU:2022-05274" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="open-vm-tools" epoch="0" version="12.1.0" release="1.el7" arch="x86_64" src="">
					<filename>open-vm-tools-0:12.1.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250813-05</id>
		<issued date="2025-08-13" />
		<updated date="2025-08-13" />
		<title>Уязвимость xen </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в xen</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-xen-cve-2024-31143/</description>
               <solution>
                    Запретить использование в ОС пакета xen
                или
                    Установить обновление для пакета(ов) xen
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-xen-cve-2024-31143/" type="self" id="ROS-20250813-05" title="ROS-20250813-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31143" type="cve" id="CVE-2024-31143" title="CVE-2024-31143" />
			<reference href="https://bdu.fstec.ru/vul/2025-09862" type="self" id="BDU:2025-09862" title="BDU:2025-09862" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="xen" epoch="0" version="4.19.0" release="1.el7" arch="x86_64" src="">
					<filename>xen-0:4.19.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250813-06</id>
		<issued date="2025-08-13" />
		<updated date="2025-08-13" />
		<title>Уязвимость stunnel </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в stunnel</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-stunnel-cve-2021-20230/</description>
               <solution>
                    Запретить использование в ОС пакета stunnel
                или
                    Установить обновление для пакета(ов) stunnel
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-stunnel-cve-2021-20230/" type="self" id="ROS-20250813-06" title="ROS-20250813-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20230" type="cve" id="CVE-2021-20230" title="CVE-2021-20230" />
			<reference href="https://bdu.fstec.ru/vul/2025-09865" type="self" id="BDU:2025-09865" title="BDU:2025-09865" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="stunnel" epoch="0" version="5.75" release="1.el7" arch="x86_64" src="">
					<filename>stunnel-0:5.75-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250813-07</id>
		<issued date="2025-08-13" />
		<updated date="2025-08-13" />
		<title>Уязвимость dnsjava </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в dnsjava</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dnsjava-cve-2024-25638/</description>
               <solution>
                    Запретить использование в ОС пакета dnsjava
                или
                    Установить обновление для пакета(ов) dnsjava
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dnsjava-cve-2024-25638/" type="self" id="ROS-20250813-07" title="ROS-20250813-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25638" type="cve" id="CVE-2024-25638" title="CVE-2024-25638" />
			<reference href="https://bdu.fstec.ru/vul/2025-09867" type="self" id="BDU:2025-09867" title="BDU:2025-09867" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dnsjava" epoch="0" version="2.1.3" release="13.el7" arch="noarch" src="">
					<filename>dnsjava-0:2.1.3-13.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250813-08</id>
		<issued date="2025-08-13" />
		<updated date="2025-08-13" />
		<title>Уязвимость aqute-bnd3 </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в aqute-bnd3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-aqute-bnd3-cve-2024-25638/</description>
               <solution>
                    Запретить использование в ОС пакета aqute-bnd3
                или
                    Установить обновление для пакета(ов) aqute-bnd3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-aqute-bnd3-cve-2024-25638/" type="self" id="ROS-20250813-08" title="ROS-20250813-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25638" type="cve" id="CVE-2024-25638" title="CVE-2024-25638" />
			<reference href="https://bdu.fstec.ru/vul/2025-09867" type="self" id="BDU:2025-09867" title="BDU:2025-09867" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="aqute-bnd3" epoch="0" version="3.5.0" release="1.el7" arch="noarch" src="">
					<filename>aqute-bnd3-0:3.5.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250813-09</id>
		<issued date="2025-08-13" />
		<updated date="2025-08-13" />
		<title>Уязвимость NetworkManager </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в NetworkManager</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-networkmanager-cve-2024-5290/</description>
               <solution>
                    Запретить использование в ОС пакета NetworkManager
                или
                    Установить обновление для пакета(ов) NetworkManager
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-networkmanager-cve-2024-5290/" type="self" id="ROS-20250813-09" title="ROS-20250813-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5290" type="cve" id="CVE-2024-5290" title="CVE-2024-5290" />
			<reference href="https://bdu.fstec.ru/vul/2024-06261" type="self" id="BDU:2024-06261" title="BDU:2024-06261" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="NetworkManager" epoch="1" version="1.52.0" release="5.el7" arch="x86_64" src="">
					<filename>NetworkManager-1:1.52.0-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250813-10</id>
		<issued date="2025-08-13" />
		<updated date="2025-08-13" />
		<title>Уязвимость wpa_supplicant </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в wpa_supplicant</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-wpa-supplicant-cve-2024-5290/</description>
               <solution>
                    Запретить использование в ОС пакета wpa_supplicant
                или
                    Установить обновление для пакета(ов) wpa_supplicant
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-wpa-supplicant-cve-2024-5290/" type="self" id="ROS-20250813-10" title="ROS-20250813-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5290" type="cve" id="CVE-2024-5290" title="CVE-2024-5290" />
			<reference href="https://bdu.fstec.ru/vul/2024-06261" type="self" id="BDU:2024-06261" title="BDU:2024-06261" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="wpa_supplicant" epoch="1" version="2.11" release="1.el7" arch="x86_64" src="">
					<filename>wpa_supplicant-1:2.11-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250813-11</id>
		<issued date="2025-08-13" />
		<updated date="2025-08-13" />
		<title>Множественные уязвимости linux-firmware</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в linux-firmware</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-linux-firmware-13082025/</description>
               <solution>
                    Запретить использование в ОС пакета linux-firmware
                или
                    Установить обновление для пакета(ов) linux-firmware
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-linux-firmware-13082025/" type="self" id="ROS-20250813-11" title="ROS-20250813-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23815" type="cve" id="CVE-2022-23815" title="CVE-2022-23815" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31315" type="cve" id="CVE-2023-31315" title="CVE-2023-31315" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20518" type="cve" id="CVE-2023-20518" title="CVE-2023-20518" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20578" type="cve" id="CVE-2023-20578" title="CVE-2023-20578" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20584" type="cve" id="CVE-2023-20584" title="CVE-2023-20584" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20591" type="cve" id="CVE-2023-20591" title="CVE-2023-20591" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31355" type="cve" id="CVE-2023-31355" title="CVE-2023-31355" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31356" type="cve" id="CVE-2023-31356" title="CVE-2023-31356" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21978" type="cve" id="CVE-2024-21978" title="CVE-2024-21978" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21980" type="cve" id="CVE-2024-21980" title="CVE-2024-21980" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21981" type="cve" id="CVE-2024-21981" title="CVE-2024-21981" />
			<reference href="https://bdu.fstec.ru/vul/2025-09857" type="self" id="BDU:2025-09857" title="BDU:2025-09857" />
			<reference href="https://bdu.fstec.ru/vul/2025-03956" type="self" id="BDU:2025-03956" title="BDU:2025-03956" />
			<reference href="https://bdu.fstec.ru/vul/2025-09856" type="self" id="BDU:2025-09856" title="BDU:2025-09856" />
			<reference href="https://bdu.fstec.ru/vul/2025-09860" type="self" id="BDU:2025-09860" title="BDU:2025-09860" />
			<reference href="https://bdu.fstec.ru/vul/2025-03959" type="self" id="BDU:2025-03959" title="BDU:2025-03959" />
			<reference href="https://bdu.fstec.ru/vul/2025-09859" type="self" id="BDU:2025-09859" title="BDU:2025-09859" />
			<reference href="https://bdu.fstec.ru/vul/2025-09858" type="self" id="BDU:2025-09858" title="BDU:2025-09858" />
			<reference href="https://bdu.fstec.ru/vul/2025-09861" type="self" id="BDU:2025-09861" title="BDU:2025-09861" />
			<reference href="https://bdu.fstec.ru/vul/2025-09854" type="self" id="BDU:2025-09854" title="BDU:2025-09854" />
			<reference href="https://bdu.fstec.ru/vul/2025-09863" type="self" id="BDU:2025-09863" title="BDU:2025-09863" />
			<reference href="https://bdu.fstec.ru/vul/2025-09855" type="self" id="BDU:2025-09855" title="BDU:2025-09855" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="linux-firmware" epoch="0" version="20241017" release="2.el7.3" arch="noarch" src="">
					<filename>linux-firmware-0:20241017-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250814-01</id>
		<issued date="2025-08-14" />
		<updated date="2025-08-14" />
		<title>Уязвимость mediawiki </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в mediawiki</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mediawiki-cve-2023-3550/</description>
               <solution>
                    Запретить использование в ОС пакета mediawiki
                или
                    Установить обновление для пакета(ов) mediawiki
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mediawiki-cve-2023-3550/" type="self" id="ROS-20250814-01" title="ROS-20250814-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3550" type="cve" id="CVE-2023-3550" title="CVE-2023-3550" />
			<reference href="https://bdu.fstec.ru/vul/2023-07505" type="self" id="BDU:2023-07505" title="BDU:2023-07505" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mediawiki" epoch="0" version="1.40.2" release="1.el7" arch="noarch" src="">
					<filename>mediawiki-0:1.40.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250814-02</id>
		<issued date="2025-08-14" />
		<updated date="2025-08-14" />
		<title>Уязвимость golang-k8s-ingress-nginx </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang-k8s-ingress-nginx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-k8s-ingress-nginx-cve-2024-7646/</description>
               <solution>
                    Запретить использование в ОС пакета golang-k8s-ingress-nginx
                или
                    Установить обновление для пакета(ов) golang-k8s-ingress-nginx
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-k8s-ingress-nginx-cve-2024-7646/" type="self" id="ROS-20250814-02" title="ROS-20250814-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7646" type="cve" id="CVE-2024-7646" title="CVE-2024-7646" />
			<reference href="https://bdu.fstec.ru/vul/2024-06271" type="self" id="BDU:2024-06271" title="BDU:2024-06271" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang-k8s-ingress-nginx" epoch="0" version="1.12.1" release="1.el7" arch="x86_64" src="">
					<filename>golang-k8s-ingress-nginx-0:1.12.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250814-03</id>
		<issued date="2025-08-14" />
		<updated date="2025-08-14" />
		<title>Уязвимость pdns-recursor </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в pdns-recursor</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pdns-recursor-cve-2024-25590/</description>
               <solution>
                    Запретить использование в ОС пакета pdns-recursor
                или
                    Установить обновление для пакета(ов) pdns-recursor
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pdns-recursor-cve-2024-25590/" type="self" id="ROS-20250814-03" title="ROS-20250814-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25590" type="cve" id="CVE-2024-25590" title="CVE-2024-25590" />
			<reference href="https://bdu.fstec.ru/vul/2025-01069" type="self" id="BDU:2025-01069" title="BDU:2025-01069" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pdns-recursor" epoch="0" version="5.1.3" release="1.el7" arch="x86_64" src="">
					<filename>pdns-recursor-0:5.1.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250814-04</id>
		<issued date="2025-08-14" />
		<updated date="2025-08-14" />
		<title>Уязвимость subversion </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в subversion</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-subversion-cve-2022-24070/</description>
               <solution>
                    Запретить использование в ОС пакета subversion
                или
                    Установить обновление для пакета(ов) subversion
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-subversion-cve-2022-24070/" type="self" id="ROS-20250814-04" title="ROS-20250814-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24070" type="cve" id="CVE-2022-24070" title="CVE-2022-24070" />
			<reference href="https://bdu.fstec.ru/vul/2022-05791" type="self" id="BDU:2022-05791" title="BDU:2022-05791" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="subversion" epoch="0" version="1.14.2" release="1.el7" arch="x86_64" src="">
					<filename>subversion-0:1.14.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250814-05</id>
		<issued date="2025-08-14" />
		<updated date="2025-08-14" />
		<title>Множественные уязвимости nss </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nss</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nss-cve-2024-0743-cve-2024-6609/</description>
               <solution>
                    Запретить использование в ОС пакета nss
                или
                    Установить обновление для пакета(ов) nss
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nss-cve-2024-0743-cve-2024-6609/" type="self" id="ROS-20250814-05" title="ROS-20250814-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6609" type="cve" id="CVE-2024-6609" title="CVE-2024-6609" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743" type="cve" id="CVE-2024-0743" title="CVE-2024-0743" />
			<reference href="https://bdu.fstec.ru/vul/2024-09869" type="self" id="BDU:2024-09869" title="BDU:2024-09869" />
			<reference href="https://bdu.fstec.ru/vul/2024-00804" type="self" id="BDU:2024-00804" title="BDU:2024-00804" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nss" epoch="0" version="3.79.4" release="4.el7" arch="x86_64" src="">
					<filename>nss-0:3.79.4-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250814-06</id>
		<issued date="2025-08-14" />
		<updated date="2025-08-14" />
		<title>Уязвимость iperf3 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в iperf3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-iperf3-cve-2024-53580/</description>
               <solution>
                    Запретить использование в ОС пакета iperf3
                или
                    Установить обновление для пакета(ов) iperf3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-iperf3-cve-2024-53580/" type="self" id="ROS-20250814-06" title="ROS-20250814-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53580" type="cve" id="CVE-2024-53580" title="CVE-2024-53580" />
			<reference href="https://bdu.fstec.ru/vul/2024-11145" type="self" id="BDU:2024-11145" title="BDU:2024-11145" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="iperf3" epoch="0" version="3.19" release="1.el7" arch="x86_64" src="">
					<filename>iperf3-0:3.19-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250814-07</id>
		<issued date="2025-08-14" />
		<updated date="2025-08-14" />
		<title>Уязвимость libxml2 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libxml2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libxml2-cve-2022-49043/</description>
               <solution>
                    Запретить использование в ОС пакета libxml2
                или
                    Установить обновление для пакета(ов) libxml2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libxml2-cve-2022-49043/" type="self" id="ROS-20250814-07" title="ROS-20250814-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49043" type="cve" id="CVE-2022-49043" title="CVE-2022-49043" />
			<reference href="https://bdu.fstec.ru/vul/2025-11749" type="self" id="BDU:2025-11749" title="BDU:2025-11749" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libxml2" epoch="0" version="2.9.8" release="21.el7.3" arch="x86_64" src="">
					<filename>libxml2-0:2.9.8-21.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250814-08</id>
		<issued date="2025-08-14" />
		<updated date="2025-08-14" />
		<title>Уязвимость golang-github-glog-devel </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang-github-glog-devel</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-github-glog-devel-cve-2024-45339/</description>
               <solution>
                    Запретить использование в ОС пакета golang-github-glog-devel
                или
                    Установить обновление для пакета(ов) golang-github-glog-devel
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-github-glog-devel-cve-2024-45339/" type="self" id="ROS-20250814-08" title="ROS-20250814-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45339" type="cve" id="CVE-2024-45339" title="CVE-2024-45339" />
			<reference href="https://bdu.fstec.ru/vul/2025-02785" type="self" id="BDU:2025-02785" title="BDU:2025-02785" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang-github-glog-devel" epoch="0" version="1.2.5" release="1.el7" arch="noarch" src="">
					<filename>golang-github-glog-devel-0:1.2.5-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250814-09</id>
		<issued date="2025-08-14" />
		<updated date="2025-08-14" />
		<title>Множественные уязвимости linux-firmware </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в linux-firmware</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-linux-firmware-cve-2024-56161-cve-2023-20558-cve-2023-20559/</description>
               <solution>
                    Запретить использование в ОС пакета linux-firmware
                или
                    Установить обновление для пакета(ов) linux-firmware
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-linux-firmware-cve-2024-56161-cve-2023-20558-cve-2023-20559/" type="self" id="ROS-20250814-09" title="ROS-20250814-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20558" type="cve" id="CVE-2023-20558" title="CVE-2023-20558" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20559" type="cve" id="CVE-2023-20559" title="CVE-2023-20559" />
			<reference href="https://bdu.fstec.ru/vul/2025-11743" type="self" id="BDU:2025-11743" title="BDU:2025-11743" />
			<reference href="https://bdu.fstec.ru/vul/2025-11742" type="self" id="BDU:2025-11742" title="BDU:2025-11742" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="linux-firmware" epoch="0" version="20250109" release="1.el7.3" arch="noarch" src="">
					<filename>linux-firmware-0:20250109-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250814-10</id>
		<issued date="2025-08-14" />
		<updated date="2025-08-14" />
		<title>Уязвимость Proftpd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в proftpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-proftpd-cve-2024-57392/</description>
               <solution>
                    Запретить использование в ОС пакета Proftpd
                или
                    Установить обновление для пакета(ов) Proftpd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-proftpd-cve-2024-57392/" type="self" id="ROS-20250814-10" title="ROS-20250814-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57392" type="cve" id="CVE-2024-57392" title="CVE-2024-57392" />
			<reference href="https://bdu.fstec.ru/vul/2025-10684" type="self" id="BDU:2025-10684" title="BDU:2025-10684" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="proftpd" epoch="0" version="1.3.9" release="1.el7" arch="x86_64" src="">
					<filename>proftpd-0:1.3.9-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250814-11</id>
		<issued date="2025-08-14" />
		<updated date="2025-08-14" />
		<title>Множественные уязвимости linux-firmware </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в linux-firmware</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-linux-firmware-cve-2023-31342-cve-2023-31345-cve-2023-31343/</description>
               <solution>
                    Запретить использование в ОС пакета linux-firmware
                или
                    Установить обновление для пакета(ов) linux-firmware
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-linux-firmware-cve-2023-31342-cve-2023-31345-cve-2023-31343/" type="self" id="ROS-20250814-11" title="ROS-20250814-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31342" type="cve" id="CVE-2023-31342" title="CVE-2023-31342" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31345" type="cve" id="CVE-2023-31345" title="CVE-2023-31345" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31343" type="cve" id="CVE-2023-31343" title="CVE-2023-31343" />
			<reference href="https://bdu.fstec.ru/vul/2025-02691" type="self" id="BDU:2025-02691" title="BDU:2025-02691" />
			<reference href="https://bdu.fstec.ru/vul/2025-02693" type="self" id="BDU:2025-02693" title="BDU:2025-02693" />
			<reference href="https://bdu.fstec.ru/vul/2025-02692" type="self" id="BDU:2025-02692" title="BDU:2025-02692" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="linux-firmware" epoch="0" version="20241017" release="2.el7.3" arch="noarch" src="">
					<filename>linux-firmware-0:20241017-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250814-12</id>
		<issued date="2025-08-14" />
		<updated date="2025-08-14" />
		<title>Уязвимость emacs </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в emacs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-emacs-cve-2023-28617/</description>
               <solution>
                    Запретить использование в ОС пакета emacs
                или
                    Установить обновление для пакета(ов) emacs
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-emacs-cve-2023-28617/" type="self" id="ROS-20250814-12" title="ROS-20250814-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28617" type="cve" id="CVE-2023-28617" title="CVE-2023-28617" />
			<reference href="https://bdu.fstec.ru/vul/2025-11741" type="self" id="BDU:2025-11741" title="BDU:2025-11741" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="emacs" epoch="1" version="25.0.92" release="7.el7" arch="x86_64" src="">
					<filename>emacs-1:25.0.92-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250818-01</id>
		<issued date="2025-08-18" />
		<updated date="2026-02-06" />
		<title>Множественные уязвимости gpac</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в gpac</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gpac-18082025/</description>
               <solution>
                    Запретить использование в ОС пакета gpac 
                или
                    Установить обновление для пакета(ов) gpac 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gpac-18082025/" type="self" id="ROS-20250818-01" title="ROS-20250818-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=" type="cve" id="" title="" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=" type="cve" id="" title="" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=" type="cve" id="" title="" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=" type="cve" id="" title="" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=" type="cve" id="" title="" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=" type="cve" id="" title="" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=" type="cve" id="" title="" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=" type="cve" id="" title="" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=" type="cve" id="" title="" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=" type="cve" id="" title="" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=" type="cve" id="" title="" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=" type="cve" id="" title="" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=" type="cve" id="" title="" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=" type="cve" id="" title="" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=" type="cve" id="" title="" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=" type="cve" id="" title="" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=" type="cve" id="" title="" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=" type="cve" id="" title="" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=" type="cve" id="" title="" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=" type="cve" id="" title="" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=" type="cve" id="" title="" />
			<reference href="https://bdu.fstec.ru/vul/2025-09346" type="self" id="BDU:2025-09346" title="BDU:2025-09346" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gpac" epoch="0" version="2.4.0" release="5.el7" arch="x86_64" src="">
					<filename>gpac-0:2.4.0-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250818-02</id>
		<issued date="2025-08-18" />
		<updated date="2025-08-18" />
		<title>Уязвимость thunderbird </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-thunderbird-cve-2025-3030/</description>
               <solution>
                    Запретить использование в ОС пакета thunderbird
                или
                    Установить обновление для пакета(ов) thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-thunderbird-cve-2025-3030/" type="self" id="ROS-20250818-02" title="ROS-20250818-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3030" type="cve" id="CVE-2025-3030" title="CVE-2025-3030" />
			<reference href="https://bdu.fstec.ru/vul/2025-04986" type="self" id="BDU:2025-04986" title="BDU:2025-04986" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="128.10.0" release="1.el7" arch="x86_64" src="">
					<filename>thunderbird-0:128.10.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250818-03</id>
		<issued date="2025-08-18" />
		<updated date="2025-08-18" />
		<title>Множественные уязвимости php-phpseclib </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в php-phpseclib</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-phpseclib-cve-2021-30130-cve-2024-27354/</description>
               <solution>
                    Запретить использование в ОС пакета php-phpseclib
                или
                    Установить обновление для пакета(ов) php-phpseclib
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-phpseclib-cve-2021-30130-cve-2024-27354/" type="self" id="ROS-20250818-03" title="ROS-20250818-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30130" type="cve" id="CVE-2021-30130" title="CVE-2021-30130" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27354" type="cve" id="CVE-2024-27354" title="CVE-2024-27354" />
			<reference href="https://bdu.fstec.ru/vul/2025-10827" type="self" id="BDU:2025-10827" title="BDU:2025-10827" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php-phpseclib" epoch="0" version="3.0.46" release="1.el7" arch="noarch" src="">
					<filename>php-phpseclib-0:3.0.46-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250818-04</id>
		<issued date="2025-08-18" />
		<updated date="2025-08-18" />
		<title>Множественные уязвимости linux-firmware </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в linux-firmware</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-linux-firmware-cve-2024-0179-cve-2024-21925/</description>
               <solution>
                    Запретить использование в ОС пакета linux-firmware
                или
                    Установить обновление для пакета(ов) linux-firmware
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-linux-firmware-cve-2024-0179-cve-2024-21925/" type="self" id="ROS-20250818-04" title="ROS-20250818-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21925" type="cve" id="CVE-2024-21925" title="CVE-2024-21925" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0179" type="cve" id="CVE-2024-0179" title="CVE-2024-0179" />
			<reference href="https://bdu.fstec.ru/vul/2025-01835" type="self" id="BDU:2025-01835" title="BDU:2025-01835" />
			<reference href="https://bdu.fstec.ru/vul/2025-01687" type="self" id="BDU:2025-01687" title="BDU:2025-01687" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="linux-firmware" epoch="0" version="20250109" release="1.el7.3" arch="noarch" src="">
					<filename>linux-firmware-0:20250109-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250818-05</id>
		<issued date="2025-08-18" />
		<updated date="2025-08-18" />
		<title>Уязвимость wireshark </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в wireshark</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-wireshark-cve-2023-1994/</description>
               <solution>
                    Запретить использование в ОС пакета wireshark
                или
                    Установить обновление для пакета(ов) wireshark
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-wireshark-cve-2023-1994/" type="self" id="ROS-20250818-05" title="ROS-20250818-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1994" type="cve" id="CVE-2023-1994" title="CVE-2023-1994" />
			<reference href="https://bdu.fstec.ru/vul/2025-11744" type="self" id="BDU:2025-11744" title="BDU:2025-11744" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="wireshark" epoch="1" version="4.0.8" release="1.el7" arch="x86_64" src="">
					<filename>wireshark-1:4.0.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250818-06</id>
		<issued date="2025-08-18" />
		<updated date="2025-08-18" />
		<title>Множественные уязвимости grub2-common</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в grub2-common</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-grub2-common-18082025/</description>
               <solution>
                    Запретить использование в ОС пакета grub2-common
                или
                    Установить обновление для пакета(ов) grub2-common
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-grub2-common-18082025/" type="self" id="ROS-20250818-06" title="ROS-20250818-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0622" type="cve" id="CVE-2025-0622" title="CVE-2025-0622" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45774" type="cve" id="CVE-2024-45774" title="CVE-2024-45774" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45775" type="cve" id="CVE-2024-45775" title="CVE-2024-45775" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45776" type="cve" id="CVE-2024-45776" title="CVE-2024-45776" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45777" type="cve" id="CVE-2024-45777" title="CVE-2024-45777" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45778" type="cve" id="CVE-2024-45778" title="CVE-2024-45778" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45779" type="cve" id="CVE-2024-45779" title="CVE-2024-45779" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45780" type="cve" id="CVE-2024-45780" title="CVE-2024-45780" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45781" type="cve" id="CVE-2024-45781" title="CVE-2024-45781" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45782" type="cve" id="CVE-2024-45782" title="CVE-2024-45782" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45783" type="cve" id="CVE-2024-45783" title="CVE-2024-45783" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0624" type="cve" id="CVE-2025-0624" title="CVE-2025-0624" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0677" type="cve" id="CVE-2025-0677" title="CVE-2025-0677" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0678" type="cve" id="CVE-2025-0678" title="CVE-2025-0678" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0684" type="cve" id="CVE-2025-0684" title="CVE-2025-0684" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0685" type="cve" id="CVE-2025-0685" title="CVE-2025-0685" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0686" type="cve" id="CVE-2025-0686" title="CVE-2025-0686" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0689" type="cve" id="CVE-2025-0689" title="CVE-2025-0689" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0690" type="cve" id="CVE-2025-0690" title="CVE-2025-0690" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1118" type="cve" id="CVE-2025-1118" title="CVE-2025-1118" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1125" type="cve" id="CVE-2025-1125" title="CVE-2025-1125" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56737" type="cve" id="CVE-2024-56737" title="CVE-2024-56737" />
			<reference href="https://bdu.fstec.ru/vul/2025-03840" type="self" id="BDU:2025-03840" title="BDU:2025-03840" />
			<reference href="https://bdu.fstec.ru/vul/2025-02125" type="self" id="BDU:2025-02125" title="BDU:2025-02125" />
			<reference href="https://bdu.fstec.ru/vul/2025-02218" type="self" id="BDU:2025-02218" title="BDU:2025-02218" />
			<reference href="https://bdu.fstec.ru/vul/2025-07120" type="self" id="BDU:2025-07120" title="BDU:2025-07120" />
			<reference href="https://bdu.fstec.ru/vul/2025-07099" type="self" id="BDU:2025-07099" title="BDU:2025-07099" />
			<reference href="https://bdu.fstec.ru/vul/2025-03832" type="self" id="BDU:2025-03832" title="BDU:2025-03832" />
			<reference href="https://bdu.fstec.ru/vul/2025-03837" type="self" id="BDU:2025-03837" title="BDU:2025-03837" />
			<reference href="https://bdu.fstec.ru/vul/2025-03834" type="self" id="BDU:2025-03834" title="BDU:2025-03834" />
			<reference href="https://bdu.fstec.ru/vul/2025-03840" type="self" id="BDU:2025-03840" title="BDU:2025-03840" />
			<reference href="https://bdu.fstec.ru/vul/2025-03836" type="self" id="BDU:2025-03836" title="BDU:2025-03836" />
			<reference href="https://bdu.fstec.ru/vul/2025-02685" type="self" id="BDU:2025-02685" title="BDU:2025-02685" />
			<reference href="https://bdu.fstec.ru/vul/2025-07124" type="self" id="BDU:2025-07124" title="BDU:2025-07124" />
			<reference href="https://bdu.fstec.ru/vul/2025-02244" type="self" id="BDU:2025-02244" title="BDU:2025-02244" />
			<reference href="https://bdu.fstec.ru/vul/2025-07126" type="self" id="BDU:2025-07126" title="BDU:2025-07126" />
			<reference href="https://bdu.fstec.ru/vul/2025-07116" type="self" id="BDU:2025-07116" title="BDU:2025-07116" />
			<reference href="https://bdu.fstec.ru/vul/2025-07122" type="self" id="BDU:2025-07122" title="BDU:2025-07122" />
			<reference href="https://bdu.fstec.ru/vul/2025-07125" type="self" id="BDU:2025-07125" title="BDU:2025-07125" />
			<reference href="https://bdu.fstec.ru/vul/2025-07123" type="self" id="BDU:2025-07123" title="BDU:2025-07123" />
			<reference href="https://bdu.fstec.ru/vul/2025-11727" type="self" id="BDU:2025-11727" title="BDU:2025-11727" />
			<reference href="https://bdu.fstec.ru/vul/2025-07119" type="self" id="BDU:2025-07119" title="BDU:2025-07119" />
			<reference href="https://bdu.fstec.ru/vul/2025-00028" type="self" id="BDU:2025-00028" title="BDU:2025-00028" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="grub2-common" epoch="1" version="2.06" release="66.el7.3" arch="noarch" src="">
					<filename>grub2-common-1:2.06-66.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250819-01</id>
		<issued date="2025-08-19" />
		<updated date="2025-08-19" />
		<title>Множественные уязвимости moodle </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-moodle-cve-2024-43438-cve-2024-43426-cve-2025-3625/</description>
               <solution>
                    Запретить использование в ОС пакета moodle
                или
                    Установить обновление для пакета(ов) moodle
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-moodle-cve-2024-43438-cve-2024-43426-cve-2025-3625/" type="self" id="ROS-20250819-01" title="ROS-20250819-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43438" type="cve" id="CVE-2024-43438" title="CVE-2024-43438" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43426" type="cve" id="CVE-2024-43426" title="CVE-2024-43426" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3625" type="cve" id="CVE-2025-3625" title="CVE-2025-3625" />
			<reference href="https://bdu.fstec.ru/vul/2025-10851" type="self" id="BDU:2025-10851" title="BDU:2025-10851" />
			<reference href="https://bdu.fstec.ru/vul/2025-10852" type="self" id="BDU:2025-10852" title="BDU:2025-10852" />
			<reference href="https://bdu.fstec.ru/vul/2025-05111" type="self" id="BDU:2025-05111" title="BDU:2025-05111" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="moodle" epoch="0" version="4.5.4" release="1.el7" arch="noarch" src="">
					<filename>moodle-0:4.5.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250819-02</id>
		<issued date="2025-08-19" />
		<updated date="2025-08-19" />
		<title>Уязвимость virtuoso-opensource </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в virtuoso-opensource</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtuoso-opensource-cve-2024-57655/</description>
               <solution>
                    Запретить использование в ОС пакета virtuoso-opensource
                или
                    Установить обновление для пакета(ов) virtuoso-opensource
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtuoso-opensource-cve-2024-57655/" type="self" id="ROS-20250819-02" title="ROS-20250819-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57655" type="cve" id="CVE-2024-57655" title="CVE-2024-57655" />
			<reference href="https://bdu.fstec.ru/vul/2025-10855" type="self" id="BDU:2025-10855" title="BDU:2025-10855" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="virtuoso-opensource" epoch="1" version="7.2.14" release="1.el7" arch="x86_64" src="">
					<filename>virtuoso-opensource-1:7.2.14-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250819-03</id>
		<issued date="2025-08-19" />
		<updated date="2025-08-19" />
		<title>Уязвимость dbeaver </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в dbeaver</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dbeaver-cve-2021-3836/</description>
               <solution>
                    Запретить использование в ОС пакета dbeaver
                или
                    Установить обновление для пакета(ов) dbeaver
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dbeaver-cve-2021-3836/" type="self" id="ROS-20250819-03" title="ROS-20250819-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3836" type="cve" id="CVE-2021-3836" title="CVE-2021-3836" />
			<reference href="https://bdu.fstec.ru/vul/2025-10854" type="self" id="BDU:2025-10854" title="BDU:2025-10854" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dbeaver" epoch="0" version="24.0.2" release="1.el7" arch="x86_64" src="">
					<filename>dbeaver-0:24.0.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250819-04</id>
		<issued date="2025-08-19" />
		<updated date="2025-08-19" />
		<title>Уязвимость libarchive </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libarchive</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libarchive-cve-2024-48615/</description>
               <solution>
                    Запретить использование в ОС пакета libarchive
                или
                    Установить обновление для пакета(ов) libarchive
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libarchive-cve-2024-48615/" type="self" id="ROS-20250819-04" title="ROS-20250819-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48615" type="cve" id="CVE-2024-48615" title="CVE-2024-48615" />
			<reference href="https://bdu.fstec.ru/vul/2025-10856" type="self" id="BDU:2025-10856" title="BDU:2025-10856" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libarchive" epoch="0" version="3.7.9" release="1.el7" arch="x86_64" src="">
					<filename>libarchive-0:3.7.9-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250819-05</id>
		<issued date="2025-08-19" />
		<updated date="2025-08-19" />
		<title>Уязвимость python3.11 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в python3.11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2025-4517/</description>
               <solution>
                    Запретить использование в ОС пакета python3.11
                или
                    Установить обновление для пакета(ов) python3.11
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2025-4517/" type="self" id="ROS-20250819-05" title="ROS-20250819-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4517" type="cve" id="CVE-2025-4517" title="CVE-2025-4517" />
			<reference href="https://bdu.fstec.ru/vul/2025-06494" type="self" id="BDU:2025-06494" title="BDU:2025-06494" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.11" epoch="0" version="3.11.13" release="1.el7" arch="x86_64" src="">
					<filename>python3.11-0:3.11.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250819-06</id>
		<issued date="2025-08-19" />
		<updated date="2025-08-19" />
		<title>Уязвимость python3.12 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в python3.12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-12-cve-2025-4517/</description>
               <solution>
                    Запретить использование в ОС пакета python3.12
                или
                    Установить обновление для пакета(ов) python3.12
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-12-cve-2025-4517/" type="self" id="ROS-20250819-06" title="ROS-20250819-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4517" type="cve" id="CVE-2025-4517" title="CVE-2025-4517" />
			<reference href="https://bdu.fstec.ru/vul/2025-06494" type="self" id="BDU:2025-06494" title="BDU:2025-06494" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.12" epoch="0" version="3.12.11" release="1.el7" arch="x86_64" src="">
					<filename>python3.12-0:3.12.11-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250819-07</id>
		<issued date="2025-08-19" />
		<updated date="2025-08-19" />
		<title>Уязвимость xen </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в xen</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-xen-cve-2025-1713/</description>
               <solution>
                    Запретить использование в ОС пакета xen
                или
                    Установить обновление для пакета(ов) xen
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-xen-cve-2025-1713/" type="self" id="ROS-20250819-07" title="ROS-20250819-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1713" type="cve" id="CVE-2025-1713" title="CVE-2025-1713" />
			<reference href="https://bdu.fstec.ru/vul/2025-05058" type="self" id="BDU:2025-05058" title="BDU:2025-05058" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="xen" epoch="0" version="4.19.1" release="2.el7" arch="x86_64" src="">
					<filename>xen-0:4.19.1-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250819-08</id>
		<issued date="2025-08-19" />
		<updated date="2025-08-19" />
		<title>Уязвимость netty </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в netty</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-netty-cve-2020-7238/</description>
               <solution>
                    Запретить использование в ОС пакета netty
                или
                    Установить обновление для пакета(ов) netty
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-netty-cve-2020-7238/" type="self" id="ROS-20250819-08" title="ROS-20250819-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7238" type="cve" id="CVE-2020-7238" title="CVE-2020-7238" />
			<reference href="https://bdu.fstec.ru/vul/2022-00325" type="self" id="BDU:2022-00325" title="BDU:2022-00325" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="netty" epoch="0" version="4.1.60" release="1.el7.3" arch="x86_64" src="">
					<filename>netty-0:4.1.60-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250819-09</id>
		<issued date="2025-08-19" />
		<updated date="2025-08-19" />
		<title>Множественные уязвимости libxml2 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в libxml2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libxml2-cve-2025-49794-cve-2025-49796/</description>
               <solution>
                    Запретить использование в ОС пакета libxml2
                или
                    Установить обновление для пакета(ов) libxml2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libxml2-cve-2025-49794-cve-2025-49796/" type="self" id="ROS-20250819-09" title="ROS-20250819-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49796" type="cve" id="CVE-2025-49796" title="CVE-2025-49796" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49794" type="cve" id="CVE-2025-49794" title="CVE-2025-49794" />
			<reference href="https://bdu.fstec.ru/vul/2025-08978" type="self" id="BDU:2025-08978" title="BDU:2025-08978" />
			<reference href="https://bdu.fstec.ru/vul/2025-08979" type="self" id="BDU:2025-08979" title="BDU:2025-08979" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libxml2" epoch="0" version="2.9.8" release="22.el7.3" arch="x86_64" src="">
					<filename>libxml2-0:2.9.8-22.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250819-10</id>
		<issued date="2025-08-19" />
		<updated date="2025-08-19" />
		<title>Множественные уязвимости cjson </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в cjson</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-cjson-cve-2023-50472-cve-2024-31755/</description>
               <solution>
                    Запретить использование в ОС пакета cjson
                или
                    Установить обновление для пакета(ов) cjson
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-cjson-cve-2023-50472-cve-2024-31755/" type="self" id="ROS-20250819-10" title="ROS-20250819-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50472" type="cve" id="CVE-2023-50472" title="CVE-2023-50472" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31755" type="cve" id="CVE-2024-31755" title="CVE-2024-31755" />
			<reference href="https://bdu.fstec.ru/vul/2025-10850" type="self" id="BDU:2025-10850" title="BDU:2025-10850" />
			<reference href="https://bdu.fstec.ru/vul/2025-00956" type="self" id="BDU:2025-00956" title="BDU:2025-00956" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cjson" epoch="0" version="1.7.18" release="1.el7" arch="x86_64" src="">
					<filename>cjson-0:1.7.18-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250819-11</id>
		<issued date="2025-08-19" />
		<updated date="2025-08-19" />
		<title>Множественные уязвимости python3-zmq</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-zmq</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-zmq-19082025/</description>
               <solution>
                    Запретить использование в ОС пакета python3-zmq
                или
                    Установить обновление для пакета(ов) python3-zmq
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-zmq-19082025/" type="self" id="ROS-20250819-11" title="ROS-20250819-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38822" type="cve" id="CVE-2024-38822" title="CVE-2024-38822" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38823" type="cve" id="CVE-2024-38823" title="CVE-2024-38823" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38824" type="cve" id="CVE-2024-38824" title="CVE-2024-38824" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38825" type="cve" id="CVE-2024-38825" title="CVE-2024-38825" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22236" type="cve" id="CVE-2025-22236" title="CVE-2025-22236" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22237" type="cve" id="CVE-2025-22237" title="CVE-2025-22237" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22238" type="cve" id="CVE-2025-22238" title="CVE-2025-22238" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22239" type="cve" id="CVE-2025-22239" title="CVE-2025-22239" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22240" type="cve" id="CVE-2025-22240" title="CVE-2025-22240" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22241" type="cve" id="CVE-2025-22241" title="CVE-2025-22241" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22242" type="cve" id="CVE-2025-22242" title="CVE-2025-22242" />
			<reference href="https://bdu.fstec.ru/vul/2025-10846" type="self" id="BDU:2025-10846" title="BDU:2025-10846" />
			<reference href="https://bdu.fstec.ru/vul/2025-10866" type="self" id="BDU:2025-10866" title="BDU:2025-10866" />
			<reference href="https://bdu.fstec.ru/vul/2025-10869" type="self" id="BDU:2025-10869" title="BDU:2025-10869" />
			<reference href="https://bdu.fstec.ru/vul/2025-10849" type="self" id="BDU:2025-10849" title="BDU:2025-10849" />
			<reference href="https://bdu.fstec.ru/vul/2025-10868" type="self" id="BDU:2025-10868" title="BDU:2025-10868" />
			<reference href="https://bdu.fstec.ru/vul/2025-10845" type="self" id="BDU:2025-10845" title="BDU:2025-10845" />
			<reference href="https://bdu.fstec.ru/vul/2025-10865" type="self" id="BDU:2025-10865" title="BDU:2025-10865" />
			<reference href="https://bdu.fstec.ru/vul/2025-10848" type="self" id="BDU:2025-10848" title="BDU:2025-10848" />
			<reference href="https://bdu.fstec.ru/vul/2025-10867" type="self" id="BDU:2025-10867" title="BDU:2025-10867" />
			<reference href="https://bdu.fstec.ru/vul/2025-10844" type="self" id="BDU:2025-10844" title="BDU:2025-10844" />
			<reference href="https://bdu.fstec.ru/vul/2025-10847" type="self" id="BDU:2025-10847" title="BDU:2025-10847" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-zmq" epoch="0" version="25.1.2" release="1.el7" arch="x86_64" src="">
					<filename>python3-zmq-0:25.1.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250819-12</id>
		<issued date="2025-08-19" />
		<updated date="2025-08-19" />
		<title>Множественные уязвимости salt3006</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в salt3006</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-salt3006-19082025/</description>
               <solution>
                    Запретить использование в ОС пакета salt3006
                или
                    Установить обновление для пакета(ов) salt3006
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-salt3006-19082025/" type="self" id="ROS-20250819-12" title="ROS-20250819-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38822" type="cve" id="CVE-2024-38822" title="CVE-2024-38822" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38823" type="cve" id="CVE-2024-38823" title="CVE-2024-38823" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38824" type="cve" id="CVE-2024-38824" title="CVE-2024-38824" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38825" type="cve" id="CVE-2024-38825" title="CVE-2024-38825" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22236" type="cve" id="CVE-2025-22236" title="CVE-2025-22236" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22237" type="cve" id="CVE-2025-22237" title="CVE-2025-22237" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22238" type="cve" id="CVE-2025-22238" title="CVE-2025-22238" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22239" type="cve" id="CVE-2025-22239" title="CVE-2025-22239" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22240" type="cve" id="CVE-2025-22240" title="CVE-2025-22240" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22241" type="cve" id="CVE-2025-22241" title="CVE-2025-22241" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22242" type="cve" id="CVE-2025-22242" title="CVE-2025-22242" />
			<reference href="https://bdu.fstec.ru/vul/2025-10846" type="self" id="BDU:2025-10846" title="BDU:2025-10846" />
			<reference href="https://bdu.fstec.ru/vul/2025-10866" type="self" id="BDU:2025-10866" title="BDU:2025-10866" />
			<reference href="https://bdu.fstec.ru/vul/2025-10869" type="self" id="BDU:2025-10869" title="BDU:2025-10869" />
			<reference href="https://bdu.fstec.ru/vul/2025-10849" type="self" id="BDU:2025-10849" title="BDU:2025-10849" />
			<reference href="https://bdu.fstec.ru/vul/2025-10868" type="self" id="BDU:2025-10868" title="BDU:2025-10868" />
			<reference href="https://bdu.fstec.ru/vul/2025-10845" type="self" id="BDU:2025-10845" title="BDU:2025-10845" />
			<reference href="https://bdu.fstec.ru/vul/2025-10865" type="self" id="BDU:2025-10865" title="BDU:2025-10865" />
			<reference href="https://bdu.fstec.ru/vul/2025-10848" type="self" id="BDU:2025-10848" title="BDU:2025-10848" />
			<reference href="https://bdu.fstec.ru/vul/2025-10867" type="self" id="BDU:2025-10867" title="BDU:2025-10867" />
			<reference href="https://bdu.fstec.ru/vul/2025-10844" type="self" id="BDU:2025-10844" title="BDU:2025-10844" />
			<reference href="https://bdu.fstec.ru/vul/2025-10847" type="self" id="BDU:2025-10847" title="BDU:2025-10847" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="salt3006" epoch="0" version="3006.12" release="1.el7" arch="noarch" src="">
					<filename>salt3006-0:3006.12-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250819-13</id>
		<issued date="2025-08-19" />
		<updated date="2025-08-21" />
		<title>Множественные уязвимости salt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в salt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-salt-19082025/</description>
               <solution>
                    Запретить использование в ОС пакета salt
                или
                    Установить обновление для пакета(ов) salt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-salt-19082025/" type="self" id="ROS-20250819-13" title="ROS-20250819-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38822" type="cve" id="CVE-2024-38822" title="CVE-2024-38822" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38823" type="cve" id="CVE-2024-38823" title="CVE-2024-38823" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38824" type="cve" id="CVE-2024-38824" title="CVE-2024-38824" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38825" type="cve" id="CVE-2024-38825" title="CVE-2024-38825" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22236" type="cve" id="CVE-2025-22236" title="CVE-2025-22236" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22237" type="cve" id="CVE-2025-22237" title="CVE-2025-22237" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22238" type="cve" id="CVE-2025-22238" title="CVE-2025-22238" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22239" type="cve" id="CVE-2025-22239" title="CVE-2025-22239" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22240" type="cve" id="CVE-2025-22240" title="CVE-2025-22240" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22241" type="cve" id="CVE-2025-22241" title="CVE-2025-22241" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22242" type="cve" id="CVE-2025-22242" title="CVE-2025-22242" />
			<reference href="https://bdu.fstec.ru/vul/2025-10846" type="self" id="BDU:2025-10846" title="BDU:2025-10846" />
			<reference href="https://bdu.fstec.ru/vul/2025-10866" type="self" id="BDU:2025-10866" title="BDU:2025-10866" />
			<reference href="https://bdu.fstec.ru/vul/2025-10869" type="self" id="BDU:2025-10869" title="BDU:2025-10869" />
			<reference href="https://bdu.fstec.ru/vul/2025-10849" type="self" id="BDU:2025-10849" title="BDU:2025-10849" />
			<reference href="https://bdu.fstec.ru/vul/2025-10868" type="self" id="BDU:2025-10868" title="BDU:2025-10868" />
			<reference href="https://bdu.fstec.ru/vul/2025-10845" type="self" id="BDU:2025-10845" title="BDU:2025-10845" />
			<reference href="https://bdu.fstec.ru/vul/2025-10865" type="self" id="BDU:2025-10865" title="BDU:2025-10865" />
			<reference href="https://bdu.fstec.ru/vul/2025-10848" type="self" id="BDU:2025-10848" title="BDU:2025-10848" />
			<reference href="https://bdu.fstec.ru/vul/2025-10867" type="self" id="BDU:2025-10867" title="BDU:2025-10867" />
			<reference href="https://bdu.fstec.ru/vul/2025-10844" type="self" id="BDU:2025-10844" title="BDU:2025-10844" />
			<reference href="https://bdu.fstec.ru/vul/2025-10847" type="self" id="BDU:2025-10847" title="BDU:2025-10847" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="salt" epoch="0" version="3007.4" release="1.el7" arch="noarch" src="">
					<filename>salt-0:3007.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250821-01</id>
		<issued date="2025-08-21" />
		<updated date="2025-08-21" />
		<title>Уязвимость python3-gunicorn </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-gunicorn</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-gunicorn-cve-2024-1135/</description>
               <solution>
                    Запретить использование в ОС пакета python3-gunicorn
                или
                    Установить обновление для пакета(ов) python3-gunicorn
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-gunicorn-cve-2024-1135/" type="self" id="ROS-20250821-01" title="ROS-20250821-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1135" type="cve" id="CVE-2024-1135" title="CVE-2024-1135" />
			<reference href="https://bdu.fstec.ru/vul/2024-03553" type="self" id="BDU:2024-03553" title="BDU:2024-03553" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-gunicorn" epoch="0" version="22.0.0" release="1.el7" arch="noarch" src="">
					<filename>python3-gunicorn-0:22.0.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250821-02</id>
		<issued date="2025-08-21" />
		<updated date="2025-08-21" />
		<title>Уязвимость xstream </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в xstream</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-xstream-cve-2024-47072/</description>
               <solution>
                    Запретить использование в ОС пакета xstream
                или
                    Установить обновление для пакета(ов) xstream
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-xstream-cve-2024-47072/" type="self" id="ROS-20250821-02" title="ROS-20250821-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47072" type="cve" id="CVE-2024-47072" title="CVE-2024-47072" />
			<reference href="https://bdu.fstec.ru/vul/2024-09422" type="self" id="BDU:2024-09422" title="BDU:2024-09422" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="xstream" epoch="0" version="1.4.21" release="1.el7" arch="noarch" src="">
					<filename>xstream-0:1.4.21-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250821-03</id>
		<issued date="2025-08-21" />
		<updated date="2025-08-21" />
		<title>Уязвимость emacs </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в emacs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-emacs-cve-2025-1244/</description>
               <solution>
                    Запретить использование в ОС пакета emacs
                или
                    Установить обновление для пакета(ов) emacs
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-emacs-cve-2025-1244/" type="self" id="ROS-20250821-03" title="ROS-20250821-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1244" type="cve" id="CVE-2025-1244" title="CVE-2025-1244" />
			<reference href="https://bdu.fstec.ru/vul/2025-04327" type="self" id="BDU:2025-04327" title="BDU:2025-04327" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="emacs" epoch="1" version="25.0.92" release="8.el7" arch="x86_64" src="">
					<filename>emacs-1:25.0.92-8.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250821-04</id>
		<issued date="2025-08-21" />
		<updated date="2025-08-21" />
		<title>Множественные уязвимости libsoup</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libsoup</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libsoup-21082025/</description>
               <solution>
                    Запретить использование в ОС пакета libsoup
                или
                    Установить обновление для пакета(ов) libsoup
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libsoup-21082025/" type="self" id="ROS-20250821-04" title="ROS-20250821-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4945" type="cve" id="CVE-2025-4945" title="CVE-2025-4945" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46421" type="cve" id="CVE-2025-46421" title="CVE-2025-46421" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32907" type="cve" id="CVE-2025-32907" title="CVE-2025-32907" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4948" type="cve" id="CVE-2025-4948" title="CVE-2025-4948" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4969" type="cve" id="CVE-2025-4969" title="CVE-2025-4969" />
			<reference href="https://bdu.fstec.ru/vul/2025-10260" type="self" id="BDU:2025-10260" title="BDU:2025-10260" />
			<reference href="https://bdu.fstec.ru/vul/2025-07135" type="self" id="BDU:2025-07135" title="BDU:2025-07135" />
			<reference href="https://bdu.fstec.ru/vul/2025-04546" type="self" id="BDU:2025-04546" title="BDU:2025-04546" />
			<reference href="https://bdu.fstec.ru/vul/2025-07136" type="self" id="BDU:2025-07136" title="BDU:2025-07136" />
			<reference href="https://bdu.fstec.ru/vul/2025-10261" type="self" id="BDU:2025-10261" title="BDU:2025-10261" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libsoup" epoch="0" version="2.74.3" release="4.el7" arch="x86_64" src="">
					<filename>libsoup-0:2.74.3-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250821-05</id>
		<issued date="2025-08-21" />
		<updated date="2025-08-21" />
		<title>Уязвимость abseil-cpp </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в abseil-cpp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-abseil-cpp-cve-2025-0838/</description>
               <solution>
                    Запретить использование в ОС пакета abseil-cpp
                или
                    Установить обновление для пакета(ов) abseil-cpp
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-abseil-cpp-cve-2025-0838/" type="self" id="ROS-20250821-05" title="ROS-20250821-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0838" type="cve" id="CVE-2025-0838" title="CVE-2025-0838" />
			<reference href="https://bdu.fstec.ru/vul/2025-10265" type="self" id="BDU:2025-10265" title="BDU:2025-10265" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="abseil-cpp" epoch="0" version="20210324.2" release="7.el7" arch="x86_64" src="">
					<filename>abseil-cpp-0:20210324.2-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250821-06</id>
		<issued date="2025-08-21" />
		<updated date="2025-08-21" />
		<title>Уязвимость perl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в perl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-cve-2025-40909/</description>
               <solution>
                    Запретить использование в ОС пакета perl
                или
                    Установить обновление для пакета(ов) perl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-cve-2025-40909/" type="self" id="ROS-20250821-06" title="ROS-20250821-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40909" type="cve" id="CVE-2025-40909" title="CVE-2025-40909" />
			<reference href="https://bdu.fstec.ru/vul/2025-10307" type="self" id="BDU:2025-10307" title="BDU:2025-10307" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="perl" epoch="4" version="5.30.1" release="467.el7" arch="x86_64" src="">
					<filename>perl-4:5.30.1-467.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250821-07</id>
		<issued date="2025-08-21" />
		<updated date="2025-08-21" />
		<title>Уязвимость cjson </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в cjson</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cjson-cve-2023-53154/</description>
               <solution>
                    Запретить использование в ОС пакета cjson
                или
                    Установить обновление для пакета(ов) cjson
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cjson-cve-2023-53154/" type="self" id="ROS-20250821-07" title="ROS-20250821-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53154" type="cve" id="CVE-2023-53154" title="CVE-2023-53154" />
			<reference href="https://bdu.fstec.ru/vul/2025-10853" type="self" id="BDU:2025-10853" title="BDU:2025-10853" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cjson" epoch="0" version="1.7.18" release="1.el7" arch="x86_64" src="">
					<filename>cjson-0:1.7.18-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250821-08</id>
		<issued date="2025-08-21" />
		<updated date="2025-08-21" />
		<title>Множественные уязвимости php-tcpdf</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в php-tcpdf</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-tcpdf-21082025/</description>
               <solution>
                    Запретить использование в ОС пакета php-tcpdf
                или
                    Установить обновление для пакета(ов) php-tcpdf
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php-tcpdf-21082025/" type="self" id="ROS-20250821-08" title="ROS-20250821-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22640" type="cve" id="CVE-2024-22640" title="CVE-2024-22640" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22641" type="cve" id="CVE-2024-22641" title="CVE-2024-22641" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32489" type="cve" id="CVE-2024-32489" title="CVE-2024-32489" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-51058" type="cve" id="CVE-2024-51058" title="CVE-2024-51058" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56519" type="cve" id="CVE-2024-56519" title="CVE-2024-56519" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56520" type="cve" id="CVE-2024-56520" title="CVE-2024-56520" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56522" type="cve" id="CVE-2024-56522" title="CVE-2024-56522" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56527" type="cve" id="CVE-2024-56527" title="CVE-2024-56527" />
			<reference href="https://bdu.fstec.ru/vul/2025-10860" type="self" id="BDU:2025-10860" title="BDU:2025-10860" />
			<reference href="https://bdu.fstec.ru/vul/2025-10861" type="self" id="BDU:2025-10861" title="BDU:2025-10861" />
			<reference href="https://bdu.fstec.ru/vul/2025-10862" type="self" id="BDU:2025-10862" title="BDU:2025-10862" />
			<reference href="https://bdu.fstec.ru/vul/2025-10863" type="self" id="BDU:2025-10863" title="BDU:2025-10863" />
			<reference href="https://bdu.fstec.ru/vul/2025-10828" type="self" id="BDU:2025-10828" title="BDU:2025-10828" />
			<reference href="https://bdu.fstec.ru/vul/2025-10829" type="self" id="BDU:2025-10829" title="BDU:2025-10829" />
			<reference href="https://bdu.fstec.ru/vul/2025-10830" type="self" id="BDU:2025-10830" title="BDU:2025-10830" />
			<reference href="https://bdu.fstec.ru/vul/2025-10864" type="self" id="BDU:2025-10864" title="BDU:2025-10864" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php-tcpdf" epoch="0" version="6.10.0" release="1.el7" arch="noarch" src="">
					<filename>php-tcpdf-0:6.10.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250822-01</id>
		<issued date="2025-08-22" />
		<updated date="2025-08-22" />
		<title>Уязвимость kea </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kea</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kea-cve-2025-32801/</description>
               <solution>
                    Запретить использование в ОС пакета kea
                или
                    Установить обновление для пакета(ов) kea
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kea-cve-2025-32801/" type="self" id="ROS-20250822-01" title="ROS-20250822-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32801" type="cve" id="CVE-2025-32801" title="CVE-2025-32801" />
			<reference href="https://bdu.fstec.ru/vul/2025-11253" type="self" id="BDU:2025-11253" title="BDU:2025-11253" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kea" epoch="0" version="3.0.0" release="2.el7" arch="x86_64" src="">
					<filename>kea-0:3.0.0-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250822-02</id>
		<issued date="2025-08-22" />
		<updated date="2025-08-22" />
		<title>Уязвимость dom4j </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dom4j</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dom4j-cve-2018-1000632/</description>
               <solution>
                    Запретить использование в ОС пакета dom4j
                или
                    Установить обновление для пакета(ов) dom4j
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dom4j-cve-2018-1000632/" type="self" id="ROS-20250822-02" title="ROS-20250822-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000632" type="cve" id="CVE-2018-1000632" title="CVE-2018-1000632" />
			<reference href="https://bdu.fstec.ru/vul/2025-11250" type="self" id="BDU:2025-11250" title="BDU:2025-11250" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dom4j" epoch="0" version="2.2.0" release="1.el7" arch="noarch" src="">
					<filename>dom4j-0:2.2.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250822-03</id>
		<issued date="2025-08-22" />
		<updated date="2025-08-22" />
		<title>Уязвимость hibernate-validator </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в hibernate-validator</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-hibernate-validator-cve-2019-10219/</description>
               <solution>
                    Запретить использование в ОС пакета hibernate-validator
                или
                    Установить обновление для пакета(ов) hibernate-validator
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-hibernate-validator-cve-2019-10219/" type="self" id="ROS-20250822-03" title="ROS-20250822-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10219" type="cve" id="CVE-2019-10219" title="CVE-2019-10219" />
			<reference href="https://bdu.fstec.ru/vul/2023-05424" type="self" id="BDU:2023-05424" title="BDU:2023-05424" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="hibernate-validator" epoch="0" version="5.2.4" release="7.el7" arch="noarch" src="">
					<filename>hibernate-validator-0:5.2.4-7.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250822-04</id>
		<issued date="2025-08-22" />
		<updated date="2025-08-22" />
		<title>Уязвимость tomcat </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2025-49125/</description>
               <solution>
                    Запретить использование в ОС пакета tomcat
                или
                    Установить обновление для пакета(ов) tomcat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2025-49125/" type="self" id="ROS-20250822-04" title="ROS-20250822-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49125" type="cve" id="CVE-2025-49125" title="CVE-2025-49125" />
			<reference href="https://bdu.fstec.ru/vul/2025-09499" type="self" id="BDU:2025-09499" title="BDU:2025-09499" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat" epoch="1" version="9.0.106" release="1.el7" arch="noarch" src="">
					<filename>tomcat-1:9.0.106-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250822-05</id>
		<issued date="2025-08-22" />
		<updated date="2025-08-22" />
		<title>Уязвимость tomcat10 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat10</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat10-cve-2025-49125/</description>
               <solution>
                    Запретить использование в ОС пакета tomcat10
                или
                    Установить обновление для пакета(ов) tomcat10
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat10-cve-2025-49125/" type="self" id="ROS-20250822-05" title="ROS-20250822-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49125" type="cve" id="CVE-2025-49125" title="CVE-2025-49125" />
			<reference href="https://bdu.fstec.ru/vul/2025-09499" type="self" id="BDU:2025-09499" title="BDU:2025-09499" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat10" epoch="1" version="10.1.42" release="1.el7" arch="noarch" src="">
					<filename>tomcat10-1:10.1.42-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250822-06</id>
		<issued date="2025-08-22" />
		<updated date="2025-08-22" />
		<title>Уязвимость moodle </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-moodle-cve-2025-53021/</description>
               <solution>
                    Запретить использование в ОС пакета moodle
                или
                    Установить обновление для пакета(ов) moodle
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-moodle-cve-2025-53021/" type="self" id="ROS-20250822-06" title="ROS-20250822-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53021" type="cve" id="CVE-2025-53021" title="CVE-2025-53021" />
			<reference href="https://bdu.fstec.ru/vul/2025-10235" type="self" id="BDU:2025-10235" title="BDU:2025-10235" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="moodle" epoch="0" version="4.5.4" release="1.el7" arch="noarch" src="">
					<filename>moodle-0:4.5.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250822-07</id>
		<issued date="2025-08-22" />
		<updated date="2025-08-22" />
		<title>Уязвимость golang-github-jwt-4-devel </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang-github-jwt-4-devel</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-github-jwt-4-devel-cve-2025-30204/</description>
               <solution>
                    Запретить использование в ОС пакета golang-github-jwt-4-devel
                или
                    Установить обновление для пакета(ов) golang-github-jwt-4-devel
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-github-jwt-4-devel-cve-2025-30204/" type="self" id="ROS-20250822-07" title="ROS-20250822-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30204" type="cve" id="CVE-2025-30204" title="CVE-2025-30204" />
			<reference href="https://bdu.fstec.ru/vul/2025-08472" type="self" id="BDU:2025-08472" title="BDU:2025-08472" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang-github-jwt-4-devel" epoch="0" version="4.5.2" release="1.el7" arch="noarch" src="">
					<filename>golang-github-jwt-4-devel-0:4.5.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250822-08</id>
		<issued date="2025-08-22" />
		<updated date="2025-08-22" />
		<title>Уязвимость golang-github-jwt-5 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang-github-jwt-5</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-github-jwt-5-cve-2025-30204/</description>
               <solution>
                    Запретить использование в ОС пакета golang-github-jwt-5
                или
                    Установить обновление для пакета(ов) golang-github-jwt-5
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-github-jwt-5-cve-2025-30204/" type="self" id="ROS-20250822-08" title="ROS-20250822-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30204" type="cve" id="CVE-2025-30204" title="CVE-2025-30204" />
			<reference href="https://bdu.fstec.ru/vul/2025-08472" type="self" id="BDU:2025-08472" title="BDU:2025-08472" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang-github-jwt-5" epoch="0" version="5.3.0" release="1.el7" arch="x86_64" src="">
					<filename>golang-github-jwt-5-0:5.3.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250822-09</id>
		<issued date="2025-08-22" />
		<updated date="2025-08-22" />
		<title>Уязвимость stolon </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в stolon</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-stolon-cve-2020-26160/</description>
               <solution>
                    Запретить использование в ОС пакета stolon
                или
                    Установить обновление для пакета(ов) stolon
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-stolon-cve-2020-26160/" type="self" id="ROS-20250822-09" title="ROS-20250822-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26160" type="cve" id="CVE-2020-26160" title="CVE-2020-26160" />
			<reference href="https://bdu.fstec.ru/vul/2025-11266" type="self" id="BDU:2025-11266" title="BDU:2025-11266" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="stolon" epoch="0" version="0.17.0" release="4.el7" arch="x86_64" src="">
					<filename>stolon-0:0.17.0-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250822-10</id>
		<issued date="2025-08-22" />
		<updated date="2025-08-22" />
		<title>Уязвимость stolon </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в stolon</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-stolon-cve-2022-21698/</description>
               <solution>
                    Запретить использование в ОС пакета stolon
                или
                    Установить обновление для пакета(ов) stolon
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-stolon-cve-2022-21698/" type="self" id="ROS-20250822-10" title="ROS-20250822-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21698" type="cve" id="CVE-2022-21698" title="CVE-2022-21698" />
			<reference href="https://bdu.fstec.ru/vul/2022-05475" type="self" id="BDU:2022-05475" title="BDU:2022-05475" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="stolon" epoch="0" version="0.17.0" release="4.el7" arch="x86_64" src="">
					<filename>stolon-0:0.17.0-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250822-11</id>
		<issued date="2025-08-22" />
		<updated date="2025-08-22" />
		<title>Уязвимость stolon </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в stolon</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-stolon-cve-2022-41723/</description>
               <solution>
                    Запретить использование в ОС пакета stolon
                или
                    Установить обновление для пакета(ов) stolon
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-stolon-cve-2022-41723/" type="self" id="ROS-20250822-11" title="ROS-20250822-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41723" type="cve" id="CVE-2022-41723" title="CVE-2022-41723" />
			<reference href="https://bdu.fstec.ru/vul/2023-07322" type="self" id="BDU:2023-07322" title="BDU:2023-07322" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="stolon" epoch="0" version="0.17.0" release="4.el7" arch="x86_64" src="">
					<filename>stolon-0:0.17.0-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250822-12</id>
		<issued date="2025-08-22" />
		<updated date="2025-08-22" />
		<title>Уязвимость stolon </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в stolon</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-stolon-cve-2023-39325/</description>
               <solution>
                    Запретить использование в ОС пакета stolon
                или
                    Установить обновление для пакета(ов) stolon
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-stolon-cve-2023-39325/" type="self" id="ROS-20250822-12" title="ROS-20250822-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39325" type="cve" id="CVE-2023-39325" title="CVE-2023-39325" />
			<reference href="https://bdu.fstec.ru/vul/2023-07013" type="self" id="BDU:2023-07013" title="BDU:2023-07013" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="stolon" epoch="0" version="0.17.0" release="4.el7" arch="x86_64" src="">
					<filename>stolon-0:0.17.0-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250822-13</id>
		<issued date="2025-08-22" />
		<updated date="2025-08-22" />
		<title>Уязвимость stolon </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в stolon</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-stolon-cve-2023-44487/</description>
               <solution>
                    Запретить использование в ОС пакета stolon
                или
                    Установить обновление для пакета(ов) stolon
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-stolon-cve-2023-44487/" type="self" id="ROS-20250822-13" title="ROS-20250822-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487" type="cve" id="CVE-2023-44487" title="CVE-2023-44487" />
			<reference href="https://bdu.fstec.ru/vul/2023-06559" type="self" id="BDU:2023-06559" title="BDU:2023-06559" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="stolon" epoch="0" version="0.17.0" release="4.el7" arch="x86_64" src="">
					<filename>stolon-0:0.17.0-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250822-14</id>
		<issued date="2025-08-22" />
		<updated date="2025-08-22" />
		<title>Уязвимость libxslt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libxslt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libxslt-cve-2025-7424/</description>
               <solution>
                    Запретить использование в ОС пакета libxslt
                или
                    Установить обновление для пакета(ов) libxslt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libxslt-cve-2025-7424/" type="self" id="ROS-20250822-14" title="ROS-20250822-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7424" type="cve" id="CVE-2025-7424" title="CVE-2025-7424" />
			<reference href="https://bdu.fstec.ru/vul/2025-11248" type="self" id="BDU:2025-11248" title="BDU:2025-11248" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libxslt" epoch="0" version="1.1.43" release="2.el7" arch="x86_64" src="">
					<filename>libxslt-0:1.1.43-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250822-15</id>
		<issued date="2025-08-22" />
		<updated date="2025-08-22" />
		<title>Уязвимость helm </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в helm</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-helm-cve-2025-53547/</description>
               <solution>
                    Запретить использование в ОС пакета helm
                или
                    Установить обновление для пакета(ов) helm
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-helm-cve-2025-53547/" type="self" id="ROS-20250822-15" title="ROS-20250822-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53547" type="cve" id="CVE-2025-53547" title="CVE-2025-53547" />
			<reference href="https://bdu.fstec.ru/vul/2025-10843" type="self" id="BDU:2025-10843" title="BDU:2025-10843" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="helm" epoch="0" version="3.12.3" release="3.el7" arch="x86_64" src="">
					<filename>helm-0:3.12.3-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250822-16</id>
		<issued date="2025-08-22" />
		<updated date="2025-08-22" />
		<title>Множественные уязвимости java-21-openjdk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-21-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-21-openjdk-cve-2025-50106-cve-2025-30749/</description>
               <solution>
                    Запретить использование в ОС пакета java-21-openjdk
                или
                    Установить обновление для пакета(ов) java-21-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-21-openjdk-cve-2025-50106-cve-2025-30749/" type="self" id="ROS-20250822-16" title="ROS-20250822-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50106" type="cve" id="CVE-2025-50106" title="CVE-2025-50106" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30749" type="cve" id="CVE-2025-30749" title="CVE-2025-30749" />
			<reference href="https://bdu.fstec.ru/vul/2025-08709" type="self" id="BDU:2025-08709" title="BDU:2025-08709" />
			<reference href="https://bdu.fstec.ru/vul/2025-09721" type="self" id="BDU:2025-09721" title="BDU:2025-09721" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-21-openjdk" epoch="1" version="21.0.8.0.9" release="1.el7" arch="x86_64" src="">
					<filename>java-21-openjdk-1:21.0.8.0.9-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250822-17</id>
		<issued date="2025-08-22" />
		<updated date="2025-08-22" />
		<title>Множественные уязвимости java-17-openjdk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-17-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-17-openjdk-cve-2025-50106-cve-2025-30749/</description>
               <solution>
                    Запретить использование в ОС пакета java-17-openjdk
                или
                    Установить обновление для пакета(ов) java-17-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-17-openjdk-cve-2025-50106-cve-2025-30749/" type="self" id="ROS-20250822-17" title="ROS-20250822-17" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50106" type="cve" id="CVE-2025-50106" title="CVE-2025-50106" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30749" type="cve" id="CVE-2025-30749" title="CVE-2025-30749" />
			<reference href="https://bdu.fstec.ru/vul/2025-08709" type="self" id="BDU:2025-08709" title="BDU:2025-08709" />
			<reference href="https://bdu.fstec.ru/vul/2025-09721" type="self" id="BDU:2025-09721" title="BDU:2025-09721" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-17-openjdk" epoch="1" version="17.0.16.0.8" release="1.el7" arch="x86_64" src="">
					<filename>java-17-openjdk-1:17.0.16.0.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250822-18</id>
		<issued date="2025-08-22" />
		<updated date="2025-08-22" />
		<title>Множественные уязвимости java-11-openjdk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-11-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-11-openjdk-cve-2025-50106-cve-2025-30749/</description>
               <solution>
                    Запретить использование в ОС пакета java-11-openjdk
                или
                    Установить обновление для пакета(ов) java-11-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-11-openjdk-cve-2025-50106-cve-2025-30749/" type="self" id="ROS-20250822-18" title="ROS-20250822-18" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50106" type="cve" id="CVE-2025-50106" title="CVE-2025-50106" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30749" type="cve" id="CVE-2025-30749" title="CVE-2025-30749" />
			<reference href="https://bdu.fstec.ru/vul/2025-08709" type="self" id="BDU:2025-08709" title="BDU:2025-08709" />
			<reference href="https://bdu.fstec.ru/vul/2025-09721" type="self" id="BDU:2025-09721" title="BDU:2025-09721" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-11-openjdk" epoch="1" version="11.0.28.0.6" release="1.el7" arch="x86_64" src="">
					<filename>java-11-openjdk-1:11.0.28.0.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250822-20</id>
		<issued date="2025-08-22" />
		<updated date="2025-08-22" />
		<title>Уязвимость gpac </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gpac</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gpac-cve-2025-7797/</description>
               <solution>
                    Запретить использование в ОС пакета gpac
                или
                    Установить обновление для пакета(ов) gpac
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gpac-cve-2025-7797/" type="self" id="ROS-20250822-20" title="ROS-20250822-20" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7797" type="cve" id="CVE-2025-7797" title="CVE-2025-7797" />
			<reference href="https://bdu.fstec.ru/vul/2025-11267" type="self" id="BDU:2025-11267" title="BDU:2025-11267" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gpac" epoch="0" version="2.4.0" release="5.el7" arch="x86_64" src="">
					<filename>gpac-0:2.4.0-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250822-19</id>
		<issued date="2025-08-22" />
		<updated date="2025-08-22" />
		<title>Множественные уязвимости java-1.8.0-openjdk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-1.8.0-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-1-8-0-openjdk-cve-2025-50106-cve-2025-30749/</description>
               <solution>
                    Запретить использование в ОС пакета java-1.8.0-openjdk
                или
                    Установить обновление для пакета(ов) java-1.8.0-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-1-8-0-openjdk-cve-2025-50106-cve-2025-30749/" type="self" id="ROS-20250822-19" title="ROS-20250822-19" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50106" type="cve" id="CVE-2025-50106" title="CVE-2025-50106" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30749" type="cve" id="CVE-2025-30749" title="CVE-2025-30749" />
			<reference href="https://bdu.fstec.ru/vul/2025-08709" type="self" id="BDU:2025-08709" title="BDU:2025-08709" />
			<reference href="https://bdu.fstec.ru/vul/2025-09721" type="self" id="BDU:2025-09721" title="BDU:2025-09721" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-1.8.0-openjdk" epoch="1" version="1.8.0.462.b08" release="1.el7" arch="x86_64" src="">
					<filename>java-1.8.0-openjdk-1:1.8.0.462.b08-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250822-21</id>
		<issued date="2025-08-22" />
		<updated date="2025-08-22" />
		<title>Множественные уязвимости php </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в php</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php83-cve-2025-6491-cve-2025-1220-cve-2025-1735/</description>
               <solution>
                    Запретить использование в ОС пакета php
                или
                    Установить обновление для пакета(ов) php Установка и обновление пакетов PHP до версии 8.Х на РЕД ОС производится по инструкции https://redos.red-soft.ru/base/arm/arm-other/php-8-redos-73/
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php83-cve-2025-6491-cve-2025-1220-cve-2025-1735/" type="self" id="ROS-20250822-21" title="ROS-20250822-21" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6491" type="cve" id="CVE-2025-6491" title="CVE-2025-6491" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1735" type="cve" id="CVE-2025-1735" title="CVE-2025-1735" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1220" type="cve" id="CVE-2025-1220" title="CVE-2025-1220" />
			<reference href="https://bdu.fstec.ru/vul/2025-10415" type="self" id="BDU:2025-10415" title="BDU:2025-10415" />
			<reference href="https://bdu.fstec.ru/vul/2025-10413" type="self" id="BDU:2025-10413" title="BDU:2025-10413" />
			<reference href="https://bdu.fstec.ru/vul/2025-10414" type="self" id="BDU:2025-10414" title="BDU:2025-10414" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php" epoch="0" version="8.3.8" release="1.el7" arch="x86_64" src="">
					<filename>php-0:8.3.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250822-22</id>
		<issued date="2025-08-22" />
		<updated date="2025-08-22" />
		<title>Множественные уязвимости php </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в php</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php84-cve-2025-6491-cve-2025-1220-cve-2025-1735/</description>
               <solution>
                    Запретить использование в ОС пакета php
                или
                    Установить обновление для пакета(ов) php Установка и обновление пакетов PHP до версии 8.Х на РЕД ОС производится по инструкции https://redos.red-soft.ru/base/arm/arm-other/php-8-redos-73/
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php84-cve-2025-6491-cve-2025-1220-cve-2025-1735/" type="self" id="ROS-20250822-22" title="ROS-20250822-22" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6491" type="cve" id="CVE-2025-6491" title="CVE-2025-6491" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1735" type="cve" id="CVE-2025-1735" title="CVE-2025-1735" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1220" type="cve" id="CVE-2025-1220" title="CVE-2025-1220" />
			<reference href="https://bdu.fstec.ru/vul/2025-10415" type="self" id="BDU:2025-10415" title="BDU:2025-10415" />
			<reference href="https://bdu.fstec.ru/vul/2025-10413" type="self" id="BDU:2025-10413" title="BDU:2025-10413" />
			<reference href="https://bdu.fstec.ru/vul/2025-10414" type="self" id="BDU:2025-10414" title="BDU:2025-10414" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php" epoch="0" version="8.4.10" release="1.el7" arch="x86_64" src="">
					<filename>php-0:8.4.10-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250822-23</id>
		<issued date="2025-08-22" />
		<updated date="2025-08-22" />
		<title>Множественные уязвимости php </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в php</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php82-cve-2025-6491-cve-2025-1220-cve-2025-1735/</description>
               <solution>
                    Запретить использование в ОС пакета php
                или
                    Установить обновление для пакета(ов) php Установка и обновление пакетов PHP до версии 8.Х на РЕД ОС производится по инструкции https://redos.red-soft.ru/base/arm/arm-other/php-8-redos-73/
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php82-cve-2025-6491-cve-2025-1220-cve-2025-1735/" type="self" id="ROS-20250822-23" title="ROS-20250822-23" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6491" type="cve" id="CVE-2025-6491" title="CVE-2025-6491" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1735" type="cve" id="CVE-2025-1735" title="CVE-2025-1735" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1220" type="cve" id="CVE-2025-1220" title="CVE-2025-1220" />
			<reference href="https://bdu.fstec.ru/vul/2025-10415" type="self" id="BDU:2025-10415" title="BDU:2025-10415" />
			<reference href="https://bdu.fstec.ru/vul/2025-10413" type="self" id="BDU:2025-10413" title="BDU:2025-10413" />
			<reference href="https://bdu.fstec.ru/vul/2025-10414" type="self" id="BDU:2025-10414" title="BDU:2025-10414" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php" epoch="0" version="8.2.28" release="2.el7" arch="x86_64" src="">
					<filename>php-0:8.2.28-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250822-24</id>
		<issued date="2025-08-22" />
		<updated date="2025-08-22" />
		<title>Множественные уязвимости php </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в php</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php81-cve-2025-6491-cve-2025-1220-cve-2025-1735/</description>
               <solution>
                    Запретить использование в ОС пакета php
                или
                    Установить обновление для пакета(ов) php Установка и обновление пакетов PHP до версии 8.Х на РЕД ОС производится по инструкции https://redos.red-soft.ru/base/arm/arm-other/php-8-redos-73/
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-php81-cve-2025-6491-cve-2025-1220-cve-2025-1735/" type="self" id="ROS-20250822-24" title="ROS-20250822-24" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6491" type="cve" id="CVE-2025-6491" title="CVE-2025-6491" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1735" type="cve" id="CVE-2025-1735" title="CVE-2025-1735" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1220" type="cve" id="CVE-2025-1220" title="CVE-2025-1220" />
			<reference href="https://bdu.fstec.ru/vul/2025-10415" type="self" id="BDU:2025-10415" title="BDU:2025-10415" />
			<reference href="https://bdu.fstec.ru/vul/2025-10413" type="self" id="BDU:2025-10413" title="BDU:2025-10413" />
			<reference href="https://bdu.fstec.ru/vul/2025-10414" type="self" id="BDU:2025-10414" title="BDU:2025-10414" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php" epoch="0" version="8.1.32" release="1.el7" arch="x86_64" src="">
					<filename>php-0:8.1.32-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250825-01</id>
		<issued date="2025-08-25" />
		<updated date="2025-08-25" />
		<title>Уязвимость cpio </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в cpio</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cpio-cve-2019-14866/</description>
               <solution>
                    Запретить использование в ОС пакета cpio
                или
                    Установить обновление для пакета(ов) cpio
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cpio-cve-2019-14866/" type="self" id="ROS-20250825-01" title="ROS-20250825-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14866" type="cve" id="CVE-2019-14866" title="CVE-2019-14866" />
			<reference href="https://bdu.fstec.ru/vul/2020-01329" type="self" id="BDU:2020-01329" title="BDU:2020-01329" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cpio" epoch="0" version="2.15" release="1.el7" arch="x86_64" src="">
					<filename>cpio-0:2.15-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250825-02</id>
		<issued date="2025-08-25" />
		<updated date="2025-08-25" />
		<title>Множественные уязвимости rubygem-nokogiri </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в rubygem-nokogiri</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rubygem-nokogiri-cve-2020-26247-cve-2022-29181/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-nokogiri
                или
                    Установить обновление для пакета(ов) rubygem-nokogiri
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rubygem-nokogiri-cve-2020-26247-cve-2022-29181/" type="self" id="ROS-20250825-02" title="ROS-20250825-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29181" type="cve" id="CVE-2022-29181" title="CVE-2022-29181" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26247" type="cve" id="CVE-2020-26247" title="CVE-2020-26247" />
			<reference href="https://bdu.fstec.ru/vul/2024-02313" type="self" id="BDU:2024-02313" title="BDU:2024-02313" />
			<reference href="https://bdu.fstec.ru/vul/2021-01008" type="self" id="BDU:2021-01008" title="BDU:2021-01008" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-nokogiri" epoch="0" version="1.16.7" release="2.el7" arch="x86_64" src="">
					<filename>rubygem-nokogiri-0:1.16.7-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250825-03</id>
		<issued date="2025-08-25" />
		<updated date="2025-08-25" />
		<title>Уязвимость openssh </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в openssh</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssh-cve-2021-36368/</description>
               <solution>
                    Запретить использование в ОС пакета openssh
                или
                    Установить обновление для пакета(ов) openssh
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssh-cve-2021-36368/" type="self" id="ROS-20250825-03" title="ROS-20250825-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36368" type="cve" id="CVE-2021-36368" title="CVE-2021-36368" />
			<reference href="https://bdu.fstec.ru/vul/2025-10810" type="self" id="BDU:2025-10810" title="BDU:2025-10810" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssh" epoch="0" version="8.9p1" release="5.el7" arch="x86_64" src="">
					<filename>openssh-0:8.9p1-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250825-04</id>
		<issued date="2025-08-25" />
		<updated date="2025-08-25" />
		<title>Уязвимость python3-starlette </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-starlette</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-starlette-cve-2025-54121/</description>
               <solution>
                    Запретить использование в ОС пакета python3-starlette
                или
                    Установить обновление для пакета(ов) python3-starlette
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-starlette-cve-2025-54121/" type="self" id="ROS-20250825-04" title="ROS-20250825-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54121" type="cve" id="CVE-2025-54121" title="CVE-2025-54121" />
			<reference href="https://bdu.fstec.ru/vul/2025-10819" type="self" id="BDU:2025-10819" title="BDU:2025-10819" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-starlette" epoch="0" version="0.23.0" release="4.el7" arch="noarch" src="">
					<filename>python3-starlette-0:0.23.0-4.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250825-05</id>
		<issued date="2025-08-25" />
		<updated date="2025-08-25" />
		<title>Уязвимость rubygem-sinatra </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в rubygem-sinatra</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-sinatra-cve-2022-29970/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-sinatra
                или
                    Установить обновление для пакета(ов) rubygem-sinatra
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-sinatra-cve-2022-29970/" type="self" id="ROS-20250825-05" title="ROS-20250825-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29970" type="cve" id="CVE-2022-29970" title="CVE-2022-29970" />
			<reference href="https://bdu.fstec.ru/vul/2023-00294" type="self" id="BDU:2023-00294" title="BDU:2023-00294" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-sinatra" epoch="1" version="2.2.4" release="1.el7" arch="noarch" src="">
					<filename>rubygem-sinatra-1:2.2.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250825-06</id>
		<issued date="2025-08-25" />
		<updated date="2025-08-25" />
		<title>Уязвимость sqlite </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в sqlite</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sqlite-cve-2025-6965/</description>
               <solution>
                    Запретить использование в ОС пакета sqlite
                или
                    Установить обновление для пакета(ов) sqlite
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sqlite-cve-2025-6965/" type="self" id="ROS-20250825-06" title="ROS-20250825-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6965" type="cve" id="CVE-2025-6965" title="CVE-2025-6965" />
			<reference href="https://bdu.fstec.ru/vul/2025-08786" type="self" id="BDU:2025-08786" title="BDU:2025-08786" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="sqlite" epoch="0" version="3.35.3" release="6.el7" arch="x86_64" src="">
					<filename>sqlite-0:3.35.3-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250825-07</id>
		<issued date="2025-08-25" />
		<updated date="2025-08-25" />
		<title>Уязвимость php-adodb </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в php-adodb</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-adodb-cve-2025-54119/</description>
               <solution>
                    Запретить использование в ОС пакета php-adodb
                или
                    Установить обновление для пакета(ов) php-adodb
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-adodb-cve-2025-54119/" type="self" id="ROS-20250825-07" title="ROS-20250825-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54119" type="cve" id="CVE-2025-54119" title="CVE-2025-54119" />
			<reference href="https://bdu.fstec.ru/vul/2025-10815" type="self" id="BDU:2025-10815" title="BDU:2025-10815" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php-adodb" epoch="0" version="5.22.7" release="4.el7" arch="noarch" src="">
					<filename>php-adodb-0:5.22.7-4.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250825-08</id>
		<issued date="2025-08-25" />
		<updated date="2025-08-25" />
		<title>Множественные уязвимости iperf3 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в iperf3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-iperf3-cve-2025-54350-cve-2025-54351/</description>
               <solution>
                    Запретить использование в ОС пакета iperf3
                или
                    Установить обновление для пакета(ов) iperf3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-iperf3-cve-2025-54350-cve-2025-54351/" type="self" id="ROS-20250825-08" title="ROS-20250825-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54350" type="cve" id="CVE-2025-54350" title="CVE-2025-54350" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54351" type="cve" id="CVE-2025-54351" title="CVE-2025-54351" />
			<reference href="https://bdu.fstec.ru/vul/2025-10811" type="self" id="BDU:2025-10811" title="BDU:2025-10811" />
			<reference href="https://bdu.fstec.ru/vul/2025-10812" type="self" id="BDU:2025-10812" title="BDU:2025-10812" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="iperf3" epoch="0" version="3.19.1" release="1.el7" arch="x86_64" src="">
					<filename>iperf3-0:3.19.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250826-01</id>
		<issued date="2025-08-26" />
		<updated date="2025-08-26" />
		<title>Множественные уязвимости cyrus-imapd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в cyrus-imapd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-cyrus-imapd-cve-2021-33582-cve-2024-34055/</description>
               <solution>
                    Запретить использование в ОС пакета cyrus-imapd
                или
                    Установить обновление для пакета(ов) cyrus-imapd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-cyrus-imapd-cve-2021-33582-cve-2024-34055/" type="self" id="ROS-20250826-01" title="ROS-20250826-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34055" type="cve" id="CVE-2024-34055" title="CVE-2024-34055" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33582" type="cve" id="CVE-2021-33582" title="CVE-2021-33582" />
			<reference href="https://bdu.fstec.ru/vul/2024-04474" type="self" id="BDU:2024-04474" title="BDU:2024-04474" />
			<reference href="https://bdu.fstec.ru/vul/2022-01804" type="self" id="BDU:2022-01804" title="BDU:2022-01804" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cyrus-imapd" epoch="0" version="3.6.6" release="2.el7" arch="x86_64" src="">
					<filename>cyrus-imapd-0:3.6.6-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250826-02</id>
		<issued date="2025-08-26" />
		<updated date="2025-08-26" />
		<title>Уязвимость openssl3 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в openssl3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2024-41996/</description>
               <solution>
                    Запретить использование в ОС пакета openssl3
                или
                    Установить обновление для пакета(ов) openssl3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2024-41996/" type="self" id="ROS-20250826-02" title="ROS-20250826-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41996" type="cve" id="CVE-2024-41996" title="CVE-2024-41996" />
			<reference href="https://bdu.fstec.ru/vul/2025-11398" type="self" id="BDU:2025-11398" title="BDU:2025-11398" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl3" epoch="0" version="3.2.2" release="5.el7" arch="x86_64" src="">
					<filename>openssl3-0:3.2.2-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250826-03</id>
		<issued date="2025-08-26" />
		<updated date="2025-08-26" />
		<title>Множественные уязвимости rubygem-webrick </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в rubygem-webrick</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rubygem-webrick-cve-2024-47220-cve-2025-6442/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-webrick
                или
                    Установить обновление для пакета(ов) rubygem-webrick
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rubygem-webrick-cve-2024-47220-cve-2025-6442/" type="self" id="ROS-20250826-03" title="ROS-20250826-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47220" type="cve" id="CVE-2024-47220" title="CVE-2024-47220" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6442" type="cve" id="CVE-2025-6442" title="CVE-2025-6442" />
			<reference href="https://bdu.fstec.ru/vul/2025-10615" type="self" id="BDU:2025-10615" title="BDU:2025-10615" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-webrick" epoch="0" version="1.9.1" release="1.el7" arch="noarch" src="">
					<filename>rubygem-webrick-0:1.9.1-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250826-04</id>
		<issued date="2025-08-26" />
		<updated date="2025-08-26" />
		<title>Множественные уязвимости wireshark </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в wireshark</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-wireshark-cve-2025-1492-cve-2025-5601/</description>
               <solution>
                    Запретить использование в ОС пакета wireshark
                или
                    Установить обновление для пакета(ов) wireshark
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-wireshark-cve-2025-1492-cve-2025-5601/" type="self" id="ROS-20250826-04" title="ROS-20250826-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1492" type="cve" id="CVE-2025-1492" title="CVE-2025-1492" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5601" type="cve" id="CVE-2025-5601" title="CVE-2025-5601" />
			<reference href="https://bdu.fstec.ru/vul/2025-10912" type="self" id="BDU:2025-10912" title="BDU:2025-10912" />
			<reference href="https://bdu.fstec.ru/vul/2025-10884" type="self" id="BDU:2025-10884" title="BDU:2025-10884" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="wireshark" epoch="1" version="4.0.12" release="1.el7" arch="x86_64" src="">
					<filename>wireshark-1:4.0.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250826-05</id>
		<issued date="2025-08-26" />
		<updated date="2025-08-26" />
		<title>Уязвимость perl-DBI </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в perl-DBI</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-dbi-cve-2014-10402/</description>
               <solution>
                    Запретить использование в ОС пакета perl-DBI
                или
                    Установить обновление для пакета(ов) perl-DBI
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-dbi-cve-2014-10402/" type="self" id="ROS-20250826-05" title="ROS-20250826-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-10402" type="cve" id="CVE-2014-10402" title="CVE-2014-10402" />
			<reference href="https://bdu.fstec.ru/vul/2022-05974" type="self" id="BDU:2022-05974" title="BDU:2022-05974" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="perl-DBI" epoch="0" version="1.647" release="1.el7" arch="x86_64" src="">
					<filename>perl-DBI-0:1.647-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250826-06</id>
		<issued date="2025-08-26" />
		<updated date="2025-08-26" />
		<title>Множественные уязвимости ImageMagick </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в ImageMagick</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-imagemagick-cve-2025-43965-cve-2025-46393/</description>
               <solution>
                    Запретить использование в ОС пакета ImageMagick
                или
                    Установить обновление для пакета(ов) ImageMagick
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-imagemagick-cve-2025-43965-cve-2025-46393/" type="self" id="ROS-20250826-06" title="ROS-20250826-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46393" type="cve" id="CVE-2025-46393" title="CVE-2025-46393" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43965" type="cve" id="CVE-2025-43965" title="CVE-2025-43965" />
			<reference href="https://bdu.fstec.ru/vul/2025-10909" type="self" id="BDU:2025-10909" title="BDU:2025-10909" />
			<reference href="https://bdu.fstec.ru/vul/2025-04922" type="self" id="BDU:2025-04922" title="BDU:2025-04922" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ImageMagick" epoch="1" version="6.9.13.27" release="3.el7" arch="x86_64" src="">
					<filename>ImageMagick-1:6.9.13.27-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250826-07</id>
		<issued date="2025-08-26" />
		<updated date="2025-08-26" />
		<title>Множественные уязвимости glib2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в glib2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-glib2-cve-2025-4373-cve-2025-3360/</description>
               <solution>
                    Запретить использование в ОС пакета glib2
                или
                    Установить обновление для пакета(ов) glib2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-glib2-cve-2025-4373-cve-2025-3360/" type="self" id="ROS-20250826-07" title="ROS-20250826-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3360" type="cve" id="CVE-2025-3360" title="CVE-2025-3360" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4373" type="cve" id="CVE-2025-4373" title="CVE-2025-4373" />
			<reference href="https://bdu.fstec.ru/vul/2025-10907" type="self" id="BDU:2025-10907" title="BDU:2025-10907" />
			<reference href="https://bdu.fstec.ru/vul/2025-07137" type="self" id="BDU:2025-07137" title="BDU:2025-07137" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glib2" epoch="0" version="2.65.3" release="7.el7" arch="x86_64" src="">
					<filename>glib2-0:2.65.3-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250826-08</id>
		<issued date="2025-08-26" />
		<updated date="2025-08-26" />
		<title>Множественные уязвимости tomcat </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в tomcat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-tomcat-cve-2025-53506-cve-2025-52520-cve-2025-52434/</description>
               <solution>
                    Запретить использование в ОС пакета tomcat
                или
                    Установить обновление для пакета(ов) tomcat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-tomcat-cve-2025-53506-cve-2025-52520-cve-2025-52434/" type="self" id="ROS-20250826-08" title="ROS-20250826-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52434" type="cve" id="CVE-2025-52434" title="CVE-2025-52434" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53506" type="cve" id="CVE-2025-53506" title="CVE-2025-53506" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52520" type="cve" id="CVE-2025-52520" title="CVE-2025-52520" />
			<reference href="https://bdu.fstec.ru/vul/2025-08954" type="self" id="BDU:2025-08954" title="BDU:2025-08954" />
			<reference href="https://bdu.fstec.ru/vul/2025-08952" type="self" id="BDU:2025-08952" title="BDU:2025-08952" />
			<reference href="https://bdu.fstec.ru/vul/2025-08953" type="self" id="BDU:2025-08953" title="BDU:2025-08953" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat" epoch="1" version="9.0.108" release="1.el7" arch="noarch" src="">
					<filename>tomcat-1:9.0.108-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250826-09</id>
		<issued date="2025-08-26" />
		<updated date="2025-08-26" />
		<title>Множественные уязвимости tomcat10 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в tomcat10</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-tomcat10-cve-2025-53506-cve-2025-52520/</description>
               <solution>
                    Запретить использование в ОС пакета tomcat10
                или
                    Установить обновление для пакета(ов) tomcat10
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-tomcat10-cve-2025-53506-cve-2025-52520/" type="self" id="ROS-20250826-09" title="ROS-20250826-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53506" type="cve" id="CVE-2025-53506" title="CVE-2025-53506" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52520" type="cve" id="CVE-2025-52520" title="CVE-2025-52520" />
			<reference href="https://bdu.fstec.ru/vul/2025-08952" type="self" id="BDU:2025-08952" title="BDU:2025-08952" />
			<reference href="https://bdu.fstec.ru/vul/2025-08953" type="self" id="BDU:2025-08953" title="BDU:2025-08953" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat10" epoch="1" version="10.1.44" release="1.el7" arch="noarch" src="">
					<filename>tomcat10-1:10.1.44-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250827-01</id>
		<issued date="2025-08-27" />
		<updated date="2025-08-27" />
		<title>Уязвимость uriparser </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в uriparser</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-uriparser-cve-2024-34403/</description>
               <solution>
                    Запретить использование в ОС пакета uriparser
                или
                    Установить обновление для пакета(ов) uriparser
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-uriparser-cve-2024-34403/" type="self" id="ROS-20250827-01" title="ROS-20250827-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34403" type="cve" id="CVE-2024-34403" title="CVE-2024-34403" />
			<reference href="https://bdu.fstec.ru/vul/2024-04296" type="self" id="BDU:2024-04296" title="BDU:2024-04296" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="uriparser" epoch="0" version="0.9.8" release="1.el7" arch="x86_64" src="">
					<filename>uriparser-0:0.9.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250827-02</id>
		<issued date="2025-08-27" />
		<updated date="2025-08-27" />
		<title>Уязвимость qpdf </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в qpdf</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qpdf-cve-2021-36978/</description>
               <solution>
                    Запретить использование в ОС пакета qpdf
                или
                    Установить обновление для пакета(ов) qpdf
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qpdf-cve-2021-36978/" type="self" id="ROS-20250827-02" title="ROS-20250827-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36978" type="cve" id="CVE-2021-36978" title="CVE-2021-36978" />
			<reference href="https://bdu.fstec.ru/vul/2025-10921" type="self" id="BDU:2025-10921" title="BDU:2025-10921" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="qpdf" epoch="0" version="10.6.3" release="1.el7" arch="x86_64" src="">
					<filename>qpdf-0:10.6.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250827-03</id>
		<issued date="2025-08-27" />
		<updated date="2025-08-27" />
		<title>Уязвимость apache-commons-vfs </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в apache-commons-vfs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-commons-vfs-cve-2025-27553/</description>
               <solution>
                    Запретить использование в ОС пакета apache-commons-vfs
                или
                    Установить обновление для пакета(ов) apache-commons-vfs
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-commons-vfs-cve-2025-27553/" type="self" id="ROS-20250827-03" title="ROS-20250827-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27553" type="cve" id="CVE-2025-27553" title="CVE-2025-27553" />
			<reference href="https://bdu.fstec.ru/vul/2025-03216" type="self" id="BDU:2025-03216" title="BDU:2025-03216" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="apache-commons-vfs" epoch="0" version="2.9.0" release="2.el7" arch="noarch" src="">
					<filename>apache-commons-vfs-0:2.9.0-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250827-04</id>
		<issued date="2025-08-27" />
		<updated date="2025-08-27" />
		<title>Множественные уязвимости ImageMagick </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в ImageMagick</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-imagemagick-cve-2025-53014-cve-2025-53015-cve-2025-53019-cve-2025-53101/</description>
               <solution>
                    Запретить использование в ОС пакета ImageMagick
                или
                    Установить обновление для пакета(ов) ImageMagick
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-imagemagick-cve-2025-53014-cve-2025-53015-cve-2025-53019-cve-2025-53101/" type="self" id="ROS-20250827-04" title="ROS-20250827-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53014" type="cve" id="CVE-2025-53014" title="CVE-2025-53014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53015" type="cve" id="CVE-2025-53015" title="CVE-2025-53015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53019" type="cve" id="CVE-2025-53019" title="CVE-2025-53019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53101" type="cve" id="CVE-2025-53101" title="CVE-2025-53101" />
			<reference href="https://bdu.fstec.ru/vul/2025-10910" type="self" id="BDU:2025-10910" title="BDU:2025-10910" />
			<reference href="https://bdu.fstec.ru/vul/2025-09402" type="self" id="BDU:2025-09402" title="BDU:2025-09402" />
			<reference href="https://bdu.fstec.ru/vul/2025-09402" type="self" id="BDU:2025-09402" title="BDU:2025-09402" />
			<reference href="https://bdu.fstec.ru/vul/2025-10876" type="self" id="BDU:2025-10876" title="BDU:2025-10876" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ImageMagick" epoch="1" version="6.9.13.27" release="3.el7" arch="x86_64" src="">
					<filename>ImageMagick-1:6.9.13.27-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250827-05</id>
		<issued date="2025-08-27" />
		<updated date="2025-08-27" />
		<title>Уязвимость perl-Authen-SASL </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в perl-Authen-SASL</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-authen-sasl-cve-2025-40918/</description>
               <solution>
                    Запретить использование в ОС пакета perl-Authen-SASL
                или
                    Установить обновление для пакета(ов) perl-Authen-SASL
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-authen-sasl-cve-2025-40918/" type="self" id="ROS-20250827-05" title="ROS-20250827-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40918" type="cve" id="CVE-2025-40918" title="CVE-2025-40918" />
			<reference href="https://bdu.fstec.ru/vul/2025-10918" type="self" id="BDU:2025-10918" title="BDU:2025-10918" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="perl-Authen-SASL" epoch="0" version="2.1900" release="1.el7" arch="noarch" src="">
					<filename>perl-Authen-SASL-0:2.1900-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250827-06</id>
		<issued date="2025-08-27" />
		<updated date="2025-08-27" />
		<title>Множественные уязвимости nodejs-webpack </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в nodejs-webpack</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nodejs-webpack-cve-2025-6545-cve-2025-6547/</description>
               <solution>
                    Запретить использование в ОС пакета nodejs-webpack
                или
                    Установить обновление для пакета(ов) nodejs-webpack
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nodejs-webpack-cve-2025-6545-cve-2025-6547/" type="self" id="ROS-20250827-06" title="ROS-20250827-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6547" type="cve" id="CVE-2025-6547" title="CVE-2025-6547" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6545" type="cve" id="CVE-2025-6545" title="CVE-2025-6545" />
			<reference href="https://bdu.fstec.ru/vul/2025-07454" type="self" id="BDU:2025-07454" title="BDU:2025-07454" />
			<reference href="https://bdu.fstec.ru/vul/2025-07453" type="self" id="BDU:2025-07453" title="BDU:2025-07453" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs-webpack" epoch="0" version="3.12.0" release="6.el7" arch="noarch" src="">
					<filename>nodejs-webpack-0:3.12.0-6.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250827-07</id>
		<issued date="2025-08-27" />
		<updated date="2025-08-27" />
		<title>Множественные уязвимости glpi </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-glpi-cve-2025-27514-cve-2025-52567-cve-2025-52897/</description>
               <solution>
                    Запретить использование в ОС пакета glpi
                или
                    Установить обновление для пакета(ов) glpi
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-glpi-cve-2025-27514-cve-2025-52567-cve-2025-52897/" type="self" id="ROS-20250827-07" title="ROS-20250827-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27514" type="cve" id="CVE-2025-27514" title="CVE-2025-27514" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52567" type="cve" id="CVE-2025-52567" title="CVE-2025-52567" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52897" type="cve" id="CVE-2025-52897" title="CVE-2025-52897" />
			<reference href="https://bdu.fstec.ru/vul/2025-10945" type="self" id="BDU:2025-10945" title="BDU:2025-10945" />
			<reference href="https://bdu.fstec.ru/vul/2025-10946" type="self" id="BDU:2025-10946" title="BDU:2025-10946" />
			<reference href="https://bdu.fstec.ru/vul/2025-10947" type="self" id="BDU:2025-10947" title="BDU:2025-10947" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi" epoch="0" version="10.0.19" release="1.el7" arch="noarch" src="">
					<filename>glpi-0:10.0.19-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250827-08</id>
		<issued date="2025-08-27" />
		<updated date="2025-08-27" />
		<title>Множественные уязвимости firefox </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-cve-2025-8027-cve-2025-8028/</description>
               <solution>
                    Запретить использование в ОС пакета firefox
                или
                    Установить обновление для пакета(ов) firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-cve-2025-8027-cve-2025-8028/" type="self" id="ROS-20250827-08" title="ROS-20250827-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8027" type="cve" id="CVE-2025-8027" title="CVE-2025-8027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8028" type="cve" id="CVE-2025-8028" title="CVE-2025-8028" />
			<reference href="https://bdu.fstec.ru/vul/2025-08995" type="self" id="BDU:2025-08995" title="BDU:2025-08995" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.26.0" release="1.el7" arch="x86_64" src="">
					<filename>firefox-0:115.26.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250827-09</id>
		<issued date="2025-08-27" />
		<updated date="2025-08-27" />
		<title>Множественные уязвимости thunderbird </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-cve-2025-8027-cve-2025-8028/</description>
               <solution>
                    Запретить использование в ОС пакета thunderbird
                или
                    Установить обновление для пакета(ов) thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-cve-2025-8027-cve-2025-8028/" type="self" id="ROS-20250827-09" title="ROS-20250827-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8027" type="cve" id="CVE-2025-8027" title="CVE-2025-8027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8028" type="cve" id="CVE-2025-8028" title="CVE-2025-8028" />
			<reference href="https://bdu.fstec.ru/vul/2025-08995" type="self" id="BDU:2025-08995" title="BDU:2025-08995" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="128.13.0" release="1.el7" arch="x86_64" src="">
					<filename>thunderbird-0:128.13.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250828-01</id>
		<issued date="2025-08-28" />
		<updated date="2025-08-28" />
		<title>Множественные уязвимости 7zip </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в 7zip</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-7zip-cve-2024-11612-cve-2025-55188/</description>
               <solution>
                    Запретить использование в ОС пакета 7zip
                или
                    Установить обновление для пакета(ов) 7zip
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-7zip-cve-2024-11612-cve-2025-55188/" type="self" id="ROS-20250828-01" title="ROS-20250828-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11612" type="cve" id="CVE-2024-11612" title="CVE-2024-11612" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55188" type="cve" id="CVE-2025-55188" title="CVE-2025-55188" />
			<reference href="https://bdu.fstec.ru/vul/2024-10378" type="self" id="BDU:2024-10378" title="BDU:2024-10378" />
			<reference href="https://bdu.fstec.ru/vul/2025-09673" type="self" id="BDU:2025-09673" title="BDU:2025-09673" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="7zip" epoch="0" version="25.01" release="1.el7" arch="x86_64" src="">
					<filename>7zip-0:25.01-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250828-02</id>
		<issued date="2025-08-28" />
		<updated date="2025-08-28" />
		<title>Уязвимость bison </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в bison</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-bison-cve-2025-8734/</description>
               <solution>
                    Запретить использование в ОС пакета bison
                или
                    Установить обновление для пакета(ов) bison
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-bison-cve-2025-8734/" type="self" id="ROS-20250828-02" title="ROS-20250828-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8734" type="cve" id="CVE-2025-8734" title="CVE-2025-8734" />
			<reference href="https://bdu.fstec.ru/vul/2025-10837" type="self" id="BDU:2025-10837" title="BDU:2025-10837" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="bison" epoch="0" version="3.8.2" release="1.el7" arch="x86_64" src="">
					<filename>bison-0:3.8.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250828-03</id>
		<issued date="2025-08-28" />
		<updated date="2025-08-28" />
		<title>Уязвимость tomcat </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в tomcat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2023-28708/</description>
               <solution>
                    Запретить использование в ОС пакета tomcat
                или
                    Установить обновление для пакета(ов) tomcat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2023-28708/" type="self" id="ROS-20250828-03" title="ROS-20250828-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28708" type="cve" id="CVE-2023-28708" title="CVE-2023-28708" />
			<reference href="https://bdu.fstec.ru/vul/2025-10838" type="self" id="BDU:2025-10838" title="BDU:2025-10838" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat" epoch="1" version="9.0.74" release="1.el7" arch="noarch" src="">
					<filename>tomcat-1:9.0.74-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250828-04</id>
		<issued date="2025-08-28" />
		<updated date="2025-08-28" />
		<title>Множественные уязвимости moodle</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-moodle-28082025/</description>
               <solution>
                    Запретить использование в ОС пакета moodle
                или
                    Установить обновление для пакета(ов) moodle
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-moodle-28082025/" type="self" id="ROS-20250828-04" title="ROS-20250828-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38277" type="cve" id="CVE-2024-38277" title="CVE-2024-38277" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26531" type="cve" id="CVE-2025-26531" title="CVE-2025-26531" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38273" type="cve" id="CVE-2024-38273" title="CVE-2024-38273" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38274" type="cve" id="CVE-2024-38274" title="CVE-2024-38274" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26532" type="cve" id="CVE-2025-26532" title="CVE-2025-26532" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26533" type="cve" id="CVE-2025-26533" title="CVE-2025-26533" />
			<reference href="https://bdu.fstec.ru/vul/2025-10840" type="self" id="BDU:2025-10840" title="BDU:2025-10840" />
			<reference href="https://bdu.fstec.ru/vul/2025-02321" type="self" id="BDU:2025-02321" title="BDU:2025-02321" />
			<reference href="https://bdu.fstec.ru/vul/2025-10841" type="self" id="BDU:2025-10841" title="BDU:2025-10841" />
			<reference href="https://bdu.fstec.ru/vul/2025-10842" type="self" id="BDU:2025-10842" title="BDU:2025-10842" />
			<reference href="https://bdu.fstec.ru/vul/2025-02328" type="self" id="BDU:2025-02328" title="BDU:2025-02328" />
			<reference href="https://bdu.fstec.ru/vul/2025-02325" type="self" id="BDU:2025-02325" title="BDU:2025-02325" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="moodle" epoch="0" version="4.5.4" release="1.el7" arch="noarch" src="">
					<filename>moodle-0:4.5.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250828-05</id>
		<issued date="2025-08-28" />
		<updated date="2025-09-11" />
		<title>Множественные уязвимости tar </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tar</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-tar-cve-2019-9923-cve-2021-20193/</description>
               <solution>
                    Запретить использование в ОС пакета tar
                или
                    Установить обновление для пакета(ов) tar
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-tar-cve-2019-9923-cve-2021-20193/" type="self" id="ROS-20250828-05" title="ROS-20250828-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923" type="cve" id="CVE-2019-9923" title="CVE-2019-9923" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193" type="cve" id="CVE-2021-20193" title="CVE-2021-20193" />
			<reference href="https://bdu.fstec.ru/vul/2025-10839" type="self" id="BDU:2025-10839" title="BDU:2025-10839" />
			<reference href="https://bdu.fstec.ru/vul/2021-02357" type="self" id="BDU:2021-02357" title="BDU:2021-02357" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tar" epoch="2" version="1.30" release="5.el7" arch="x86_64" src="">
					<filename>tar-2:1.30-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250828-06</id>
		<issued date="2025-08-28" />
		<updated date="2025-08-28" />
		<title>Множественные уязвимости portainer-ce </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в portainer-ce</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-portainer-ce-cve-2025-53547-cve-2025-22874/</description>
               <solution>
                    Запретить использование в ОС пакета portainer-ce
                или
                    Установить обновление для пакета(ов) portainer-ce
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-portainer-ce-cve-2025-53547-cve-2025-22874/" type="self" id="ROS-20250828-06" title="ROS-20250828-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53547" type="cve" id="CVE-2025-53547" title="CVE-2025-53547" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22874" type="cve" id="CVE-2025-22874" title="CVE-2025-22874" />
			<reference href="https://bdu.fstec.ru/vul/2025-10843" type="self" id="BDU:2025-10843" title="BDU:2025-10843" />
			<reference href="https://bdu.fstec.ru/vul/2025-08556" type="self" id="BDU:2025-08556" title="BDU:2025-08556" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="portainer-ce" epoch="0" version="2.32.0" release="2.el7" arch="x86_64" src="">
					<filename>portainer-ce-0:2.32.0-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250828-07</id>
		<issued date="2025-08-28" />
		<updated date="2025-09-01" />
		<title>Уязвимость vault </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в vault</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vault-cve-2024-5798/</description>
               <solution>
                    Запретить использование в ОС пакета vault
                или
                    Установить обновление для пакета(ов) vault
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vault-cve-2024-5798/" type="self" id="ROS-20250828-07" title="ROS-20250828-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5798" type="cve" id="CVE-2024-5798" title="CVE-2024-5798" />
			<reference href="https://bdu.fstec.ru/vul/2025-10836" type="self" id="BDU:2025-10836" title="BDU:2025-10836" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vault" epoch="0" version="1.17.5" release="1.el7" arch="x86_64" src="">
					<filename>vault-0:1.17.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250829-01</id>
		<issued date="2025-08-29" />
		<updated date="2025-08-29" />
		<title>Уязвимость cifs-utils </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в cifs-utils</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cifs-utils-cve-2022-27239/</description>
               <solution>
                    Запретить использование в ОС пакета cifs-utils
                или
                    Установить обновление для пакета(ов) cifs-utils
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cifs-utils-cve-2022-27239/" type="self" id="ROS-20250829-01" title="ROS-20250829-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27239" type="cve" id="CVE-2022-27239" title="CVE-2022-27239" />
			<reference href="https://bdu.fstec.ru/vul/2022-04338" type="self" id="BDU:2022-04338" title="BDU:2022-04338" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cifs-utils" epoch="0" version="6.15" release="1.el7" arch="x86_64" src="">
					<filename>cifs-utils-0:6.15-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250829-02</id>
		<issued date="2025-08-29" />
		<updated date="2025-08-29" />
		<title>Множественные уязвимости ImageMagick </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ImageMagick</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-imagemagick-cve-2025-55004-cve-2025-55005-cve-2025-55154-cve-2025-55160/</description>
               <solution>
                    Запретить использование в ОС пакета ImageMagick
                или
                    Установить обновление для пакета(ов) ImageMagick
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-imagemagick-cve-2025-55004-cve-2025-55005-cve-2025-55154-cve-2025-55160/" type="self" id="ROS-20250829-02" title="ROS-20250829-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55004" type="cve" id="CVE-2025-55004" title="CVE-2025-55004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55005" type="cve" id="CVE-2025-55005" title="CVE-2025-55005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55154" type="cve" id="CVE-2025-55154" title="CVE-2025-55154" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55160" type="cve" id="CVE-2025-55160" title="CVE-2025-55160" />
			<reference href="https://bdu.fstec.ru/vul/2025-10835" type="self" id="BDU:2025-10835" title="BDU:2025-10835" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ImageMagick" epoch="1" version="6.9.13.27" release="3.el7" arch="x86_64" src="">
					<filename>ImageMagick-1:6.9.13.27-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250829-03</id>
		<issued date="2025-08-29" />
		<updated date="2025-08-29" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2025-47907/</description>
               <solution>
                    Запретить использование в ОС пакета golang
                или
                    Установить обновление для пакета(ов) golang
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2025-47907/" type="self" id="ROS-20250829-03" title="ROS-20250829-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47907" type="cve" id="CVE-2025-47907" title="CVE-2025-47907" />
			<reference href="https://bdu.fstec.ru/vul/2025-10834" type="self" id="BDU:2025-10834" title="BDU:2025-10834" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.24.6" release="1.el7" arch="x86_64" src="">
					<filename>golang-0:1.24.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250829-04</id>
		<issued date="2025-08-29" />
		<updated date="2025-08-29" />
		<title>Уязвимость netavark </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в netavark</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-netavark-cve-2025-8283/</description>
               <solution>
                    Запретить использование в ОС пакета netavark
                или
                    Установить обновление для пакета(ов) netavark
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-netavark-cve-2025-8283/" type="self" id="ROS-20250829-04" title="ROS-20250829-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8283" type="cve" id="CVE-2025-8283" title="CVE-2025-8283" />
			<reference href="https://bdu.fstec.ru/vul/2025-10832" type="self" id="BDU:2025-10832" title="BDU:2025-10832" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="netavark" epoch="0" version="1.15.2" release="1.el7" arch="x86_64" src="">
					<filename>netavark-0:1.15.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250829-05</id>
		<issued date="2025-08-29" />
		<updated date="2025-08-29" />
		<title>Уязвимость bison </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в bison</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-bison-cve-2025-8733/</description>
               <solution>
                    Запретить использование в ОС пакета bison
                или
                    Установить обновление для пакета(ов) bison
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-bison-cve-2025-8733/" type="self" id="ROS-20250829-05" title="ROS-20250829-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8733" type="cve" id="CVE-2025-8733" title="CVE-2025-8733" />
			<reference href="https://bdu.fstec.ru/vul/2025-10833" type="self" id="BDU:2025-10833" title="BDU:2025-10833" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="bison" epoch="0" version="3.8.2" release="1.el7" arch="x86_64" src="">
					<filename>bison-0:3.8.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250829-06</id>
		<issued date="2025-08-29" />
		<updated date="2025-08-29" />
		<title>Уязвимость vault </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в vault</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vault-cve-2025-5999/</description>
               <solution>
                    Запретить использование в ОС пакета vault
                или
                    Установить обновление для пакета(ов) vault
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vault-cve-2025-5999/" type="self" id="ROS-20250829-06" title="ROS-20250829-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5999" type="cve" id="CVE-2025-5999" title="CVE-2025-5999" />
			<reference href="https://bdu.fstec.ru/vul/2025-09565" type="self" id="BDU:2025-09565" title="BDU:2025-09565" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vault" epoch="0" version="1.20.0" release="1.el7" arch="x86_64" src="">
					<filename>vault-0:1.20.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250829-07</id>
		<issued date="2025-08-29" />
		<updated date="2025-08-29" />
		<title>Уязвимость openjpeg2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openjpeg2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openjpeg2-cve-2025-50952/</description>
               <solution>
                    Запретить использование в ОС пакета openjpeg2
                или
                    Установить обновление для пакета(ов) openjpeg2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openjpeg2-cve-2025-50952/" type="self" id="ROS-20250829-07" title="ROS-20250829-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50952" type="cve" id="CVE-2025-50952" title="CVE-2025-50952" />
			<reference href="https://bdu.fstec.ru/vul/2025-10831" type="self" id="BDU:2025-10831" title="BDU:2025-10831" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openjpeg2" epoch="0" version="2.5.3" release="2.el7" arch="x86_64" src="">
					<filename>openjpeg2-0:2.5.3-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250902-01</id>
		<issued date="2025-09-02" />
		<updated date="2025-09-02" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-02082025/</description>
               <solution>
                    Установить обновление для пакета(ов) kernel-lt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-02082025/" type="self" id="ROS-20250902-01" title="ROS-20250902-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38430" type="cve" id="CVE-2025-38430" title="CVE-2025-38430" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38498" type="cve" id="CVE-2025-38498" title="CVE-2025-38498" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38428" type="cve" id="CVE-2025-38428" title="CVE-2025-38428" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38425" type="cve" id="CVE-2025-38425" title="CVE-2025-38425" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38424" type="cve" id="CVE-2025-38424" title="CVE-2025-38424" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38422" type="cve" id="CVE-2025-38422" title="CVE-2025-38422" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38420" type="cve" id="CVE-2025-38420" title="CVE-2025-38420" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38419" type="cve" id="CVE-2025-38419" title="CVE-2025-38419" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38418" type="cve" id="CVE-2025-38418" title="CVE-2025-38418" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38416" type="cve" id="CVE-2025-38416" title="CVE-2025-38416" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38415" type="cve" id="CVE-2025-38415" title="CVE-2025-38415" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38365" type="cve" id="CVE-2025-38365" title="CVE-2025-38365" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38363" type="cve" id="CVE-2025-38363" title="CVE-2025-38363" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38362" type="cve" id="CVE-2025-38362" title="CVE-2025-38362" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38354" type="cve" id="CVE-2025-38354" title="CVE-2025-38354" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38352" type="cve" id="CVE-2025-38352" title="CVE-2025-38352" />
			<reference href="https://bdu.fstec.ru/vul/2025-10952" type="self" id="BDU:2025-10952" title="BDU:2025-10952" />
			<reference href="https://bdu.fstec.ru/vul/2025-09314" type="self" id="BDU:2025-09314" title="BDU:2025-09314" />
			<reference href="https://bdu.fstec.ru/vul/2025-10953" type="self" id="BDU:2025-10953" title="BDU:2025-10953" />
			<reference href="https://bdu.fstec.ru/vul/2025-10954" type="self" id="BDU:2025-10954" title="BDU:2025-10954" />
			<reference href="https://bdu.fstec.ru/vul/2025-09720" type="self" id="BDU:2025-09720" title="BDU:2025-09720" />
			<reference href="https://bdu.fstec.ru/vul/2025-10955" type="self" id="BDU:2025-10955" title="BDU:2025-10955" />
			<reference href="https://bdu.fstec.ru/vul/2025-09137" type="self" id="BDU:2025-09137" title="BDU:2025-09137" />
			<reference href="https://bdu.fstec.ru/vul/2025-09123" type="self" id="BDU:2025-09123" title="BDU:2025-09123" />
			<reference href="https://bdu.fstec.ru/vul/2025-09125" type="self" id="BDU:2025-09125" title="BDU:2025-09125" />
			<reference href="https://bdu.fstec.ru/vul/2025-09124" type="self" id="BDU:2025-09124" title="BDU:2025-09124" />
			<reference href="https://bdu.fstec.ru/vul/2025-09134" type="self" id="BDU:2025-09134" title="BDU:2025-09134" />
			<reference href="https://bdu.fstec.ru/vul/2025-09255" type="self" id="BDU:2025-09255" title="BDU:2025-09255" />
			<reference href="https://bdu.fstec.ru/vul/2025-10956" type="self" id="BDU:2025-10956" title="BDU:2025-10956" />
			<reference href="https://bdu.fstec.ru/vul/2025-10957" type="self" id="BDU:2025-10957" title="BDU:2025-10957" />
			<reference href="https://bdu.fstec.ru/vul/2025-10958" type="self" id="BDU:2025-10958" title="BDU:2025-10958" />
			<reference href="https://bdu.fstec.ru/vul/2025-10870" type="self" id="BDU:2025-10870" title="BDU:2025-10870" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250903-01</id>
		<issued date="2025-09-03" />
		<updated date="2025-09-03" />
		<title>Множественные уязвимости libbson</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libbson</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libbson/</description>
               <solution>
                    Запретить использование в ОС пакета libbson
                или
                    Установить обновление для пакета(ов) libbson
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libbson/" type="self" id="ROS-20250903-01" title="ROS-20250903-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16790" type="cve" id="CVE-2018-16790" title="CVE-2018-16790" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0437" type="cve" id="CVE-2023-0437" title="CVE-2023-0437" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6381" type="cve" id="CVE-2024-6381" title="CVE-2024-6381" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6383" type="cve" id="CVE-2024-6383" title="CVE-2024-6383" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0755" type="cve" id="CVE-2025-0755" title="CVE-2025-0755" />
			<reference href="https://bdu.fstec.ru/vul/2025-11254" type="self" id="BDU:2025-11254" title="BDU:2025-11254" />
			<reference href="https://bdu.fstec.ru/vul/2024-02893" type="self" id="BDU:2024-02893" title="BDU:2024-02893" />
			<reference href="https://bdu.fstec.ru/vul/2024-07887" type="self" id="BDU:2024-07887" title="BDU:2024-07887" />
			<reference href="https://bdu.fstec.ru/vul/2025-11249" type="self" id="BDU:2025-11249" title="BDU:2025-11249" />
			<reference href="https://bdu.fstec.ru/vul/2025-03276" type="self" id="BDU:2025-03276" title="BDU:2025-03276" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libbson" epoch="0" version="1.30.0" release="1.el7" arch="x86_64" src="">
					<filename>libbson-0:1.30.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250903-02</id>
		<issued date="2025-09-03" />
		<updated date="2025-09-03" />
		<title>Уязвимость go-git </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в go-git</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-go-git-cve-2023-49569/</description>
               <solution>
                    Запретить использование в ОС пакета Go-git
                или
                    Установить обновление для пакета(ов) Go-git
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-go-git-cve-2023-49569/" type="self" id="ROS-20250903-02" title="ROS-20250903-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49569" type="cve" id="CVE-2023-49569" title="CVE-2023-49569" />
			<reference href="https://bdu.fstec.ru/vul/2025-11252" type="self" id="BDU:2025-11252" title="BDU:2025-11252" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="go-git" epoch="0" version="5.16.2" release="1.el7" arch="x86_64" src="">
					<filename>go-git-0:5.16.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250904-01</id>
		<issued date="2025-09-04" />
		<updated date="2025-09-04" />
		<title>Множественные уязвимости man2html </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в man2html</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-man2html-cve-2021-40648-cve-2021-40647/</description>
               <solution>
                    Запретить использование в ОС пакета man2html
                или
                    Установить обновление для пакета(ов) man2html
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-man2html-cve-2021-40648-cve-2021-40647/" type="self" id="ROS-20250904-01" title="ROS-20250904-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40648" type="cve" id="CVE-2021-40648" title="CVE-2021-40648" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40647" type="cve" id="CVE-2021-40647" title="CVE-2021-40647" />
			<reference href="https://bdu.fstec.ru/vul/2025-11276" type="self" id="BDU:2025-11276" title="BDU:2025-11276" />
			<reference href="https://bdu.fstec.ru/vul/2025-11258" type="self" id="BDU:2025-11258" title="BDU:2025-11258" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="man2html" epoch="0" version="1.6" release="1.el7" arch="x86_64" src="">
					<filename>man2html-0:1.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250904-02</id>
		<issued date="2025-09-04" />
		<updated date="2025-09-04" />
		<title>Уязвимость pcs </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в pcs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pcs-cve-2022-2735/</description>
               <solution>
                    Запретить использование в ОС пакета pcs
                или
                    Установить обновление для пакета(ов) pcs
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pcs-cve-2022-2735/" type="self" id="ROS-20250904-02" title="ROS-20250904-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2735" type="cve" id="CVE-2022-2735" title="CVE-2022-2735" />
			<reference href="https://bdu.fstec.ru/vul/2022-05554" type="self" id="BDU:2022-05554" title="BDU:2022-05554" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pcs" epoch="0" version="0.10.17" release="4.el7" arch="x86_64" src="">
					<filename>pcs-0:0.10.17-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250904-03</id>
		<issued date="2025-09-04" />
		<updated date="2025-09-04" />
		<title>Уязвимость openh264-libs </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в openh264-libs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openh264-libs-cve-2025-27091/</description>
               <solution>
                    Запретить использование в ОС пакета openh264-libs
                или
                    Установить обновление для пакета(ов) openh264-libs
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openh264-libs-cve-2025-27091/" type="self" id="ROS-20250904-03" title="ROS-20250904-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27091" type="cve" id="CVE-2025-27091" title="CVE-2025-27091" />
			<reference href="https://bdu.fstec.ru/vul/2025-02022" type="self" id="BDU:2025-02022" title="BDU:2025-02022" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openh264-libs" epoch="1" version="1.7.0" release="4.el7" arch="x86_64" src="">
					<filename>openh264-libs-1:1.7.0-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250904-04</id>
		<issued date="2025-09-04" />
		<updated date="2025-09-04" />
		<title>Уязвимость perl-CPAN </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в perl-CPAN</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-cpan-cve-2020-16156/</description>
               <solution>
                    Запретить использование в ОС пакета perl-CPAN
                или
                    Установить обновление для пакета(ов) perl-CPAN
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-cpan-cve-2020-16156/" type="self" id="ROS-20250904-04" title="ROS-20250904-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156" type="cve" id="CVE-2020-16156" title="CVE-2020-16156" />
			<reference href="https://bdu.fstec.ru/vul/2023-01694" type="self" id="BDU:2023-01694" title="BDU:2023-01694" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="perl-CPAN" epoch="0" version="2.38" release="1.el7" arch="noarch" src="">
					<filename>perl-CPAN-0:2.38-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250904-05</id>
		<issued date="2025-09-04" />
		<updated date="2025-09-04" />
		<title>Уязвимость dnsdist </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dnsdist</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dnsdist-cve-2025-30193/</description>
               <solution>
                    Запретить использование в ОС пакета dnsdist
                или
                    Установить обновление для пакета(ов) dnsdist
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dnsdist-cve-2025-30193/" type="self" id="ROS-20250904-05" title="ROS-20250904-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30193" type="cve" id="CVE-2025-30193" title="CVE-2025-30193" />
			<reference href="https://bdu.fstec.ru/vul/2025-11255" type="self" id="BDU:2025-11255" title="BDU:2025-11255" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dnsdist" epoch="0" version="1.9.10" release="1.el7" arch="x86_64" src="">
					<filename>dnsdist-0:1.9.10-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250904-06</id>
		<issued date="2025-09-04" />
		<updated date="2025-09-04" />
		<title>Уязвимость protobuf </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в protobuf</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-protobuf-cve-2025-4565/</description>
               <solution>
                    Запретить использование в ОС пакета protobuf
                или
                    Установить обновление для пакета(ов) protobuf
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-protobuf-cve-2025-4565/" type="self" id="ROS-20250904-06" title="ROS-20250904-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4565" type="cve" id="CVE-2025-4565" title="CVE-2025-4565" />
			<reference href="https://bdu.fstec.ru/vul/2025-10926" type="self" id="BDU:2025-10926" title="BDU:2025-10926" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="protobuf" epoch="0" version="3.19.6" release="4.el7" arch="x86_64" src="">
					<filename>protobuf-0:3.19.6-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250904-07</id>
		<issued date="2025-09-04" />
		<updated date="2025-09-04" />
		<title>Уязвимость tarantool </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в tarantool</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tarantool-cve-2025-6536/</description>
               <solution>
                    Запретить использование в ОС пакета tarantool
                или
                    Установить обновление для пакета(ов) tarantool
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tarantool-cve-2025-6536/" type="self" id="ROS-20250904-07" title="ROS-20250904-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6536" type="cve" id="CVE-2025-6536" title="CVE-2025-6536" />
			<reference href="https://bdu.fstec.ru/vul/2025-11257" type="self" id="BDU:2025-11257" title="BDU:2025-11257" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tarantool" epoch="0" version="2.11.7" release="1.el7" arch="x86_64" src="">
					<filename>tarantool-0:2.11.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250904-08</id>
		<issued date="2025-09-04" />
		<updated date="2025-09-04" />
		<title>Уязвимость tarantool3 </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в tarantool3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tarantool3-cve-2025-6536/</description>
               <solution>
                    Запретить использование в ОС пакета tarantool3
                или
                    Установить обновление для пакета(ов) tarantool3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tarantool3-cve-2025-6536/" type="self" id="ROS-20250904-08" title="ROS-20250904-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6536" type="cve" id="CVE-2025-6536" title="CVE-2025-6536" />
			<reference href="https://bdu.fstec.ru/vul/2025-11257" type="self" id="BDU:2025-11257" title="BDU:2025-11257" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tarantool3" epoch="0" version="3.4.1" release="1.el7" arch="x86_64" src="">
					<filename>tarantool3-0:3.4.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250904-09</id>
		<issued date="2025-09-04" />
		<updated date="2025-09-04" />
		<title>Уязвимость djvulibre </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в djvulibre</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-djvulibre-cve-2025-53367/</description>
               <solution>
                    Запретить использование в ОС пакета djvulibre
                или
                    Установить обновление для пакета(ов) djvulibre
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-djvulibre-cve-2025-53367/" type="self" id="ROS-20250904-09" title="ROS-20250904-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53367" type="cve" id="CVE-2025-53367" title="CVE-2025-53367" />
			<reference href="https://bdu.fstec.ru/vul/2025-11247" type="self" id="BDU:2025-11247" title="BDU:2025-11247" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="djvulibre" epoch="0" version="3.5.29" release="1.el7" arch="x86_64" src="">
					<filename>djvulibre-0:3.5.29-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250904-10</id>
		<issued date="2025-09-04" />
		<updated date="2025-09-04" />
		<title>Уязвимость dpkg </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dpkg</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dpkg-cve-2025-6297/</description>
               <solution>
                    Запретить использование в ОС пакета dpkg
                или
                    Установить обновление для пакета(ов) dpkg
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dpkg-cve-2025-6297/" type="self" id="ROS-20250904-10" title="ROS-20250904-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6297" type="cve" id="CVE-2025-6297" title="CVE-2025-6297" />
			<reference href="https://bdu.fstec.ru/vul/2025-11256" type="self" id="BDU:2025-11256" title="BDU:2025-11256" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dpkg" epoch="0" version="1.21.9" release="2.el7" arch="x86_64" src="">
					<filename>dpkg-0:1.21.9-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250904-11</id>
		<issued date="2025-09-04" />
		<updated date="2025-09-04" />
		<title>Уязвимость valkey </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в valkey</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-valkey-cve-2025-32023/</description>
               <solution>
                    Запретить использование в ОС пакета valkey
                или
                    Установить обновление для пакета(ов) valkey
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-valkey-cve-2025-32023/" type="self" id="ROS-20250904-11" title="ROS-20250904-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32023" type="cve" id="CVE-2025-32023" title="CVE-2025-32023" />
			<reference href="https://bdu.fstec.ru/vul/2025-08113" type="self" id="BDU:2025-08113" title="BDU:2025-08113" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="valkey" epoch="0" version="8.1.3" release="1.el7" arch="x86_64" src="">
					<filename>valkey-0:8.1.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250904-12</id>
		<issued date="2025-09-04" />
		<updated date="2025-09-04" />
		<title>Множественные уязвимости redis </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в redis</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-redis-cve-2025-46686-cve-2025-32023/</description>
               <solution>
                    Запретить использование в ОС пакета redis
                или
                    Установить обновление для пакета(ов) redis
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-redis-cve-2025-46686-cve-2025-32023/" type="self" id="ROS-20250904-12" title="ROS-20250904-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46686" type="cve" id="CVE-2025-46686" title="CVE-2025-46686" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32023" type="cve" id="CVE-2025-32023" title="CVE-2025-32023" />
			<reference href="https://bdu.fstec.ru/vul/2025-09083" type="self" id="BDU:2025-09083" title="BDU:2025-09083" />
			<reference href="https://bdu.fstec.ru/vul/2025-08113" type="self" id="BDU:2025-08113" title="BDU:2025-08113" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="redis" epoch="0" version="8.2.1" release="1.el7" arch="x86_64" src="">
					<filename>redis-0:8.2.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250905-01</id>
		<issued date="2025-09-05" />
		<updated date="2025-09-05" />
		<title>Уязвимость python3-glance-store </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-glance-store</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-glance-store-cve-2024-1141/</description>
               <solution>
                    Запретить использование в ОС пакета python3-glance-store
                или
                    Установить обновление для пакета(ов) python3-glance-store
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-glance-store-cve-2024-1141/" type="self" id="ROS-20250905-01" title="ROS-20250905-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1141" type="cve" id="CVE-2024-1141" title="CVE-2024-1141" />
			<reference href="https://bdu.fstec.ru/vul/2025-11275" type="self" id="BDU:2025-11275" title="BDU:2025-11275" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-glance-store" epoch="0" version="4.8.2" release="1.el7" arch="noarch" src="">
					<filename>python3-glance-store-0:4.8.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250905-02</id>
		<issued date="2025-09-05" />
		<updated date="2025-09-05" />
		<title>Уязвимость python3-twisted </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-twisted</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-twisted-cve-2023-46137/</description>
               <solution>
                    Запретить использование в ОС пакета python3-twisted
                или
                    Установить обновление для пакета(ов) python3-twisted
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-twisted-cve-2023-46137/" type="self" id="ROS-20250905-02" title="ROS-20250905-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46137" type="cve" id="CVE-2023-46137" title="CVE-2023-46137" />
			<reference href="https://bdu.fstec.ru/vul/2024-01299" type="self" id="BDU:2024-01299" title="BDU:2024-01299" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-twisted" epoch="0" version="20.3.0" release="2.el7" arch="x86_64" src="">
					<filename>python3-twisted-0:20.3.0-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250905-03</id>
		<issued date="2025-09-05" />
		<updated date="2025-09-05" />
		<title>Уязвимость screen </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в screen</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-screen-cve-2023-24626/</description>
               <solution>
                    Запретить использование в ОС пакета screen
                или
                    Установить обновление для пакета(ов) screen
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-screen-cve-2023-24626/" type="self" id="ROS-20250905-03" title="ROS-20250905-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24626" type="cve" id="CVE-2023-24626" title="CVE-2023-24626" />
			<reference href="https://bdu.fstec.ru/vul/2025-07702" type="self" id="BDU:2025-07702" title="BDU:2025-07702" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="screen" epoch="0" version="5.0.0" release="1.el7" arch="x86_64" src="">
					<filename>screen-0:5.0.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250905-04</id>
		<issued date="2025-09-05" />
		<updated date="2025-09-05" />
		<title>Уязвимость ceph </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ceph</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ceph-cve-2024-48916/</description>
               <solution>
                    Запретить использование в ОС пакета ceph
                или
                    Установить обновление для пакета(ов) ceph
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ceph-cve-2024-48916/" type="self" id="ROS-20250905-04" title="ROS-20250905-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48916" type="cve" id="CVE-2024-48916" title="CVE-2024-48916" />
			<reference href="https://bdu.fstec.ru/vul/2025-00001" type="self" id="BDU:2025-00001" title="BDU:2025-00001" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ceph" epoch="2" version="17.2.7" release="3.el7.3" arch="x86_64" src="">
					<filename>ceph-2:17.2.7-3.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250905-05</id>
		<issued date="2025-09-05" />
		<updated date="2025-09-05" />
		<title>Уязвимость valkey </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в valkey</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-valkey-cve-2025-48367/</description>
               <solution>
                    Запретить использование в ОС пакета valkey
                или
                    Установить обновление для пакета(ов) valkey
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-valkey-cve-2025-48367/" type="self" id="ROS-20250905-05" title="ROS-20250905-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48367" type="cve" id="CVE-2025-48367" title="CVE-2025-48367" />
			<reference href="https://bdu.fstec.ru/vul/2025-09081" type="self" id="BDU:2025-09081" title="BDU:2025-09081" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="valkey" epoch="0" version="8.1.3" release="1.el7" arch="x86_64" src="">
					<filename>valkey-0:8.1.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250905-06</id>
		<issued date="2025-09-05" />
		<updated date="2025-09-05" />
		<title>Уязвимость redis </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в redis</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-redis-cve-2025-48367/</description>
               <solution>
                    Запретить использование в ОС пакета redis
                или
                    Установить обновление для пакета(ов) redis
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-redis-cve-2025-48367/" type="self" id="ROS-20250905-06" title="ROS-20250905-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48367" type="cve" id="CVE-2025-48367" title="CVE-2025-48367" />
			<reference href="https://bdu.fstec.ru/vul/2025-09081" type="self" id="BDU:2025-09081" title="BDU:2025-09081" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="redis" epoch="0" version="8.2.1" release="1.el7" arch="x86_64" src="">
					<filename>redis-0:8.2.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250905-07</id>
		<issued date="2025-09-05" />
		<updated date="2025-09-05" />
		<title>Множественные уязвимости vault</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в vault</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vault-05092025/</description>
               <solution>
                    Запретить использование в ОС пакета vault
                или
                    Установить обновление для пакета(ов) vault
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vault-05092025/" type="self" id="ROS-20250905-07" title="ROS-20250905-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6011" type="cve" id="CVE-2025-6011" title="CVE-2025-6011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6004" type="cve" id="CVE-2025-6004" title="CVE-2025-6004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6014" type="cve" id="CVE-2025-6014" title="CVE-2025-6014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6015" type="cve" id="CVE-2025-6015" title="CVE-2025-6015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6037" type="cve" id="CVE-2025-6037" title="CVE-2025-6037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6013" type="cve" id="CVE-2025-6013" title="CVE-2025-6013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6000" type="cve" id="CVE-2025-6000" title="CVE-2025-6000" />
			<reference href="https://bdu.fstec.ru/vul/2025-11264" type="self" id="BDU:2025-11264" title="BDU:2025-11264" />
			<reference href="https://bdu.fstec.ru/vul/2025-09564" type="self" id="BDU:2025-09564" title="BDU:2025-09564" />
			<reference href="https://bdu.fstec.ru/vul/2025-11261" type="self" id="BDU:2025-11261" title="BDU:2025-11261" />
			<reference href="https://bdu.fstec.ru/vul/2025-11260" type="self" id="BDU:2025-11260" title="BDU:2025-11260" />
			<reference href="https://bdu.fstec.ru/vul/2025-09561" type="self" id="BDU:2025-09561" title="BDU:2025-09561" />
			<reference href="https://bdu.fstec.ru/vul/2025-09582" type="self" id="BDU:2025-09582" title="BDU:2025-09582" />
			<reference href="https://bdu.fstec.ru/vul/2025-09562" type="self" id="BDU:2025-09562" title="BDU:2025-09562" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vault" epoch="0" version="1.20.2" release="1.el7" arch="x86_64" src="">
					<filename>vault-0:1.20.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20231016-25</id>
		<issued date="2025-09-05" />
		<updated date="2025-09-05" />
		<title>Множественные уязвимости libcurl </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libcurl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libcurl-cve-2023-38546-cve-2023-385455367/</description>
               <solution>
                    Запретить использование в ОС пакета libcurl
                или
                    Установить обновление для пакета(ов) libcurl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libcurl-cve-2023-38546-cve-2023-385455367/" type="self" id="ROS-20231016-25" title="ROS-20231016-25" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38545" type="cve" id="CVE-2023-38545" title="CVE-2023-38545" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38546" type="cve" id="CVE-2023-38546" title="CVE-2023-38546" />
			<reference href="https://bdu.fstec.ru/vul/2023-06576" type="self" id="BDU:2023-06576" title="BDU:2023-06576" />
			<reference href="https://bdu.fstec.ru/vul/2023-06579" type="self" id="BDU:2023-06579" title="BDU:2023-06579" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libcurl" epoch="0" version="7.85.0" release="15.el7.3" arch="x86_64" src="">
					<filename>libcurl-0:7.85.0-15.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250905-08</id>
		<issued date="2025-09-05" />
		<updated date="2025-09-05" />
		<title>Множественные уязвимости helm </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в helm</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-helm-cve-2025-55199-cve-2025-55198/</description>
               <solution>
                    Запретить использование в ОС пакета helm
                или
                    Установить обновление для пакета(ов) helm
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-helm-cve-2025-55199-cve-2025-55198/" type="self" id="ROS-20250905-08" title="ROS-20250905-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55199" type="cve" id="CVE-2025-55199" title="CVE-2025-55199" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55198" type="cve" id="CVE-2025-55198" title="CVE-2025-55198" />
			<reference href="https://bdu.fstec.ru/vul/2025-11274" type="self" id="BDU:2025-11274" title="BDU:2025-11274" />
			<reference href="https://bdu.fstec.ru/vul/2025-11272" type="self" id="BDU:2025-11272" title="BDU:2025-11272" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="helm" epoch="0" version="3.12.3" release="4.el7" arch="x86_64" src="">
					<filename>helm-0:3.12.3-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250905-09</id>
		<issued date="2025-09-05" />
		<updated date="2025-09-05" />
		<title>Уязвимость ImageMagick </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ImageMagick</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick-cve-2025-57803/</description>
               <solution>
                    Запретить использование в ОС пакета ImageMagick
                или
                    Установить обновление для пакета(ов) ImageMagick
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick-cve-2025-57803/" type="self" id="ROS-20250905-09" title="ROS-20250905-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-57803" type="cve" id="CVE-2025-57803" title="CVE-2025-57803" />
			<reference href="https://bdu.fstec.ru/vul/2025-11265" type="self" id="BDU:2025-11265" title="BDU:2025-11265" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ImageMagick" epoch="1" version="6.9.13.28" release="1.el7" arch="x86_64" src="">
					<filename>ImageMagick-1:6.9.13.28-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250905-10</id>
		<issued date="2025-09-05" />
		<updated date="2025-09-05" />
		<title>Уязвимость ImageMagick7 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ImageMagick7</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick7-cve-2025-57803/</description>
               <solution>
                    Запретить использование в ОС пакета ImageMagick7
                или
                    Установить обновление для пакета(ов) ImageMagick7
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick7-cve-2025-57803/" type="self" id="ROS-20250905-10" title="ROS-20250905-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-57803" type="cve" id="CVE-2025-57803" title="CVE-2025-57803" />
			<reference href="https://bdu.fstec.ru/vul/2025-11265" type="self" id="BDU:2025-11265" title="BDU:2025-11265" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ImageMagick7" epoch="0" version="7.1.2.2" release="1.el7" arch="x86_64" src="">
					<filename>ImageMagick7-0:7.1.2.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250905-11</id>
		<issued date="2025-09-05" />
		<updated date="2025-09-05" />
		<title>Уязвимость mupdf </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mupdf</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mupdf-cve-2025-46206/</description>
               <solution>
                    Запретить использование в ОС пакета mupdf
                или
                    Установить обновление для пакета(ов) mupdf
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mupdf-cve-2025-46206/" type="self" id="ROS-20250905-11" title="ROS-20250905-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46206" type="cve" id="CVE-2025-46206" title="CVE-2025-46206" />
			<reference href="https://bdu.fstec.ru/vul/2025-11246" type="self" id="BDU:2025-11246" title="BDU:2025-11246" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mupdf" epoch="0" version="1.26.5" release="2.el7" arch="x86_64" src="">
					<filename>mupdf-0:1.26.5-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250905-12</id>
		<issued date="2025-09-05" />
		<updated date="2025-09-05" />
		<title>Уязвимость netty </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в netty</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-netty-cve-2025-55163/</description>
               <solution>
                    Запретить использование в ОС пакета netty
                или
                    Установить обновление для пакета(ов) netty
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-netty-cve-2025-55163/" type="self" id="ROS-20250905-12" title="ROS-20250905-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55163" type="cve" id="CVE-2025-55163" title="CVE-2025-55163" />
			<reference href="https://bdu.fstec.ru/vul/2025-10993" type="self" id="BDU:2025-10993" title="BDU:2025-10993" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="netty" epoch="0" version="4.1.124" release="1.el7" arch="x86_64" src="">
					<filename>netty-0:4.1.124-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220516-30</id>
		<issued date="2025-09-08" />
		<updated date="2025-09-08" />
		<title>Множественные уязвимости libcURL</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в libcurl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-lubcurl-cve-2022-27776-cve-2022-27775-cve-2022-27774-cve-2022-225766444/</description>
               <solution>
                    Запретить использование в ОС пакета libcURL
                или
                    Установить обновление для пакета(ов) libcURL
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-lubcurl-cve-2022-27776-cve-2022-27775-cve-2022-27774-cve-2022-225766444/" type="self" id="ROS-20220516-30" title="ROS-20220516-30" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776" type="cve" id="CVE-2022-27776" title="CVE-2022-27776" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775" type="cve" id="CVE-2022-27775" title="CVE-2022-27775" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774" type="cve" id="CVE-2022-27774" title="CVE-2022-27774" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576" type="cve" id="CVE-2022-22576" title="CVE-2022-22576" />
			<reference href="https://bdu.fstec.ru/vul/2022-03040" type="self" id="BDU:2022-03040" title="BDU:2022-03040" />
			<reference href="https://bdu.fstec.ru/vul/2022-03038" type="self" id="BDU:2022-03038" title="BDU:2022-03038" />
			<reference href="https://bdu.fstec.ru/vul/2022-03041" type="self" id="BDU:2022-03041" title="BDU:2022-03041" />
			<reference href="https://bdu.fstec.ru/vul/2022-03036" type="self" id="BDU:2022-03036" title="BDU:2022-03036" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libcurl" epoch="0" version="7.81.0" release="2.el7.3" arch="x86_64" src="">
					<filename>libcurl-0:7.81.0-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20220524-21</id>
		<issued date="2025-09-08" />
		<updated date="2025-09-09" />
		<title>Множественные уязвимости libcURL</title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в libcurl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libcurl-cve-2022-30115-cve-2022-27782-cve-2022-27781-cve-2022-27780-cve-2022359/</description>
               <solution>
                    Запретить использование в ОС пакета libcURL
                или
                    Установить обновление для пакета(ов) libcURL
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libcurl-cve-2022-30115-cve-2022-27782-cve-2022-27781-cve-2022-27780-cve-2022359/" type="self" id="ROS-20220524-21" title="ROS-20220524-21" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30115" type="cve" id="CVE-2022-30115" title="CVE-2022-30115" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782" type="cve" id="CVE-2022-27782" title="CVE-2022-27782" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781" type="cve" id="CVE-2022-27781" title="CVE-2022-27781" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27780" type="cve" id="CVE-2022-27780" title="CVE-2022-27780" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27779" type="cve" id="CVE-2022-27779" title="CVE-2022-27779" />
			<reference href="https://bdu.fstec.ru/vul/2022-03187" type="self" id="BDU:2022-03187" title="BDU:2022-03187" />
			<reference href="https://bdu.fstec.ru/vul/2022-03185" type="self" id="BDU:2022-03185" title="BDU:2022-03185" />
			<reference href="https://bdu.fstec.ru/vul/2022-03180" type="self" id="BDU:2022-03180" title="BDU:2022-03180" />
			<reference href="https://bdu.fstec.ru/vul/2022-03184" type="self" id="BDU:2022-03184" title="BDU:2022-03184" />
			<reference href="https://bdu.fstec.ru/vul/2022-03178" type="self" id="BDU:2022-03178" title="BDU:2022-03178" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libcurl" epoch="0" version="7.81.0" release="3.el7.3" arch="x86_64" src="">
					<filename>libcurl-0:7.81.0-3.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221108-21</id>
		<issued date="2025-09-08" />
		<updated date="2025-09-08" />
		<title>Множественные уязвимости libcURL</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в libcurl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libcurl-cve-2022-42916-cve-2022-429155295/</description>
               <solution>
                    Запретить использование в ОС пакета libcURL
                или
                    Установить обновление для пакета(ов) libcURL
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libcurl-cve-2022-42916-cve-2022-429155295/" type="self" id="ROS-20221108-21" title="ROS-20221108-21" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42916" type="cve" id="CVE-2022-42916" title="CVE-2022-42916" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42915" type="cve" id="CVE-2022-42915" title="CVE-2022-42915" />
			<reference href="https://bdu.fstec.ru/vul/2022-06692" type="self" id="BDU:2022-06692" title="BDU:2022-06692" />
			<reference href="https://bdu.fstec.ru/vul/2022-06691" type="self" id="BDU:2022-06691" title="BDU:2022-06691" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libcurl" epoch="0" version="7.81.0" release="5.el7.3" arch="x86_64" src="">
					<filename>libcurl-0:7.81.0-5.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221007-21</id>
		<issued date="2025-09-08" />
		<updated date="2025-09-08" />
		<title>Уязвимость libcURL </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в libcurl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libcurl-cve-2022-35252270/</description>
               <solution>
                    Запретить использование в ОС пакета libcURL
                или
                    Установить обновление для пакета(ов) libcURL
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libcurl-cve-2022-35252270/" type="self" id="ROS-20221007-21" title="ROS-20221007-21" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35252" type="cve" id="CVE-2022-35252" title="CVE-2022-35252" />
			<reference href="https://bdu.fstec.ru/vul/2022-06193" type="self" id="BDU:2022-06193" title="BDU:2022-06193" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libcurl" epoch="0" version="7.81.0" release="4.el7.3" arch="x86_64" src="">
					<filename>libcurl-0:7.81.0-4.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20221222-22</id>
		<issued date="2025-09-08" />
		<updated date="2025-09-08" />
		<title>Множественные уязвимости libcURL</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в libcurl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libcurl-cve-2022-35260-cve-2022-322217835/</description>
               <solution>
                    Запретить использование в ОС пакета libcURL
                или
                    Установить обновление для пакета(ов) libcURL
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libcurl-cve-2022-35260-cve-2022-322217835/" type="self" id="ROS-20221222-22" title="ROS-20221222-22" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221" type="cve" id="CVE-2022-32221" title="CVE-2022-32221" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35260" type="cve" id="CVE-2022-35260" title="CVE-2022-35260" />
			<reference href="https://bdu.fstec.ru/vul/2022-07403" type="self" id="BDU:2022-07403" title="BDU:2022-07403" />
			<reference href="https://bdu.fstec.ru/vul/2022-07404" type="self" id="BDU:2022-07404" title="BDU:2022-07404" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libcurl" epoch="0" version="7.81.0" release="7.el7.3" arch="x86_64" src="">
					<filename>libcurl-0:7.81.0-7.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230406-21</id>
		<issued date="2025-09-08" />
		<updated date="2025-09-08" />
		<title>Множественные уязвимости libcurl </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в libcurl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libcurl-cve-2023-27534-cve-2023-275334450/</description>
               <solution>
                    Запретить использование в ОС пакета libcURL 
                или
                    Установить обновление для пакета(ов) libcURL 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libcurl-cve-2023-27534-cve-2023-275334450/" type="self" id="ROS-20230406-21" title="ROS-20230406-21" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27534" type="cve" id="CVE-2023-27534" title="CVE-2023-27534" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27533" type="cve" id="CVE-2023-27533" title="CVE-2023-27533" />
			<reference href="https://bdu.fstec.ru/vul/2023-02107" type="self" id="BDU:2023-02107" title="BDU:2023-02107" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libcurl" epoch="0" version="7.81.0" release="9.el7.3" arch="x86_64" src="">
					<filename>libcurl-0:7.81.0-9.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230621-24</id>
		<issued date="2025-09-08" />
		<updated date="2025-09-08" />
		<title>Множественные уязвимости libCurl </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libcurl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libcurl-cve-2023-28319-cve-2023-28321-cve-2023-283223017/</description>
               <solution>
                    Запретить использование в ОС пакета libcURL 
                или
                    Установить обновление для пакета(ов) libcURL 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libcurl-cve-2023-28319-cve-2023-28321-cve-2023-283223017/" type="self" id="ROS-20230621-24" title="ROS-20230621-24" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28319" type="cve" id="CVE-2023-28319" title="CVE-2023-28319" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28320" type="cve" id="CVE-2023-28320" title="CVE-2023-28320" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28321" type="cve" id="CVE-2023-28321" title="CVE-2023-28321" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28322" type="cve" id="CVE-2023-28322" title="CVE-2023-28322" />
			<reference href="https://bdu.fstec.ru/vul/2023-03622" type="self" id="BDU:2023-03622" title="BDU:2023-03622" />
			<reference href="https://bdu.fstec.ru/vul/2023-03612" type="self" id="BDU:2023-03612" title="BDU:2023-03612" />
			<reference href="https://bdu.fstec.ru/vul/2023-03648" type="self" id="BDU:2023-03648" title="BDU:2023-03648" />
			<reference href="https://bdu.fstec.ru/vul/2023-02895" type="self" id="BDU:2023-02895" title="BDU:2023-02895" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libcurl" epoch="0" version="7.81.0" release="10.el7.3" arch="x86_64" src="">
					<filename>libcurl-0:7.81.0-10.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230414-23</id>
		<issued date="2025-09-08" />
		<updated date="2025-09-08" />
		<title>Уязвимость libcurl </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libcurl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libcurl-cve-2022-435513820/</description>
               <solution>
                    Запретить использование в ОС пакета libcURL 
                или
                    Установить обновление для пакета(ов) libcURL 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libcurl-cve-2022-435513820/" type="self" id="ROS-20230414-23" title="ROS-20230414-23" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43551" type="cve" id="CVE-2022-43551" title="CVE-2022-43551" />
			<reference href="https://bdu.fstec.ru/vul/2023-02157" type="self" id="BDU:2023-02157" title="BDU:2023-02157" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libcurl" epoch="0" version="7.81.0" release="9.el7.3" arch="x86_64" src="">
					<filename>libcurl-0:7.81.0-9.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230414-24</id>
		<issued date="2025-09-08" />
		<updated date="2025-09-08" />
		<title>Уязвимость libcurl</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libcurl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libcurl-cve-2022-435525644/</description>
               <solution>
                    Запретить использование в ОС пакета libcURL 
                или
                    Установить обновление для пакета(ов) libcURL 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libcurl-cve-2022-435525644/" type="self" id="ROS-20230414-24" title="ROS-20230414-24" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552" type="cve" id="CVE-2022-43552" title="CVE-2022-43552" />
			<reference href="https://bdu.fstec.ru/vul/2024-07332" type="self" id="BDU:2024-07332" title="BDU:2024-07332" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libcurl" epoch="0" version="7.81.0" release="9.el7.3" arch="x86_64" src="">
					<filename>libcurl-0:7.81.0-9.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230417-25</id>
		<issued date="2025-09-08" />
		<updated date="2025-09-08" />
		<title>Уязвимость libcurl </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в libcurl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libcurl-cve-2023-239144879/</description>
               <solution>
                    Запретить использование в ОС пакета libcurl 
                или
                    Установить обновление для пакета(ов) libcurl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libcurl-cve-2023-239144879/" type="self" id="ROS-20230417-25" title="ROS-20230417-25" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23914" type="cve" id="CVE-2023-23914" title="CVE-2023-23914" />
			<reference href="https://bdu.fstec.ru/vul/2023-02154" type="self" id="BDU:2023-02154" title="BDU:2023-02154" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libcurl" epoch="0" version="7.81.0" release="9.el7.3" arch="x86_64" src="">
					<filename>libcurl-0:7.81.0-9.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240328-31</id>
		<issued date="2025-09-08" />
		<updated date="2025-09-08" />
		<title>Уязвимость libcurl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libcurl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libcurl-cve-2023-462187792/</description>
               <solution>
                    Запретить использование в ОС пакета libcurl
                или
                    Установить обновление для пакета(ов) libcurl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libcurl-cve-2023-462187792/" type="self" id="ROS-20240328-31" title="ROS-20240328-31" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46218" type="cve" id="CVE-2023-46218" title="CVE-2023-46218" />
			<reference href="https://bdu.fstec.ru/vul/2024-02420" type="self" id="BDU:2024-02420" title="BDU:2024-02420" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libcurl" epoch="0" version="7.85.0" release="17.el7.3" arch="x86_64" src="">
					<filename>libcurl-0:7.85.0-17.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240708-21</id>
		<issued date="2025-09-08" />
		<updated date="2025-09-08" />
		<title>Множественные уязвимости libcurl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libcurl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libcurl-cve-2024-2398-cve-2024-20048716/</description>
               <solution>
                    Запретить использование в ОС пакета libcurl
                или
                    Установить обновление для пакета(ов) libcurl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libcurl-cve-2024-2398-cve-2024-20048716/" type="self" id="ROS-20240708-21" title="ROS-20240708-21" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2398" type="cve" id="CVE-2024-2398" title="CVE-2024-2398" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2004" type="cve" id="CVE-2024-2004" title="CVE-2024-2004" />
			<reference href="https://bdu.fstec.ru/vul/2024-02723" type="self" id="BDU:2024-02723" title="BDU:2024-02723" />
			<reference href="https://bdu.fstec.ru/vul/2024-02723" type="self" id="BDU:2024-02723" title="BDU:2024-02723" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libcurl" epoch="0" version="7.85.0" release="19.el7.3" arch="x86_64" src="">
					<filename>libcurl-0:7.85.0-19.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240704-28</id>
		<issued date="2025-09-08" />
		<updated date="2025-09-08" />
		<title>Уязвимость libcurl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libcurl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libcurl-cve-2023-462199946/</description>
               <solution>
                    Запретить использование в ОС пакета libcurl
                или
                    Установить обновление для пакета(ов) libcurl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libcurl-cve-2023-462199946/" type="self" id="ROS-20240704-28" title="ROS-20240704-28" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46219" type="cve" id="CVE-2023-46219" title="CVE-2023-46219" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libcurl" epoch="0" version="7.85.0" release="19.el7.3" arch="x86_64" src="">
					<filename>libcurl-0:7.85.0-19.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240812-34</id>
		<issued date="2025-09-08" />
		<updated date="2025-09-08" />
		<title>Уязвимость libcurl </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libcurl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libcurl-cve-2024-61973464/</description>
               <solution>
                    Запретить использование в ОС пакета libcurl
                или
                    Установить обновление для пакета(ов) libcurl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libcurl-cve-2024-61973464/" type="self" id="ROS-20240812-34" title="ROS-20240812-34" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6197" type="cve" id="CVE-2024-6197" title="CVE-2024-6197" />
			<reference href="https://bdu.fstec.ru/vul/2024-06023" type="self" id="BDU:2024-06023" title="BDU:2024-06023" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libcurl" epoch="0" version="7.85.0" release="20.el7.3" arch="x86_64" src="">
					<filename>libcurl-0:7.85.0-20.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20240816-22</id>
		<issued date="2025-09-08" />
		<updated date="2025-09-08" />
		<title>Уязвимость libcurl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libcurl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libcurl-cve-2024-72642536/</description>
               <solution>
                    Запретить использование в ОС пакета libcurl
                или
                    Установить обновление для пакета(ов) libcurl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libcurl-cve-2024-72642536/" type="self" id="ROS-20240816-22" title="ROS-20240816-22" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7264" type="cve" id="CVE-2024-7264" title="CVE-2024-7264" />
			<reference href="https://bdu.fstec.ru/vul/2024-05923" type="self" id="BDU:2024-05923" title="BDU:2024-05923" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libcurl" epoch="0" version="7.85.0" release="21.el7.3" arch="x86_64" src="">
					<filename>libcurl-0:7.85.0-21.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250424-25</id>
		<issued date="2025-09-08" />
		<updated date="2025-09-08" />
		<title>Множественные уязвимости libcurl </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в libcurl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libcurl-cve-2025-0167-cve-2024-110535450/</description>
               <solution>
                    Запретить использование в ОС пакета libcurl
                или
                    Установить обновление для пакета(ов) libcurl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libcurl-cve-2025-0167-cve-2024-110535450/" type="self" id="ROS-20250424-25" title="ROS-20250424-25" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0167" type="cve" id="CVE-2025-0167" title="CVE-2025-0167" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11053" type="cve" id="CVE-2024-11053" title="CVE-2024-11053" />
			<reference href="https://bdu.fstec.ru/vul/2025-05209" type="self" id="BDU:2025-05209" title="BDU:2025-05209" />
			<reference href="https://bdu.fstec.ru/vul/2024-11106" type="self" id="BDU:2024-11106" title="BDU:2024-11106" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libcurl" epoch="0" version="7.86.0" release="4.el7" arch="x86_64" src="">
					<filename>libcurl-0:7.86.0-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241203-32</id>
		<issued date="2025-09-08" />
		<updated date="2025-09-08" />
		<title>Уязвимость libcurl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libcurl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libcurl-cve-2024-96818935/</description>
               <solution>
                    Запретить использование в ОС пакета libcurl
                или
                    Установить обновление для пакета(ов) libcurl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libcurl-cve-2024-96818935/" type="self" id="ROS-20241203-32" title="ROS-20241203-32" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9681" type="cve" id="CVE-2024-9681" title="CVE-2024-9681" />
			<reference href="https://bdu.fstec.ru/vul/2024-09106" type="self" id="BDU:2024-09106" title="BDU:2024-09106" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libcurl" epoch="0" version="7.85.0" release="23.el7.3" arch="x86_64" src="">
					<filename>libcurl-0:7.85.0-23.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20241001-29</id>
		<issued date="2025-09-08" />
		<updated date="2025-09-08" />
		<title>Уязвимость libcurl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libcurl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libcurl-cve-2024-80962704/</description>
               <solution>
                    Запретить использование в ОС пакета libcURL 
                или
                    Установить обновление для пакета(ов) libcURL 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libcurl-cve-2024-80962704/" type="self" id="ROS-20241001-29" title="ROS-20241001-29" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8096" type="cve" id="CVE-2024-8096" title="CVE-2024-8096" />
			<reference href="https://bdu.fstec.ru/vul/2024-07774" type="self" id="BDU:2024-07774" title="BDU:2024-07774" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libcurl" epoch="0" version="7.85.0" release="22.el7.3" arch="x86_64" src="">
					<filename>libcurl-0:7.85.0-22.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250226-34</id>
		<issued date="2025-09-08" />
		<updated date="2025-09-08" />
		<title>Множественные уязвимости libcurl </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libcurl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libcurl-cve-2025-0665-cve-2025-0725277/</description>
               <solution>
                    Запретить использование в ОС пакета libcurl
                или
                    Установить обновление для пакета(ов) libcurl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libcurl-cve-2025-0665-cve-2025-0725277/" type="self" id="ROS-20250226-34" title="ROS-20250226-34" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0665" type="cve" id="CVE-2025-0665" title="CVE-2025-0665" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0725" type="cve" id="CVE-2025-0725" title="CVE-2025-0725" />
			<reference href="https://bdu.fstec.ru/vul/2025-02320" type="self" id="BDU:2025-02320" title="BDU:2025-02320" />
			<reference href="https://bdu.fstec.ru/vul/2025-01585" type="self" id="BDU:2025-01585" title="BDU:2025-01585" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libcurl" epoch="0" version="7.86.0" release="2.el7" arch="x86_64" src="">
					<filename>libcurl-0:7.86.0-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20230407-21</id>
		<issued date="2025-09-08" />
		<updated date="2025-09-09" />
		<title>Множественные уязвимости curl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-curl-cve-2023-27538-cve-2023-27537-cve-2023-27536-cve-2023-275355269/</description>
               <solution>
                    Запретить использование в ОС пакета curl
                или
                    Установить обновление для пакета(ов) curl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-curl-cve-2023-27538-cve-2023-27537-cve-2023-27536-cve-2023-275355269/" type="self" id="ROS-20230407-21" title="ROS-20230407-21" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27538" type="cve" id="CVE-2023-27538" title="CVE-2023-27538" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27535" type="cve" id="CVE-2023-27535" title="CVE-2023-27535" />
			<reference href="https://bdu.fstec.ru/vul/2023-02103" type="self" id="BDU:2023-02103" title="BDU:2023-02103" />
			<reference href="https://bdu.fstec.ru/vul/2023-02106" type="self" id="BDU:2023-02106" title="BDU:2023-02106" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="curl" epoch="0" version="7.81.0" release="9.el7.3" arch="x86_64" src="">
					<filename>curl-0:7.81.0-9.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250804-21</id>
		<issued date="2025-09-08" />
		<updated date="2025-09-08" />
		<title>Уязвимость curl </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2023-380397479/</description>
               <solution>
                    Запретить использование в ОС пакета curl
                или
                    Установить обновление для пакета(ов) curl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2023-380397479/" type="self" id="ROS-20250804-21" title="ROS-20250804-21" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38039" type="cve" id="CVE-2023-38039" title="CVE-2023-38039" />
			<reference href="https://bdu.fstec.ru/vul/2023-05819" type="self" id="BDU:2023-05819" title="BDU:2023-05819" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="curl" epoch="0" version="7.85.0" release="23.el7.3" arch="x86_64" src="">
					<filename>curl-0:7.85.0-23.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250908-01</id>
		<issued date="2025-09-08" />
		<updated date="2025-09-08" />
		<title>Уязвимость expat </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в expat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-expat-cve-2013-0340/</description>
               <solution>
                    Запретить использование в ОС пакета expat
                или
                    Установить обновление для пакета(ов) expat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-expat-cve-2013-0340/" type="self" id="ROS-20250908-01" title="ROS-20250908-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0340" type="cve" id="CVE-2013-0340" title="CVE-2013-0340" />
			<reference href="https://bdu.fstec.ru/vul/2023-09069" type="self" id="BDU:2023-09069" title="BDU:2023-09069" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="expat" epoch="0" version="2.4.1" release="1.el7" arch="x86_64" src="">
					<filename>expat-0:2.4.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250908-02</id>
		<issued date="2025-09-08" />
		<updated date="2025-09-08" />
		<title>Уязвимость expat </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в expat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-expat-cve-2022-40674/</description>
               <solution>
                    Запретить использование в ОС пакета expat
                или
                    Установить обновление для пакета(ов) expat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-expat-cve-2022-40674/" type="self" id="ROS-20250908-02" title="ROS-20250908-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40674" type="cve" id="CVE-2022-40674" title="CVE-2022-40674" />
			<reference href="https://bdu.fstec.ru/vul/2023-02596" type="self" id="BDU:2023-02596" title="BDU:2023-02596" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="expat" epoch="0" version="2.5.0" release="1.el7" arch="x86_64" src="">
					<filename>expat-0:2.5.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250908-03</id>
		<issued date="2025-09-08" />
		<updated date="2025-09-08" />
		<title>Уязвимость java-1.8.0-openjdk CVE-2025-30698)</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в java-1.8.0-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-1-8-0-openjdk-cve-2025-30698/</description>
               <solution>
                    Запретить использование в ОС пакета java-1.8.0-openjdk
                или
                    Установить обновление для пакета(ов) java-1.8.0-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-1-8-0-openjdk-cve-2025-30698/" type="self" id="ROS-20250908-03" title="ROS-20250908-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30698" type="cve" id="CVE-2025-30698" title="CVE-2025-30698" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-1.8.0-openjdk" epoch="1" version="1.8.0.452.b09" release="1.el7" arch="x86_64" src="">
					<filename>java-1.8.0-openjdk-1:1.8.0.452.b09-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250908-04</id>
		<issued date="2025-09-08" />
		<updated date="2025-09-08" />
		<title>Уязвимость java-11-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в java-11-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-11-openjdk-cve-2025-30698/</description>
               <solution>
                    Запретить использование в ОС пакета java-11-openjdk
                или
                    Установить обновление для пакета(ов) java-11-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-11-openjdk-cve-2025-30698/" type="self" id="ROS-20250908-04" title="ROS-20250908-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30698" type="cve" id="CVE-2025-30698" title="CVE-2025-30698" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-11-openjdk" epoch="1" version="11.0.27.0.6" release="1.el7" arch="x86_64" src="">
					<filename>java-11-openjdk-1:11.0.27.0.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250908-05</id>
		<issued date="2025-09-08" />
		<updated date="2025-09-08" />
		<title>Уязвимость java-17-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в java-17-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-17-openjdk-cve-2025-30698/</description>
               <solution>
                    Запретить использование в ОС пакета java-17-openjdk
                или
                    Установить обновление для пакета(ов) java-17-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-17-openjdk-cve-2025-30698/" type="self" id="ROS-20250908-05" title="ROS-20250908-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30698" type="cve" id="CVE-2025-30698" title="CVE-2025-30698" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-17-openjdk" epoch="1" version="17.0.15.0.6" release="1.el7" arch="x86_64" src="">
					<filename>java-17-openjdk-1:17.0.15.0.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250908-06</id>
		<issued date="2025-09-08" />
		<updated date="2025-09-08" />
		<title>Множественные уязвимости java-21-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в java-21-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-21-openjdk-cve-2025-30691-cve-2025-30698/</description>
               <solution>
                    Запретить использование в ОС пакета java-21-openjdk
                или
                    Установить обновление для пакета(ов) java-21-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-21-openjdk-cve-2025-30691-cve-2025-30698/" type="self" id="ROS-20250908-06" title="ROS-20250908-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30698" type="cve" id="CVE-2025-30698" title="CVE-2025-30698" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30691" type="cve" id="CVE-2025-30691" title="CVE-2025-30691" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-21-openjdk" epoch="1" version="21.0.7.0.6" release="1.el7" arch="x86_64" src="">
					<filename>java-21-openjdk-1:21.0.7.0.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250908-07</id>
		<issued date="2025-09-08" />
		<updated date="2025-09-08" />
		<title>Множественные уязвимости java-1.8.0-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в java-1.8.0-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-1-8-0-openjdk-cve-2025-30761-cve-2025-30754/</description>
               <solution>
                    Запретить использование в ОС пакета java-1.8.0-openjdk
                или
                    Установить обновление для пакета(ов) java-1.8.0-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-1-8-0-openjdk-cve-2025-30761-cve-2025-30754/" type="self" id="ROS-20250908-07" title="ROS-20250908-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30754" type="cve" id="CVE-2025-30754" title="CVE-2025-30754" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30761" type="cve" id="CVE-2025-30761" title="CVE-2025-30761" />
			<reference href="https://bdu.fstec.ru/vul/2025-09723" type="self" id="BDU:2025-09723" title="BDU:2025-09723" />
			<reference href="https://bdu.fstec.ru/vul/2025-09730" type="self" id="BDU:2025-09730" title="BDU:2025-09730" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-1.8.0-openjdk" epoch="1" version="1.8.0.462.b08" release="1.el7" arch="x86_64" src="">
					<filename>java-1.8.0-openjdk-1:1.8.0.462.b08-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250908-08</id>
		<issued date="2025-09-08" />
		<updated date="2025-09-08" />
		<title>Множественные уязвимости java-11-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в java-11-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-11-openjdk-cve-2025-30761-cve-2025-30754/</description>
               <solution>
                    Запретить использование в ОС пакета java-11-openjdk
                или
                    Установить обновление для пакета(ов) java-11-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-11-openjdk-cve-2025-30761-cve-2025-30754/" type="self" id="ROS-20250908-08" title="ROS-20250908-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30754" type="cve" id="CVE-2025-30754" title="CVE-2025-30754" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30761" type="cve" id="CVE-2025-30761" title="CVE-2025-30761" />
			<reference href="https://bdu.fstec.ru/vul/2025-09723" type="self" id="BDU:2025-09723" title="BDU:2025-09723" />
			<reference href="https://bdu.fstec.ru/vul/2025-09730" type="self" id="BDU:2025-09730" title="BDU:2025-09730" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-11-openjdk" epoch="1" version="11.0.28.0.6" release="1.el7" arch="x86_64" src="">
					<filename>java-11-openjdk-1:11.0.28.0.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250908-09</id>
		<issued date="2025-09-08" />
		<updated date="2025-09-08" />
		<title>Уязвимость java-17-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в java-17-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-17-openjdk-cve-2025-30754/</description>
               <solution>
                    Запретить использование в ОС пакета java-17-openjdk
                или
                    Установить обновление для пакета(ов) java-17-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-17-openjdk-cve-2025-30754/" type="self" id="ROS-20250908-09" title="ROS-20250908-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30754" type="cve" id="CVE-2025-30754" title="CVE-2025-30754" />
			<reference href="https://bdu.fstec.ru/vul/2025-09723" type="self" id="BDU:2025-09723" title="BDU:2025-09723" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-17-openjdk" epoch="1" version="17.0.16.0.8" release="1.el7" arch="x86_64" src="">
					<filename>java-17-openjdk-1:17.0.16.0.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250908-10</id>
		<issued date="2025-09-08" />
		<updated date="2025-09-08" />
		<title>Уязвимость java-21-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в java-21-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-21-openjdk-cve-2025-30754/</description>
               <solution>
                    Запретить использование в ОС пакета java-21-openjdk
                или
                    Установить обновление для пакета(ов) java-21-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-21-openjdk-cve-2025-30754/" type="self" id="ROS-20250908-10" title="ROS-20250908-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30754" type="cve" id="CVE-2025-30754" title="CVE-2025-30754" />
			<reference href="https://bdu.fstec.ru/vul/2025-09723" type="self" id="BDU:2025-09723" title="BDU:2025-09723" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-21-openjdk" epoch="1" version="21.0.8.0.9" release="1.el7" arch="x86_64" src="">
					<filename>java-21-openjdk-1:21.0.8.0.9-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250908-11</id>
		<issued date="2025-09-08" />
		<updated date="2025-09-08" />
		<title>Уязвимость ruby </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ruby</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ruby-cve-2025-24294/</description>
               <solution>
                    Запретить использование в ОС пакета ruby
                или
                    Установить обновление для пакета(ов) ruby
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ruby-cve-2025-24294/" type="self" id="ROS-20250908-11" title="ROS-20250908-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24294" type="cve" id="CVE-2025-24294" title="CVE-2025-24294" />
			<reference href="https://bdu.fstec.ru/vul/2025-15238" type="self" id="BDU:2025-15238" title="BDU:2025-15238" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ruby" epoch="0" version="2.7.6" release="137.el7" arch="x86_64" src="">
					<filename>ruby-0:2.7.6-137.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250908-12</id>
		<issued date="2025-09-08" />
		<updated date="2025-09-08" />
		<title>Множественные уязвимости portainer-ce</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в portainer-ce</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-portainer-ce-08092025/</description>
               <solution>
                    Запретить использование в ОС пакета portainer-ce
                или
                    Установить обновление для пакета(ов) portainer-ce
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-portainer-ce-08092025/" type="self" id="ROS-20250908-12" title="ROS-20250908-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=GHSA-fv92-fjc5-jj9h" type="cve" id="GHSA-fv92-fjc5-jj9h" title="GHSA-fv92-fjc5-jj9h" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8556" type="cve" id="CVE-2025-8556" title="CVE-2025-8556" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8552" type="cve" id="CVE-2020-8552" title="CVE-2020-8552" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55198" type="cve" id="CVE-2025-55198" title="CVE-2025-55198" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55199" type="cve" id="CVE-2025-55199" title="CVE-2025-55199" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54388" type="cve" id="CVE-2025-54388" title="CVE-2025-54388" />
			<reference href="https://bdu.fstec.ru/vul/2025-11272" type="self" id="BDU:2025-11272" title="BDU:2025-11272" />
			<reference href="https://bdu.fstec.ru/vul/2025-11274" type="self" id="BDU:2025-11274" title="BDU:2025-11274" />
			<reference href="https://bdu.fstec.ru/vul/2025-09391" type="self" id="BDU:2025-09391" title="BDU:2025-09391" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="portainer-ce" epoch="0" version="2.33.0" release="1.el7" arch="x86_64" src="">
					<filename>portainer-ce-0:2.33.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250910-01</id>
		<issued date="2025-09-10" />
		<updated date="2025-09-10" />
		<title>Множественные уязвимости screen</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в screen</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-screen-10092025/</description>
               <solution>
                    Запретить использование в ОС пакета screen
                или
                    Установить обновление для пакета(ов) screen
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-screen-10092025/" type="self" id="ROS-20250910-01" title="ROS-20250910-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46802" type="cve" id="CVE-2025-46802" title="CVE-2025-46802" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23395" type="cve" id="CVE-2025-23395" title="CVE-2025-23395" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46803" type="cve" id="CVE-2025-46803" title="CVE-2025-46803" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46804" type="cve" id="CVE-2025-46804" title="CVE-2025-46804" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46805" type="cve" id="CVE-2025-46805" title="CVE-2025-46805" />
			<reference href="https://bdu.fstec.ru/vul/2025-11403" type="self" id="BDU:2025-11403" title="BDU:2025-11403" />
			<reference href="https://bdu.fstec.ru/vul/2025-05618" type="self" id="BDU:2025-05618" title="BDU:2025-05618" />
			<reference href="https://bdu.fstec.ru/vul/2025-11402" type="self" id="BDU:2025-11402" title="BDU:2025-11402" />
			<reference href="https://bdu.fstec.ru/vul/2025-11401" type="self" id="BDU:2025-11401" title="BDU:2025-11401" />
			<reference href="https://bdu.fstec.ru/vul/2025-11400" type="self" id="BDU:2025-11400" title="BDU:2025-11400" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="screen" epoch="0" version="5.0.1" release="1.el7" arch="x86_64" src="">
					<filename>screen-0:5.0.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250910-02</id>
		<issued date="2025-09-10" />
		<updated date="2025-09-10" />
		<title>Множественные уязвимости poppler</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в poppler</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-poppler-10092025/</description>
               <solution>
                    Запретить использование в ОС пакета poppler
                или
                    Установить обновление для пакета(ов) poppler
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-poppler-10092025/" type="self" id="ROS-20250910-02" title="ROS-20250910-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34872" type="cve" id="CVE-2023-34872" title="CVE-2023-34872" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50422" type="cve" id="CVE-2025-50422" title="CVE-2025-50422" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27337" type="cve" id="CVE-2022-27337" title="CVE-2022-27337" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52886" type="cve" id="CVE-2025-52886" title="CVE-2025-52886" />
			<reference href="https://bdu.fstec.ru/vul/2025-11409" type="self" id="BDU:2025-11409" title="BDU:2025-11409" />
			<reference href="https://bdu.fstec.ru/vul/2025-11408" type="self" id="BDU:2025-11408" title="BDU:2025-11408" />
			<reference href="https://bdu.fstec.ru/vul/2022-06926" type="self" id="BDU:2022-06926" title="BDU:2022-06926" />
			<reference href="https://bdu.fstec.ru/vul/2025-11228" type="self" id="BDU:2025-11228" title="BDU:2025-11228" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="poppler" epoch="0" version="21.08.0" release="18.el7" arch="x86_64" src="">
					<filename>poppler-0:21.08.0-18.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250910-03</id>
		<issued date="2025-09-10" />
		<updated date="2025-09-10" />
		<title>Уязвимость cairo </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в cairo</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cairo-cve-2025-50422/</description>
               <solution>
                    Запретить использование в ОС пакета cairo
                или
                    Установить обновление для пакета(ов) cairo
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cairo-cve-2025-50422/" type="self" id="ROS-20250910-03" title="ROS-20250910-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50422" type="cve" id="CVE-2025-50422" title="CVE-2025-50422" />
			<reference href="https://bdu.fstec.ru/vul/2025-11408" type="self" id="BDU:2025-11408" title="BDU:2025-11408" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cairo" epoch="1" version="1.17.4" release="3.el7" arch="x86_64" src="">
					<filename>cairo-1:1.17.4-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250910-04</id>
		<issued date="2025-09-10" />
		<updated date="2025-09-10" />
		<title>Уязвимость ipa-server </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ipa-server</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ipa-server-cve-2024-2698/</description>
               <solution>
                    Запретить использование в ОС пакета ipa-server
                или
                    Установить обновление для пакета(ов) ipa-server
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ipa-server-cve-2024-2698/" type="self" id="ROS-20250910-04" title="ROS-20250910-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2698" type="cve" id="CVE-2024-2698" title="CVE-2024-2698" />
			<reference href="https://bdu.fstec.ru/vul/2024-06333" type="self" id="BDU:2024-06333" title="BDU:2024-06333" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ipa-server" epoch="0" version="4.10.3" release="12.el7" arch="x86_64" src="">
					<filename>ipa-server-0:4.10.3-12.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250910-05</id>
		<issued date="2025-09-10" />
		<updated date="2025-09-10" />
		<title>Множественные уязвимости dcmtk</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dcmtk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-dcmtk-10092025/</description>
               <solution>
                    Запретить использование в ОС пакета dcmtk
                или
                    Установить обновление для пакета(ов) dcmtk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-dcmtk-10092025/" type="self" id="ROS-20250910-05" title="ROS-20250910-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2357" type="cve" id="CVE-2025-2357" title="CVE-2025-2357" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28130" type="cve" id="CVE-2024-28130" title="CVE-2024-28130" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-25472" type="cve" id="CVE-2025-25472" title="CVE-2025-25472" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-25474" type="cve" id="CVE-2025-25474" title="CVE-2025-25474" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-25475" type="cve" id="CVE-2025-25475" title="CVE-2025-25475" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27628" type="cve" id="CVE-2024-27628" title="CVE-2024-27628" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34509" type="cve" id="CVE-2024-34509" title="CVE-2024-34509" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34508" type="cve" id="CVE-2024-34508" title="CVE-2024-34508" />
			<reference href="https://bdu.fstec.ru/vul/2025-11441" type="self" id="BDU:2025-11441" title="BDU:2025-11441" />
			<reference href="https://bdu.fstec.ru/vul/2025-01309" type="self" id="BDU:2025-01309" title="BDU:2025-01309" />
			<reference href="https://bdu.fstec.ru/vul/2025-02223" type="self" id="BDU:2025-02223" title="BDU:2025-02223" />
			<reference href="https://bdu.fstec.ru/vul/2025-11406" type="self" id="BDU:2025-11406" title="BDU:2025-11406" />
			<reference href="https://bdu.fstec.ru/vul/2025-11405" type="self" id="BDU:2025-11405" title="BDU:2025-11405" />
			<reference href="https://bdu.fstec.ru/vul/2025-00958" type="self" id="BDU:2025-00958" title="BDU:2025-00958" />
			<reference href="https://bdu.fstec.ru/vul/2025-00955" type="self" id="BDU:2025-00955" title="BDU:2025-00955" />
			<reference href="https://bdu.fstec.ru/vul/2025-03917" type="self" id="BDU:2025-03917" title="BDU:2025-03917" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dcmtk" epoch="0" version="3.6.8" release="3.el7" arch="x86_64" src="">
					<filename>dcmtk-0:3.6.8-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250911-01</id>
		<issued date="2025-09-11" />
		<updated date="2025-09-11" />
		<title>Уязвимость dnsdist </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dnsdist</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dnsdist-cve-2024-25581/</description>
               <solution>
                    Запретить использование в ОС пакета dnsdist
                или
                    Установить обновление для пакета(ов) dnsdist
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dnsdist-cve-2024-25581/" type="self" id="ROS-20250911-01" title="ROS-20250911-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25581" type="cve" id="CVE-2024-25581" title="CVE-2024-25581" />
			<reference href="https://bdu.fstec.ru/vul/2025-11269" type="self" id="BDU:2025-11269" title="BDU:2025-11269" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dnsdist" epoch="0" version="1.9.10" release="1.el7" arch="x86_64" src="">
					<filename>dnsdist-0:1.9.10-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250911-02</id>
		<issued date="2025-09-11" />
		<updated date="2025-09-11" />
		<title>Уязвимость dpdk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dpdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dpdk-cve-2024-11614/</description>
               <solution>
                    Запретить использование в ОС пакета dpdk
                или
                    Установить обновление для пакета(ов) dpdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dpdk-cve-2024-11614/" type="self" id="ROS-20250911-02" title="ROS-20250911-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11614" type="cve" id="CVE-2024-11614" title="CVE-2024-11614" />
			<reference href="https://bdu.fstec.ru/vul/2024-11484" type="self" id="BDU:2024-11484" title="BDU:2024-11484" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dpdk" epoch="2" version="22.11.7" release="1.el7" arch="x86_64" src="">
					<filename>dpdk-2:22.11.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250911-03</id>
		<issued date="2025-09-11" />
		<updated date="2025-09-11" />
		<title>Множественные уязвимости gimp </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gimp-cve-2025-2761-cve-2025-2760-cve-2025-48797-cve-2025-48798/</description>
               <solution>
                    Запретить использование в ОС пакета gimp
                или
                    Установить обновление для пакета(ов) gimp
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gimp-cve-2025-2761-cve-2025-2760-cve-2025-48797-cve-2025-48798/" type="self" id="ROS-20250911-03" title="ROS-20250911-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2761" type="cve" id="CVE-2025-2761" title="CVE-2025-2761" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2760" type="cve" id="CVE-2025-2760" title="CVE-2025-2760" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48797" type="cve" id="CVE-2025-48797" title="CVE-2025-48797" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48798" type="cve" id="CVE-2025-48798" title="CVE-2025-48798" />
			<reference href="https://bdu.fstec.ru/vul/2025-09831" type="self" id="BDU:2025-09831" title="BDU:2025-09831" />
			<reference href="https://bdu.fstec.ru/vul/2025-09833" type="self" id="BDU:2025-09833" title="BDU:2025-09833" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gimp" epoch="2" version="2.10.36" release="3.el7" arch="x86_64" src="">
					<filename>gimp-2:2.10.36-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250911-04</id>
		<issued date="2025-09-11" />
		<updated date="2025-09-11" />
		<title>Уязвимость tomcat </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2025-46701/</description>
               <solution>
                    Запретить использование в ОС пакета tomcat
                или
                    Установить обновление для пакета(ов) tomcat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2025-46701/" type="self" id="ROS-20250911-04" title="ROS-20250911-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46701" type="cve" id="CVE-2025-46701" title="CVE-2025-46701" />
			<reference href="https://bdu.fstec.ru/vul/2025-09498" type="self" id="BDU:2025-09498" title="BDU:2025-09498" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat" epoch="1" version="9.0.105" release="2.el7" arch="noarch" src="">
					<filename>tomcat-1:9.0.105-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250911-05</id>
		<issued date="2025-09-11" />
		<updated date="2025-09-11" />
		<title>Уязвимость tomcat10 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat10</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat10-cve-2025-46701/</description>
               <solution>
                    Запретить использование в ОС пакета tomcat10
                или
                    Установить обновление для пакета(ов) tomcat10
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat10-cve-2025-46701/" type="self" id="ROS-20250911-05" title="ROS-20250911-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46701" type="cve" id="CVE-2025-46701" title="CVE-2025-46701" />
			<reference href="https://bdu.fstec.ru/vul/2025-09498" type="self" id="BDU:2025-09498" title="BDU:2025-09498" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat10" epoch="1" version="10.1.42" release="1.el7" arch="noarch" src="">
					<filename>tomcat10-1:10.1.42-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250911-06</id>
		<issued date="2025-09-11" />
		<updated date="2025-09-11" />
		<title>Уязвимость tomcat11 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat11-cve-2025-46701/</description>
               <solution>
                    Запретить использование в ОС пакета tomcat11
                или
                    Установить обновление для пакета(ов) tomcat11
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat11-cve-2025-46701/" type="self" id="ROS-20250911-06" title="ROS-20250911-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46701" type="cve" id="CVE-2025-46701" title="CVE-2025-46701" />
			<reference href="https://bdu.fstec.ru/vul/2025-09498" type="self" id="BDU:2025-09498" title="BDU:2025-09498" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat11" epoch="1" version="11.0.10" release="1.el7" arch="noarch" src="">
					<filename>tomcat11-1:11.0.10-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250911-07</id>
		<issued date="2025-09-11" />
		<updated date="2025-09-11" />
		<title>Уязвимость apache-commons-compress </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в apache-commons-compress</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-commons-compress-cve-2024-25710/</description>
               <solution>
                    Запретить использование в ОС пакета apache-commons-compress
                или
                    Установить обновление для пакета(ов) apache-commons-compress
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-commons-compress-cve-2024-25710/" type="self" id="ROS-20250911-07" title="ROS-20250911-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25710" type="cve" id="CVE-2024-25710" title="CVE-2024-25710" />
			<reference href="https://bdu.fstec.ru/vul/2024-02851" type="self" id="BDU:2024-02851" title="BDU:2024-02851" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="apache-commons-compress" epoch="0" version="1.25.0" release="2.el7" arch="noarch" src="">
					<filename>apache-commons-compress-0:1.25.0-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250911-09</id>
		<issued date="2025-09-11" />
		<updated date="2025-09-11" />
		<title>Уязвимость apache-commons-fileupload </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в apache-commons-fileupload</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-commons-fileupload-cve-2025-48976/</description>
               <solution>
                    Запретить использование в ОС пакета apache-commons-fileupload
                или
                    Установить обновление для пакета(ов) apache-commons-fileupload
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-commons-fileupload-cve-2025-48976/" type="self" id="ROS-20250911-09" title="ROS-20250911-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48976" type="cve" id="CVE-2025-48976" title="CVE-2025-48976" />
			<reference href="https://bdu.fstec.ru/vul/2025-07776" type="self" id="BDU:2025-07776" title="BDU:2025-07776" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="apache-commons-fileupload" epoch="0" version="2.0.0~M4" release="1.el7" arch="noarch" src="">
					<filename>apache-commons-fileupload-0:2.0.0~M4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250911-10</id>
		<issued date="2025-09-11" />
		<updated date="2025-09-11" />
		<title>Уязвимость botan2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в botan2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-botan2-cve-2024-50382/</description>
               <solution>
                    Запретить использование в ОС пакета botan2
                или
                    Установить обновление для пакета(ов) botan2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-botan2-cve-2024-50382/" type="self" id="ROS-20250911-10" title="ROS-20250911-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50382" type="cve" id="CVE-2024-50382" title="CVE-2024-50382" />
			<reference href="https://bdu.fstec.ru/vul/2024-09445" type="self" id="BDU:2024-09445" title="BDU:2024-09445" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="botan2" epoch="0" version="2.19.5" release="2.el7" arch="x86_64" src="">
					<filename>botan2-0:2.19.5-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250911-11</id>
		<issued date="2025-09-11" />
		<updated date="2025-09-11" />
		<title>Множественные уязвимости cloud-init </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в cloud-init</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-cloud-init-cve-2024-11584-cve-2024-6174/</description>
               <solution>
                    Запретить использование в ОС пакета cloud-init
                или
                    Установить обновление для пакета(ов) cloud-init
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-cloud-init-cve-2024-11584-cve-2024-6174/" type="self" id="ROS-20250911-11" title="ROS-20250911-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11584" type="cve" id="CVE-2024-11584" title="CVE-2024-11584" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6174" type="cve" id="CVE-2024-6174" title="CVE-2024-6174" />
			<reference href="https://bdu.fstec.ru/vul/2025-10929" type="self" id="BDU:2025-10929" title="BDU:2025-10929" />
			<reference href="https://bdu.fstec.ru/vul/2025-10809" type="self" id="BDU:2025-10809" title="BDU:2025-10809" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cloud-init" epoch="0" version="23.2" release="11.el7" arch="noarch" src="">
					<filename>cloud-init-0:23.2-11.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250911-12</id>
		<issued date="2025-09-11" />
		<updated date="2025-09-11" />
		<title>Уязвимость glpi </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2025-53105/</description>
               <solution>
                    Запретить использование в ОС пакета glpi
                или
                    Установить обновление для пакета(ов) glpi
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2025-53105/" type="self" id="ROS-20250911-12" title="ROS-20250911-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53105" type="cve" id="CVE-2025-53105" title="CVE-2025-53105" />
			<reference href="https://bdu.fstec.ru/vul/2025-11259" type="self" id="BDU:2025-11259" title="BDU:2025-11259" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi" epoch="0" version="10.0.19" release="1.el7" arch="noarch" src="">
					<filename>glpi-0:10.0.19-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250912-01</id>
		<issued date="2025-09-12" />
		<updated date="2025-09-12" />
		<title>Уязвимость postgresql13 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql13</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql13-cve-2025-8715/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql13
                или
                    Установить обновление для пакета(ов) postgresql13
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql13-cve-2025-8715/" type="self" id="ROS-20250912-01" title="ROS-20250912-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8715" type="cve" id="CVE-2025-8715" title="CVE-2025-8715" />
			<reference href="https://bdu.fstec.ru/vul/2025-09830" type="self" id="BDU:2025-09830" title="BDU:2025-09830" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql13" epoch="0" version="13.22" release="1.el7" arch="x86_64" src="">
					<filename>postgresql13-0:13.22-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250912-02</id>
		<issued date="2025-09-12" />
		<updated date="2025-09-12" />
		<title>Уязвимость postgresql14 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql14</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql14-cve-2025-8715/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql14
                или
                    Установить обновление для пакета(ов) postgresql14
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql14-cve-2025-8715/" type="self" id="ROS-20250912-02" title="ROS-20250912-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8715" type="cve" id="CVE-2025-8715" title="CVE-2025-8715" />
			<reference href="https://bdu.fstec.ru/vul/2025-09830" type="self" id="BDU:2025-09830" title="BDU:2025-09830" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql14" epoch="0" version="14.19" release="1.el7" arch="x86_64" src="">
					<filename>postgresql14-0:14.19-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250912-03</id>
		<issued date="2025-09-12" />
		<updated date="2025-09-12" />
		<title>Уязвимость postgresql15 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql15</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql15-cve-2025-8715/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql15
                или
                    Установить обновление для пакета(ов) postgresql15
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql15-cve-2025-8715/" type="self" id="ROS-20250912-03" title="ROS-20250912-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8715" type="cve" id="CVE-2025-8715" title="CVE-2025-8715" />
			<reference href="https://bdu.fstec.ru/vul/2025-09830" type="self" id="BDU:2025-09830" title="BDU:2025-09830" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql15" epoch="0" version="15.14" release="1.el7" arch="x86_64" src="">
					<filename>postgresql15-0:15.14-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250912-04</id>
		<issued date="2025-09-12" />
		<updated date="2025-09-12" />
		<title>Уязвимость postgresql16 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql16</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql16-cve-2025-8715/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql16
                или
                    Установить обновление для пакета(ов) postgresql16
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql16-cve-2025-8715/" type="self" id="ROS-20250912-04" title="ROS-20250912-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8715" type="cve" id="CVE-2025-8715" title="CVE-2025-8715" />
			<reference href="https://bdu.fstec.ru/vul/2025-09830" type="self" id="BDU:2025-09830" title="BDU:2025-09830" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql16" epoch="0" version="16.10" release="1.el7" arch="x86_64" src="">
					<filename>postgresql16-0:16.10-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250912-05</id>
		<issued date="2025-09-12" />
		<updated date="2025-09-12" />
		<title>Уязвимость postgresql17 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql17</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql17-cve-2025-8715/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql17
                или
                    Установить обновление для пакета(ов) postgresql17
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql17-cve-2025-8715/" type="self" id="ROS-20250912-05" title="ROS-20250912-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8715" type="cve" id="CVE-2025-8715" title="CVE-2025-8715" />
			<reference href="https://bdu.fstec.ru/vul/2025-09830" type="self" id="BDU:2025-09830" title="BDU:2025-09830" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql17" epoch="0" version="17.6" release="1.el7" arch="x86_64" src="">
					<filename>postgresql17-0:17.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250912-06</id>
		<issued date="2025-09-12" />
		<updated date="2025-09-12" />
		<title>Уязвимость postgresql-1c </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-1c-cve-2025-8715/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql-1c
                или
                    Установить обновление для пакета(ов) postgresql-1c
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-1c-cve-2025-8715/" type="self" id="ROS-20250912-06" title="ROS-20250912-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8715" type="cve" id="CVE-2025-8715" title="CVE-2025-8715" />
			<reference href="https://bdu.fstec.ru/vul/2025-09830" type="self" id="BDU:2025-09830" title="BDU:2025-09830" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql-1c" epoch="0" version="14.19" release="1.el7" arch="x86_64" src="">
					<filename>postgresql-1c-0:14.19-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250912-07</id>
		<issued date="2025-09-12" />
		<updated date="2025-09-12" />
		<title>Уязвимость postgresql15-1c </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql15-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql15-1c-cve-2025-8715/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql15-1c
                или
                    Установить обновление для пакета(ов) postgresql15-1c
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql15-1c-cve-2025-8715/" type="self" id="ROS-20250912-07" title="ROS-20250912-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8715" type="cve" id="CVE-2025-8715" title="CVE-2025-8715" />
			<reference href="https://bdu.fstec.ru/vul/2025-09830" type="self" id="BDU:2025-09830" title="BDU:2025-09830" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql15-1c" epoch="0" version="15.14" release="1.el7" arch="x86_64" src="">
					<filename>postgresql15-1c-0:15.14-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250912-08</id>
		<issued date="2025-09-12" />
		<updated date="2025-09-12" />
		<title>Уязвимость postgresql17-1c </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql17-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql17-1c-cve-2025-8715/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql17-1c
                или
                    Установить обновление для пакета(ов) postgresql17-1c
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql17-1c-cve-2025-8715/" type="self" id="ROS-20250912-08" title="ROS-20250912-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8715" type="cve" id="CVE-2025-8715" title="CVE-2025-8715" />
			<reference href="https://bdu.fstec.ru/vul/2025-09830" type="self" id="BDU:2025-09830" title="BDU:2025-09830" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql17-1c" epoch="0" version="17.6" release="1.el7" arch="x86_64" src="">
					<filename>postgresql17-1c-0:17.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250912-09</id>
		<issued date="2025-09-12" />
		<updated date="2025-09-12" />
		<title>Множественные уязвимости python3-flask-cors</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-flask-cors</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-flask-cors-12092025/</description>
               <solution>
                    Запретить использование в ОС пакета python3-flask-cors
                или
                    Установить обновление для пакета(ов) python3-flask-cors
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-flask-cors-12092025/" type="self" id="ROS-20250912-09" title="ROS-20250912-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1681" type="cve" id="CVE-2024-1681" title="CVE-2024-1681" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6221" type="cve" id="CVE-2024-6221" title="CVE-2024-6221" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6839" type="cve" id="CVE-2024-6839" title="CVE-2024-6839" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6844" type="cve" id="CVE-2024-6844" title="CVE-2024-6844" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6866" type="cve" id="CVE-2024-6866" title="CVE-2024-6866" />
			<reference href="https://bdu.fstec.ru/vul/2025-11598" type="self" id="BDU:2025-11598" title="BDU:2025-11598" />
			<reference href="https://bdu.fstec.ru/vul/2024-07531" type="self" id="BDU:2024-07531" title="BDU:2024-07531" />
			<reference href="https://bdu.fstec.ru/vul/2024-07530" type="self" id="BDU:2024-07530" title="BDU:2024-07530" />
			<reference href="https://bdu.fstec.ru/vul/2024-07529" type="self" id="BDU:2024-07529" title="BDU:2024-07529" />
			<reference href="https://bdu.fstec.ru/vul/2024-07532" type="self" id="BDU:2024-07532" title="BDU:2024-07532" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-flask-cors" epoch="0" version="6.0.1" release="1.el7" arch="noarch" src="">
					<filename>python3-flask-cors-0:6.0.1-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250912-10</id>
		<issued date="2025-09-12" />
		<updated date="2025-09-12" />
		<title>Уязвимость python3-traitlets </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-traitlets</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-traitlets-cve-2022-39286/</description>
               <solution>
                    Запретить использование в ОС пакета python3-traitlets
                или
                    Установить обновление для пакета(ов) python3-traitlets
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-traitlets-cve-2022-39286/" type="self" id="ROS-20250912-10" title="ROS-20250912-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39286" type="cve" id="CVE-2022-39286" title="CVE-2022-39286" />
			<reference href="https://bdu.fstec.ru/vul/2023-04040" type="self" id="BDU:2023-04040" title="BDU:2023-04040" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-traitlets" epoch="0" version="5.4.0" release="1.el7" arch="noarch" src="">
					<filename>python3-traitlets-0:5.4.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250912-11</id>
		<issued date="2025-09-12" />
		<updated date="2025-09-12" />
		<title>Уязвимость python3-jupyter-core </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-jupyter-core</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-jupyter-core-cve-2022-39286/</description>
               <solution>
                    Запретить использование в ОС пакета python3-jupyter-core
                или
                    Установить обновление для пакета(ов) python3-jupyter-core
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-jupyter-core-cve-2022-39286/" type="self" id="ROS-20250912-11" title="ROS-20250912-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39286" type="cve" id="CVE-2022-39286" title="CVE-2022-39286" />
			<reference href="https://bdu.fstec.ru/vul/2023-04040" type="self" id="BDU:2023-04040" title="BDU:2023-04040" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-jupyter-core" epoch="0" version="5.7.2" release="1.el7" arch="noarch" src="">
					<filename>python3-jupyter-core-0:5.7.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250912-12</id>
		<issued date="2025-09-12" />
		<updated date="2025-09-12" />
		<title>Уязвимость qbittorrent </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в qbittorrent</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qbittorrent-cve-2025-54310/</description>
               <solution>
                    Запретить использование в ОС пакета qbittorrent
                или
                    Установить обновление для пакета(ов) qbittorrent
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qbittorrent-cve-2025-54310/" type="self" id="ROS-20250912-12" title="ROS-20250912-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54310" type="cve" id="CVE-2025-54310" title="CVE-2025-54310" />
			<reference href="https://bdu.fstec.ru/vul/2025-11251" type="self" id="BDU:2025-11251" title="BDU:2025-11251" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="qbittorrent" epoch="1" version="5.0.1" release="2.el7" arch="x86_64" src="">
					<filename>qbittorrent-1:5.0.1-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250912-13</id>
		<issued date="2025-09-12" />
		<updated date="2025-09-12" />
		<title>Множественные уязвимости openbao</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в openbao</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-openbao-12092025/</description>
               <solution>
                    Запретить использование в ОС пакета openbao
                или
                    Установить обновление для пакета(ов) openbao
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-openbao-12092025/" type="self" id="ROS-20250912-13" title="ROS-20250912-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54996" type="cve" id="CVE-2025-54996" title="CVE-2025-54996" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54997" type="cve" id="CVE-2025-54997" title="CVE-2025-54997" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54998" type="cve" id="CVE-2025-54998" title="CVE-2025-54998" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54999" type="cve" id="CVE-2025-54999" title="CVE-2025-54999" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55000" type="cve" id="CVE-2025-55000" title="CVE-2025-55000" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55001" type="cve" id="CVE-2025-55001" title="CVE-2025-55001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55003" type="cve" id="CVE-2025-55003" title="CVE-2025-55003" />
			<reference href="https://bdu.fstec.ru/vul/2025-11283" type="self" id="BDU:2025-11283" title="BDU:2025-11283" />
			<reference href="https://bdu.fstec.ru/vul/2025-11282" type="self" id="BDU:2025-11282" title="BDU:2025-11282" />
			<reference href="https://bdu.fstec.ru/vul/2025-11281" type="self" id="BDU:2025-11281" title="BDU:2025-11281" />
			<reference href="https://bdu.fstec.ru/vul/2025-11277" type="self" id="BDU:2025-11277" title="BDU:2025-11277" />
			<reference href="https://bdu.fstec.ru/vul/2025-11280" type="self" id="BDU:2025-11280" title="BDU:2025-11280" />
			<reference href="https://bdu.fstec.ru/vul/2025-11279" type="self" id="BDU:2025-11279" title="BDU:2025-11279" />
			<reference href="https://bdu.fstec.ru/vul/2025-11278" type="self" id="BDU:2025-11278" title="BDU:2025-11278" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openbao" epoch="0" version="2.4.0" release="1.el7" arch="x86_64" src="">
					<filename>openbao-0:2.4.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250912-14</id>
		<issued date="2025-09-12" />
		<updated date="2025-09-12" />
		<title>Уязвимость tomcat11 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в tomcat11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat11-cve-2025-55668/</description>
               <solution>
                    Запретить использование в ОС пакета tomcat11
                или
                    Установить обновление для пакета(ов) tomcat11
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat11-cve-2025-55668/" type="self" id="ROS-20250912-14" title="ROS-20250912-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55668" type="cve" id="CVE-2025-55668" title="CVE-2025-55668" />
			<reference href="https://bdu.fstec.ru/vul/2025-09900" type="self" id="BDU:2025-09900" title="BDU:2025-09900" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat11" epoch="1" version="11.0.10" release="1.el7" arch="noarch" src="">
					<filename>tomcat11-1:11.0.10-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250912-15</id>
		<issued date="2025-09-12" />
		<updated date="2025-09-12" />
		<title>Уязвимость tomcat10 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в tomcat10</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat10-cve-2025-55668/</description>
               <solution>
                    Запретить использование в ОС пакета tomcat10
                или
                    Установить обновление для пакета(ов) tomcat10
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat10-cve-2025-55668/" type="self" id="ROS-20250912-15" title="ROS-20250912-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55668" type="cve" id="CVE-2025-55668" title="CVE-2025-55668" />
			<reference href="https://bdu.fstec.ru/vul/2025-09900" type="self" id="BDU:2025-09900" title="BDU:2025-09900" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat10" epoch="1" version="10.1.42" release="1.el7" arch="noarch" src="">
					<filename>tomcat10-1:10.1.42-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250912-16</id>
		<issued date="2025-09-12" />
		<updated date="2025-09-12" />
		<title>Уязвимость tomcat </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в tomcat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2025-55668/</description>
               <solution>
                    Запретить использование в ОС пакета tomcat
                или
                    Установить обновление для пакета(ов) tomcat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2025-55668/" type="self" id="ROS-20250912-16" title="ROS-20250912-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55668" type="cve" id="CVE-2025-55668" title="CVE-2025-55668" />
			<reference href="https://bdu.fstec.ru/vul/2025-09900" type="self" id="BDU:2025-09900" title="BDU:2025-09900" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat" epoch="1" version="9.0.106" release="1.el7" arch="noarch" src="">
					<filename>tomcat-1:9.0.106-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250912-17</id>
		<issued date="2025-09-12" />
		<updated date="2025-09-12" />
		<title>Уязвимость tomcat11 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat11-cve-2025-48989/</description>
               <solution>
                    Запретить использование в ОС пакета tomcat11
                или
                    Установить обновление для пакета(ов) tomcat11
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat11-cve-2025-48989/" type="self" id="ROS-20250912-17" title="ROS-20250912-17" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48989" type="cve" id="CVE-2025-48989" title="CVE-2025-48989" />
			<reference href="https://bdu.fstec.ru/vul/2025-09899" type="self" id="BDU:2025-09899" title="BDU:2025-09899" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat11" epoch="1" version="11.0.10" release="1.el7" arch="noarch" src="">
					<filename>tomcat11-1:11.0.10-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250912-18</id>
		<issued date="2025-09-12" />
		<updated date="2025-09-12" />
		<title>Уязвимость tomcat10 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat10</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat10-cve-2025-48989/</description>
               <solution>
                    Запретить использование в ОС пакета tomcat10
                или
                    Установить обновление для пакета(ов) tomcat10
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat10-cve-2025-48989/" type="self" id="ROS-20250912-18" title="ROS-20250912-18" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48989" type="cve" id="CVE-2025-48989" title="CVE-2025-48989" />
			<reference href="https://bdu.fstec.ru/vul/2025-09899" type="self" id="BDU:2025-09899" title="BDU:2025-09899" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat10" epoch="1" version="10.1.44" release="1.el7" arch="noarch" src="">
					<filename>tomcat10-1:10.1.44-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250912-19</id>
		<issued date="2025-09-12" />
		<updated date="2025-09-12" />
		<title>Уязвимость tomcat </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2025-48989/</description>
               <solution>
                    Запретить использование в ОС пакета tomcat
                или
                    Установить обновление для пакета(ов) tomcat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2025-48989/" type="self" id="ROS-20250912-19" title="ROS-20250912-19" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48989" type="cve" id="CVE-2025-48989" title="CVE-2025-48989" />
			<reference href="https://bdu.fstec.ru/vul/2025-09899" type="self" id="BDU:2025-09899" title="BDU:2025-09899" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat" epoch="1" version="9.0.108" release="1.el7" arch="noarch" src="">
					<filename>tomcat-1:9.0.108-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250922-01</id>
		<issued date="2025-09-22" />
		<updated date="2025-09-22" />
		<title>Множественные уязвимости thunderbird </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-cve-2025-4093-cve-2025-4087-cve-2025-4091/</description>
               <solution>
                    Запретить использование в ОС пакета thunderbird
                или
                    Установить обновление для пакета(ов) thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-cve-2025-4093-cve-2025-4087-cve-2025-4091/" type="self" id="ROS-20250922-01" title="ROS-20250922-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4093" type="cve" id="CVE-2025-4093" title="CVE-2025-4093" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4087" type="cve" id="CVE-2025-4087" title="CVE-2025-4087" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4091" type="cve" id="CVE-2025-4091" title="CVE-2025-4091" />
			<reference href="https://bdu.fstec.ru/vul/2025-06660" type="self" id="BDU:2025-06660" title="BDU:2025-06660" />
			<reference href="https://bdu.fstec.ru/vul/2025-05384" type="self" id="BDU:2025-05384" title="BDU:2025-05384" />
			<reference href="https://bdu.fstec.ru/vul/2025-10507" type="self" id="BDU:2025-10507" title="BDU:2025-10507" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="128.10.0" release="1.el7" arch="x86_64" src="">
					<filename>thunderbird-0:128.10.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250922-02</id>
		<issued date="2025-09-22" />
		<updated date="2025-09-22" />
		<title>Множественные уязвимости thunderbird </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-cve-2025-8035-cve-2025-8030-cve-2025-8032/</description>
               <solution>
                    Запретить использование в ОС пакета thunderbird
                или
                    Установить обновление для пакета(ов) thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-cve-2025-8035-cve-2025-8030-cve-2025-8032/" type="self" id="ROS-20250922-02" title="ROS-20250922-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8030" type="cve" id="CVE-2025-8030" title="CVE-2025-8030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8032" type="cve" id="CVE-2025-8032" title="CVE-2025-8032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8035" type="cve" id="CVE-2025-8035" title="CVE-2025-8035" />
			<reference href="https://bdu.fstec.ru/vul/2025-10486" type="self" id="BDU:2025-10486" title="BDU:2025-10486" />
			<reference href="https://bdu.fstec.ru/vul/2025-10487" type="self" id="BDU:2025-10487" title="BDU:2025-10487" />
			<reference href="https://bdu.fstec.ru/vul/2025-09459" type="self" id="BDU:2025-09459" title="BDU:2025-09459" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="128.13.0" release="1.el7" arch="x86_64" src="">
					<filename>thunderbird-0:128.13.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250922-03</id>
		<issued date="2025-09-22" />
		<updated date="2025-09-22" />
		<title>Множественные уязвимости thunderbird </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-cve-2025-8033-cve-2025-8034/</description>
               <solution>
                    Запретить использование в ОС пакета thunderbird
                или
                    Установить обновление для пакета(ов) thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-cve-2025-8033-cve-2025-8034/" type="self" id="ROS-20250922-03" title="ROS-20250922-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8034" type="cve" id="CVE-2025-8034" title="CVE-2025-8034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8033" type="cve" id="CVE-2025-8033" title="CVE-2025-8033" />
			<reference href="https://bdu.fstec.ru/vul/2025-09458" type="self" id="BDU:2025-09458" title="BDU:2025-09458" />
			<reference href="https://bdu.fstec.ru/vul/2025-10490" type="self" id="BDU:2025-10490" title="BDU:2025-10490" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="128.13.0" release="1.el7" arch="x86_64" src="">
					<filename>thunderbird-0:128.13.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250922-04</id>
		<issued date="2025-09-22" />
		<updated date="2025-09-22" />
		<title>Множественные уязвимости firefox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-cve-2025-8033-cve-2025-8034/</description>
               <solution>
                    Запретить использование в ОС пакета firefox
                или
                    Установить обновление для пакета(ов) firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-cve-2025-8033-cve-2025-8034/" type="self" id="ROS-20250922-04" title="ROS-20250922-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8034" type="cve" id="CVE-2025-8034" title="CVE-2025-8034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8033" type="cve" id="CVE-2025-8033" title="CVE-2025-8033" />
			<reference href="https://bdu.fstec.ru/vul/2025-09458" type="self" id="BDU:2025-09458" title="BDU:2025-09458" />
			<reference href="https://bdu.fstec.ru/vul/2025-10490" type="self" id="BDU:2025-10490" title="BDU:2025-10490" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.26.0" release="1.el7" arch="x86_64" src="">
					<filename>firefox-0:115.26.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250922-05</id>
		<issued date="2025-09-22" />
		<updated date="2025-09-22" />
		<title>Множественные уязвимости minio </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в minio</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-minio-cve-2025-31489-cve-2025-27414/</description>
               <solution>
                    Запретить использование в ОС пакета minio
                или
                    Установить обновление для пакета(ов) minio
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-minio-cve-2025-31489-cve-2025-27414/" type="self" id="ROS-20250922-05" title="ROS-20250922-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27414" type="cve" id="CVE-2025-27414" title="CVE-2025-27414" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31489" type="cve" id="CVE-2025-31489" title="CVE-2025-31489" />
			<reference href="https://bdu.fstec.ru/vul/2025-11495" type="self" id="BDU:2025-11495" title="BDU:2025-11495" />
			<reference href="https://bdu.fstec.ru/vul/2025-11494" type="self" id="BDU:2025-11494" title="BDU:2025-11494" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="minio" epoch="0" version="20250907T161309Z" release="1.el7" arch="x86_64" src="">
					<filename>minio-0:20250907T161309Z-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250922-06</id>
		<issued date="2025-09-22" />
		<updated date="2025-09-22" />
		<title>Уязвимость rabbitmq-server </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в rabbitmq-server</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rabbitmq-server-cve-2025-30219/</description>
               <solution>
                    Запретить использование в ОС пакета rabbitmq-server
                или
                    Установить обновление для пакета(ов) rabbitmq-server
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rabbitmq-server-cve-2025-30219/" type="self" id="ROS-20250922-06" title="ROS-20250922-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30219" type="cve" id="CVE-2025-30219" title="CVE-2025-30219" />
			<reference href="https://bdu.fstec.ru/vul/2025-11493" type="self" id="BDU:2025-11493" title="BDU:2025-11493" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rabbitmq-server" epoch="0" version="4.1.4" release="1.el7" arch="x86_64" src="">
					<filename>rabbitmq-server-0:4.1.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250922-07</id>
		<issued date="2025-09-22" />
		<updated date="2025-09-22" />
		<title>Множественные уязвимости firefox </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-cve-2024-3859-cve-2024-3861/</description>
               <solution>
                    Запретить использование в ОС пакета firefox
                или
                    Установить обновление для пакета(ов) firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-cve-2024-3859-cve-2024-3861/" type="self" id="ROS-20250922-07" title="ROS-20250922-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3861" type="cve" id="CVE-2024-3861" title="CVE-2024-3861" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3859" type="cve" id="CVE-2024-3859" title="CVE-2024-3859" />
			<reference href="https://bdu.fstec.ru/vul/2024-03786" type="self" id="BDU:2024-03786" title="BDU:2024-03786" />
			<reference href="https://bdu.fstec.ru/vul/2024-03909" type="self" id="BDU:2024-03909" title="BDU:2024-03909" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.12.0" release="1.el7" arch="x86_64" src="">
					<filename>firefox-0:115.12.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250922-08</id>
		<issued date="2025-09-22" />
		<updated date="2025-09-22" />
		<title>Множественные уязвимости python3-twisted </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-twisted</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-twisted-cve-2024-41671-cve-2022-21712-cve-2022-21716-cve-2022-248/</description>
               <solution>
                    Запретить использование в ОС пакета python3-twisted
                или
                    Установить обновление для пакета(ов) python3-twisted
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-twisted-cve-2024-41671-cve-2022-21712-cve-2022-21716-cve-2022-248/" type="self" id="ROS-20250922-08" title="ROS-20250922-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24801" type="cve" id="CVE-2022-24801" title="CVE-2022-24801" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41671" type="cve" id="CVE-2024-41671" title="CVE-2024-41671" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21712" type="cve" id="CVE-2022-21712" title="CVE-2022-21712" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21716" type="cve" id="CVE-2022-21716" title="CVE-2022-21716" />
			<reference href="https://bdu.fstec.ru/vul/2022-06921" type="self" id="BDU:2022-06921" title="BDU:2022-06921" />
			<reference href="https://bdu.fstec.ru/vul/2024-06573" type="self" id="BDU:2024-06573" title="BDU:2024-06573" />
			<reference href="https://bdu.fstec.ru/vul/2022-06046" type="self" id="BDU:2022-06046" title="BDU:2022-06046" />
			<reference href="https://bdu.fstec.ru/vul/2022-05982" type="self" id="BDU:2022-05982" title="BDU:2022-05982" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-twisted" epoch="0" version="25.5.0" release="1.el7" arch="noarch" src="">
					<filename>python3-twisted-0:25.5.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250922-09</id>
		<issued date="2025-09-22" />
		<updated date="2025-09-22" />
		<title>Уязвимость unbound </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в unbound</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-unbound-cve-2024-8508/</description>
               <solution>
                    Запретить использование в ОС пакета unbound
                или
                    Установить обновление для пакета(ов) unbound
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-unbound-cve-2024-8508/" type="self" id="ROS-20250922-09" title="ROS-20250922-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8508" type="cve" id="CVE-2024-8508" title="CVE-2024-8508" />
			<reference href="https://bdu.fstec.ru/vul/2025-11496" type="self" id="BDU:2025-11496" title="BDU:2025-11496" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="unbound" epoch="0" version="1.19.2" release="6.el7" arch="x86_64" src="">
					<filename>unbound-0:1.19.2-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250922-10</id>
		<issued date="2025-09-22" />
		<updated date="2025-09-22" />
		<title>Уязвимость python3-waitress </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-waitress</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-waitress-cve-2024-49769/</description>
               <solution>
                    Запретить использование в ОС пакета python3-waitress
                или
                    Установить обновление для пакета(ов) python3-waitress
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-waitress-cve-2024-49769/" type="self" id="ROS-20250922-10" title="ROS-20250922-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49769" type="cve" id="CVE-2024-49769" title="CVE-2024-49769" />
			<reference href="https://bdu.fstec.ru/vul/2024-10887" type="self" id="BDU:2024-10887" title="BDU:2024-10887" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-waitress" epoch="0" version="1.4.4" release="1.el7" arch="noarch" src="">
					<filename>python3-waitress-0:1.4.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250923-01</id>
		<issued date="2025-09-23" />
		<updated date="2025-09-23" />
		<title>Уязвимость openssl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openssl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl-cve-2024-5642/</description>
               <solution>
                    Запретить использование в ОС пакета openssl
                или
                    Установить обновление для пакета(ов) openssl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl-cve-2024-5642/" type="self" id="ROS-20250923-01" title="ROS-20250923-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5642" type="cve" id="CVE-2024-5642" title="CVE-2024-5642" />
			<reference href="https://bdu.fstec.ru/vul/2025-11592" type="self" id="BDU:2025-11592" title="BDU:2025-11592" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl" epoch="1" version="1.1.1w" release="3.el7" arch="x86_64" src="">
					<filename>openssl-1:1.1.1w-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250923-02</id>
		<issued date="2025-09-23" />
		<updated date="2025-09-23" />
		<title>Уязвимость nodejs </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nodejs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-cve-2024-22017/</description>
               <solution>
                    Запретить использование в ОС пакета nodejs
                или
                    Установить обновление для пакета(ов) nodejs
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-cve-2024-22017/" type="self" id="ROS-20250923-02" title="ROS-20250923-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22017" type="cve" id="CVE-2024-22017" title="CVE-2024-22017" />
			<reference href="https://bdu.fstec.ru/vul/2024-04313" type="self" id="BDU:2024-04313" title="BDU:2024-04313" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs" epoch="1" version="18.19.1" release="1.el7" arch="x86_64" src="">
					<filename>nodejs-1:18.19.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250923-03</id>
		<issued date="2025-09-23" />
		<updated date="2025-09-23" />
		<title>Уязвимость python3.11 </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в python3.11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2025-1795/</description>
               <solution>
                    Запретить использование в ОС пакета python3.11
                или
                    Установить обновление для пакета(ов) python3.11
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2025-1795/" type="self" id="ROS-20250923-03" title="ROS-20250923-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1795" type="cve" id="CVE-2025-1795" title="CVE-2025-1795" />
			<reference href="https://bdu.fstec.ru/vul/2025-11593" type="self" id="BDU:2025-11593" title="BDU:2025-11593" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.11" epoch="0" version="3.11.13" release="1.el7" arch="x86_64" src="">
					<filename>python3.11-0:3.11.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250923-04</id>
		<issued date="2025-09-23" />
		<updated date="2025-09-23" />
		<title>Уязвимость python3.12 </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в python3.12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-12-cve-2025-1795/</description>
               <solution>
                    Запретить использование в ОС пакета python3.12
                или
                    Установить обновление для пакета(ов) python3.12
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-12-cve-2025-1795/" type="self" id="ROS-20250923-04" title="ROS-20250923-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1795" type="cve" id="CVE-2025-1795" title="CVE-2025-1795" />
			<reference href="https://bdu.fstec.ru/vul/2025-11593" type="self" id="BDU:2025-11593" title="BDU:2025-11593" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.12" epoch="0" version="3.12.5" release="1.el7" arch="x86_64" src="">
					<filename>python3.12-0:3.12.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250923-05</id>
		<issued date="2025-09-23" />
		<updated date="2025-09-23" />
		<title>Уязвимость sqlite </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в sqlite</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sqlite-cve-2025-29088/</description>
               <solution>
                    Запретить использование в ОС пакета sqlite
                или
                    Установить обновление для пакета(ов) sqlite
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sqlite-cve-2025-29088/" type="self" id="ROS-20250923-05" title="ROS-20250923-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29088" type="cve" id="CVE-2025-29088" title="CVE-2025-29088" />
			<reference href="https://bdu.fstec.ru/vul/2025-06411" type="self" id="BDU:2025-06411" title="BDU:2025-06411" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="sqlite" epoch="0" version="3.35.3" release="7.el7" arch="x86_64" src="">
					<filename>sqlite-0:3.35.3-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250923-06</id>
		<issued date="2025-09-23" />
		<updated date="2025-09-23" />
		<title>Уязвимость cassandra </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в cassandra</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cassandra-cve-2025-26467/</description>
               <solution>
                    Запретить использование в ОС пакета cassandra
                или
                    Установить обновление для пакета(ов) cassandra
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cassandra-cve-2025-26467/" type="self" id="ROS-20250923-06" title="ROS-20250923-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26467" type="cve" id="CVE-2025-26467" title="CVE-2025-26467" />
			<reference href="https://bdu.fstec.ru/vul/2025-06618" type="self" id="BDU:2025-06618" title="BDU:2025-06618" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cassandra" epoch="0" version="4.1.8" release="1.el7" arch="noarch" src="">
					<filename>cassandra-0:4.1.8-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250923-07</id>
		<issued date="2025-09-23" />
		<updated date="2025-09-23" />
		<title>Множественные уязвимости postgresql13 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql13</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql13-cve-2025-8714-cve-2025-8713/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql13
                или
                    Установить обновление для пакета(ов) postgresql13
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql13-cve-2025-8714-cve-2025-8713/" type="self" id="ROS-20250923-07" title="ROS-20250923-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8713" type="cve" id="CVE-2025-8713" title="CVE-2025-8713" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8714" type="cve" id="CVE-2025-8714" title="CVE-2025-8714" />
			<reference href="https://bdu.fstec.ru/vul/2025-09827" type="self" id="BDU:2025-09827" title="BDU:2025-09827" />
			<reference href="https://bdu.fstec.ru/vul/2025-09829" type="self" id="BDU:2025-09829" title="BDU:2025-09829" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql13" epoch="0" version="13.22" release="1.el7" arch="x86_64" src="">
					<filename>postgresql13-0:13.22-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250923-08</id>
		<issued date="2025-09-23" />
		<updated date="2025-09-23" />
		<title>Множественные уязвимости postgresql16 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql16</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql16-cve-2025-8714-cve-2025-8713/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql16
                или
                    Установить обновление для пакета(ов) postgresql16
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql16-cve-2025-8714-cve-2025-8713/" type="self" id="ROS-20250923-08" title="ROS-20250923-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8713" type="cve" id="CVE-2025-8713" title="CVE-2025-8713" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8714" type="cve" id="CVE-2025-8714" title="CVE-2025-8714" />
			<reference href="https://bdu.fstec.ru/vul/2025-09827" type="self" id="BDU:2025-09827" title="BDU:2025-09827" />
			<reference href="https://bdu.fstec.ru/vul/2025-09829" type="self" id="BDU:2025-09829" title="BDU:2025-09829" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql16" epoch="0" version="16.10" release="1.el7" arch="x86_64" src="">
					<filename>postgresql16-0:16.10-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250923-09</id>
		<issued date="2025-09-23" />
		<updated date="2025-09-23" />
		<title>Множественные уязвимости postgresql15 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql15</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql15-cve-2025-8714-cve-2025-8713/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql15
                или
                    Установить обновление для пакета(ов) postgresql15
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql15-cve-2025-8714-cve-2025-8713/" type="self" id="ROS-20250923-09" title="ROS-20250923-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8713" type="cve" id="CVE-2025-8713" title="CVE-2025-8713" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8714" type="cve" id="CVE-2025-8714" title="CVE-2025-8714" />
			<reference href="https://bdu.fstec.ru/vul/2025-09827" type="self" id="BDU:2025-09827" title="BDU:2025-09827" />
			<reference href="https://bdu.fstec.ru/vul/2025-09829" type="self" id="BDU:2025-09829" title="BDU:2025-09829" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql15" epoch="0" version="15.14" release="1.el7" arch="x86_64" src="">
					<filename>postgresql15-0:15.14-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250923-10</id>
		<issued date="2025-09-23" />
		<updated date="2025-09-23" />
		<title>Множественные уязвимости postgresql17 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql17</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql17-cve-2025-8714-cve-2025-8713/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql17
                или
                    Установить обновление для пакета(ов) postgresql17
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql17-cve-2025-8714-cve-2025-8713/" type="self" id="ROS-20250923-10" title="ROS-20250923-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8713" type="cve" id="CVE-2025-8713" title="CVE-2025-8713" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8714" type="cve" id="CVE-2025-8714" title="CVE-2025-8714" />
			<reference href="https://bdu.fstec.ru/vul/2025-09827" type="self" id="BDU:2025-09827" title="BDU:2025-09827" />
			<reference href="https://bdu.fstec.ru/vul/2025-09829" type="self" id="BDU:2025-09829" title="BDU:2025-09829" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql17" epoch="0" version="17.6" release="1.el7" arch="x86_64" src="">
					<filename>postgresql17-0:17.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250923-11</id>
		<issued date="2025-09-23" />
		<updated date="2025-09-23" />
		<title>Множественные уязвимости postgresql14 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql14</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql14-cve-2025-8714-cve-2025-8713/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql14
                или
                    Установить обновление для пакета(ов) postgresql14
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql14-cve-2025-8714-cve-2025-8713/" type="self" id="ROS-20250923-11" title="ROS-20250923-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8713" type="cve" id="CVE-2025-8713" title="CVE-2025-8713" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8714" type="cve" id="CVE-2025-8714" title="CVE-2025-8714" />
			<reference href="https://bdu.fstec.ru/vul/2025-09827" type="self" id="BDU:2025-09827" title="BDU:2025-09827" />
			<reference href="https://bdu.fstec.ru/vul/2025-09829" type="self" id="BDU:2025-09829" title="BDU:2025-09829" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql14" epoch="0" version="14.19" release="1.el7" arch="x86_64" src="">
					<filename>postgresql14-0:14.19-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250923-12</id>
		<issued date="2025-09-23" />
		<updated date="2025-09-23" />
		<title>Множественные уязвимости postgresql15-1c </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql15-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql15-1c-cve-2025-8714-cve-2025-8713/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql15-1c
                или
                    Установить обновление для пакета(ов) postgresql15-1c
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql15-1c-cve-2025-8714-cve-2025-8713/" type="self" id="ROS-20250923-12" title="ROS-20250923-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8713" type="cve" id="CVE-2025-8713" title="CVE-2025-8713" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8714" type="cve" id="CVE-2025-8714" title="CVE-2025-8714" />
			<reference href="https://bdu.fstec.ru/vul/2025-09827" type="self" id="BDU:2025-09827" title="BDU:2025-09827" />
			<reference href="https://bdu.fstec.ru/vul/2025-09829" type="self" id="BDU:2025-09829" title="BDU:2025-09829" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql15-1c" epoch="0" version="15.14" release="1.el7" arch="x86_64" src="">
					<filename>postgresql15-1c-0:15.14-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250923-13</id>
		<issued date="2025-09-23" />
		<updated date="2025-09-23" />
		<title>Множественные уязвимости postgresql17-1c </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql17-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql17-1c-cve-2025-8714-cve-2025-8713/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql17-1c
                или
                    Установить обновление для пакета(ов) postgresql17-1c
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql17-1c-cve-2025-8714-cve-2025-8713/" type="self" id="ROS-20250923-13" title="ROS-20250923-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8713" type="cve" id="CVE-2025-8713" title="CVE-2025-8713" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8714" type="cve" id="CVE-2025-8714" title="CVE-2025-8714" />
			<reference href="https://bdu.fstec.ru/vul/2025-09827" type="self" id="BDU:2025-09827" title="BDU:2025-09827" />
			<reference href="https://bdu.fstec.ru/vul/2025-09829" type="self" id="BDU:2025-09829" title="BDU:2025-09829" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql17-1c" epoch="0" version="17.6" release="1.el7" arch="x86_64" src="">
					<filename>postgresql17-1c-0:17.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250923-14</id>
		<issued date="2025-09-23" />
		<updated date="2025-09-23" />
		<title>Множественные уязвимости postgresql-1c </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql-1c-cve-2025-8714-cve-2025-8713/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql-1c
                или
                    Установить обновление для пакета(ов) postgresql-1c
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-postgresql-1c-cve-2025-8714-cve-2025-8713/" type="self" id="ROS-20250923-14" title="ROS-20250923-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8713" type="cve" id="CVE-2025-8713" title="CVE-2025-8713" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8714" type="cve" id="CVE-2025-8714" title="CVE-2025-8714" />
			<reference href="https://bdu.fstec.ru/vul/2025-09827" type="self" id="BDU:2025-09827" title="BDU:2025-09827" />
			<reference href="https://bdu.fstec.ru/vul/2025-09829" type="self" id="BDU:2025-09829" title="BDU:2025-09829" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql-1c" epoch="0" version="14.19" release="1.el7" arch="x86_64" src="">
					<filename>postgresql-1c-0:14.19-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250923-15</id>
		<issued date="2025-09-23" />
		<updated date="2025-09-23" />
		<title>Уязвимость samba </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в samba</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-samba-cve-2020-25720/</description>
               <solution>
                    Запретить использование в ОС пакета samba
                или
                    Установить обновление для пакета(ов) samba
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-samba-cve-2020-25720/" type="self" id="ROS-20250923-15" title="ROS-20250923-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25720" type="cve" id="CVE-2020-25720" title="CVE-2020-25720" />
			<reference href="https://bdu.fstec.ru/vul/2025-00114" type="self" id="BDU:2025-00114" title="BDU:2025-00114" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="samba" epoch="0" version="4.19.9" release="2h.el7" arch="x86_64" src="">
					<filename>samba-0:4.19.9-2h.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250923-17</id>
		<issued date="2025-09-23" />
		<updated date="2025-09-23" />
		<title>Уязвимость zabbix7.2-agent </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в zabbix7.2-agent</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimosti-zabbix7-2-agent-cve-2025-27238/</description>
               <solution>
                    Запретить использование в ОС пакета zabbix7.2-agent
                или
                    Установить обновление для пакета(ов) zabbix7.2-agent
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimosti-zabbix7-2-agent-cve-2025-27238/" type="self" id="ROS-20250923-17" title="ROS-20250923-17" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27238" type="cve" id="CVE-2025-27238" title="CVE-2025-27238" />
			<reference href="https://bdu.fstec.ru/vul/2025-11597" type="self" id="BDU:2025-11597" title="BDU:2025-11597" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix7.2-agent" epoch="1" version="7.2.12" release="1.el7" arch="x86_64" src="">
					<filename>zabbix7.2-agent-1:7.2.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250923-16</id>
		<issued date="2025-09-23" />
		<updated date="2025-09-23" />
		<title>Уязвимость zabbix7-lts-agent </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в zabbix7-lts-agent</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-lts-agent-cve-2025-27238/</description>
               <solution>
                    Запретить использование в ОС пакета zabbix7-lts-agent
                или
                    Установить обновление для пакета(ов) zabbix7-lts-agent
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-lts-agent-cve-2025-27238/" type="self" id="ROS-20250923-16" title="ROS-20250923-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27238" type="cve" id="CVE-2025-27238" title="CVE-2025-27238" />
			<reference href="https://bdu.fstec.ru/vul/2025-11597" type="self" id="BDU:2025-11597" title="BDU:2025-11597" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix7-lts-agent" epoch="1" version="7.0.18" release="1.el7" arch="x86_64" src="">
					<filename>zabbix7-lts-agent-1:7.0.18-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250923-18</id>
		<issued date="2025-09-23" />
		<updated date="2025-09-23" />
		<title>Уязвимость zabbix7-lts-agent </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в zabbix7-lts-agent</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-lts-agent-cve-2025-27240/</description>
               <solution>
                    Запретить использование в ОС пакета zabbix7-lts-agent
                или
                    Установить обновление для пакета(ов) zabbix7-lts-agent
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-lts-agent-cve-2025-27240/" type="self" id="ROS-20250923-18" title="ROS-20250923-18" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27240" type="cve" id="CVE-2025-27240" title="CVE-2025-27240" />
			<reference href="https://bdu.fstec.ru/vul/2025-11596" type="self" id="BDU:2025-11596" title="BDU:2025-11596" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix7-lts-agent" epoch="1" version="7.0.5" release="1.el7" arch="x86_64" src="">
					<filename>zabbix7-lts-agent-1:7.0.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250923-19</id>
		<issued date="2025-09-23" />
		<updated date="2025-09-23" />
		<title>Уязвимость zabbix-agent </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в zabbix-agent</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix-agent-cve-2025-27240/</description>
               <solution>
                    Запретить использование в ОС пакета zabbix-agent
                или
                    Установить обновление для пакета(ов) zabbix-agent
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix-agent-cve-2025-27240/" type="self" id="ROS-20250923-19" title="ROS-20250923-19" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27240" type="cve" id="CVE-2025-27240" title="CVE-2025-27240" />
			<reference href="https://bdu.fstec.ru/vul/2025-11596" type="self" id="BDU:2025-11596" title="BDU:2025-11596" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix-agent" epoch="1" version="6.4.20" release="1.el7" arch="x86_64" src="">
					<filename>zabbix-agent-1:6.4.20-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250923-23</id>
		<issued date="2025-09-23" />
		<updated date="2025-09-25" />
		<title>Уязвимость zabbix-lts-agent </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в zabbix-lts-agent</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix-lts-agent-cve-2025-27240/</description>
               <solution>
                    Запретить использование в ОС пакета zabbix-lts-agent
                или
                    Установить обновление для пакета(ов) zabbix-lts-agent
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix-lts-agent-cve-2025-27240/" type="self" id="ROS-20250923-23" title="ROS-20250923-23" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27240" type="cve" id="CVE-2025-27240" title="CVE-2025-27240" />
			<reference href="https://bdu.fstec.ru/vul/2025-11596" type="self" id="BDU:2025-11596" title="BDU:2025-11596" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix-lts-agent" epoch="1" version="6.0.36" release="1.el7" arch="x86_64" src="">
					<filename>zabbix-lts-agent-1:6.0.36-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250923-21</id>
		<issued date="2025-09-23" />
		<updated date="2025-09-23" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2025-47906/</description>
               <solution>
                    Запретить использование в ОС пакета golang
                или
                    Установить обновление для пакета(ов) golang
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2025-47906/" type="self" id="ROS-20250923-21" title="ROS-20250923-21" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47906" type="cve" id="CVE-2025-47906" title="CVE-2025-47906" />
			<reference href="https://bdu.fstec.ru/vul/2025-11595" type="self" id="BDU:2025-11595" title="BDU:2025-11595" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.24.6" release="1.el7" arch="x86_64" src="">
					<filename>golang-0:1.24.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250923-22</id>
		<issued date="2025-09-23" />
		<updated date="2025-09-23" />
		<title>Множественные уязвимости curl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-curl-cve-2023-23916-cve-2023-23915/</description>
               <solution>
                    Запретить использование в ОС пакета curl 
                или
                    Установить обновление для пакета(ов) curl 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-curl-cve-2023-23916-cve-2023-23915/" type="self" id="ROS-20250923-22" title="ROS-20250923-22" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23915" type="cve" id="CVE-2023-23915" title="CVE-2023-23915" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23916" type="cve" id="CVE-2023-23916" title="CVE-2023-23916" />
			<reference href="https://bdu.fstec.ru/vul/2025-11571" type="self" id="BDU:2025-11571" title="BDU:2025-11571" />
			<reference href="https://bdu.fstec.ru/vul/2023-07689" type="self" id="BDU:2023-07689" title="BDU:2023-07689" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="curl" epoch="0" version="7.85.0" release="11.el7.3" arch="x86_64" src="">
					<filename>curl-0:7.85.0-11.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250924-01</id>
		<issued date="2025-09-24" />
		<updated date="2025-09-24" />
		<title>Уязвимость python3-pip </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-pip</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-pip-cve-2023-5752/</description>
               <solution>
                    Запретить использование в ОС пакета python3-pip
                или
                    Установить обновление для пакета(ов) python3-pip
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-pip-cve-2023-5752/" type="self" id="ROS-20250924-01" title="ROS-20250924-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5752" type="cve" id="CVE-2023-5752" title="CVE-2023-5752" />
			<reference href="https://bdu.fstec.ru/vul/2023-08026" type="self" id="BDU:2023-08026" title="BDU:2023-08026" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-pip" epoch="0" version="20.2.2" release="1.el7" arch="noarch" src="">
					<filename>python3-pip-0:20.2.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250924-02</id>
		<issued date="2025-09-24" />
		<updated date="2025-09-24" />
		<title>Множественные уязвимости pcp </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в pcp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-pcp-cve-2024-45769-cve-2024-45770/</description>
               <solution>
                    Запретить использование в ОС пакета pcp
                или
                    Установить обновление для пакета(ов) pcp
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-pcp-cve-2024-45769-cve-2024-45770/" type="self" id="ROS-20250924-02" title="ROS-20250924-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45770" type="cve" id="CVE-2024-45770" title="CVE-2024-45770" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45769" type="cve" id="CVE-2024-45769" title="CVE-2024-45769" />
			<reference href="https://bdu.fstec.ru/vul/2025-12378" type="self" id="BDU:2025-12378" title="BDU:2025-12378" />
			<reference href="https://bdu.fstec.ru/vul/2025-12383" type="self" id="BDU:2025-12383" title="BDU:2025-12383" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pcp" epoch="0" version="6.2.0" release="2.el7" arch="x86_64" src="">
					<filename>pcp-0:6.2.0-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250924-03</id>
		<issued date="2025-09-24" />
		<updated date="2025-09-24" />
		<title>Множественные уязвимости VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-virtualbox-cve-2025-30712-cve-2025-30725-cve-2025-30719/</description>
               <solution>
                    Запретить использование в ОС пакета VirtualBox
                или
                    Установить обновление для пакета(ов) VirtualBox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-virtualbox-cve-2025-30712-cve-2025-30725-cve-2025-30719/" type="self" id="ROS-20250924-03" title="ROS-20250924-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30719" type="cve" id="CVE-2025-30719" title="CVE-2025-30719" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30712" type="cve" id="CVE-2025-30712" title="CVE-2025-30712" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30725" type="cve" id="CVE-2025-30725" title="CVE-2025-30725" />
			<reference href="https://bdu.fstec.ru/vul/2025-05241" type="self" id="BDU:2025-05241" title="BDU:2025-05241" />
			<reference href="https://bdu.fstec.ru/vul/2025-08108" type="self" id="BDU:2025-08108" title="BDU:2025-08108" />
			<reference href="https://bdu.fstec.ru/vul/2025-05240" type="self" id="BDU:2025-05240" title="BDU:2025-05240" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox" epoch="0" version="7.1.12" release="1.el7" arch="x86_64" src="">
					<filename>VirtualBox-0:7.1.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250924-04</id>
		<issued date="2025-09-24" />
		<updated date="2025-09-24" />
		<title>Множественные уязвимости VirtualBox-guest-additions </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox-guest-additions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-virtualbox-guest-additions-cve-2025-30712-cve-2025-30725-cve-2025-30719/</description>
               <solution>
                    Запретить использование в ОС пакета VirtualBox-guest-additions
                или
                    Установить обновление для пакета(ов) VirtualBox-guest-additions
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-virtualbox-guest-additions-cve-2025-30712-cve-2025-30725-cve-2025-30719/" type="self" id="ROS-20250924-04" title="ROS-20250924-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30719" type="cve" id="CVE-2025-30719" title="CVE-2025-30719" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30712" type="cve" id="CVE-2025-30712" title="CVE-2025-30712" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30725" type="cve" id="CVE-2025-30725" title="CVE-2025-30725" />
			<reference href="https://bdu.fstec.ru/vul/2025-05241" type="self" id="BDU:2025-05241" title="BDU:2025-05241" />
			<reference href="https://bdu.fstec.ru/vul/2025-08108" type="self" id="BDU:2025-08108" title="BDU:2025-08108" />
			<reference href="https://bdu.fstec.ru/vul/2025-05240" type="self" id="BDU:2025-05240" title="BDU:2025-05240" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox-guest-additions" epoch="0" version="7.1.12" release="1.el7" arch="x86_64" src="">
					<filename>VirtualBox-guest-additions-0:7.1.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250924-05</id>
		<issued date="2025-09-24" />
		<updated date="2025-09-24" />
		<title>Множественные уязвимости kea </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kea</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kea-cve-2025-32802-cve-2025-32803/</description>
               <solution>
                    Запретить использование в ОС пакета kea
                или
                    Установить обновление для пакета(ов) kea
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kea-cve-2025-32802-cve-2025-32803/" type="self" id="ROS-20250924-05" title="ROS-20250924-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32802" type="cve" id="CVE-2025-32802" title="CVE-2025-32802" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32803" type="cve" id="CVE-2025-32803" title="CVE-2025-32803" />
			<reference href="https://bdu.fstec.ru/vul/2025-11746" type="self" id="BDU:2025-11746" title="BDU:2025-11746" />
			<reference href="https://bdu.fstec.ru/vul/2025-11745" type="self" id="BDU:2025-11745" title="BDU:2025-11745" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kea" epoch="0" version="3.0.0" release="2.el7" arch="x86_64" src="">
					<filename>kea-0:3.0.0-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250924-06</id>
		<issued date="2025-09-24" />
		<updated date="2025-09-24" />
		<title>Множественные уязвимости python3-django </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-django</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-django-cve-2025-48432-cve-2025-57833/</description>
               <solution>
                    Запретить использование в ОС пакета python3-django
                или
                    Установить обновление для пакета(ов) python3-django
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-django-cve-2025-48432-cve-2025-57833/" type="self" id="ROS-20250924-06" title="ROS-20250924-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-57833" type="cve" id="CVE-2025-57833" title="CVE-2025-57833" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48432" type="cve" id="CVE-2025-48432" title="CVE-2025-48432" />
			<reference href="https://bdu.fstec.ru/vul/2025-11748" type="self" id="BDU:2025-11748" title="BDU:2025-11748" />
			<reference href="https://bdu.fstec.ru/vul/2025-06450" type="self" id="BDU:2025-06450" title="BDU:2025-06450" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-django" epoch="0" version="4.2.24" release="1.el7" arch="noarch" src="">
					<filename>python3-django-0:4.2.24-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250924-07</id>
		<issued date="2025-09-24" />
		<updated date="2025-09-24" />
		<title>Уязвимость gimp </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2025-5473/</description>
               <solution>
                    Запретить использование в ОС пакета gimp
                или
                    Установить обновление для пакета(ов) gimp
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2025-5473/" type="self" id="ROS-20250924-07" title="ROS-20250924-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5473" type="cve" id="CVE-2025-5473" title="CVE-2025-5473" />
			<reference href="https://bdu.fstec.ru/vul/2025-11787" type="self" id="BDU:2025-11787" title="BDU:2025-11787" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gimp" epoch="2" version="2.10.36" release="4.el7" arch="x86_64" src="">
					<filename>gimp-2:2.10.36-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250924-08</id>
		<issued date="2025-09-24" />
		<updated date="2025-09-24" />
		<title>Множественные уязвимости gdk-pixbuf2 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gdk-pixbuf2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gdk-pixbuf2-cve-2025-6199-cve-2025-7345/</description>
               <solution>
                    Запретить использование в ОС пакета gdk-pixbuf2
                или
                    Установить обновление для пакета(ов) gdk-pixbuf2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gdk-pixbuf2-cve-2025-6199-cve-2025-7345/" type="self" id="ROS-20250924-08" title="ROS-20250924-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7345" type="cve" id="CVE-2025-7345" title="CVE-2025-7345" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6199" type="cve" id="CVE-2025-6199" title="CVE-2025-6199" />
			<reference href="https://bdu.fstec.ru/vul/2025-10733" type="self" id="BDU:2025-10733" title="BDU:2025-10733" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gdk-pixbuf2" epoch="0" version="2.40.0" release="11.el7" arch="x86_64" src="">
					<filename>gdk-pixbuf2-0:2.40.0-11.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250924-09</id>
		<issued date="2025-09-24" />
		<updated date="2025-09-24" />
		<title>Множественные уязвимости libssh</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libssh</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libssh-24092025/</description>
               <solution>
                    Запретить использование в ОС пакета libssh
                или
                    Установить обновление для пакета(ов) libssh
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libssh-24092025/" type="self" id="ROS-20250924-09" title="ROS-20250924-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8114" type="cve" id="CVE-2025-8114" title="CVE-2025-8114" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5449" type="cve" id="CVE-2025-5449" title="CVE-2025-5449" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4878" type="cve" id="CVE-2025-4878" title="CVE-2025-4878" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4877" type="cve" id="CVE-2025-4877" title="CVE-2025-4877" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5351" type="cve" id="CVE-2025-5351" title="CVE-2025-5351" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5987" type="cve" id="CVE-2025-5987" title="CVE-2025-5987" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5372" type="cve" id="CVE-2025-5372" title="CVE-2025-5372" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3603" type="cve" id="CVE-2023-3603" title="CVE-2023-3603" />
			<reference href="https://bdu.fstec.ru/vul/2025-12376" type="self" id="BDU:2025-12376" title="BDU:2025-12376" />
			<reference href="https://bdu.fstec.ru/vul/2025-07645" type="self" id="BDU:2025-07645" title="BDU:2025-07645" />
			<reference href="https://bdu.fstec.ru/vul/2025-07642" type="self" id="BDU:2025-07642" title="BDU:2025-07642" />
			<reference href="https://bdu.fstec.ru/vul/2025-07641" type="self" id="BDU:2025-07641" title="BDU:2025-07641" />
			<reference href="https://bdu.fstec.ru/vul/2025-07643" type="self" id="BDU:2025-07643" title="BDU:2025-07643" />
			<reference href="https://bdu.fstec.ru/vul/2025-07640" type="self" id="BDU:2025-07640" title="BDU:2025-07640" />
			<reference href="https://bdu.fstec.ru/vul/2025-07644" type="self" id="BDU:2025-07644" title="BDU:2025-07644" />
			<reference href="https://bdu.fstec.ru/vul/2025-12375" type="self" id="BDU:2025-12375" title="BDU:2025-12375" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libssh" epoch="0" version="0.11.3" release="1.el7" arch="x86_64" src="">
					<filename>libssh-0:0.11.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250923-42</id>
		<issued date="2025-09-24" />
		<updated date="2025-09-24" />
		<title>Множественные уязвимости libcurl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libcurl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libcurl-cve-2023-23916-cve-2023-239157046/</description>
               <solution>
                    Запретить использование в ОС пакета libcurl 
                или
                    Установить обновление для пакета(ов) libcurl 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libcurl-cve-2023-23916-cve-2023-239157046/" type="self" id="ROS-20250923-42" title="ROS-20250923-42" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23915" type="cve" id="CVE-2023-23915" title="CVE-2023-23915" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23916" type="cve" id="CVE-2023-23916" title="CVE-2023-23916" />
			<reference href="https://bdu.fstec.ru/vul/2025-11571" type="self" id="BDU:2025-11571" title="BDU:2025-11571" />
			<reference href="https://bdu.fstec.ru/vul/2023-07689" type="self" id="BDU:2023-07689" title="BDU:2023-07689" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libcurl" epoch="0" version="7.85.0" release="11.el7.3" arch="x86_64" src="">
					<filename>libcurl-0:7.85.0-11.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250925-01</id>
		<issued date="2025-09-25" />
		<updated date="2025-09-25" />
		<title>Множественные уязвимости python3.12</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в python3.12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-12-25092025/</description>
               <solution>
                    Запретить использование в ОС пакета python3.12
                или
                    Установить обновление для пакета(ов) python3.12
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-12-25092025/" type="self" id="ROS-20250925-01" title="ROS-20250925-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12718" type="cve" id="CVE-2024-12718" title="CVE-2024-12718" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4138" type="cve" id="CVE-2025-4138" title="CVE-2025-4138" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4517" type="cve" id="CVE-2025-4517" title="CVE-2025-4517" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4330" type="cve" id="CVE-2025-4330" title="CVE-2025-4330" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4435" type="cve" id="CVE-2025-4435" title="CVE-2025-4435" />
			<reference href="https://bdu.fstec.ru/vul/2025-12377" type="self" id="BDU:2025-12377" title="BDU:2025-12377" />
			<reference href="https://bdu.fstec.ru/vul/2025-09992" type="self" id="BDU:2025-09992" title="BDU:2025-09992" />
			<reference href="https://bdu.fstec.ru/vul/2025-06494" type="self" id="BDU:2025-06494" title="BDU:2025-06494" />
			<reference href="https://bdu.fstec.ru/vul/2025-09993" type="self" id="BDU:2025-09993" title="BDU:2025-09993" />
			<reference href="https://bdu.fstec.ru/vul/2025-09994" type="self" id="BDU:2025-09994" title="BDU:2025-09994" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.12" epoch="0" version="3.12.11" release="1.el7" arch="x86_64" src="">
					<filename>python3.12-0:3.12.11-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250925-02</id>
		<issued date="2025-09-25" />
		<updated date="2025-09-25" />
		<title>Множественные уязвимости python3.11</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в python3.11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-11-25092025/</description>
               <solution>
                    Запретить использование в ОС пакета python3.11
                или
                    Установить обновление для пакета(ов) python3.11
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-11-25092025/" type="self" id="ROS-20250925-02" title="ROS-20250925-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12718" type="cve" id="CVE-2024-12718" title="CVE-2024-12718" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4138" type="cve" id="CVE-2025-4138" title="CVE-2025-4138" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4517" type="cve" id="CVE-2025-4517" title="CVE-2025-4517" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4330" type="cve" id="CVE-2025-4330" title="CVE-2025-4330" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4435" type="cve" id="CVE-2025-4435" title="CVE-2025-4435" />
			<reference href="https://bdu.fstec.ru/vul/2025-12377" type="self" id="BDU:2025-12377" title="BDU:2025-12377" />
			<reference href="https://bdu.fstec.ru/vul/2025-09992" type="self" id="BDU:2025-09992" title="BDU:2025-09992" />
			<reference href="https://bdu.fstec.ru/vul/2025-06494" type="self" id="BDU:2025-06494" title="BDU:2025-06494" />
			<reference href="https://bdu.fstec.ru/vul/2025-09993" type="self" id="BDU:2025-09993" title="BDU:2025-09993" />
			<reference href="https://bdu.fstec.ru/vul/2025-09994" type="self" id="BDU:2025-09994" title="BDU:2025-09994" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.11" epoch="0" version="3.11.13" release="1.el7" arch="x86_64" src="">
					<filename>python3.11-0:3.11.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250925-03</id>
		<issued date="2025-09-25" />
		<updated date="2025-09-25" />
		<title>Множественные уязвимости python3.10</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в python3.10</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-10-25092025/</description>
               <solution>
                    Запретить использование в ОС пакета python3.10
                или
                    Установить обновление для пакета(ов) python3.10
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-10-25092025/" type="self" id="ROS-20250925-03" title="ROS-20250925-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12718" type="cve" id="CVE-2024-12718" title="CVE-2024-12718" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4138" type="cve" id="CVE-2025-4138" title="CVE-2025-4138" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4517" type="cve" id="CVE-2025-4517" title="CVE-2025-4517" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4330" type="cve" id="CVE-2025-4330" title="CVE-2025-4330" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4435" type="cve" id="CVE-2025-4435" title="CVE-2025-4435" />
			<reference href="https://bdu.fstec.ru/vul/2025-12377" type="self" id="BDU:2025-12377" title="BDU:2025-12377" />
			<reference href="https://bdu.fstec.ru/vul/2025-09992" type="self" id="BDU:2025-09992" title="BDU:2025-09992" />
			<reference href="https://bdu.fstec.ru/vul/2025-06494" type="self" id="BDU:2025-06494" title="BDU:2025-06494" />
			<reference href="https://bdu.fstec.ru/vul/2025-09993" type="self" id="BDU:2025-09993" title="BDU:2025-09993" />
			<reference href="https://bdu.fstec.ru/vul/2025-09994" type="self" id="BDU:2025-09994" title="BDU:2025-09994" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.10" epoch="0" version="3.10.18" release="1.el7" arch="x86_64" src="">
					<filename>python3.10-0:3.10.18-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250925-04</id>
		<issued date="2025-09-25" />
		<updated date="2025-09-25" />
		<title>Множественные уязвимости python3</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в python3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-25092025/</description>
               <solution>
                    Запретить использование в ОС пакета python3
                или
                    Установить обновление для пакета(ов) python3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-25092025/" type="self" id="ROS-20250925-04" title="ROS-20250925-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12718" type="cve" id="CVE-2024-12718" title="CVE-2024-12718" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4138" type="cve" id="CVE-2025-4138" title="CVE-2025-4138" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4517" type="cve" id="CVE-2025-4517" title="CVE-2025-4517" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4330" type="cve" id="CVE-2025-4330" title="CVE-2025-4330" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4435" type="cve" id="CVE-2025-4435" title="CVE-2025-4435" />
			<reference href="https://bdu.fstec.ru/vul/2025-12377" type="self" id="BDU:2025-12377" title="BDU:2025-12377" />
			<reference href="https://bdu.fstec.ru/vul/2025-09992" type="self" id="BDU:2025-09992" title="BDU:2025-09992" />
			<reference href="https://bdu.fstec.ru/vul/2025-06494" type="self" id="BDU:2025-06494" title="BDU:2025-06494" />
			<reference href="https://bdu.fstec.ru/vul/2025-09993" type="self" id="BDU:2025-09993" title="BDU:2025-09993" />
			<reference href="https://bdu.fstec.ru/vul/2025-09994" type="self" id="BDU:2025-09994" title="BDU:2025-09994" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3" epoch="0" version="3.8.20" release="5.el7" arch="x86_64" src="">
					<filename>python3-0:3.8.20-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250925-05</id>
		<issued date="2025-09-25" />
		<updated date="2025-09-25" />
		<title>Множественные уязвимости nvidia-modprobe</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nvidia-modprobe</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nvidia-modprobe-25092025/</description>
               <solution>
                    Запретить использование в ОС пакета nvidia-modprobe
                или
                    Установить обновление для пакета(ов) nvidia-modprobe
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nvidia-modprobe-25092025/" type="self" id="ROS-20250925-05" title="ROS-20250925-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23244" type="cve" id="CVE-2025-23244" title="CVE-2025-23244" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23284" type="cve" id="CVE-2025-23284" title="CVE-2025-23284" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23283" type="cve" id="CVE-2025-23283" title="CVE-2025-23283" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23277" type="cve" id="CVE-2025-23277" title="CVE-2025-23277" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25516" type="cve" id="CVE-2023-25516" title="CVE-2023-25516" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0126" type="cve" id="CVE-2024-0126" title="CVE-2024-0126" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0128" type="cve" id="CVE-2024-0128" title="CVE-2024-0128" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25515" type="cve" id="CVE-2023-25515" title="CVE-2023-25515" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0147" type="cve" id="CVE-2024-0147" title="CVE-2024-0147" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0149" type="cve" id="CVE-2024-0149" title="CVE-2024-0149" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0150" type="cve" id="CVE-2024-0150" title="CVE-2024-0150" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53869" type="cve" id="CVE-2024-53869" title="CVE-2024-53869" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25517" type="cve" id="CVE-2023-25517" title="CVE-2023-25517" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0127" type="cve" id="CVE-2024-0127" title="CVE-2024-0127" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0146" type="cve" id="CVE-2024-0146" title="CVE-2024-0146" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53881" type="cve" id="CVE-2024-53881" title="CVE-2024-53881" />
			<reference href="https://bdu.fstec.ru/vul/2025-12380" type="self" id="BDU:2025-12380" title="BDU:2025-12380" />
			<reference href="https://bdu.fstec.ru/vul/2025-09413" type="self" id="BDU:2025-09413" title="BDU:2025-09413" />
			<reference href="https://bdu.fstec.ru/vul/2025-09414" type="self" id="BDU:2025-09414" title="BDU:2025-09414" />
			<reference href="https://bdu.fstec.ru/vul/2025-09409" type="self" id="BDU:2025-09409" title="BDU:2025-09409" />
			<reference href="https://bdu.fstec.ru/vul/2025-12381" type="self" id="BDU:2025-12381" title="BDU:2025-12381" />
			<reference href="https://bdu.fstec.ru/vul/2024-11075" type="self" id="BDU:2024-11075" title="BDU:2024-11075" />
			<reference href="https://bdu.fstec.ru/vul/2024-09486" type="self" id="BDU:2024-09486" title="BDU:2024-09486" />
			<reference href="https://bdu.fstec.ru/vul/2023-06212" type="self" id="BDU:2023-06212" title="BDU:2023-06212" />
			<reference href="https://bdu.fstec.ru/vul/2025-11728" type="self" id="BDU:2025-11728" title="BDU:2025-11728" />
			<reference href="https://bdu.fstec.ru/vul/2025-06250" type="self" id="BDU:2025-06250" title="BDU:2025-06250" />
			<reference href="https://bdu.fstec.ru/vul/2025-12379" type="self" id="BDU:2025-12379" title="BDU:2025-12379" />
			<reference href="https://bdu.fstec.ru/vul/2025-12382" type="self" id="BDU:2025-12382" title="BDU:2025-12382" />
			<reference href="https://bdu.fstec.ru/vul/2024-09488" type="self" id="BDU:2024-09488" title="BDU:2024-09488" />
			<reference href="https://bdu.fstec.ru/vul/2025-01460" type="self" id="BDU:2025-01460" title="BDU:2025-01460" />
			<reference href="https://bdu.fstec.ru/vul/2025-11729" type="self" id="BDU:2025-11729" title="BDU:2025-11729" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nvidia-modprobe" epoch="3" version="580.76.05" release="1.el7" arch="x86_64" src="">
					<filename>nvidia-modprobe-3:580.76.05-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250925-07</id>
		<issued date="2025-09-25" />
		<updated date="2025-09-27" />
		<title>Множественные уязвимости nvidia-persistenced</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nvidia-persistenced</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nvidia-persistenced-25092025/</description>
               <solution>
                    Запретить использование в ОС пакета nvidia-persistenced
                или
                    Установить обновление для пакета(ов) nvidia-persistenced
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nvidia-persistenced-25092025/" type="self" id="ROS-20250925-07" title="ROS-20250925-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23244" type="cve" id="CVE-2025-23244" title="CVE-2025-23244" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23284" type="cve" id="CVE-2025-23284" title="CVE-2025-23284" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23283" type="cve" id="CVE-2025-23283" title="CVE-2025-23283" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23277" type="cve" id="CVE-2025-23277" title="CVE-2025-23277" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25516" type="cve" id="CVE-2023-25516" title="CVE-2023-25516" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0126" type="cve" id="CVE-2024-0126" title="CVE-2024-0126" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0128" type="cve" id="CVE-2024-0128" title="CVE-2024-0128" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25515" type="cve" id="CVE-2023-25515" title="CVE-2023-25515" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0147" type="cve" id="CVE-2024-0147" title="CVE-2024-0147" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0149" type="cve" id="CVE-2024-0149" title="CVE-2024-0149" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0150" type="cve" id="CVE-2024-0150" title="CVE-2024-0150" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53869" type="cve" id="CVE-2024-53869" title="CVE-2024-53869" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25517" type="cve" id="CVE-2023-25517" title="CVE-2023-25517" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0127" type="cve" id="CVE-2024-0127" title="CVE-2024-0127" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0146" type="cve" id="CVE-2024-0146" title="CVE-2024-0146" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53881" type="cve" id="CVE-2024-53881" title="CVE-2024-53881" />
			<reference href="https://bdu.fstec.ru/vul/2025-12380" type="self" id="BDU:2025-12380" title="BDU:2025-12380" />
			<reference href="https://bdu.fstec.ru/vul/2025-09413" type="self" id="BDU:2025-09413" title="BDU:2025-09413" />
			<reference href="https://bdu.fstec.ru/vul/2025-09414" type="self" id="BDU:2025-09414" title="BDU:2025-09414" />
			<reference href="https://bdu.fstec.ru/vul/2025-09409" type="self" id="BDU:2025-09409" title="BDU:2025-09409" />
			<reference href="https://bdu.fstec.ru/vul/2025-12381" type="self" id="BDU:2025-12381" title="BDU:2025-12381" />
			<reference href="https://bdu.fstec.ru/vul/2024-11075" type="self" id="BDU:2024-11075" title="BDU:2024-11075" />
			<reference href="https://bdu.fstec.ru/vul/2024-09486" type="self" id="BDU:2024-09486" title="BDU:2024-09486" />
			<reference href="https://bdu.fstec.ru/vul/2023-06212" type="self" id="BDU:2023-06212" title="BDU:2023-06212" />
			<reference href="https://bdu.fstec.ru/vul/2025-11728" type="self" id="BDU:2025-11728" title="BDU:2025-11728" />
			<reference href="https://bdu.fstec.ru/vul/2025-06250" type="self" id="BDU:2025-06250" title="BDU:2025-06250" />
			<reference href="https://bdu.fstec.ru/vul/2025-12379" type="self" id="BDU:2025-12379" title="BDU:2025-12379" />
			<reference href="https://bdu.fstec.ru/vul/2025-12382" type="self" id="BDU:2025-12382" title="BDU:2025-12382" />
			<reference href="https://bdu.fstec.ru/vul/2024-09488" type="self" id="BDU:2024-09488" title="BDU:2024-09488" />
			<reference href="https://bdu.fstec.ru/vul/2025-01460" type="self" id="BDU:2025-01460" title="BDU:2025-01460" />
			<reference href="https://bdu.fstec.ru/vul/2025-11729" type="self" id="BDU:2025-11729" title="BDU:2025-11729" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nvidia-persistenced" epoch="3" version="580.76.05" release="1.el7" arch="x86_64" src="">
					<filename>nvidia-persistenced-3:580.76.05-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250925-06</id>
		<issued date="2025-09-25" />
		<updated date="2025-09-25" />
		<title>Множественные уязвимости nvidia-drivers</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nvidia-drivers</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nvidia-drivers-25092025/</description>
               <solution>
                    Запретить использование в ОС пакета nvidia-drivers
                или
                    Установить обновление для пакета(ов) nvidia-drivers
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nvidia-drivers-25092025/" type="self" id="ROS-20250925-06" title="ROS-20250925-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23244" type="cve" id="CVE-2025-23244" title="CVE-2025-23244" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23284" type="cve" id="CVE-2025-23284" title="CVE-2025-23284" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23283" type="cve" id="CVE-2025-23283" title="CVE-2025-23283" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23277" type="cve" id="CVE-2025-23277" title="CVE-2025-23277" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25516" type="cve" id="CVE-2023-25516" title="CVE-2023-25516" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0126" type="cve" id="CVE-2024-0126" title="CVE-2024-0126" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0128" type="cve" id="CVE-2024-0128" title="CVE-2024-0128" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25515" type="cve" id="CVE-2023-25515" title="CVE-2023-25515" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0147" type="cve" id="CVE-2024-0147" title="CVE-2024-0147" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0149" type="cve" id="CVE-2024-0149" title="CVE-2024-0149" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0150" type="cve" id="CVE-2024-0150" title="CVE-2024-0150" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53869" type="cve" id="CVE-2024-53869" title="CVE-2024-53869" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25517" type="cve" id="CVE-2023-25517" title="CVE-2023-25517" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0127" type="cve" id="CVE-2024-0127" title="CVE-2024-0127" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0146" type="cve" id="CVE-2024-0146" title="CVE-2024-0146" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53881" type="cve" id="CVE-2024-53881" title="CVE-2024-53881" />
			<reference href="https://bdu.fstec.ru/vul/2025-12380" type="self" id="BDU:2025-12380" title="BDU:2025-12380" />
			<reference href="https://bdu.fstec.ru/vul/2025-09413" type="self" id="BDU:2025-09413" title="BDU:2025-09413" />
			<reference href="https://bdu.fstec.ru/vul/2025-09414" type="self" id="BDU:2025-09414" title="BDU:2025-09414" />
			<reference href="https://bdu.fstec.ru/vul/2025-09409" type="self" id="BDU:2025-09409" title="BDU:2025-09409" />
			<reference href="https://bdu.fstec.ru/vul/2025-12381" type="self" id="BDU:2025-12381" title="BDU:2025-12381" />
			<reference href="https://bdu.fstec.ru/vul/2024-11075" type="self" id="BDU:2024-11075" title="BDU:2024-11075" />
			<reference href="https://bdu.fstec.ru/vul/2024-09486" type="self" id="BDU:2024-09486" title="BDU:2024-09486" />
			<reference href="https://bdu.fstec.ru/vul/2023-06212" type="self" id="BDU:2023-06212" title="BDU:2023-06212" />
			<reference href="https://bdu.fstec.ru/vul/2025-11728" type="self" id="BDU:2025-11728" title="BDU:2025-11728" />
			<reference href="https://bdu.fstec.ru/vul/2025-06250" type="self" id="BDU:2025-06250" title="BDU:2025-06250" />
			<reference href="https://bdu.fstec.ru/vul/2025-12379" type="self" id="BDU:2025-12379" title="BDU:2025-12379" />
			<reference href="https://bdu.fstec.ru/vul/2025-12382" type="self" id="BDU:2025-12382" title="BDU:2025-12382" />
			<reference href="https://bdu.fstec.ru/vul/2024-09488" type="self" id="BDU:2024-09488" title="BDU:2024-09488" />
			<reference href="https://bdu.fstec.ru/vul/2025-01460" type="self" id="BDU:2025-01460" title="BDU:2025-01460" />
			<reference href="https://bdu.fstec.ru/vul/2025-11729" type="self" id="BDU:2025-11729" title="BDU:2025-11729" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nvidia-drivers" epoch="3" version="580.76.05" release="2.el7" arch="x86_64" src="">
					<filename>nvidia-drivers-3:580.76.05-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250929-01</id>
		<issued date="2025-09-29" />
		<updated date="2025-09-29" />
		<title>Множественные уязвимости dcmtk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dcmtk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-dcmtk-cve-2024-47796-cve-2024-52333/</description>
               <solution>
                    Запретить использование в ОС пакета dcmtk
                или
                    Установить обновление для пакета(ов) dcmtk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-dcmtk-cve-2024-47796-cve-2024-52333/" type="self" id="ROS-20250929-01" title="ROS-20250929-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47796" type="cve" id="CVE-2024-47796" title="CVE-2024-47796" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52333" type="cve" id="CVE-2024-52333" title="CVE-2024-52333" />
			<reference href="https://bdu.fstec.ru/vul/2025-08003" type="self" id="BDU:2025-08003" title="BDU:2025-08003" />
			<reference href="https://bdu.fstec.ru/vul/2025-07883" type="self" id="BDU:2025-07883" title="BDU:2025-07883" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dcmtk" epoch="0" version="3.6.8" release="3.el7" arch="x86_64" src="">
					<filename>dcmtk-0:3.6.8-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250929-02</id>
		<issued date="2025-09-29" />
		<updated date="2025-09-29" />
		<title>Уязвимость icu </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в icu</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-icu-cve-2025-5222/</description>
               <solution>
                    Запретить использование в ОС пакета icu
                или
                    Установить обновление для пакета(ов) icu
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-icu-cve-2025-5222/" type="self" id="ROS-20250929-02" title="ROS-20250929-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5222" type="cve" id="CVE-2025-5222" title="CVE-2025-5222" />
			<reference href="https://bdu.fstec.ru/vul/2025-10931" type="self" id="BDU:2025-10931" title="BDU:2025-10931" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="icu" epoch="1" version="65.1" release="6.el7" arch="x86_64" src="">
					<filename>icu-1:65.1-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250929-03</id>
		<issued date="2025-09-29" />
		<updated date="2025-09-29" />
		<title>Уязвимость perl-File-Find-Rule </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в perl-File-Find-Rule</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-file-find-rule-cve-2011-10007/</description>
               <solution>
                    Запретить использование в ОС пакета perl-File-Find-Rule
                или
                    Установить обновление для пакета(ов) perl-File-Find-Rule
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-file-find-rule-cve-2011-10007/" type="self" id="ROS-20250929-03" title="ROS-20250929-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-10007" type="cve" id="CVE-2011-10007" title="CVE-2011-10007" />
			<reference href="https://bdu.fstec.ru/vul/2025-12301" type="self" id="BDU:2025-12301" title="BDU:2025-12301" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="perl-File-Find-Rule" epoch="0" version="0.35" release="1.el7" arch="noarch" src="">
					<filename>perl-File-Find-Rule-0:0.35-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250929-04</id>
		<issued date="2025-09-29" />
		<updated date="2025-09-29" />
		<title>Уязвимость apache-commons-fileupload </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в apache-commons-fileupload</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-commons-fileupload-cve-2016-3092/</description>
               <solution>
                    Запретить использование в ОС пакета apache-commons-fileupload
                или
                    Установить обновление для пакета(ов) apache-commons-fileupload
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-commons-fileupload-cve-2016-3092/" type="self" id="ROS-20250929-04" title="ROS-20250929-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3092" type="cve" id="CVE-2016-3092" title="CVE-2016-3092" />
			<reference href="https://bdu.fstec.ru/vul/2016-01698" type="self" id="BDU:2016-01698" title="BDU:2016-01698" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="apache-commons-fileupload" epoch="0" version="2.0.0~M2" release="1.el7" arch="noarch" src="">
					<filename>apache-commons-fileupload-0:2.0.0~M2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250929-05</id>
		<issued date="2025-09-29" />
		<updated date="2025-09-29" />
		<title>Множественные уязвимости libarchive</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в libarchive</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libarchive-29092025/</description>
               <solution>
                    Запретить использование в ОС пакета libarchive
                или
                    Установить обновление для пакета(ов) libarchive
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libarchive-29092025/" type="self" id="ROS-20250929-05" title="ROS-20250929-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5915" type="cve" id="CVE-2025-5915" title="CVE-2025-5915" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5914" type="cve" id="CVE-2025-5914" title="CVE-2025-5914" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5916" type="cve" id="CVE-2025-5916" title="CVE-2025-5916" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5917" type="cve" id="CVE-2025-5917" title="CVE-2025-5917" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5918" type="cve" id="CVE-2025-5918" title="CVE-2025-5918" />
			<reference href="https://bdu.fstec.ru/vul/2025-11855" type="self" id="BDU:2025-11855" title="BDU:2025-11855" />
			<reference href="https://bdu.fstec.ru/vul/2025-10932" type="self" id="BDU:2025-10932" title="BDU:2025-10932" />
			<reference href="https://bdu.fstec.ru/vul/2025-11085" type="self" id="BDU:2025-11085" title="BDU:2025-11085" />
			<reference href="https://bdu.fstec.ru/vul/2025-11084" type="self" id="BDU:2025-11084" title="BDU:2025-11084" />
			<reference href="https://bdu.fstec.ru/vul/2025-11083" type="self" id="BDU:2025-11083" title="BDU:2025-11083" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libarchive" epoch="0" version="3.8.1" release="1.el7" arch="x86_64" src="">
					<filename>libarchive-0:3.8.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250929-06</id>
		<issued date="2025-09-29" />
		<updated date="2025-09-29" />
		<title>Уязвимость python3-relenv </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-relenv</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-relenv-cve-2025-29087/</description>
               <solution>
                    Запретить использование в ОС пакета python3-relenv
                или
                    Установить обновление для пакета(ов) python3-relenv
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-relenv-cve-2025-29087/" type="self" id="ROS-20250929-06" title="ROS-20250929-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29087" type="cve" id="CVE-2025-29087" title="CVE-2025-29087" />
			<reference href="https://bdu.fstec.ru/vul/2025-06404" type="self" id="BDU:2025-06404" title="BDU:2025-06404" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-relenv" epoch="0" version="0.20.6" release="1.el7" arch="noarch" src="">
					<filename>python3-relenv-0:0.20.6-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250929-07</id>
		<issued date="2025-09-29" />
		<updated date="2025-09-29" />
		<title>Уязвимость python3-pytest-skip-markers </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-pytest-skip-markers</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-pytest-skip-markers-cve-2025-29087/</description>
               <solution>
                    Запретить использование в ОС пакета python3-pytest-skip-markers
                или
                    Установить обновление для пакета(ов) python3-pytest-skip-markers
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-pytest-skip-markers-cve-2025-29087/" type="self" id="ROS-20250929-07" title="ROS-20250929-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29087" type="cve" id="CVE-2025-29087" title="CVE-2025-29087" />
			<reference href="https://bdu.fstec.ru/vul/2025-06404" type="self" id="BDU:2025-06404" title="BDU:2025-06404" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-pytest-skip-markers" epoch="0" version="1.5.2" release="1.el7" arch="noarch" src="">
					<filename>python3-pytest-skip-markers-0:1.5.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250929-08</id>
		<issued date="2025-09-29" />
		<updated date="2025-09-29" />
		<title>Множественные уязвимости xen</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в xen</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-xen-29092025/</description>
               <solution>
                    Запретить использование в ОС пакета xen
                или
                    Установить обновление для пакета(ов) xen
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-xen-29092025/" type="self" id="ROS-20250929-08" title="ROS-20250929-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58143" type="cve" id="CVE-2025-58143" title="CVE-2025-58143" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58142" type="cve" id="CVE-2025-58142" title="CVE-2025-58142" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27466" type="cve" id="CVE-2025-27466" title="CVE-2025-27466" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58145" type="cve" id="CVE-2025-58145" title="CVE-2025-58145" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58144" type="cve" id="CVE-2025-58144" title="CVE-2025-58144" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27465" type="cve" id="CVE-2025-27465" title="CVE-2025-27465" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36357" type="cve" id="CVE-2024-36357" title="CVE-2024-36357" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36350" type="cve" id="CVE-2024-36350" title="CVE-2024-36350" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28956" type="cve" id="CVE-2024-28956" title="CVE-2024-28956" />
			<reference href="https://bdu.fstec.ru/vul/2025-12596" type="self" id="BDU:2025-12596" title="BDU:2025-12596" />
			<reference href="https://bdu.fstec.ru/vul/2025-12595" type="self" id="BDU:2025-12595" title="BDU:2025-12595" />
			<reference href="https://bdu.fstec.ru/vul/2025-12580" type="self" id="BDU:2025-12580" title="BDU:2025-12580" />
			<reference href="https://bdu.fstec.ru/vul/2025-12598" type="self" id="BDU:2025-12598" title="BDU:2025-12598" />
			<reference href="https://bdu.fstec.ru/vul/2025-12597" type="self" id="BDU:2025-12597" title="BDU:2025-12597" />
			<reference href="https://bdu.fstec.ru/vul/2025-12579" type="self" id="BDU:2025-12579" title="BDU:2025-12579" />
			<reference href="https://bdu.fstec.ru/vul/2025-08939" type="self" id="BDU:2025-08939" title="BDU:2025-08939" />
			<reference href="https://bdu.fstec.ru/vul/2025-08925" type="self" id="BDU:2025-08925" title="BDU:2025-08925" />
			<reference href="https://bdu.fstec.ru/vul/2025-07578" type="self" id="BDU:2025-07578" title="BDU:2025-07578" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="xen" epoch="0" version="4.19.3" release="1.el7" arch="x86_64" src="">
					<filename>xen-0:4.19.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250929-09</id>
		<issued date="2025-09-29" />
		<updated date="2025-09-29" />
		<title>Множественные уязвимости linux-firmware </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в linux-firmware</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-linux-firmware-cve-2024-36357-cve-2024-36350/</description>
               <solution>
                    Запретить использование в ОС пакета linux-firmware
                или
                    Установить обновление для пакета(ов) linux-firmware
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-linux-firmware-cve-2024-36357-cve-2024-36350/" type="self" id="ROS-20250929-09" title="ROS-20250929-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36357" type="cve" id="CVE-2024-36357" title="CVE-2024-36357" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36350" type="cve" id="CVE-2024-36350" title="CVE-2024-36350" />
			<reference href="https://bdu.fstec.ru/vul/2025-08939" type="self" id="BDU:2025-08939" title="BDU:2025-08939" />
			<reference href="https://bdu.fstec.ru/vul/2025-08925" type="self" id="BDU:2025-08925" title="BDU:2025-08925" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="linux-firmware" epoch="0" version="20250311" release="1.el7.3" arch="noarch" src="">
					<filename>linux-firmware-0:20250311-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250929-10</id>
		<issued date="2025-09-29" />
		<updated date="2025-09-29" />
		<title>Уязвимость linux-firmware </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в linux-firmware</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-linux-firmware-cve-2024-28956/</description>
               <solution>
                    Запретить использование в ОС пакета linux-firmware
                или
                    Установить обновление для пакета(ов) linux-firmware
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-linux-firmware-cve-2024-28956/" type="self" id="ROS-20250929-10" title="ROS-20250929-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28956" type="cve" id="CVE-2024-28956" title="CVE-2024-28956" />
			<reference href="https://bdu.fstec.ru/vul/2025-07578" type="self" id="BDU:2025-07578" title="BDU:2025-07578" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="linux-firmware" epoch="0" version="20250627" release="1.el7.3" arch="noarch" src="">
					<filename>linux-firmware-0:20250627-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250929-11</id>
		<issued date="2025-09-29" />
		<updated date="2025-09-29" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-28956/</description>
               <solution>
                    Установить обновление для пакета(ов) kernel-lt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-28956/" type="self" id="ROS-20250929-11" title="ROS-20250929-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28956" type="cve" id="CVE-2024-28956" title="CVE-2024-28956" />
			<reference href="https://bdu.fstec.ru/vul/2025-07578" type="self" id="BDU:2025-07578" title="BDU:2025-07578" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250929-12</id>
		<issued date="2025-09-29" />
		<updated date="2025-09-29" />
		<title>Множественные уязвимости firefox </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-cve-2025-9185-cve-2025-9179-cve-2025-9180-cve-2025-9181/</description>
               <solution>
                    Запретить использование в ОС пакета firefox
                или
                    Установить обновление для пакета(ов) firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-firefox-cve-2025-9185-cve-2025-9179-cve-2025-9180-cve-2025-9181/" type="self" id="ROS-20250929-12" title="ROS-20250929-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9185" type="cve" id="CVE-2025-9185" title="CVE-2025-9185" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9179" type="cve" id="CVE-2025-9179" title="CVE-2025-9179" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9180" type="cve" id="CVE-2025-9180" title="CVE-2025-9180" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9181" type="cve" id="CVE-2025-9181" title="CVE-2025-9181" />
			<reference href="https://bdu.fstec.ru/vul/2025-10497" type="self" id="BDU:2025-10497" title="BDU:2025-10497" />
			<reference href="https://bdu.fstec.ru/vul/2025-10496" type="self" id="BDU:2025-10496" title="BDU:2025-10496" />
			<reference href="https://bdu.fstec.ru/vul/2025-10385" type="self" id="BDU:2025-10385" title="BDU:2025-10385" />
			<reference href="https://bdu.fstec.ru/vul/2025-10387" type="self" id="BDU:2025-10387" title="BDU:2025-10387" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.27.0" release="1.el7" arch="x86_64" src="">
					<filename>firefox-0:115.27.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250929-13</id>
		<issued date="2025-09-29" />
		<updated date="2025-09-29" />
		<title>Множественные уязвимости thunderbird </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-cve-2025-9185-cve-2025-9179-cve-2025-9180-cve-2025-9181/</description>
               <solution>
                    Запретить использование в ОС пакета thunderbird
                или
                    Установить обновление для пакета(ов) thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-cve-2025-9185-cve-2025-9179-cve-2025-9180-cve-2025-9181/" type="self" id="ROS-20250929-13" title="ROS-20250929-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9185" type="cve" id="CVE-2025-9185" title="CVE-2025-9185" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9179" type="cve" id="CVE-2025-9179" title="CVE-2025-9179" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9180" type="cve" id="CVE-2025-9180" title="CVE-2025-9180" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9181" type="cve" id="CVE-2025-9181" title="CVE-2025-9181" />
			<reference href="https://bdu.fstec.ru/vul/2025-10497" type="self" id="BDU:2025-10497" title="BDU:2025-10497" />
			<reference href="https://bdu.fstec.ru/vul/2025-10496" type="self" id="BDU:2025-10496" title="BDU:2025-10496" />
			<reference href="https://bdu.fstec.ru/vul/2025-10385" type="self" id="BDU:2025-10385" title="BDU:2025-10385" />
			<reference href="https://bdu.fstec.ru/vul/2025-10387" type="self" id="BDU:2025-10387" title="BDU:2025-10387" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="128.14.0" release="1.el7" arch="x86_64" src="">
					<filename>thunderbird-0:128.14.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250929-14</id>
		<issued date="2025-09-29" />
		<updated date="2025-09-29" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38236/</description>
               <solution>
                    Установить обновление для пакета(ов) kernel-lt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38236/" type="self" id="ROS-20250929-14" title="ROS-20250929-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38236" type="cve" id="CVE-2025-38236" title="CVE-2025-38236" />
			<reference href="https://bdu.fstec.ru/vul/2025-09670" type="self" id="BDU:2025-09670" title="BDU:2025-09670" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250929-15</id>
		<issued date="2025-09-29" />
		<updated date="2026-02-27" />
		<title>Множественные уязвимости httpd</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в httpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-httpd-29092025/</description>
               <solution>
                    Запретить использование в ОС пакета httpd
                или
                    Установить обновление для пакета(ов) httpd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-httpd-29092025/" type="self" id="ROS-20250929-15" title="ROS-20250929-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53020" type="cve" id="CVE-2025-53020" title="CVE-2025-53020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54090" type="cve" id="CVE-2025-54090" title="CVE-2025-54090" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42516" type="cve" id="CVE-2024-42516" title="CVE-2024-42516" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43204" type="cve" id="CVE-2024-43204" title="CVE-2024-43204" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43394" type="cve" id="CVE-2024-43394" title="CVE-2024-43394" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47252" type="cve" id="CVE-2024-47252" title="CVE-2024-47252" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49630" type="cve" id="CVE-2025-49630" title="CVE-2025-49630" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49812" type="cve" id="CVE-2025-49812" title="CVE-2025-49812" />
			<reference href="https://bdu.fstec.ru/vul/DU:2025-08955" type="self" id="DU:2025-08955" title="DU:2025-08955" />
			<reference href="https://bdu.fstec.ru/vul/2025-09493" type="self" id="BDU:2025-09493" title="BDU:2025-09493" />
			<reference href="https://bdu.fstec.ru/vul/2025-08975" type="self" id="BDU:2025-08975" title="BDU:2025-08975" />
			<reference href="https://bdu.fstec.ru/vul/2025-08957" type="self" id="BDU:2025-08957" title="BDU:2025-08957" />
			<reference href="https://bdu.fstec.ru/vul/2025-08951" type="self" id="BDU:2025-08951" title="BDU:2025-08951" />
			<reference href="https://bdu.fstec.ru/vul/2025-08958" type="self" id="BDU:2025-08958" title="BDU:2025-08958" />
			<reference href="https://bdu.fstec.ru/vul/2025-08695" type="self" id="BDU:2025-08695" title="BDU:2025-08695" />
			<reference href="https://bdu.fstec.ru/vul/2025-08696" type="self" id="BDU:2025-08696" title="BDU:2025-08696" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="httpd" epoch="0" version="2.4.65" release="4.el7" arch="x86_64" src="">
					<filename>httpd-0:2.4.65-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250930-01</id>
		<issued date="2025-09-30" />
		<updated date="2025-09-30" />
		<title>Уязвимость libgepub </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libgepub</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libgepub-cve-2025-6196/</description>
               <solution>
                    Запретить использование в ОС пакета libgepub
                или
                    Установить обновление для пакета(ов) libgepub
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libgepub-cve-2025-6196/" type="self" id="ROS-20250930-01" title="ROS-20250930-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6196" type="cve" id="CVE-2025-6196" title="CVE-2025-6196" />
			<reference href="https://bdu.fstec.ru/vul/2025-12601" type="self" id="BDU:2025-12601" title="BDU:2025-12601" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libgepub" epoch="0" version="0.6.0" release="6.el7" arch="x86_64" src="">
					<filename>libgepub-0:0.6.0-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250930-02</id>
		<issued date="2025-09-30" />
		<updated date="2025-09-30" />
		<title>Множественные уязвимости bluez </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в bluez</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-bluez-cve-2023-51596-cve-2023-44431/</description>
               <solution>
                    Запретить использование в ОС пакета bluez
                или
                    Установить обновление для пакета(ов) bluez
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-bluez-cve-2023-51596-cve-2023-44431/" type="self" id="ROS-20250930-02" title="ROS-20250930-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44431" type="cve" id="CVE-2023-44431" title="CVE-2023-44431" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51596" type="cve" id="CVE-2023-51596" title="CVE-2023-51596" />
			<reference href="https://bdu.fstec.ru/vul/2024-03543" type="self" id="BDU:2024-03543" title="BDU:2024-03543" />
			<reference href="https://bdu.fstec.ru/vul/2024-03559" type="self" id="BDU:2024-03559" title="BDU:2024-03559" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="bluez" epoch="0" version="5.75" release="1.el7" arch="x86_64" src="">
					<filename>bluez-0:5.75-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250930-03</id>
		<issued date="2025-09-30" />
		<updated date="2025-09-30" />
		<title>Уязвимость polkit </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в polkit</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-polkit-cve-2025-7519/</description>
               <solution>
                    Запретить использование в ОС пакета polkit
                или
                    Установить обновление для пакета(ов) polkit
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-polkit-cve-2025-7519/" type="self" id="ROS-20250930-03" title="ROS-20250930-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7519" type="cve" id="CVE-2025-7519" title="CVE-2025-7519" />
			<reference href="https://bdu.fstec.ru/vul/2025-12602" type="self" id="BDU:2025-12602" title="BDU:2025-12602" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="polkit" epoch="0" version="0.118" release="6.el7" arch="x86_64" src="">
					<filename>polkit-0:0.118-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250930-04</id>
		<issued date="2025-09-30" />
		<updated date="2025-09-30" />
		<title>Множественные уязвимости assimp </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в assimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-assimp-cve-2025-2592-cve-2025-2591-cve-2025-3158/</description>
               <solution>
                    Запретить использование в ОС пакета assimp
                или
                    Установить обновление для пакета(ов) assimp
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-assimp-cve-2025-2592-cve-2025-2591-cve-2025-3158/" type="self" id="ROS-20250930-04" title="ROS-20250930-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2592" type="cve" id="CVE-2025-2592" title="CVE-2025-2592" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2591" type="cve" id="CVE-2025-2591" title="CVE-2025-2591" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3158" type="cve" id="CVE-2025-3158" title="CVE-2025-3158" />
			<reference href="https://bdu.fstec.ru/vul/2025-12578" type="self" id="BDU:2025-12578" title="BDU:2025-12578" />
			<reference href="https://bdu.fstec.ru/vul/2025-12577" type="self" id="BDU:2025-12577" title="BDU:2025-12577" />
			<reference href="https://bdu.fstec.ru/vul/2025-12581" type="self" id="BDU:2025-12581" title="BDU:2025-12581" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="assimp" epoch="0" version="5.4.3" release="3.el7" arch="x86_64" src="">
					<filename>assimp-0:5.4.3-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250930-05</id>
		<issued date="2025-09-30" />
		<updated date="2025-09-30" />
		<title>Уязвимость unbound </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в unbound</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-unbound-cve-2025-5994/</description>
               <solution>
                    Запретить использование в ОС пакета unbound
                или
                    Установить обновление для пакета(ов) unbound
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-unbound-cve-2025-5994/" type="self" id="ROS-20250930-05" title="ROS-20250930-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5994" type="cve" id="CVE-2025-5994" title="CVE-2025-5994" />
			<reference href="https://bdu.fstec.ru/vul/2025-12600" type="self" id="BDU:2025-12600" title="BDU:2025-12600" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="unbound" epoch="0" version="1.19.2" release="6.el7" arch="x86_64" src="">
					<filename>unbound-0:1.19.2-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250930-06</id>
		<issued date="2025-09-30" />
		<updated date="2025-09-30" />
		<title>Уязвимость edk2-tools </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в edk2-tools</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-edk2-tools-cve-2025-3770/</description>
               <solution>
                    Запретить использование в ОС пакета edk2-tools
                или
                    Установить обновление для пакета(ов) edk2-tools
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-edk2-tools-cve-2025-3770/" type="self" id="ROS-20250930-06" title="ROS-20250930-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3770" type="cve" id="CVE-2025-3770" title="CVE-2025-3770" />
			<reference href="https://bdu.fstec.ru/vul/2025-12585" type="self" id="BDU:2025-12585" title="BDU:2025-12585" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="edk2-tools" epoch="0" version="20240524" release="4.el7" arch="x86_64" src="">
					<filename>edk2-tools-0:20240524-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250930-07</id>
		<issued date="2025-09-30" />
		<updated date="2025-09-30" />
		<title>Множественные уязвимости ImageMagick </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ImageMagick</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-imagemagick-cve-2025-55298-cve-2025-55212/</description>
               <solution>
                    Запретить использование в ОС пакета ImageMagick
                или
                    Установить обновление для пакета(ов) ImageMagick
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-imagemagick-cve-2025-55298-cve-2025-55212/" type="self" id="ROS-20250930-07" title="ROS-20250930-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55298" type="cve" id="CVE-2025-55298" title="CVE-2025-55298" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55212" type="cve" id="CVE-2025-55212" title="CVE-2025-55212" />
			<reference href="https://bdu.fstec.ru/vul/2025-12590" type="self" id="BDU:2025-12590" title="BDU:2025-12590" />
			<reference href="https://bdu.fstec.ru/vul/2025-12589" type="self" id="BDU:2025-12589" title="BDU:2025-12589" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ImageMagick" epoch="1" version="6.9.13.28" release="1.el7" arch="x86_64" src="">
					<filename>ImageMagick-1:6.9.13.28-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250930-08</id>
		<issued date="2025-09-30" />
		<updated date="2025-09-30" />
		<title>Множественные уязвимости ImageMagick7 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ImageMagick7</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-imagemagick7-cve-2025-55298-cve-2025-55212/</description>
               <solution>
                    Запретить использование в ОС пакета ImageMagick7
                или
                    Установить обновление для пакета(ов) ImageMagick7
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-imagemagick7-cve-2025-55298-cve-2025-55212/" type="self" id="ROS-20250930-08" title="ROS-20250930-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55298" type="cve" id="CVE-2025-55298" title="CVE-2025-55298" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55212" type="cve" id="CVE-2025-55212" title="CVE-2025-55212" />
			<reference href="https://bdu.fstec.ru/vul/2025-12590" type="self" id="BDU:2025-12590" title="BDU:2025-12590" />
			<reference href="https://bdu.fstec.ru/vul/2025-12589" type="self" id="BDU:2025-12589" title="BDU:2025-12589" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ImageMagick7" epoch="0" version="7.1.2.2" release="1.el7" arch="x86_64" src="">
					<filename>ImageMagick7-0:7.1.2.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251001-01</id>
		<issued date="2025-10-01" />
		<updated date="2025-10-01" />
		<title>Множественные уязвимости virtualbox-guest-additions</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в virtualbox-guest-additions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-virtualbox-guest-additions-01102025/</description>
               <solution>
                    Запретить использование в ОС пакета virtualbox-guest-additions
                или
                    Установить обновление для пакета(ов) virtualbox-guest-additions
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-virtualbox-guest-additions-01102025/" type="self" id="ROS-20251001-01" title="ROS-20251001-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53024" type="cve" id="CVE-2025-53024" title="CVE-2025-53024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53027" type="cve" id="CVE-2025-53027" title="CVE-2025-53027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53028" type="cve" id="CVE-2025-53028" title="CVE-2025-53028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53025" type="cve" id="CVE-2025-53025" title="CVE-2025-53025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53030" type="cve" id="CVE-2025-53030" title="CVE-2025-53030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53029" type="cve" id="CVE-2025-53029" title="CVE-2025-53029" />
			<reference href="https://bdu.fstec.ru/vul/2025-08587" type="self" id="BDU:2025-08587" title="BDU:2025-08587" />
			<reference href="https://bdu.fstec.ru/vul/2025-08588" type="self" id="BDU:2025-08588" title="BDU:2025-08588" />
			<reference href="https://bdu.fstec.ru/vul/2025-08589" type="self" id="BDU:2025-08589" title="BDU:2025-08589" />
			<reference href="https://bdu.fstec.ru/vul/2025-08874" type="self" id="BDU:2025-08874" title="BDU:2025-08874" />
			<reference href="https://bdu.fstec.ru/vul/2025-08646" type="self" id="BDU:2025-08646" title="BDU:2025-08646" />
			<reference href="https://bdu.fstec.ru/vul/2025-08875" type="self" id="BDU:2025-08875" title="BDU:2025-08875" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="virtualbox-guest-additions" epoch="0" version="7.1.12" release="1.el7" arch="x86_64" src="">
					<filename>virtualbox-guest-additions-0:7.1.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251001-02</id>
		<issued date="2025-10-01" />
		<updated date="2025-10-01" />
		<title>Множественные уязвимости VirtualBox</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-virtualbox-01102025/</description>
               <solution>
                    Запретить использование в ОС пакета VirtualBox
                или
                    Установить обновление для пакета(ов) VirtualBox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-virtualbox-01102025/" type="self" id="ROS-20251001-02" title="ROS-20251001-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53024" type="cve" id="CVE-2025-53024" title="CVE-2025-53024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53027" type="cve" id="CVE-2025-53027" title="CVE-2025-53027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53028" type="cve" id="CVE-2025-53028" title="CVE-2025-53028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53025" type="cve" id="CVE-2025-53025" title="CVE-2025-53025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53030" type="cve" id="CVE-2025-53030" title="CVE-2025-53030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53029" type="cve" id="CVE-2025-53029" title="CVE-2025-53029" />
			<reference href="https://bdu.fstec.ru/vul/2025-08587" type="self" id="BDU:2025-08587" title="BDU:2025-08587" />
			<reference href="https://bdu.fstec.ru/vul/2025-08588" type="self" id="BDU:2025-08588" title="BDU:2025-08588" />
			<reference href="https://bdu.fstec.ru/vul/2025-08589" type="self" id="BDU:2025-08589" title="BDU:2025-08589" />
			<reference href="https://bdu.fstec.ru/vul/2025-08874" type="self" id="BDU:2025-08874" title="BDU:2025-08874" />
			<reference href="https://bdu.fstec.ru/vul/2025-08646" type="self" id="BDU:2025-08646" title="BDU:2025-08646" />
			<reference href="https://bdu.fstec.ru/vul/2025-08875" type="self" id="BDU:2025-08875" title="BDU:2025-08875" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox" epoch="0" version="7.1.12" release="1.el7" arch="x86_64" src="">
					<filename>VirtualBox-0:7.1.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251001-03</id>
		<issued date="2025-10-01" />
		<updated date="2025-10-01" />
		<title>Уязвимость rubygem-jquery-rails </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в rubygem-jquery-rails</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-jquery-rails-cve-2020-11023/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-jquery-rails
                или
                    Установить обновление для пакета(ов) rubygem-jquery-rails
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-jquery-rails-cve-2020-11023/" type="self" id="ROS-20251001-03" title="ROS-20251001-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023" type="cve" id="CVE-2020-11023" title="CVE-2020-11023" />
			<reference href="https://bdu.fstec.ru/vul/2020-04949" type="self" id="BDU:2020-04949" title="BDU:2020-04949" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-jquery-rails" epoch="0" version="4.6.0" release="1.el7" arch="noarch" src="">
					<filename>rubygem-jquery-rails-0:4.6.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251001-04</id>
		<issued date="2025-10-01" />
		<updated date="2025-10-01" />
		<title>Уязвимость samba </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в samba</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-samba-cve-2022-1615/</description>
               <solution>
                    Запретить использование в ОС пакета samba
                или
                    Установить обновление для пакета(ов) samba
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-samba-cve-2022-1615/" type="self" id="ROS-20251001-04" title="ROS-20251001-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1615" type="cve" id="CVE-2022-1615" title="CVE-2022-1615" />
			<reference href="https://bdu.fstec.ru/vul/2024-06955" type="self" id="BDU:2024-06955" title="BDU:2024-06955" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="samba" epoch="0" version="4.17.5" release="1m.el7.3" arch="x86_64" src="">
					<filename>samba-0:4.17.5-1m.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20250930-15</id>
		<issued date="2025-10-01" />
		<updated date="2025-10-08" />
		<title>Уязвимость kea </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kea</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kea-cve-2025-40779/</description>
               <solution>
                    Запретить использование в ОС пакета kea
                или
                    Установить обновление для пакета(ов) kea
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kea-cve-2025-40779/" type="self" id="ROS-20250930-15" title="ROS-20250930-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40779" type="cve" id="CVE-2025-40779" title="CVE-2025-40779" />
			<reference href="https://bdu.fstec.ru/vul/2025-12586" type="self" id="BDU:2025-12586" title="BDU:2025-12586" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kea" epoch="0" version="3.0.1" release="1.el7" arch="x86_64" src="">
					<filename>kea-0:3.0.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251001-06</id>
		<issued date="2025-10-01" />
		<updated date="2025-10-01" />
		<title>Уязвимость pcre2 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в pcre2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pcre2-cve-2025-58050/</description>
               <solution>
                    Запретить использование в ОС пакета pcre2
                или
                    Установить обновление для пакета(ов) pcre2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pcre2-cve-2025-58050/" type="self" id="ROS-20251001-06" title="ROS-20251001-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58050" type="cve" id="CVE-2025-58050" title="CVE-2025-58050" />
			<reference href="https://bdu.fstec.ru/vul/2025-12592" type="self" id="BDU:2025-12592" title="BDU:2025-12592" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pcre2" epoch="0" version="10.46" release="1.el7" arch="x86_64" src="">
					<filename>pcre2-0:10.46-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251001-07</id>
		<issued date="2025-10-01" />
		<updated date="2025-10-01" />
		<title>Уязвимость iperf3 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в iperf3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-iperf3-cve-2025-54349/</description>
               <solution>
                    Запретить использование в ОС пакета iperf3
                или
                    Установить обновление для пакета(ов) iperf3
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-iperf3-cve-2025-54349/" type="self" id="ROS-20251001-07" title="ROS-20251001-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54349" type="cve" id="CVE-2025-54349" title="CVE-2025-54349" />
			<reference href="https://bdu.fstec.ru/vul/2025-12588" type="self" id="BDU:2025-12588" title="BDU:2025-12588" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="iperf3" epoch="0" version="3.19.1" release="1.el7" arch="x86_64" src="">
					<filename>iperf3-0:3.19.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251001-08</id>
		<issued date="2025-10-01" />
		<updated date="2025-10-01" />
		<title>Уязвимость cjson </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в cjson</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cjson-cve-2025-57052/</description>
               <solution>
                    Запретить использование в ОС пакета cjson
                или
                    Установить обновление для пакета(ов) cjson
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cjson-cve-2025-57052/" type="self" id="ROS-20251001-08" title="ROS-20251001-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-57052" type="cve" id="CVE-2025-57052" title="CVE-2025-57052" />
			<reference href="https://bdu.fstec.ru/vul/2025-12591" type="self" id="BDU:2025-12591" title="BDU:2025-12591" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cjson" epoch="0" version="1.7.18" release="2.el7" arch="x86_64" src="">
					<filename>cjson-0:1.7.18-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251002-01</id>
		<issued date="2025-10-02" />
		<updated date="2025-10-02" />
		<title>Множественные уязвимости privoxy </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в privoxy</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-privoxy-cve-2021-44543-cve-2021-44540-cve-2021-44541-cve-2021-44542/</description>
               <solution>
                    Запретить использование в ОС пакета privoxy
                или
                    Установить обновление для пакета(ов) privoxy
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-privoxy-cve-2021-44543-cve-2021-44540-cve-2021-44541-cve-2021-44542/" type="self" id="ROS-20251002-01" title="ROS-20251002-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44543" type="cve" id="CVE-2021-44543" title="CVE-2021-44543" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44540" type="cve" id="CVE-2021-44540" title="CVE-2021-44540" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44541" type="cve" id="CVE-2021-44541" title="CVE-2021-44541" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44542" type="cve" id="CVE-2021-44542" title="CVE-2021-44542" />
			<reference href="https://bdu.fstec.ru/vul/2025-12572" type="self" id="BDU:2025-12572" title="BDU:2025-12572" />
			<reference href="https://bdu.fstec.ru/vul/2025-12569" type="self" id="BDU:2025-12569" title="BDU:2025-12569" />
			<reference href="https://bdu.fstec.ru/vul/2025-12570" type="self" id="BDU:2025-12570" title="BDU:2025-12570" />
			<reference href="https://bdu.fstec.ru/vul/2025-12571" type="self" id="BDU:2025-12571" title="BDU:2025-12571" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="privoxy" epoch="0" version="3.0.32" release="2.el7" arch="x86_64" src="">
					<filename>privoxy-0:3.0.32-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251002-02</id>
		<issued date="2025-10-02" />
		<updated date="2025-10-02" />
		<title>Множественные уязвимости netty </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в netty</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-netty-cve-2025-58056-cve-2025-58057/</description>
               <solution>
                    Запретить использование в ОС пакета netty
                или
                    Установить обновление для пакета(ов) netty
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-netty-cve-2025-58056-cve-2025-58057/" type="self" id="ROS-20251002-02" title="ROS-20251002-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58056" type="cve" id="CVE-2025-58056" title="CVE-2025-58056" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58057" type="cve" id="CVE-2025-58057" title="CVE-2025-58057" />
			<reference href="https://bdu.fstec.ru/vul/2025-12593" type="self" id="BDU:2025-12593" title="BDU:2025-12593" />
			<reference href="https://bdu.fstec.ru/vul/2025-12594" type="self" id="BDU:2025-12594" title="BDU:2025-12594" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="netty" epoch="0" version="4.1.127" release="1.el7" arch="x86_64" src="">
					<filename>netty-0:4.1.127-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251002-03</id>
		<issued date="2025-10-02" />
		<updated date="2025-10-02" />
		<title>Множественные уязвимости dotnet </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dotnet</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-dotnet-cve-2025-36855-cve-2025-36854-cve-2025-36853/</description>
               <solution>
                    Запретить использование в ОС пакета dotnet
                или
                    Установить обновление для пакета(ов) dotnet
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-dotnet-cve-2025-36855-cve-2025-36854-cve-2025-36853/" type="self" id="ROS-20251002-03" title="ROS-20251002-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-36855" type="cve" id="CVE-2025-36855" title="CVE-2025-36855" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-36854" type="cve" id="CVE-2025-36854" title="CVE-2025-36854" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-36853" type="cve" id="CVE-2025-36853" title="CVE-2025-36853" />
			<reference href="https://bdu.fstec.ru/vul/2025-12584" type="self" id="BDU:2025-12584" title="BDU:2025-12584" />
			<reference href="https://bdu.fstec.ru/vul/2025-12583" type="self" id="BDU:2025-12583" title="BDU:2025-12583" />
			<reference href="https://bdu.fstec.ru/vul/2025-12582" type="self" id="BDU:2025-12582" title="BDU:2025-12582" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dotnet" epoch="0" version="8.0.112" release="1.el7" arch="x86_64" src="">
					<filename>dotnet-0:8.0.112-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251006-01</id>
		<issued date="2025-10-06" />
		<updated date="2025-10-06" />
		<title>Множественные уязвимости gnutls </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gnutls</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gnutls-cve-2025-32990-cve-2025-32988-cve-2025-6395/</description>
               <solution>
                    Запретить использование в ОС пакета gnutls
                или
                    Установить обновление для пакета(ов) gnutls
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gnutls-cve-2025-32990-cve-2025-32988-cve-2025-6395/" type="self" id="ROS-20251006-01" title="ROS-20251006-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6395" type="cve" id="CVE-2025-6395" title="CVE-2025-6395" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32990" type="cve" id="CVE-2025-32990" title="CVE-2025-32990" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32988" type="cve" id="CVE-2025-32988" title="CVE-2025-32988" />
			<reference href="https://bdu.fstec.ru/vul/2025-08694" type="self" id="BDU:2025-08694" title="BDU:2025-08694" />
			<reference href="https://bdu.fstec.ru/vul/2025-11074" type="self" id="BDU:2025-11074" title="BDU:2025-11074" />
			<reference href="https://bdu.fstec.ru/vul/2025-11076" type="self" id="BDU:2025-11076" title="BDU:2025-11076" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gnutls" epoch="0" version="3.6.16" release="17.el7" arch="x86_64" src="">
					<filename>gnutls-0:3.6.16-17.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251006-02</id>
		<issued date="2025-10-06" />
		<updated date="2025-10-06" />
		<title>Уязвимость curl </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2025-9086/</description>
               <solution>
                    Запретить использование в ОС пакета curl 
                или
                    Установить обновление для пакета(ов) curl 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2025-9086/" type="self" id="ROS-20251006-02" title="ROS-20251006-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9086" type="cve" id="CVE-2025-9086" title="CVE-2025-9086" />
			<reference href="https://bdu.fstec.ru/vul/2025-12599" type="self" id="BDU:2025-12599" title="BDU:2025-12599" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="curl" epoch="0" version="7.86.0" release="6.el7" arch="x86_64" src="">
					<filename>curl-0:7.86.0-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251006-03</id>
		<issued date="2025-10-06" />
		<updated date="2025-10-06" />
		<title>Уязвимость candlepin </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в candlepin</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-candlepin-cve-2023-1832/</description>
               <solution>
                    Запретить использование в ОС пакета candlepin
                или
                    Установить обновление для пакета(ов) candlepin
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-candlepin-cve-2023-1832/" type="self" id="ROS-20251006-03" title="ROS-20251006-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1832" type="cve" id="CVE-2023-1832" title="CVE-2023-1832" />
			<reference href="https://bdu.fstec.ru/vul/2025-12573" type="self" id="BDU:2025-12573" title="BDU:2025-12573" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="candlepin" epoch="0" version="4.3.12" release="1.el7" arch="noarch" src="">
					<filename>candlepin-0:4.3.12-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251006-04</id>
		<issued date="2025-10-06" />
		<updated date="2025-10-06" />
		<title>Уязвимость gpac </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gpac</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gpac-cve-2024-6061/</description>
               <solution>
                    Запретить использование в ОС пакета gpac
                или
                    Установить обновление для пакета(ов) gpac
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gpac-cve-2024-6061/" type="self" id="ROS-20251006-04" title="ROS-20251006-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6061" type="cve" id="CVE-2024-6061" title="CVE-2024-6061" />
			<reference href="https://bdu.fstec.ru/vul/2025-12575" type="self" id="BDU:2025-12575" title="BDU:2025-12575" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gpac" epoch="0" version="2.4.0" release="6.el7" arch="x86_64" src="">
					<filename>gpac-0:2.4.0-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251006-05</id>
		<issued date="2025-10-06" />
		<updated date="2025-10-06" />
		<title>Уязвимость cockpit </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в cockpit</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cockpit-cve-2024-6126/</description>
               <solution>
                    Запретить использование в ОС пакета cockpit
                или
                    Установить обновление для пакета(ов) cockpit
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cockpit-cve-2024-6126/" type="self" id="ROS-20251006-05" title="ROS-20251006-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6126" type="cve" id="CVE-2024-6126" title="CVE-2024-6126" />
			<reference href="https://bdu.fstec.ru/vul/2025-12576" type="self" id="BDU:2025-12576" title="BDU:2025-12576" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cockpit" epoch="0" version="331" release="1.el7" arch="x86_64" src="">
					<filename>cockpit-0:331-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251006-06</id>
		<issued date="2025-10-06" />
		<updated date="2025-10-06" />
		<title>Уязвимость mediawiki </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mediawiki</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mediawiki-cve-2024-47913/</description>
               <solution>
                    Запретить использование в ОС пакета mediawiki
                или
                    Установить обновление для пакета(ов) mediawiki
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mediawiki-cve-2024-47913/" type="self" id="ROS-20251006-06" title="ROS-20251006-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47913" type="cve" id="CVE-2024-47913" title="CVE-2024-47913" />
			<reference href="https://bdu.fstec.ru/vul/2025-12574" type="self" id="BDU:2025-12574" title="BDU:2025-12574" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mediawiki" epoch="0" version="1.40.3" release="7.el7" arch="noarch" src="">
					<filename>mediawiki-0:1.40.3-7.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251006-07</id>
		<issued date="2025-10-06" />
		<updated date="2025-10-06" />
		<title>Множественные уязвимости pam </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в pam</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-pam-cve-2024-10963-cve-2025-60200/</description>
               <solution>
                    Запретить использование в ОС пакета pam
                или
                    Установить обновление для пакета(ов) pam
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-pam-cve-2024-10963-cve-2025-60200/" type="self" id="ROS-20251006-07" title="ROS-20251006-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6020" type="cve" id="CVE-2025-6020" title="CVE-2025-6020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10963" type="cve" id="CVE-2024-10963" title="CVE-2024-10963" />
			<reference href="https://bdu.fstec.ru/vul/2025-07273" type="self" id="BDU:2025-07273" title="BDU:2025-07273" />
			<reference href="https://bdu.fstec.ru/vul/2025-02448" type="self" id="BDU:2025-02448" title="BDU:2025-02448" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pam" epoch="0" version="1.4.0" release="11.el7" arch="x86_64" src="">
					<filename>pam-0:1.4.0-11.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251006-08</id>
		<issued date="2025-10-06" />
		<updated date="2025-10-06" />
		<title>Уязвимость glpi </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2024-11955/</description>
               <solution>
                    Запретить использование в ОС пакета glpi
                или
                    Установить обновление для пакета(ов) glpi
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2024-11955/" type="self" id="ROS-20251006-08" title="ROS-20251006-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11955" type="cve" id="CVE-2024-11955" title="CVE-2024-11955" />
			<reference href="https://bdu.fstec.ru/vul/2025-11359" type="self" id="BDU:2025-11359" title="BDU:2025-11359" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi" epoch="0" version="10.0.19" release="1.el7" arch="noarch" src="">
					<filename>glpi-0:10.0.19-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251006-09</id>
		<issued date="2025-10-06" />
		<updated date="2025-10-06" />
		<title>Множественные уязвимости nodejs </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nodejs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nodejs-cve-2025-23165-cve-2025-23166-cve-2025-23167/</description>
               <solution>
                    Запретить использование в ОС пакета nodejs
                или
                    Установить обновление для пакета(ов) nodejs
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nodejs-cve-2025-23165-cve-2025-23166-cve-2025-23167/" type="self" id="ROS-20251006-09" title="ROS-20251006-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23167" type="cve" id="CVE-2025-23167" title="CVE-2025-23167" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23165" type="cve" id="CVE-2025-23165" title="CVE-2025-23165" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23166" type="cve" id="CVE-2025-23166" title="CVE-2025-23166" />
			<reference href="https://bdu.fstec.ru/vul/2025-10618" type="self" id="BDU:2025-10618" title="BDU:2025-10618" />
			<reference href="https://bdu.fstec.ru/vul/2025-10619" type="self" id="BDU:2025-10619" title="BDU:2025-10619" />
			<reference href="https://bdu.fstec.ru/vul/2025-10620" type="self" id="BDU:2025-10620" title="BDU:2025-10620" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs" epoch="1" version="22.19.0" release="1.el7" arch="x86_64" src="">
					<filename>nodejs-1:22.19.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251006-10</id>
		<issued date="2025-10-06" />
		<updated date="2025-10-06" />
		<title>Множественные уязвимости nodejs20 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nodejs20</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nodejs20-cve-2025-23165-cve-2025-23166-cve-2025-23167/</description>
               <solution>
                    Запретить использование в ОС пакета nodejs20
                или
                    Установить обновление для пакета(ов) nodejs20
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nodejs20-cve-2025-23165-cve-2025-23166-cve-2025-23167/" type="self" id="ROS-20251006-10" title="ROS-20251006-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23167" type="cve" id="CVE-2025-23167" title="CVE-2025-23167" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23165" type="cve" id="CVE-2025-23165" title="CVE-2025-23165" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23166" type="cve" id="CVE-2025-23166" title="CVE-2025-23166" />
			<reference href="https://bdu.fstec.ru/vul/2025-10618" type="self" id="BDU:2025-10618" title="BDU:2025-10618" />
			<reference href="https://bdu.fstec.ru/vul/2025-10619" type="self" id="BDU:2025-10619" title="BDU:2025-10619" />
			<reference href="https://bdu.fstec.ru/vul/2025-10620" type="self" id="BDU:2025-10620" title="BDU:2025-10620" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs20" epoch="1" version="20.19.4" release="1.el7" arch="x86_64" src="">
					<filename>nodejs20-1:20.19.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251006-11</id>
		<issued date="2025-10-06" />
		<updated date="2025-10-06" />
		<title>Множественные уязвимости libuv </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libuv</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libuv-cve-2025-23165-cve-2025-23166-cve-2025-23167/</description>
               <solution>
                    Запретить использование в ОС пакета libuv
                или
                    Установить обновление для пакета(ов) libuv
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libuv-cve-2025-23165-cve-2025-23166-cve-2025-23167/" type="self" id="ROS-20251006-11" title="ROS-20251006-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23167" type="cve" id="CVE-2025-23167" title="CVE-2025-23167" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23165" type="cve" id="CVE-2025-23165" title="CVE-2025-23165" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23166" type="cve" id="CVE-2025-23166" title="CVE-2025-23166" />
			<reference href="https://bdu.fstec.ru/vul/2025-10618" type="self" id="BDU:2025-10618" title="BDU:2025-10618" />
			<reference href="https://bdu.fstec.ru/vul/2025-10619" type="self" id="BDU:2025-10619" title="BDU:2025-10619" />
			<reference href="https://bdu.fstec.ru/vul/2025-10620" type="self" id="BDU:2025-10620" title="BDU:2025-10620" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libuv" epoch="1" version="1.51.0" release="1.el7" arch="x86_64" src="">
					<filename>libuv-1:1.51.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251006-12</id>
		<issued date="2025-10-06" />
		<updated date="2025-10-06" />
		<title>Множественные уязвимости jackson-parent </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в jackson-parent</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-jackson-parent-cve-2025-52999-cve-2025-49128/</description>
               <solution>
                    Запретить использование в ОС пакета jackson-parent
                или
                    Установить обновление для пакета(ов) jackson-parent
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-jackson-parent-cve-2025-52999-cve-2025-49128/" type="self" id="ROS-20251006-12" title="ROS-20251006-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49128" type="cve" id="CVE-2025-49128" title="CVE-2025-49128" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52999" type="cve" id="CVE-2025-52999" title="CVE-2025-52999" />
			<reference href="https://bdu.fstec.ru/vul/2025-12587" type="self" id="BDU:2025-12587" title="BDU:2025-12587" />
			<reference href="https://bdu.fstec.ru/vul/2025-11087" type="self" id="BDU:2025-11087" title="BDU:2025-11087" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jackson-parent" epoch="0" version="2.15" release="1.el7" arch="noarch" src="">
					<filename>jackson-parent-0:2.15-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251006-13</id>
		<issued date="2025-10-06" />
		<updated date="2025-10-06" />
		<title>Множественные уязвимости jackson-bom </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в jackson-bom</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-jackson-bom-cve-2025-52999-cve-2025-49128/</description>
               <solution>
                    Запретить использование в ОС пакета jackson-bom
                или
                    Установить обновление для пакета(ов) jackson-bom
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-jackson-bom-cve-2025-52999-cve-2025-49128/" type="self" id="ROS-20251006-13" title="ROS-20251006-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49128" type="cve" id="CVE-2025-49128" title="CVE-2025-49128" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52999" type="cve" id="CVE-2025-52999" title="CVE-2025-52999" />
			<reference href="https://bdu.fstec.ru/vul/2025-12587" type="self" id="BDU:2025-12587" title="BDU:2025-12587" />
			<reference href="https://bdu.fstec.ru/vul/2025-11087" type="self" id="BDU:2025-11087" title="BDU:2025-11087" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jackson-bom" epoch="0" version="2.15.0" release="1.el7" arch="noarch" src="">
					<filename>jackson-bom-0:2.15.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251006-14</id>
		<issued date="2025-10-06" />
		<updated date="2025-10-06" />
		<title>Множественные уязвимости jackson-annotations </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в jackson-annotations</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-jackson-annotations-cve-2025-52999-cve-2025-49128/</description>
               <solution>
                    Запретить использование в ОС пакета jackson-annotations
                или
                    Установить обновление для пакета(ов) jackson-annotations
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-jackson-annotations-cve-2025-52999-cve-2025-49128/" type="self" id="ROS-20251006-14" title="ROS-20251006-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49128" type="cve" id="CVE-2025-49128" title="CVE-2025-49128" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52999" type="cve" id="CVE-2025-52999" title="CVE-2025-52999" />
			<reference href="https://bdu.fstec.ru/vul/2025-12587" type="self" id="BDU:2025-12587" title="BDU:2025-12587" />
			<reference href="https://bdu.fstec.ru/vul/2025-11087" type="self" id="BDU:2025-11087" title="BDU:2025-11087" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jackson-annotations" epoch="0" version="2.15.0" release="1.el7" arch="noarch" src="">
					<filename>jackson-annotations-0:2.15.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251006-15</id>
		<issued date="2025-10-06" />
		<updated date="2025-10-06" />
		<title>Множественные уязвимости jackson-core </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в jackson-core</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-jackson-core-cve-2025-52999-cve-2025-49128/</description>
               <solution>
                    Запретить использование в ОС пакета jackson-core
                или
                    Установить обновление для пакета(ов) jackson-core
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-jackson-core-cve-2025-52999-cve-2025-49128/" type="self" id="ROS-20251006-15" title="ROS-20251006-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49128" type="cve" id="CVE-2025-49128" title="CVE-2025-49128" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52999" type="cve" id="CVE-2025-52999" title="CVE-2025-52999" />
			<reference href="https://bdu.fstec.ru/vul/2025-12587" type="self" id="BDU:2025-12587" title="BDU:2025-12587" />
			<reference href="https://bdu.fstec.ru/vul/2025-11087" type="self" id="BDU:2025-11087" title="BDU:2025-11087" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jackson-core" epoch="0" version="2.15.0" release="1.el7" arch="noarch" src="">
					<filename>jackson-core-0:2.15.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251006-16</id>
		<issued date="2025-10-06" />
		<updated date="2025-10-06" />
		<title>Множественные уязвимости jackson-databind </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в jackson-databind</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-jackson-databind-cve-2025-52999-cve-2025-49128/</description>
               <solution>
                    Запретить использование в ОС пакета jackson-databind
                или
                    Установить обновление для пакета(ов) jackson-databind
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-jackson-databind-cve-2025-52999-cve-2025-49128/" type="self" id="ROS-20251006-16" title="ROS-20251006-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49128" type="cve" id="CVE-2025-49128" title="CVE-2025-49128" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52999" type="cve" id="CVE-2025-52999" title="CVE-2025-52999" />
			<reference href="https://bdu.fstec.ru/vul/2025-12587" type="self" id="BDU:2025-12587" title="BDU:2025-12587" />
			<reference href="https://bdu.fstec.ru/vul/2025-11087" type="self" id="BDU:2025-11087" title="BDU:2025-11087" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jackson-databind" epoch="0" version="2.15.0" release="1.el7" arch="noarch" src="">
					<filename>jackson-databind-0:2.15.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251006-17</id>
		<issued date="2025-10-06" />
		<updated date="2025-10-06" />
		<title>Уязвимость libgcrypt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libgcrypt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libgcrypt-cve-2021-33560/</description>
               <solution>
                    Запретить использование в ОС пакета libgcrypt
                или
                    Установить обновление для пакета(ов) libgcrypt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libgcrypt-cve-2021-33560/" type="self" id="ROS-20251006-17" title="ROS-20251006-17" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560" type="cve" id="CVE-2021-33560" title="CVE-2021-33560" />
			<reference href="https://bdu.fstec.ru/vul/2022-03136" type="self" id="BDU:2022-03136" title="BDU:2022-03136" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libgcrypt" epoch="0" version="1.8.6" release="4.el7" arch="x86_64" src="">
					<filename>libgcrypt-0:1.8.6-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251007-01</id>
		<issued date="2025-10-07" />
		<updated date="2025-10-07" />
		<title>Множественные уязвимости catdoc </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в catdoc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-catdoc-cve-2024-48877-cve-2024-52035-cve-2024-54028/</description>
               <solution>
                    Запретить использование в ОС пакета catdoc
                или
                    Установить обновление для пакета(ов) catdoc
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-catdoc-cve-2024-48877-cve-2024-52035-cve-2024-54028/" type="self" id="ROS-20251007-01" title="ROS-20251007-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54028" type="cve" id="CVE-2024-54028" title="CVE-2024-54028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52035" type="cve" id="CVE-2024-52035" title="CVE-2024-52035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48877" type="cve" id="CVE-2024-48877" title="CVE-2024-48877" />
			<reference href="https://bdu.fstec.ru/vul/2025-12847" type="self" id="BDU:2025-12847" title="BDU:2025-12847" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="catdoc" epoch="0" version="0.95" release="6.el7" arch="x86_64" src="">
					<filename>catdoc-0:0.95-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251007-02</id>
		<issued date="2025-10-07" />
		<updated date="2025-10-07" />
		<title>Множественные уязвимости mediawiki</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в mediawiki</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mediawiki-07102025/</description>
               <solution>
                    Запретить использование в ОС пакета mediawiki
                или
                    Установить обновление для пакета(ов) mediawiki
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-mediawiki-07102025/" type="self" id="ROS-20251007-02" title="ROS-20251007-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32072" type="cve" id="CVE-2025-32072" title="CVE-2025-32072" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6590" type="cve" id="CVE-2025-6590" title="CVE-2025-6590" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6591" type="cve" id="CVE-2025-6591" title="CVE-2025-6591" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6593" type="cve" id="CVE-2025-6593" title="CVE-2025-6593" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6594" type="cve" id="CVE-2025-6594" title="CVE-2025-6594" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6595" type="cve" id="CVE-2025-6595" title="CVE-2025-6595" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6597" type="cve" id="CVE-2025-6597" title="CVE-2025-6597" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mediawiki" epoch="0" version="1.40.3" release="7.el7" arch="noarch" src="">
					<filename>mediawiki-0:1.40.3-7.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251007-03</id>
		<issued date="2025-10-07" />
		<updated date="2025-10-07" />
		<title>Уязвимость pdns-recursor </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в pdns-recursor</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pdns-recursor-cve-2025-30192/</description>
               <solution>
                    Запретить использование в ОС пакета pdns-recursor
                или
                    Установить обновление для пакета(ов) pdns-recursor
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pdns-recursor-cve-2025-30192/" type="self" id="ROS-20251007-03" title="ROS-20251007-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30192" type="cve" id="CVE-2025-30192" title="CVE-2025-30192" />
			<reference href="https://bdu.fstec.ru/vul/2025-12940" type="self" id="BDU:2025-12940" title="BDU:2025-12940" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pdns-recursor" epoch="0" version="5.1.7" release="1.el7" arch="x86_64" src="">
					<filename>pdns-recursor-0:5.1.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251007-04</id>
		<issued date="2025-10-07" />
		<updated date="2025-10-07" />
		<title>Множественные уязвимости glpi</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-glpi-07102025/</description>
               <solution>
                    Запретить использование в ОС пакета glpi
                или
                    Установить обновление для пакета(ов) glpi
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-glpi-07102025/" type="self" id="ROS-20251007-04" title="ROS-20251007-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53008" type="cve" id="CVE-2025-53008" title="CVE-2025-53008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53111" type="cve" id="CVE-2025-53111" title="CVE-2025-53111" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53112" type="cve" id="CVE-2025-53112" title="CVE-2025-53112" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53113" type="cve" id="CVE-2025-53113" title="CVE-2025-53113" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53357" type="cve" id="CVE-2025-53357" title="CVE-2025-53357" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi" epoch="0" version="10.0.19" release="1.el7" arch="noarch" src="">
					<filename>glpi-0:10.0.19-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251007-05</id>
		<issued date="2025-10-07" />
		<updated date="2025-10-07" />
		<title>Множественные уязвимости vim-X11 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в vim-X11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim-x11-cve-2025-55158-cve-2025-55157-cve-2025-9390-cve-2025-9389/</description>
               <solution>
                    Запретить использование в ОС пакета vim-X11
                или
                    Установить обновление для пакета(ов) vim-X11
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vim-x11-cve-2025-55158-cve-2025-55157-cve-2025-9390-cve-2025-9389/" type="self" id="ROS-20251007-05" title="ROS-20251007-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55158" type="cve" id="CVE-2025-55158" title="CVE-2025-55158" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55157" type="cve" id="CVE-2025-55157" title="CVE-2025-55157" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9390" type="cve" id="CVE-2025-9390" title="CVE-2025-9390" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9389" type="cve" id="CVE-2025-9389" title="CVE-2025-9389" />
			<reference href="https://bdu.fstec.ru/vul/2025-12932" type="self" id="BDU:2025-12932" title="BDU:2025-12932" />
			<reference href="https://bdu.fstec.ru/vul/2025-12929" type="self" id="BDU:2025-12929" title="BDU:2025-12929" />
			<reference href="https://bdu.fstec.ru/vul/2025-12931" type="self" id="BDU:2025-12931" title="BDU:2025-12931" />
			<reference href="https://bdu.fstec.ru/vul/2025-12930" type="self" id="BDU:2025-12930" title="BDU:2025-12930" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-X11" epoch="2" version="9.1.1740" release="1.el7" arch="x86_64" src="">
					<filename>vim-X11-2:9.1.1740-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251008-01</id>
		<issued date="2025-10-08" />
		<updated date="2025-10-08" />
		<title>Множественные уязвимости thunderbird </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-cve-2025-0510-cve-2025-1015-cve-2025-26695/</description>
               <solution>
                    Запретить использование в ОС пакета thunderbird
                или
                    Установить обновление для пакета(ов) thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-thunderbird-cve-2025-0510-cve-2025-1015-cve-2025-26695/" type="self" id="ROS-20251008-01" title="ROS-20251008-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0510" type="cve" id="CVE-2025-0510" title="CVE-2025-0510" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1015" type="cve" id="CVE-2025-1015" title="CVE-2025-1015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26695" type="cve" id="CVE-2025-26695" title="CVE-2025-26695" />
			<reference href="https://bdu.fstec.ru/vul/2025-02316" type="self" id="BDU:2025-02316" title="BDU:2025-02316" />
			<reference href="https://bdu.fstec.ru/vul/2025-02315" type="self" id="BDU:2025-02315" title="BDU:2025-02315" />
			<reference href="https://bdu.fstec.ru/vul/2025-02578" type="self" id="BDU:2025-02578" title="BDU:2025-02578" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="128.8.0" release="1.el7" arch="x86_64" src="">
					<filename>thunderbird-0:128.8.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251008-02</id>
		<issued date="2025-10-08" />
		<updated date="2025-10-08" />
		<title>Уязвимость thunderbird </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-thunderbird-cve-2025-3877/</description>
               <solution>
                    Запретить использование в ОС пакета thunderbird
                или
                    Установить обновление для пакета(ов) thunderbird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-thunderbird-cve-2025-3877/" type="self" id="ROS-20251008-02" title="ROS-20251008-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3877" type="cve" id="CVE-2025-3877" title="CVE-2025-3877" />
			<reference href="https://bdu.fstec.ru/vul/2025-05735" type="self" id="BDU:2025-05735" title="BDU:2025-05735" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="128.11.1" release="1.el7" arch="x86_64" src="">
					<filename>thunderbird-0:128.11.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251008-03</id>
		<issued date="2025-10-08" />
		<updated date="2025-10-08" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-6556/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-6556/" type="self" id="ROS-20251008-03" title="ROS-20251008-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6556" type="cve" id="CVE-2025-6556" title="CVE-2025-6556" />
			<reference href="https://bdu.fstec.ru/vul/2025-09103" type="self" id="BDU:2025-09103" title="BDU:2025-09103" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="138.0.7204.49" release="1.el7" arch="x86_64" src="">
					<filename>chromium-0:138.0.7204.49-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251008-04</id>
		<issued date="2025-10-08" />
		<updated date="2025-10-13" />
		<title>Множественные уязвимости gpac</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gpac</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gpac-08102025/</description>
               <solution>
                    Запретить использование в ОС пакета gpac 
                или
                    Установить обновление для пакета(ов) gpac 
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gpac-08102025/" type="self" id="ROS-20251008-04" title="ROS-20251008-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=" type="cve" id="" title="" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=" type="cve" id="" title="" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=" type="cve" id="" title="" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=" type="cve" id="" title="" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=" type="cve" id="" title="" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=" type="cve" id="" title="" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gpac" epoch="0" version="2.4.0" release="6.el7" arch="x86_64" src="">
					<filename>gpac-0:2.4.0-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251008-05</id>
		<issued date="2025-10-08" />
		<updated date="2025-10-08" />
		<title>Уязвимость kubernetes </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kubernetes</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kubernetes-cve-2021-25743/</description>
               <solution>
                    Запретить использование в ОС пакета kubernetes
                или
                    Установить обновление для пакета(ов) kubernetes
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kubernetes-cve-2021-25743/" type="self" id="ROS-20251008-05" title="ROS-20251008-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25743" type="cve" id="CVE-2021-25743" title="CVE-2021-25743" />
			<reference href="https://bdu.fstec.ru/vul/2025-12934" type="self" id="BDU:2025-12934" title="BDU:2025-12934" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kubernetes" epoch="0" version="1.24.17" release="9.el7" arch="x86_64" src="">
					<filename>kubernetes-0:1.24.17-9.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251008-06</id>
		<issued date="2025-10-08" />
		<updated date="2025-10-08" />
		<title>Уязвимость jetty </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в jetty</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jetty-cve-2025-5115/</description>
               <solution>
                    Запретить использование в ОС пакета jetty
                или
                    Установить обновление для пакета(ов) jetty
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jetty-cve-2025-5115/" type="self" id="ROS-20251008-06" title="ROS-20251008-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5115" type="cve" id="CVE-2025-5115" title="CVE-2025-5115" />
			<reference href="https://bdu.fstec.ru/vul/2025-12933" type="self" id="BDU:2025-12933" title="BDU:2025-12933" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jetty" epoch="0" version="9.4.58" release="1.el7" arch="noarch" src="">
					<filename>jetty-0:9.4.58-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251008-07</id>
		<issued date="2025-10-08" />
		<updated date="2025-10-08" />
		<title>Уязвимость git-lfs </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в git-lfs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-git-lfs-cve-2025-47907/</description>
               <solution>
                    Запретить использование в ОС пакета git-lfs
                или
                    Установить обновление для пакета(ов) git-lfs
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-git-lfs-cve-2025-47907/" type="self" id="ROS-20251008-07" title="ROS-20251008-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47907" type="cve" id="CVE-2025-47907" title="CVE-2025-47907" />
			<reference href="https://bdu.fstec.ru/vul/2025-10834" type="self" id="BDU:2025-10834" title="BDU:2025-10834" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="git-lfs" epoch="0" version="3.7.0" release="1.el7" arch="x86_64" src="">
					<filename>git-lfs-0:3.7.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251008-10</id>
		<issued date="2025-10-08" />
		<updated date="2025-10-14" />
		<title>Уязвимость udisks2 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в udisks2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-udisks2-cve-2025-8067/</description>
               <solution>
                    Запретить использование в ОС пакета udisks2
                или
                    Установить обновление для пакета(ов) udisks2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-udisks2-cve-2025-8067/" type="self" id="ROS-20251008-10" title="ROS-20251008-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8067" type="cve" id="CVE-2025-8067" title="CVE-2025-8067" />
			<reference href="https://bdu.fstec.ru/vul/2025-11284" type="self" id="BDU:2025-11284" title="BDU:2025-11284" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="udisks2" epoch="0" version="2.9.3" release="3.el7" arch="x86_64" src="">
					<filename>udisks2-0:2.9.3-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251008-08</id>
		<issued date="2025-10-08" />
		<updated date="2025-10-08" />
		<title>Уязвимость expat </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в expat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-expat-cve-2025-59375/</description>
               <solution>
                    Запретить использование в ОС пакета expat
                или
                    Установить обновление для пакета(ов) expat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-expat-cve-2025-59375/" type="self" id="ROS-20251008-08" title="ROS-20251008-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59375" type="cve" id="CVE-2025-59375" title="CVE-2025-59375" />
			<reference href="https://bdu.fstec.ru/vul/2025-12925" type="self" id="BDU:2025-12925" title="BDU:2025-12925" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="expat" epoch="0" version="2.7.2" release="1.el7" arch="x86_64" src="">
					<filename>expat-0:2.7.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251008-09</id>
		<issued date="2025-10-08" />
		<updated date="2025-10-08" />
		<title>Множественные уязвимости assimp </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в assimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-assimp-cve-2025-3016-cve-2025-3015-cve-2025-3160/</description>
               <solution>
                    Запретить использование в ОС пакета assimp
                или
                    Установить обновление для пакета(ов) assimp
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-assimp-cve-2025-3016-cve-2025-3015-cve-2025-3160/" type="self" id="ROS-20251008-09" title="ROS-20251008-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3016" type="cve" id="CVE-2025-3016" title="CVE-2025-3016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3160" type="cve" id="CVE-2025-3160" title="CVE-2025-3160" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3015" type="cve" id="CVE-2025-3015" title="CVE-2025-3015" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="assimp" epoch="0" version="5.4.3" release="4.el7" arch="x86_64" src="">
					<filename>assimp-0:5.4.3-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251013-01</id>
		<issued date="2025-10-13" />
		<updated date="2025-10-13" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-13102025/</description>
               <solution>
                    Установить обновление для пакета(ов) kernel-lt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-13102025/" type="self" id="ROS-20251013-01" title="ROS-20251013-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25744" type="cve" id="CVE-2024-25744" title="CVE-2024-25744" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26595" type="cve" id="CVE-2024-26595" title="CVE-2024-26595" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26607" type="cve" id="CVE-2024-26607" title="CVE-2024-26607" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52481" type="cve" id="CVE-2023-52481" title="CVE-2023-52481" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48628" type="cve" id="CVE-2022-48628" title="CVE-2022-48628" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52506" type="cve" id="CVE-2023-52506" title="CVE-2023-52506" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52508" type="cve" id="CVE-2023-52508" title="CVE-2023-52508" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52532" type="cve" id="CVE-2023-52532" title="CVE-2023-52532" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52561" type="cve" id="CVE-2023-52561" title="CVE-2023-52561" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52569" type="cve" id="CVE-2023-52569" title="CVE-2023-52569" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52576" type="cve" id="CVE-2023-52576" title="CVE-2023-52576" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52593" type="cve" id="CVE-2023-52593" title="CVE-2023-52593" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52589" type="cve" id="CVE-2023-52589" title="CVE-2023-52589" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52584" type="cve" id="CVE-2023-52584" title="CVE-2023-52584" />
			<reference href="https://bdu.fstec.ru/vul/2025-12936" type="self" id="BDU:2025-12936" title="BDU:2025-12936" />
			<reference href="https://bdu.fstec.ru/vul/2024-01846" type="self" id="BDU:2024-01846" title="BDU:2024-01846" />
			<reference href="https://bdu.fstec.ru/vul/2024-01829" type="self" id="BDU:2024-01829" title="BDU:2024-01829" />
			<reference href="https://bdu.fstec.ru/vul/2025-12937" type="self" id="BDU:2025-12937" title="BDU:2025-12937" />
			<reference href="https://bdu.fstec.ru/vul/2025-04450" type="self" id="BDU:2025-04450" title="BDU:2025-04450" />
			<reference href="https://bdu.fstec.ru/vul/2025-12938" type="self" id="BDU:2025-12938" title="BDU:2025-12938" />
			<reference href="https://bdu.fstec.ru/vul/2025-12939" type="self" id="BDU:2025-12939" title="BDU:2025-12939" />
			<reference href="https://bdu.fstec.ru/vul/2025-03820" type="self" id="BDU:2025-03820" title="BDU:2025-03820" />
			<reference href="https://bdu.fstec.ru/vul/2025-12941" type="self" id="BDU:2025-12941" title="BDU:2025-12941" />
			<reference href="https://bdu.fstec.ru/vul/2024-01936" type="self" id="BDU:2024-01936" title="BDU:2024-01936" />
			<reference href="https://bdu.fstec.ru/vul/2024-01766" type="self" id="BDU:2024-01766" title="BDU:2024-01766" />
			<reference href="https://bdu.fstec.ru/vul/2025-08236" type="self" id="BDU:2025-08236" title="BDU:2025-08236" />
			<reference href="https://bdu.fstec.ru/vul/2025-03819" type="self" id="BDU:2025-03819" title="BDU:2025-03819" />
			<reference href="https://bdu.fstec.ru/vul/2025-12942" type="self" id="BDU:2025-12942" title="BDU:2025-12942" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251013-02</id>
		<issued date="2025-10-13" />
		<updated date="2025-10-13" />
		<title>Множественные уязвимости kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-cve-2024-26618-cve-2024-26596/</description>
               <solution>
                    Установить обновление для пакета(ов) kernel-lt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-cve-2024-26618-cve-2024-26596/" type="self" id="ROS-20251013-02" title="ROS-20251013-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26596" type="cve" id="CVE-2024-26596" title="CVE-2024-26596" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26618" type="cve" id="CVE-2024-26618" title="CVE-2024-26618" />
			<reference href="https://bdu.fstec.ru/vul/2024-01856" type="self" id="BDU:2024-01856" title="BDU:2024-01856" />
			<reference href="https://bdu.fstec.ru/vul/2024-04141" type="self" id="BDU:2024-04141" title="BDU:2024-04141" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251014-01</id>
		<issued date="2025-10-14" />
		<updated date="2025-10-14" />
		<title>Уязвимость rubygem-rack </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в rubygem-rack</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-rack-cve-2025-59830/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-rack
                или
                    Установить обновление для пакета(ов) rubygem-rack
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-rack-cve-2025-59830/" type="self" id="ROS-20251014-01" title="ROS-20251014-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59830" type="cve" id="CVE-2025-59830" title="CVE-2025-59830" />
			<reference href="https://bdu.fstec.ru/vul/2025-13146" type="self" id="BDU:2025-13146" title="BDU:2025-13146" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-rack" epoch="1" version="2.2.18" release="1.el7" arch="noarch" src="">
					<filename>rubygem-rack-1:2.2.18-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251014-02</id>
		<issued date="2025-10-14" />
		<updated date="2025-10-14" />
		<title>Уязвимость pam-u2f </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в pam-u2f</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pam-u2f-cve-2025-23013/</description>
               <solution>
                    Запретить использование в ОС пакета pam-u2f
                или
                    Установить обновление для пакета(ов) pam-u2f
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pam-u2f-cve-2025-23013/" type="self" id="ROS-20251014-02" title="ROS-20251014-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23013" type="cve" id="CVE-2025-23013" title="CVE-2025-23013" />
			<reference href="https://bdu.fstec.ru/vul/2025-02595" type="self" id="BDU:2025-02595" title="BDU:2025-02595" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pam-u2f" epoch="0" version="1.4.0" release="1.el7" arch="x86_64" src="">
					<filename>pam-u2f-0:1.4.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251014-03</id>
		<issued date="2025-10-14" />
		<updated date="2025-10-14" />
		<title>Уязвимость golang-x-net-devel </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang-x-net-devel</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-x-net-devel-cve-2025-22872/</description>
               <solution>
                    Запретить использование в ОС пакета golang-x-net-devel
                или
                    Установить обновление для пакета(ов) golang-x-net-devel
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-x-net-devel-cve-2025-22872/" type="self" id="ROS-20251014-03" title="ROS-20251014-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22872" type="cve" id="CVE-2025-22872" title="CVE-2025-22872" />
			<reference href="https://bdu.fstec.ru/vul/2025-08473" type="self" id="BDU:2025-08473" title="BDU:2025-08473" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang-x-net-devel" epoch="0" version="0.33.0" release="2.el7" arch="noarch" src="">
					<filename>golang-x-net-devel-0:0.33.0-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251014-04</id>
		<issued date="2025-10-14" />
		<updated date="2025-10-14" />
		<title>Уязвимость vips </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в vips</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vips-cve-2025-29769/</description>
               <solution>
                    Запретить использование в ОС пакета vips
                или
                    Установить обновление для пакета(ов) vips
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vips-cve-2025-29769/" type="self" id="ROS-20251014-04" title="ROS-20251014-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29769" type="cve" id="CVE-2025-29769" title="CVE-2025-29769" />
			<reference href="https://bdu.fstec.ru/vul/2025-13158" type="self" id="BDU:2025-13158" title="BDU:2025-13158" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vips" epoch="0" version="8.16.1" release="1.el7" arch="x86_64" src="">
					<filename>vips-0:8.16.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251014-05</id>
		<issued date="2025-10-14" />
		<updated date="2025-10-14" />
		<title>Уязвимость grafana </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в grafana</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grafana-cve-2024-6837/</description>
               <solution>
                    Запретить использование в ОС пакета grafana
                или
                    Установить обновление для пакета(ов) grafana
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grafana-cve-2024-6837/" type="self" id="ROS-20251014-05" title="ROS-20251014-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6837" type="cve" id="CVE-2024-6837" title="CVE-2024-6837" />
			<reference href="https://bdu.fstec.ru/vul/2025-02009" type="self" id="BDU:2025-02009" title="BDU:2025-02009" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="grafana" epoch="0" version="11.2.0" release="1.el7" arch="x86_64" src="">
					<filename>grafana-0:11.2.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251014-06</id>
		<issued date="2025-10-14" />
		<updated date="2025-10-14" />
		<title>Уязвимость jq </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в jq</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jq-cve-2025-9403/</description>
               <solution>
                    Запретить использование в ОС пакета jq
                или
                    Установить обновление для пакета(ов) jq
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jq-cve-2025-9403/" type="self" id="ROS-20251014-06" title="ROS-20251014-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9403" type="cve" id="CVE-2025-9403" title="CVE-2025-9403" />
			<reference href="https://bdu.fstec.ru/vul/2025-13159" type="self" id="BDU:2025-13159" title="BDU:2025-13159" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jq" epoch="0" version="1.8.1" release="2.el7" arch="x86_64" src="">
					<filename>jq-0:1.8.1-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251014-07</id>
		<issued date="2025-10-14" />
		<updated date="2025-10-14" />
		<title>Уязвимость perl-JSON-XS </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в perl-JSON-XS</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-json-xs-cve-2025-40928/</description>
               <solution>
                    Запретить использование в ОС пакета perl-JSON-XS
                или
                    Установить обновление для пакета(ов) perl-JSON-XS
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-json-xs-cve-2025-40928/" type="self" id="ROS-20251014-07" title="ROS-20251014-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40928" type="cve" id="CVE-2025-40928" title="CVE-2025-40928" />
			<reference href="https://bdu.fstec.ru/vul/2025-13160" type="self" id="BDU:2025-13160" title="BDU:2025-13160" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="perl-JSON-XS" epoch="1" version="4.04" release="1.el7" arch="x86_64" src="">
					<filename>perl-JSON-XS-1:4.04-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251014-08</id>
		<issued date="2025-10-14" />
		<updated date="2025-10-14" />
		<title>Уязвимость podman </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в podman</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-podman-cve-2025-9566/</description>
               <solution>
                    Запретить использование в ОС пакета podman
                или
                    Установить обновление для пакета(ов) podman
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-podman-cve-2025-9566/" type="self" id="ROS-20251014-08" title="ROS-20251014-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9566" type="cve" id="CVE-2025-9566" title="CVE-2025-9566" />
			<reference href="https://bdu.fstec.ru/vul/2025-13147" type="self" id="BDU:2025-13147" title="BDU:2025-13147" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="podman" epoch="0" version="4.9.5" release="6.el7" arch="x86_64" src="">
					<filename>podman-0:4.9.5-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251014-09</id>
		<issued date="2025-10-14" />
		<updated date="2025-10-14" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2025-10533/</description>
               <solution>
                    Запретить использование в ОС пакета firefox
                или
                    Установить обновление для пакета(ов) firefox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2025-10533/" type="self" id="ROS-20251014-09" title="ROS-20251014-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10533" type="cve" id="CVE-2025-10533" title="CVE-2025-10533" />
			<reference href="https://bdu.fstec.ru/vul/2025-11378" type="self" id="BDU:2025-11378" title="BDU:2025-11378" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.28.0" release="1.el7" arch="x86_64" src="">
					<filename>firefox-0:115.28.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251014-10</id>
		<issued date="2025-10-14" />
		<updated date="2025-10-14" />
		<title>Уязвимость jenkins </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в jenkins</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jenkins-cve-2025-59474/</description>
               <solution>
                    Запретить использование в ОС пакета jenkins
                или
                    Установить обновление для пакета(ов) jenkins
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jenkins-cve-2025-59474/" type="self" id="ROS-20251014-10" title="ROS-20251014-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59474" type="cve" id="CVE-2025-59474" title="CVE-2025-59474" />
			<reference href="https://bdu.fstec.ru/vul/2025-13143" type="self" id="BDU:2025-13143" title="BDU:2025-13143" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jenkins" epoch="0" version="2.516.3" release="1.el7" arch="noarch" src="">
					<filename>jenkins-0:2.516.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251014-11</id>
		<issued date="2025-10-14" />
		<updated date="2025-10-14" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2025-47910/</description>
               <solution>
                    Запретить использование в ОС пакета golang
                или
                    Установить обновление для пакета(ов) golang
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2025-47910/" type="self" id="ROS-20251014-11" title="ROS-20251014-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47910" type="cve" id="CVE-2025-47910" title="CVE-2025-47910" />
			<reference href="https://bdu.fstec.ru/vul/2025-11599" type="self" id="BDU:2025-11599" title="BDU:2025-11599" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.24.7" release="1.el7" arch="x86_64" src="">
					<filename>golang-0:1.24.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251016-01</id>
		<issued date="2025-10-16" />
		<updated date="2025-10-16" />
		<title>Уязвимость dcmtk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dcmtk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dcmtk-cve-2025-9732/</description>
               <solution>
                    Запретить использование в ОС пакета dcmtk
                или
                    Установить обновление для пакета(ов) dcmtk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dcmtk-cve-2025-9732/" type="self" id="ROS-20251016-01" title="ROS-20251016-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9732" type="cve" id="CVE-2025-9732" title="CVE-2025-9732" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dcmtk" epoch="0" version="3.6.9" release="1.el7" arch="x86_64" src="">
					<filename>dcmtk-0:3.6.9-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251016-02</id>
		<issued date="2025-10-16" />
		<updated date="2025-10-16" />
		<title>Уязвимость OpenImageIO </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в OpenImageIO</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openimageio-cve-2025-9732/</description>
               <solution>
                    Запретить использование в ОС пакета OpenImageIO
                или
                    Установить обновление для пакета(ов) OpenImageIO
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openimageio-cve-2025-9732/" type="self" id="ROS-20251016-02" title="ROS-20251016-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9732" type="cve" id="CVE-2025-9732" title="CVE-2025-9732" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="OpenImageIO" epoch="0" version="2.2.8.0" release="6.el7" arch="x86_64" src="">
					<filename>OpenImageIO-0:2.2.8.0-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251016-03</id>
		<issued date="2025-10-16" />
		<updated date="2025-10-16" />
		<title>Уязвимость edk2-tools </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в edk2-tools</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-edk2-tools-cve-2024-1298/</description>
               <solution>
                    Запретить использование в ОС пакета edk2-tools
                или
                    Установить обновление для пакета(ов) edk2-tools
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-edk2-tools-cve-2024-1298/" type="self" id="ROS-20251016-03" title="ROS-20251016-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1298" type="cve" id="CVE-2024-1298" title="CVE-2024-1298" />
			<reference href="https://bdu.fstec.ru/vul/2025-12007" type="self" id="BDU:2025-12007" title="BDU:2025-12007" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="edk2-tools" epoch="0" version="20240524" release="1.el7" arch="x86_64" src="">
					<filename>edk2-tools-0:20240524-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251016-04</id>
		<issued date="2025-10-16" />
		<updated date="2025-10-16" />
		<title>Множественные уязвимости edk2-tools</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в edk2-tools</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-edk2-tools-16102025/</description>
               <solution>
                    Запретить использование в ОС пакета edk2-tools
                или
                    Установить обновление для пакета(ов) edk2-tools
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-edk2-tools-16102025/" type="self" id="ROS-20251016-04" title="ROS-20251016-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712" type="cve" id="CVE-2021-3712" title="CVE-2021-3712" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711" type="cve" id="CVE-2021-3711" title="CVE-2021-3711" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840" type="cve" id="CVE-2021-23840" title="CVE-2021-23840" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0466" type="cve" id="CVE-2023-0466" title="CVE-2023-0466" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3449" type="cve" id="CVE-2021-3449" title="CVE-2021-3449" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841" type="cve" id="CVE-2021-23841" title="CVE-2021-23841" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551" type="cve" id="CVE-2019-1551" title="CVE-2019-1551" />
			<reference href="https://bdu.fstec.ru/vul/2021-04571" type="self" id="BDU:2021-04571" title="BDU:2021-04571" />
			<reference href="https://bdu.fstec.ru/vul/2021-04570" type="self" id="BDU:2021-04570" title="BDU:2021-04570" />
			<reference href="https://bdu.fstec.ru/vul/2021-03742" type="self" id="BDU:2021-03742" title="BDU:2021-03742" />
			<reference href="https://bdu.fstec.ru/vul/2023-04973" type="self" id="BDU:2023-04973" title="BDU:2023-04973" />
			<reference href="https://bdu.fstec.ru/vul/2021-01844" type="self" id="BDU:2021-01844" title="BDU:2021-01844" />
			<reference href="https://bdu.fstec.ru/vul/2021-03744" type="self" id="BDU:2021-03744" title="BDU:2021-03744" />
			<reference href="https://bdu.fstec.ru/vul/2020-00300" type="self" id="BDU:2020-00300" title="BDU:2020-00300" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="edk2-tools" epoch="0" version="20240524" release="1.el7" arch="x86_64" src="">
					<filename>edk2-tools-0:20240524-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251017-01</id>
		<issued date="2025-10-17" />
		<updated date="2025-10-17" />
		<title>Множественные уязвимости kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-cve-2024-35870-cve-2024-35866-cve-2024-35790-cve-2024-27407/</description>
               <solution>
                    Установить обновление для пакета(ов) kernel-lt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-cve-2024-35870-cve-2024-35866-cve-2024-35790-cve-2024-27407/" type="self" id="ROS-20251017-01" title="ROS-20251017-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27407" type="cve" id="CVE-2024-27407" title="CVE-2024-27407" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35790" type="cve" id="CVE-2024-35790" title="CVE-2024-35790" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35866" type="cve" id="CVE-2024-35866" title="CVE-2024-35866" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35870" type="cve" id="CVE-2024-35870" title="CVE-2024-35870" />
			<reference href="https://bdu.fstec.ru/vul/2024-06991" type="self" id="BDU:2024-06991" title="BDU:2024-06991" />
			<reference href="https://bdu.fstec.ru/vul/2025-12228" type="self" id="BDU:2025-12228" title="BDU:2025-12228" />
			<reference href="https://bdu.fstec.ru/vul/2024-04221" type="self" id="BDU:2024-04221" title="BDU:2024-04221" />
			<reference href="https://bdu.fstec.ru/vul/2024-04218" type="self" id="BDU:2024-04218" title="BDU:2024-04218" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251017-02</id>
		<issued date="2025-10-17" />
		<updated date="2025-10-17" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-17102025/</description>
               <solution>
                    Установить обновление для пакета(ов) kernel-lt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-17102025/" type="self" id="ROS-20251017-02" title="ROS-20251017-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52657" type="cve" id="CVE-2023-52657" title="CVE-2023-52657" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52656" type="cve" id="CVE-2023-52656" title="CVE-2023-52656" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27402" type="cve" id="CVE-2024-27402" title="CVE-2024-27402" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27418" type="cve" id="CVE-2024-27418" title="CVE-2024-27418" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52660" type="cve" id="CVE-2023-52660" title="CVE-2023-52660" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27435" type="cve" id="CVE-2024-27435" title="CVE-2024-27435" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52664" type="cve" id="CVE-2023-52664" title="CVE-2023-52664" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35803" type="cve" id="CVE-2024-35803" title="CVE-2024-35803" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35818" type="cve" id="CVE-2024-35818" title="CVE-2024-35818" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52682" type="cve" id="CVE-2023-52682" title="CVE-2023-52682" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35839" type="cve" id="CVE-2024-35839" title="CVE-2024-35839" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35861" type="cve" id="CVE-2024-35861" title="CVE-2024-35861" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35862" type="cve" id="CVE-2024-35862" title="CVE-2024-35862" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35863" type="cve" id="CVE-2024-35863" title="CVE-2024-35863" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35864" type="cve" id="CVE-2024-35864" title="CVE-2024-35864" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35867" type="cve" id="CVE-2024-35867" title="CVE-2024-35867" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35868" type="cve" id="CVE-2024-35868" title="CVE-2024-35868" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35875" type="cve" id="CVE-2024-35875" title="CVE-2024-35875" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35932" type="cve" id="CVE-2024-35932" title="CVE-2024-35932" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35937" type="cve" id="CVE-2024-35937" title="CVE-2024-35937" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35939" type="cve" id="CVE-2024-35939" title="CVE-2024-35939" />
			<reference href="https://bdu.fstec.ru/vul/2025-13355" type="self" id="BDU:2025-13355" title="BDU:2025-13355" />
			<reference href="https://bdu.fstec.ru/vul/2024-03941" type="self" id="BDU:2024-03941" title="BDU:2024-03941" />
			<reference href="https://bdu.fstec.ru/vul/2024-04234" type="self" id="BDU:2024-04234" title="BDU:2024-04234" />
			<reference href="https://bdu.fstec.ru/vul/2025-13358" type="self" id="BDU:2025-13358" title="BDU:2025-13358" />
			<reference href="https://bdu.fstec.ru/vul/2025-13348" type="self" id="BDU:2025-13348" title="BDU:2025-13348" />
			<reference href="https://bdu.fstec.ru/vul/2025-03088" type="self" id="BDU:2025-03088" title="BDU:2025-03088" />
			<reference href="https://bdu.fstec.ru/vul/2025-07481" type="self" id="BDU:2025-07481" title="BDU:2025-07481" />
			<reference href="https://bdu.fstec.ru/vul/2025-13349" type="self" id="BDU:2025-13349" title="BDU:2025-13349" />
			<reference href="https://bdu.fstec.ru/vul/2025-13350" type="self" id="BDU:2025-13350" title="BDU:2025-13350" />
			<reference href="https://bdu.fstec.ru/vul/2025-13351" type="self" id="BDU:2025-13351" title="BDU:2025-13351" />
			<reference href="https://bdu.fstec.ru/vul/2025-13352" type="self" id="BDU:2025-13352" title="BDU:2025-13352" />
			<reference href="https://bdu.fstec.ru/vul/2024-04226" type="self" id="BDU:2024-04226" title="BDU:2024-04226" />
			<reference href="https://bdu.fstec.ru/vul/2024-04225" type="self" id="BDU:2024-04225" title="BDU:2024-04225" />
			<reference href="https://bdu.fstec.ru/vul/2024-04224" type="self" id="BDU:2024-04224" title="BDU:2024-04224" />
			<reference href="https://bdu.fstec.ru/vul/2024-04223" type="self" id="BDU:2024-04223" title="BDU:2024-04223" />
			<reference href="https://bdu.fstec.ru/vul/2024-04220" type="self" id="BDU:2024-04220" title="BDU:2024-04220" />
			<reference href="https://bdu.fstec.ru/vul/2024-04219" type="self" id="BDU:2024-04219" title="BDU:2024-04219" />
			<reference href="https://bdu.fstec.ru/vul/2025-13354" type="self" id="BDU:2025-13354" title="BDU:2025-13354" />
			<reference href="https://bdu.fstec.ru/vul/2025-13353" type="self" id="BDU:2025-13353" title="BDU:2025-13353" />
			<reference href="https://bdu.fstec.ru/vul/2025-08086" type="self" id="BDU:2025-08086" title="BDU:2025-08086" />
			<reference href="https://bdu.fstec.ru/vul/2025-13357" type="self" id="BDU:2025-13357" title="BDU:2025-13357" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251020-01</id>
		<issued date="2025-10-20" />
		<updated date="2025-10-20" />
		<title>Уязвимость terraform </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в terraform</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-terraform-cve-2023-4782/</description>
               <solution>
                    Запретить использование в ОС пакета terraform
                или
                    Установить обновление для пакета(ов) terraform
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-terraform-cve-2023-4782/" type="self" id="ROS-20251020-01" title="ROS-20251020-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4782" type="cve" id="CVE-2023-4782" title="CVE-2023-4782" />
			<reference href="https://bdu.fstec.ru/vul/2023-07910" type="self" id="BDU:2023-07910" title="BDU:2023-07910" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="terraform" epoch="0" version="1.8.4" release="1.el7" arch="x86_64" src="">
					<filename>terraform-0:1.8.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251020-02</id>
		<issued date="2025-10-20" />
		<updated date="2025-10-20" />
		<title>Уязвимость python3-ipython_genutils </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-ipython_genutils</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-ipython-genutils-cve-2022-39286/</description>
               <solution>
                    Запретить использование в ОС пакета python3-ipython_genutils
                или
                    Установить обновление для пакета(ов) python3-ipython_genutils
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-ipython-genutils-cve-2022-39286/" type="self" id="ROS-20251020-02" title="ROS-20251020-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39286" type="cve" id="CVE-2022-39286" title="CVE-2022-39286" />
			<reference href="https://bdu.fstec.ru/vul/2023-04040" type="self" id="BDU:2023-04040" title="BDU:2023-04040" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-ipython_genutils" epoch="0" version="0.2.0" release="2.el7" arch="noarch" src="">
					<filename>python3-ipython_genutils-0:0.2.0-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251020-03</id>
		<issued date="2025-10-20" />
		<updated date="2025-10-20" />
		<title>Уязвимость python2-traitlets </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python2-traitlets</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python2-traitlets-cve-2022-39286/</description>
               <solution>
                    Запретить использование в ОС пакета python2-traitlets
                или
                    Установить обновление для пакета(ов) python2-traitlets
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python2-traitlets-cve-2022-39286/" type="self" id="ROS-20251020-03" title="ROS-20251020-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39286" type="cve" id="CVE-2022-39286" title="CVE-2022-39286" />
			<reference href="https://bdu.fstec.ru/vul/2023-04040" type="self" id="BDU:2023-04040" title="BDU:2023-04040" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python2-traitlets" epoch="0" version="4.3.3" release="1.el7" arch="noarch" src="">
					<filename>python2-traitlets-0:4.3.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251020-04</id>
		<issued date="2025-10-20" />
		<updated date="2025-10-20" />
		<title>Уязвимость python2-jupyter-core </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python2-jupyter-core</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python2-jupyter-core-cve-2022-39286/</description>
               <solution>
                    Запретить использование в ОС пакета python2-jupyter-core
                или
                    Установить обновление для пакета(ов) python2-jupyter-core
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python2-jupyter-core-cve-2022-39286/" type="self" id="ROS-20251020-04" title="ROS-20251020-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39286" type="cve" id="CVE-2022-39286" title="CVE-2022-39286" />
			<reference href="https://bdu.fstec.ru/vul/2023-04040" type="self" id="BDU:2023-04040" title="BDU:2023-04040" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python2-jupyter-core" epoch="0" version="4.6.3" release="1.el7" arch="noarch" src="">
					<filename>python2-jupyter-core-0:4.6.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251020-05</id>
		<issued date="2025-10-20" />
		<updated date="2025-10-20" />
		<title>Уязвимость vault </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в vault</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vault-cve-2025-6203/</description>
               <solution>
                    Запретить использование в ОС пакета vault
                или
                    Установить обновление для пакета(ов) vault
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vault-cve-2025-6203/" type="self" id="ROS-20251020-05" title="ROS-20251020-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6203" type="cve" id="CVE-2025-6203" title="CVE-2025-6203" />
			<reference href="https://bdu.fstec.ru/vul/2025-10637" type="self" id="BDU:2025-10637" title="BDU:2025-10637" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vault" epoch="0" version="1.20.3" release="1.el7" arch="x86_64" src="">
					<filename>vault-0:1.20.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251020-06</id>
		<issued date="2025-10-20" />
		<updated date="2025-10-20" />
		<title>Уязвимость mongodb-org </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2025-10060/</description>
               <solution>
                    Запретить использование в ОС пакета mongodb-org
                или
                    Установить обновление для пакета(ов) mongodb-org
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2025-10060/" type="self" id="ROS-20251020-06" title="ROS-20251020-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10060" type="cve" id="CVE-2025-10060" title="CVE-2025-10060" />
			<reference href="https://bdu.fstec.ru/vul/2025-12673" type="self" id="BDU:2025-12673" title="BDU:2025-12673" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mongodb-org" epoch="0" version="7.0.24" release="1.el7" arch="x86_64" src="">
					<filename>mongodb-org-0:7.0.24-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251020-07</id>
		<issued date="2025-10-20" />
		<updated date="2025-10-20" />
		<title>Уязвимость coredns </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в coredns</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-coredns-cve-2025-58063/</description>
               <solution>
                    Запретить использование в ОС пакета coredns
                или
                    Установить обновление для пакета(ов) coredns
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-coredns-cve-2025-58063/" type="self" id="ROS-20251020-07" title="ROS-20251020-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58063" type="cve" id="CVE-2025-58063" title="CVE-2025-58063" />
			<reference href="https://bdu.fstec.ru/vul/2025-13303" type="self" id="BDU:2025-13303" title="BDU:2025-13303" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="coredns" epoch="0" version="1.8.6" release="4.el7" arch="x86_64" src="">
					<filename>coredns-0:1.8.6-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251020-08</id>
		<issued date="2025-10-20" />
		<updated date="2025-10-20" />
		<title>Уязвимость jss </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в jss</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jss-cve-2022-4132/</description>
               <solution>
                    Запретить использование в ОС пакета jss
                или
                    Установить обновление для пакета(ов) jss
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jss-cve-2022-4132/" type="self" id="ROS-20251020-08" title="ROS-20251020-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4132" type="cve" id="CVE-2022-4132" title="CVE-2022-4132" />
			<reference href="https://bdu.fstec.ru/vul/2025-13314" type="self" id="BDU:2025-13314" title="BDU:2025-13314" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jss" epoch="0" version="4.9.4" release="1.el7" arch="x86_64" src="">
					<filename>jss-0:4.9.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251020-09</id>
		<issued date="2025-10-20" />
		<updated date="2025-10-20" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-20102025/</description>
               <solution>
                    Установить обновление для пакета(ов) kernel-lt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-20102025/" type="self" id="ROS-20251020-09" title="ROS-20251020-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26853" type="cve" id="CVE-2024-26853" title="CVE-2024-26853" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26865" type="cve" id="CVE-2024-26865" title="CVE-2024-26865" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26893" type="cve" id="CVE-2024-26893" title="CVE-2024-26893" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26896" type="cve" id="CVE-2024-26896" title="CVE-2024-26896" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26904" type="cve" id="CVE-2024-26904" title="CVE-2024-26904" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26928" type="cve" id="CVE-2024-26928" title="CVE-2024-26928" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26933" type="cve" id="CVE-2024-26933" title="CVE-2024-26933" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26938" type="cve" id="CVE-2024-26938" title="CVE-2024-26938" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26939" type="cve" id="CVE-2024-26939" title="CVE-2024-26939" />
			<reference href="https://bdu.fstec.ru/vul/2025-13347" type="self" id="BDU:2025-13347" title="BDU:2025-13347" />
			<reference href="https://bdu.fstec.ru/vul/2024-03695" type="self" id="BDU:2024-03695" title="BDU:2024-03695" />
			<reference href="https://bdu.fstec.ru/vul/2024-03702" type="self" id="BDU:2024-03702" title="BDU:2024-03702" />
			<reference href="https://bdu.fstec.ru/vul/2025-13346" type="self" id="BDU:2025-13346" title="BDU:2025-13346" />
			<reference href="https://bdu.fstec.ru/vul/2024-03669" type="self" id="BDU:2024-03669" title="BDU:2024-03669" />
			<reference href="https://bdu.fstec.ru/vul/2024-03668" type="self" id="BDU:2024-03668" title="BDU:2024-03668" />
			<reference href="https://bdu.fstec.ru/vul/2024-04580" type="self" id="BDU:2024-04580" title="BDU:2024-04580" />
			<reference href="https://bdu.fstec.ru/vul/2025-13356" type="self" id="BDU:2025-13356" title="BDU:2025-13356" />
			<reference href="https://bdu.fstec.ru/vul/2024-03634" type="self" id="BDU:2024-03634" title="BDU:2024-03634" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251020-10</id>
		<issued date="2025-10-20" />
		<updated date="2025-10-20" />
		<title>Множественные уязвимости kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-cve-2024-26952-cve-2024-26954/</description>
               <solution>
                    Установить обновление для пакета(ов) kernel-lt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-cve-2024-26952-cve-2024-26954/" type="self" id="ROS-20251020-10" title="ROS-20251020-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26954" type="cve" id="CVE-2024-26954" title="CVE-2024-26954" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26952" type="cve" id="CVE-2024-26952" title="CVE-2024-26952" />
			<reference href="https://bdu.fstec.ru/vul/2025-07830" type="self" id="BDU:2025-07830" title="BDU:2025-07830" />
			<reference href="https://bdu.fstec.ru/vul/2024-06043" type="self" id="BDU:2024-06043" title="BDU:2024-06043" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251021-01</id>
		<issued date="2025-10-21" />
		<updated date="2025-10-21" />
		<title>Множественные уязвимости kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-cve-2024-26807-cve-2024-26783-cve-2024-26767-cve-2024-26739/</description>
               <solution>
                    Установить обновление для пакета(ов) kernel-lt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-cve-2024-26807-cve-2024-26783-cve-2024-26767-cve-2024-26739/" type="self" id="ROS-20251021-01" title="ROS-20251021-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26739" type="cve" id="CVE-2024-26739" title="CVE-2024-26739" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26767" type="cve" id="CVE-2024-26767" title="CVE-2024-26767" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26775" type="cve" id="CVE-2024-26775" title="CVE-2024-26775" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26807" type="cve" id="CVE-2024-26807" title="CVE-2024-26807" />
			<reference href="https://bdu.fstec.ru/vul/2025-07485" type="self" id="BDU:2025-07485" title="BDU:2025-07485" />
			<reference href="https://bdu.fstec.ru/vul/2025-04396" type="self" id="BDU:2025-04396" title="BDU:2025-04396" />
			<reference href="https://bdu.fstec.ru/vul/2024-11616" type="self" id="BDU:2024-11616" title="BDU:2024-11616" />
			<reference href="https://bdu.fstec.ru/vul/2025-00068" type="self" id="BDU:2025-00068" title="BDU:2025-00068" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251021-02</id>
		<issued date="2025-10-21" />
		<updated date="2025-10-22" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-21102025/</description>
               <solution>
                    Установить обновление для пакета(ов) kernel-lt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-21102025/" type="self" id="ROS-20251021-02" title="ROS-20251021-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26680" type="cve" id="CVE-2024-26680" title="CVE-2024-26680" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52639" type="cve" id="CVE-2023-52639" title="CVE-2023-52639" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26686" type="cve" id="CVE-2024-26686" title="CVE-2024-26686" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26700" type="cve" id="CVE-2024-26700" title="CVE-2024-26700" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26706" type="cve" id="CVE-2024-26706" title="CVE-2024-26706" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26714" type="cve" id="CVE-2024-26714" title="CVE-2024-26714" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26726" type="cve" id="CVE-2024-26726" title="CVE-2024-26726" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26759" type="cve" id="CVE-2024-26759" title="CVE-2024-26759" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26765" type="cve" id="CVE-2024-26765" title="CVE-2024-26765" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26775" type="cve" id="CVE-2024-26775" title="CVE-2024-26775" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26828" type="cve" id="CVE-2024-26828" title="CVE-2024-26828" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26830" type="cve" id="CVE-2024-26830" title="CVE-2024-26830" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26837" type="cve" id="CVE-2024-26837" title="CVE-2024-26837" />
			<reference href="https://bdu.fstec.ru/vul/2025-13304" type="self" id="BDU:2025-13304" title="BDU:2025-13304" />
			<reference href="https://bdu.fstec.ru/vul/2025-13305" type="self" id="BDU:2025-13305" title="BDU:2025-13305" />
			<reference href="https://bdu.fstec.ru/vul/2025-07832" type="self" id="BDU:2025-07832" title="BDU:2025-07832" />
			<reference href="https://bdu.fstec.ru/vul/2025-03616" type="self" id="BDU:2025-03616" title="BDU:2025-03616" />
			<reference href="https://bdu.fstec.ru/vul/2025-13306" type="self" id="BDU:2025-13306" title="BDU:2025-13306" />
			<reference href="https://bdu.fstec.ru/vul/2025-13309" type="self" id="BDU:2025-13309" title="BDU:2025-13309" />
			<reference href="https://bdu.fstec.ru/vul/2025-13310" type="self" id="BDU:2025-13310" title="BDU:2025-13310" />
			<reference href="https://bdu.fstec.ru/vul/2025-13311" type="self" id="BDU:2025-13311" title="BDU:2025-13311" />
			<reference href="https://bdu.fstec.ru/vul/2025-13312" type="self" id="BDU:2025-13312" title="BDU:2025-13312" />
			<reference href="https://bdu.fstec.ru/vul/2025-04395" type="self" id="BDU:2025-04395" title="BDU:2025-04395" />
			<reference href="https://bdu.fstec.ru/vul/2025-04405" type="self" id="BDU:2025-04405" title="BDU:2025-04405" />
			<reference href="https://bdu.fstec.ru/vul/2025-13313" type="self" id="BDU:2025-13313" title="BDU:2025-13313" />
			<reference href="https://bdu.fstec.ru/vul/2025-12481" type="self" id="BDU:2025-12481" title="BDU:2025-12481" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251022-01</id>
		<issued date="2025-10-22" />
		<updated date="2025-10-22" />
		<title>Уязвимость mod_auth_openidc </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в mod_auth_openidc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mod-auth-openidc-cve-2025-31492/</description>
               <solution>
                    Запретить использование в ОС пакета mod_auth_openidc
                или
                    Установить обновление для пакета(ов) mod_auth_openidc
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mod-auth-openidc-cve-2025-31492/" type="self" id="ROS-20251022-01" title="ROS-20251022-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31492" type="cve" id="CVE-2025-31492" title="CVE-2025-31492" />
			<reference href="https://bdu.fstec.ru/vul/2025-11077" type="self" id="BDU:2025-11077" title="BDU:2025-11077" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mod_auth_openidc" epoch="0" version="2.4.16.11" release="1.el7" arch="x86_64" src="">
					<filename>mod_auth_openidc-0:2.4.16.11-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251022-02</id>
		<issued date="2025-10-22" />
		<updated date="2025-10-22" />
		<title>Множественные уязвимости jenkins </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в jenkins</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-jenkins-cve-2025-59476-cve-2025-59475/</description>
               <solution>
                    Запретить использование в ОС пакета jenkins
                или
                    Установить обновление для пакета(ов) jenkins
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-jenkins-cve-2025-59476-cve-2025-59475/" type="self" id="ROS-20251022-02" title="ROS-20251022-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59475" type="cve" id="CVE-2025-59475" title="CVE-2025-59475" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59476" type="cve" id="CVE-2025-59476" title="CVE-2025-59476" />
			<reference href="https://bdu.fstec.ru/vul/2025-13362" type="self" id="BDU:2025-13362" title="BDU:2025-13362" />
			<reference href="https://bdu.fstec.ru/vul/2025-13363" type="self" id="BDU:2025-13363" title="BDU:2025-13363" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jenkins" epoch="0" version="2.516.3" release="1.el7" arch="noarch" src="">
					<filename>jenkins-0:2.516.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251022-03</id>
		<issued date="2025-10-22" />
		<updated date="2025-10-22" />
		<title>Множественные уязвимости proftpd</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в proftpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-proftpd-22102025/</description>
               <solution>
                    Запретить использование в ОС пакета proftpd
                или
                    Установить обновление для пакета(ов) proftpd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-proftpd-22102025/" type="self" id="ROS-20251022-03" title="ROS-20251022-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19269" type="cve" id="CVE-2019-19269" title="CVE-2019-19269" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19270" type="cve" id="CVE-2019-19270" title="CVE-2019-19270" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19271" type="cve" id="CVE-2019-19271" title="CVE-2019-19271" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19272" type="cve" id="CVE-2019-19272" title="CVE-2019-19272" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9272" type="cve" id="CVE-2020-9272" title="CVE-2020-9272" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9273" type="cve" id="CVE-2020-9273" title="CVE-2020-9273" />
			<reference href="https://bdu.fstec.ru/vul/2025-13443" type="self" id="BDU:2025-13443" title="BDU:2025-13443" />
			<reference href="https://bdu.fstec.ru/vul/2025-13444" type="self" id="BDU:2025-13444" title="BDU:2025-13444" />
			<reference href="https://bdu.fstec.ru/vul/2025-13427" type="self" id="BDU:2025-13427" title="BDU:2025-13427" />
			<reference href="https://bdu.fstec.ru/vul/2025-13428" type="self" id="BDU:2025-13428" title="BDU:2025-13428" />
			<reference href="https://bdu.fstec.ru/vul/2025-13442" type="self" id="BDU:2025-13442" title="BDU:2025-13442" />
			<reference href="https://bdu.fstec.ru/vul/2020-05776" type="self" id="BDU:2020-05776" title="BDU:2020-05776" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="proftpd" epoch="0" version="1.3.9" release="1.el7" arch="x86_64" src="">
					<filename>proftpd-0:1.3.9-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251022-04</id>
		<issued date="2025-10-22" />
		<updated date="2025-10-22" />
		<title>Уязвимость qemu </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в qemu</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qemu-cve-2024-3447/</description>
               <solution>
                    Запретить использование в ОС пакета qemu
                или
                    Установить обновление для пакета(ов) qemu
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qemu-cve-2024-3447/" type="self" id="ROS-20251022-04" title="ROS-20251022-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3447" type="cve" id="CVE-2024-3447" title="CVE-2024-3447" />
			<reference href="https://bdu.fstec.ru/vul/2024-03819" type="self" id="BDU:2024-03819" title="BDU:2024-03819" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="qemu" epoch="15" version="9.0.0" release="1.el7" arch="x86_64" src="">
					<filename>qemu-15:9.0.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251022-05</id>
		<issued date="2025-10-22" />
		<updated date="2025-10-22" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-22102025/</description>
               <solution>
                    Установить обновление для пакета(ов) kernel-lt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-22102025/" type="self" id="ROS-20251022-05" title="ROS-20251022-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52621" type="cve" id="CVE-2023-52621" title="CVE-2023-52621" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26646" type="cve" id="CVE-2024-26646" title="CVE-2024-26646" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52632" type="cve" id="CVE-2023-52632" title="CVE-2023-52632" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26844" type="cve" id="CVE-2024-26844" title="CVE-2024-26844" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26983" type="cve" id="CVE-2024-26983" title="CVE-2024-26983" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27002" type="cve" id="CVE-2024-27002" title="CVE-2024-27002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27014" type="cve" id="CVE-2024-27014" title="CVE-2024-27014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27035" type="cve" id="CVE-2024-27035" title="CVE-2024-27035" />
			<reference href="https://bdu.fstec.ru/vul/2025-10256" type="self" id="BDU:2025-10256" title="BDU:2025-10256" />
			<reference href="https://bdu.fstec.ru/vul/2024-03616" type="self" id="BDU:2024-03616" title="BDU:2024-03616" />
			<reference href="https://bdu.fstec.ru/vul/2025-13361" type="self" id="BDU:2025-13361" title="BDU:2025-13361" />
			<reference href="https://bdu.fstec.ru/vul/2025-13359" type="self" id="BDU:2025-13359" title="BDU:2025-13359" />
			<reference href="https://bdu.fstec.ru/vul/2025-06992" type="self" id="BDU:2025-06992" title="BDU:2025-06992" />
			<reference href="https://bdu.fstec.ru/vul/2025-02920" type="self" id="BDU:2025-02920" title="BDU:2025-02920" />
			<reference href="https://bdu.fstec.ru/vul/2025-02928" type="self" id="BDU:2025-02928" title="BDU:2025-02928" />
			<reference href="https://bdu.fstec.ru/vul/2025-13360" type="self" id="BDU:2025-13360" title="BDU:2025-13360" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251022-06</id>
		<issued date="2025-10-22" />
		<updated date="2025-10-22" />
		<title>Множественные уязвимости kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-cve-2024-26982-cve-2024-26656/</description>
               <solution>
                    Установить обновление для пакета(ов) kernel-lt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-cve-2024-26982-cve-2024-26656/" type="self" id="ROS-20251022-06" title="ROS-20251022-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26656" type="cve" id="CVE-2024-26656" title="CVE-2024-26656" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26982" type="cve" id="CVE-2024-26982" title="CVE-2024-26982" />
			<reference href="https://bdu.fstec.ru/vul/2024-03748" type="self" id="BDU:2024-03748" title="BDU:2024-03748" />
			<reference href="https://bdu.fstec.ru/vul/2025-11885" type="self" id="BDU:2025-11885" title="BDU:2025-11885" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251023-01</id>
		<issued date="2025-10-23" />
		<updated date="2025-10-23" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-23102025-1/</description>
               <solution>
                    Установить обновление для пакета(ов) kernel-lt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-23102025-1/" type="self" id="ROS-20251023-01" title="ROS-20251023-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36026" type="cve" id="CVE-2024-36026" title="CVE-2024-36026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36023" type="cve" id="CVE-2024-36023" title="CVE-2024-36023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36898" type="cve" id="CVE-2024-36898" title="CVE-2024-36898" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36910" type="cve" id="CVE-2024-36910" title="CVE-2024-36910" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36912" type="cve" id="CVE-2024-36912" title="CVE-2024-36912" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36909" type="cve" id="CVE-2024-36909" title="CVE-2024-36909" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36021" type="cve" id="CVE-2024-36021" title="CVE-2024-36021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36012" type="cve" id="CVE-2024-36012" title="CVE-2024-36012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52837" type="cve" id="CVE-2023-52837" title="CVE-2023-52837" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52831" type="cve" id="CVE-2023-52831" title="CVE-2023-52831" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52757" type="cve" id="CVE-2023-52757" title="CVE-2023-52757" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52752" type="cve" id="CVE-2023-52752" title="CVE-2023-52752" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52749" type="cve" id="CVE-2023-52749" title="CVE-2023-52749" />
			<reference href="https://bdu.fstec.ru/vul/2025-13364" type="self" id="BDU:2025-13364" title="BDU:2025-13364" />
			<reference href="https://bdu.fstec.ru/vul/2024-04549" type="self" id="BDU:2024-04549" title="BDU:2024-04549" />
			<reference href="https://bdu.fstec.ru/vul/2025-08074" type="self" id="BDU:2025-08074" title="BDU:2025-08074" />
			<reference href="https://bdu.fstec.ru/vul/2025-04529" type="self" id="BDU:2025-04529" title="BDU:2025-04529" />
			<reference href="https://bdu.fstec.ru/vul/2025-06991" type="self" id="BDU:2025-06991" title="BDU:2025-06991" />
			<reference href="https://bdu.fstec.ru/vul/2025-08072" type="self" id="BDU:2025-08072" title="BDU:2025-08072" />
			<reference href="https://bdu.fstec.ru/vul/2025-13365" type="self" id="BDU:2025-13365" title="BDU:2025-13365" />
			<reference href="https://bdu.fstec.ru/vul/2024-04541" type="self" id="BDU:2024-04541" title="BDU:2024-04541" />
			<reference href="https://bdu.fstec.ru/vul/2025-07505" type="self" id="BDU:2025-07505" title="BDU:2025-07505" />
			<reference href="https://bdu.fstec.ru/vul/2025-13366" type="self" id="BDU:2025-13366" title="BDU:2025-13366" />
			<reference href="https://bdu.fstec.ru/vul/2025-04678" type="self" id="BDU:2025-04678" title="BDU:2025-04678" />
			<reference href="https://bdu.fstec.ru/vul/2024-04576" type="self" id="BDU:2024-04576" title="BDU:2024-04576" />
			<reference href="https://bdu.fstec.ru/vul/2025-10564" type="self" id="BDU:2025-10564" title="BDU:2025-10564" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251023-02</id>
		<issued date="2025-10-23" />
		<updated date="2025-10-23" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-23102025-2/</description>
               <solution>
                    Установить обновление для пакета(ов) kernel-lt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-23102025-2/" type="self" id="ROS-20251023-02" title="ROS-20251023-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36898" type="cve" id="CVE-2024-36898" title="CVE-2024-36898" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36908" type="cve" id="CVE-2024-36908" title="CVE-2024-36908" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36913" type="cve" id="CVE-2024-36913" title="CVE-2024-36913" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43831" type="cve" id="CVE-2024-43831" title="CVE-2024-43831" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52857" type="cve" id="CVE-2023-52857" title="CVE-2023-52857" />
			<reference href="https://bdu.fstec.ru/vul/2025-03058" type="self" id="BDU:2025-03058" title="BDU:2025-03058" />
			<reference href="https://bdu.fstec.ru/vul/2025-07500" type="self" id="BDU:2025-07500" title="BDU:2025-07500" />
			<reference href="https://bdu.fstec.ru/vul/2025-07455" type="self" id="BDU:2025-07455" title="BDU:2025-07455" />
			<reference href="https://bdu.fstec.ru/vul/2025-11956" type="self" id="BDU:2025-11956" title="BDU:2025-11956" />
			<reference href="https://bdu.fstec.ru/vul/2025-10570" type="self" id="BDU:2025-10570" title="BDU:2025-10570" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251027-01</id>
		<issued date="2025-10-27" />
		<updated date="2025-10-27" />
		<title>Уязвимость webmin </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в webmin</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-webmin-cve-2024-2169/</description>
               <solution>
                    Запретить использование в ОС пакета webmin
                или
                    Установить обновление для пакета(ов) webmin
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-webmin-cve-2024-2169/" type="self" id="ROS-20251027-01" title="ROS-20251027-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2169" type="cve" id="CVE-2024-2169" title="CVE-2024-2169" />
			<reference href="https://bdu.fstec.ru/vul/2024-02164" type="self" id="BDU:2024-02164" title="BDU:2024-02164" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="webmin" epoch="0" version="2.520" release="2.el7" arch="noarch" src="">
					<filename>webmin-0:2.520-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251027-02</id>
		<issued date="2025-10-27" />
		<updated date="2025-10-27" />
		<title>Множественные уязвимости cuda</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в cuda</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-cuda-27102025/</description>
               <solution>
                    Запретить использование в ОС пакета cuda
                или
                    Установить обновление для пакета(ов) cuda
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-cuda-27102025/" type="self" id="ROS-20251027-02" title="ROS-20251027-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0110" type="cve" id="CVE-2024-0110" title="CVE-2024-0110" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53870" type="cve" id="CVE-2024-53870" title="CVE-2024-53870" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53871" type="cve" id="CVE-2024-53871" title="CVE-2024-53871" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53872" type="cve" id="CVE-2024-53872" title="CVE-2024-53872" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53873" type="cve" id="CVE-2024-53873" title="CVE-2024-53873" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53874" type="cve" id="CVE-2024-53874" title="CVE-2024-53874" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53875" type="cve" id="CVE-2024-53875" title="CVE-2024-53875" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53876" type="cve" id="CVE-2024-53876" title="CVE-2024-53876" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53877" type="cve" id="CVE-2024-53877" title="CVE-2024-53877" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53878" type="cve" id="CVE-2024-53878" title="CVE-2024-53878" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53879" type="cve" id="CVE-2024-53879" title="CVE-2024-53879" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0109" type="cve" id="CVE-2024-0109" title="CVE-2024-0109" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0102" type="cve" id="CVE-2024-0102" title="CVE-2024-0102" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0111" type="cve" id="CVE-2024-0111" title="CVE-2024-0111" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0124" type="cve" id="CVE-2024-0124" title="CVE-2024-0124" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0125" type="cve" id="CVE-2024-0125" title="CVE-2024-0125" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25523" type="cve" id="CVE-2023-25523" title="CVE-2023-25523" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0123" type="cve" id="CVE-2024-0123" title="CVE-2024-0123" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23247" type="cve" id="CVE-2025-23247" title="CVE-2025-23247" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0193" type="cve" id="CVE-2023-0193" title="CVE-2023-0193" />
			<reference href="https://bdu.fstec.ru/vul/2025-13646" type="self" id="BDU:2025-13646" title="BDU:2025-13646" />
			<reference href="https://bdu.fstec.ru/vul/2025-02330" type="self" id="BDU:2025-02330" title="BDU:2025-02330" />
			<reference href="https://bdu.fstec.ru/vul/2025-02334" type="self" id="BDU:2025-02334" title="BDU:2025-02334" />
			<reference href="https://bdu.fstec.ru/vul/2025-02331" type="self" id="BDU:2025-02331" title="BDU:2025-02331" />
			<reference href="https://bdu.fstec.ru/vul/2025-02332" type="self" id="BDU:2025-02332" title="BDU:2025-02332" />
			<reference href="https://bdu.fstec.ru/vul/2025-02339" type="self" id="BDU:2025-02339" title="BDU:2025-02339" />
			<reference href="https://bdu.fstec.ru/vul/2025-02338" type="self" id="BDU:2025-02338" title="BDU:2025-02338" />
			<reference href="https://bdu.fstec.ru/vul/2025-02335" type="self" id="BDU:2025-02335" title="BDU:2025-02335" />
			<reference href="https://bdu.fstec.ru/vul/2025-02336" type="self" id="BDU:2025-02336" title="BDU:2025-02336" />
			<reference href="https://bdu.fstec.ru/vul/2025-02333" type="self" id="BDU:2025-02333" title="BDU:2025-02333" />
			<reference href="https://bdu.fstec.ru/vul/2025-02337" type="self" id="BDU:2025-02337" title="BDU:2025-02337" />
			<reference href="https://bdu.fstec.ru/vul/2025-13647" type="self" id="BDU:2025-13647" title="BDU:2025-13647" />
			<reference href="https://bdu.fstec.ru/vul/2024-05563" type="self" id="BDU:2024-05563" title="BDU:2024-05563" />
			<reference href="https://bdu.fstec.ru/vul/2025-13648" type="self" id="BDU:2025-13648" title="BDU:2025-13648" />
			<reference href="https://bdu.fstec.ru/vul/2025-13654" type="self" id="BDU:2025-13654" title="BDU:2025-13654" />
			<reference href="https://bdu.fstec.ru/vul/2025-13653" type="self" id="BDU:2025-13653" title="BDU:2025-13653" />
			<reference href="https://bdu.fstec.ru/vul/2025-13650" type="self" id="BDU:2025-13650" title="BDU:2025-13650" />
			<reference href="https://bdu.fstec.ru/vul/2025-13652" type="self" id="BDU:2025-13652" title="BDU:2025-13652" />
			<reference href="https://bdu.fstec.ru/vul/2025-13649" type="self" id="BDU:2025-13649" title="BDU:2025-13649" />
			<reference href="https://bdu.fstec.ru/vul/2025-13651" type="self" id="BDU:2025-13651" title="BDU:2025-13651" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cuda" epoch="1" version="13.0.39" release="1.el7" arch="x86_64" src="">
					<filename>cuda-1:13.0.39-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251028-01</id>
		<issued date="2025-10-28" />
		<updated date="2025-10-28" />
		<title>Уязвимость webmin </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в webmin</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-webmin-cve-2024-12828/</description>
               <solution>
                    Запретить использование в ОС пакета webmin
                или
                    Установить обновление для пакета(ов) webmin
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-webmin-cve-2024-12828/" type="self" id="ROS-20251028-01" title="ROS-20251028-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12828" type="cve" id="CVE-2024-12828" title="CVE-2024-12828" />
			<reference href="https://bdu.fstec.ru/vul/2024-11622" type="self" id="BDU:2024-11622" title="BDU:2024-11622" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="webmin" epoch="0" version="2.520" release="2.el7" arch="noarch" src="">
					<filename>webmin-0:2.520-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251028-02</id>
		<issued date="2025-10-28" />
		<updated date="2025-10-28" />
		<title>Уязвимость postgresql-pgpool-II </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql-pgpool-II</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-pgpool-ii-cve-2024-45624/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql-pgpool-II
                или
                    Установить обновление для пакета(ов) postgresql-pgpool-II
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-pgpool-ii-cve-2024-45624/" type="self" id="ROS-20251028-02" title="ROS-20251028-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45624" type="cve" id="CVE-2024-45624" title="CVE-2024-45624" />
			<reference href="https://bdu.fstec.ru/vul/2025-08025" type="self" id="BDU:2025-08025" title="BDU:2025-08025" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql-pgpool-II" epoch="0" version="4.5.7" release="1.el7" arch="x86_64" src="">
					<filename>postgresql-pgpool-II-0:4.5.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251028-03</id>
		<issued date="2025-10-28" />
		<updated date="2025-10-28" />
		<title>Уязвимость postgresql13-pgpool-II </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql13-pgpool-II</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql13-pgpool-ii-cve-2024-45624/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql13-pgpool-II
                или
                    Установить обновление для пакета(ов) postgresql13-pgpool-II
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql13-pgpool-ii-cve-2024-45624/" type="self" id="ROS-20251028-03" title="ROS-20251028-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45624" type="cve" id="CVE-2024-45624" title="CVE-2024-45624" />
			<reference href="https://bdu.fstec.ru/vul/2025-08025" type="self" id="BDU:2025-08025" title="BDU:2025-08025" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql13-pgpool-II" epoch="0" version="4.5.7" release="1.el7" arch="x86_64" src="">
					<filename>postgresql13-pgpool-II-0:4.5.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251028-04</id>
		<issued date="2025-10-28" />
		<updated date="2025-10-28" />
		<title>Уязвимость postgresql14-pgpool-II </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql14-pgpool-II</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql14-pgpool-ii-cve-2024-45624/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql14-pgpool-II
                или
                    Установить обновление для пакета(ов) postgresql14-pgpool-II
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql14-pgpool-ii-cve-2024-45624/" type="self" id="ROS-20251028-04" title="ROS-20251028-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45624" type="cve" id="CVE-2024-45624" title="CVE-2024-45624" />
			<reference href="https://bdu.fstec.ru/vul/2025-08025" type="self" id="BDU:2025-08025" title="BDU:2025-08025" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql14-pgpool-II" epoch="0" version="4.5.7" release="1.el7" arch="x86_64" src="">
					<filename>postgresql14-pgpool-II-0:4.5.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251028-05</id>
		<issued date="2025-10-28" />
		<updated date="2025-10-28" />
		<title>Уязвимость postgresql15-pgpool-II </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql15-pgpool-II</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql15-pgpool-ii-cve-2024-45624/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql15-pgpool-II
                или
                    Установить обновление для пакета(ов) postgresql15-pgpool-II
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql15-pgpool-ii-cve-2024-45624/" type="self" id="ROS-20251028-05" title="ROS-20251028-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45624" type="cve" id="CVE-2024-45624" title="CVE-2024-45624" />
			<reference href="https://bdu.fstec.ru/vul/2025-08025" type="self" id="BDU:2025-08025" title="BDU:2025-08025" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql15-pgpool-II" epoch="0" version="4.5.7" release="1.el7" arch="x86_64" src="">
					<filename>postgresql15-pgpool-II-0:4.5.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251028-06</id>
		<issued date="2025-10-28" />
		<updated date="2025-10-28" />
		<title>Уязвимость postgresql16-pgpool-II </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql16-pgpool-II</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql16-pgpool-ii-cve-2024-45624/</description>
               <solution>
                    Запретить использование в ОС пакета postgresql16-pgpool-II
                или
                    Установить обновление для пакета(ов) postgresql16-pgpool-II
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql16-pgpool-ii-cve-2024-45624/" type="self" id="ROS-20251028-06" title="ROS-20251028-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45624" type="cve" id="CVE-2024-45624" title="CVE-2024-45624" />
			<reference href="https://bdu.fstec.ru/vul/2025-08025" type="self" id="BDU:2025-08025" title="BDU:2025-08025" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql16-pgpool-II" epoch="0" version="4.5.7" release="1.el7" arch="x86_64" src="">
					<filename>postgresql16-pgpool-II-0:4.5.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251028-07</id>
		<issued date="2025-10-28" />
		<updated date="2025-10-28" />
		<title>Множественные уязвимости exiv2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в exiv2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-exiv2-cve-2025-54080-cve-2025-55304/</description>
               <solution>
                    Запретить использование в ОС пакета exiv2
                или
                    Установить обновление для пакета(ов) exiv2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-exiv2-cve-2025-54080-cve-2025-55304/" type="self" id="ROS-20251028-07" title="ROS-20251028-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54080" type="cve" id="CVE-2025-54080" title="CVE-2025-54080" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55304" type="cve" id="CVE-2025-55304" title="CVE-2025-55304" />
			<reference href="https://bdu.fstec.ru/vul/2025-13814" type="self" id="BDU:2025-13814" title="BDU:2025-13814" />
			<reference href="https://bdu.fstec.ru/vul/2025-13813" type="self" id="BDU:2025-13813" title="BDU:2025-13813" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="exiv2" epoch="0" version="0.27.5" release="2.el7" arch="x86_64" src="">
					<filename>exiv2-0:0.27.5-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251028-08</id>
		<issued date="2025-10-28" />
		<updated date="2025-10-28" />
		<title>Множественные уязвимости edk2-tools </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в edk2-tools</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-edk2-tools-cve-2024-9143-cve-2024-4741-cve-2025-2295/</description>
               <solution>
                    Запретить использование в ОС пакета edk2-tools
                или
                    Установить обновление для пакета(ов) edk2-tools
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-edk2-tools-cve-2024-9143-cve-2024-4741-cve-2025-2295/" type="self" id="ROS-20251028-08" title="ROS-20251028-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2295" type="cve" id="CVE-2025-2295" title="CVE-2025-2295" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9143" type="cve" id="CVE-2024-9143" title="CVE-2024-9143" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4741" type="cve" id="CVE-2024-4741" title="CVE-2024-4741" />
			<reference href="https://bdu.fstec.ru/vul/2025-11907" type="self" id="BDU:2025-11907" title="BDU:2025-11907" />
			<reference href="https://bdu.fstec.ru/vul/2024-08755" type="self" id="BDU:2024-08755" title="BDU:2024-08755" />
			<reference href="https://bdu.fstec.ru/vul/2024-05176" type="self" id="BDU:2024-05176" title="BDU:2024-05176" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="edk2-tools" epoch="0" version="20240524" release="5.el7" arch="x86_64" src="">
					<filename>edk2-tools-0:20240524-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251028-09</id>
		<issued date="2025-10-28" />
		<updated date="2025-10-28" />
		<title>Уязвимость JSON-lib </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в json-lib</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-json-lib-cve-2024-47855/</description>
               <solution>
                    Запретить использование в ОС пакета JSON-lib
                или
                    Установить обновление для пакета(ов) JSON-lib
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-json-lib-cve-2024-47855/" type="self" id="ROS-20251028-09" title="ROS-20251028-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47855" type="cve" id="CVE-2024-47855" title="CVE-2024-47855" />
			<reference href="https://bdu.fstec.ru/vul/2025-13819" type="self" id="BDU:2025-13819" title="BDU:2025-13819" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="json-lib" epoch="0" version="2.4" release="18.el7" arch="noarch" src="">
					<filename>json-lib-0:2.4-18.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251028-10</id>
		<issued date="2025-10-28" />
		<updated date="2025-10-28" />
		<title>Множественные уязвимости nvidia-container</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nvidia-container</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nvidia-container-28102025/</description>
               <solution>
                    Запретить использование в ОС пакета nvidia-container
                или
                    Установить обновление для пакета(ов) nvidia-container
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nvidia-container-28102025/" type="self" id="ROS-20251028-10" title="ROS-20251028-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0135" type="cve" id="CVE-2024-0135" title="CVE-2024-0135" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0132" type="cve" id="CVE-2024-0132" title="CVE-2024-0132" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23359" type="cve" id="CVE-2025-23359" title="CVE-2025-23359" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23266" type="cve" id="CVE-2025-23266" title="CVE-2025-23266" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0137" type="cve" id="CVE-2024-0137" title="CVE-2024-0137" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0136" type="cve" id="CVE-2024-0136" title="CVE-2024-0136" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23267" type="cve" id="CVE-2025-23267" title="CVE-2025-23267" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0134" type="cve" id="CVE-2024-0134" title="CVE-2024-0134" />
			<reference href="https://bdu.fstec.ru/vul/2025-13807" type="self" id="BDU:2025-13807" title="BDU:2025-13807" />
			<reference href="https://bdu.fstec.ru/vul/2024-07816" type="self" id="BDU:2024-07816" title="BDU:2024-07816" />
			<reference href="https://bdu.fstec.ru/vul/2025-02018" type="self" id="BDU:2025-02018" title="BDU:2025-02018" />
			<reference href="https://bdu.fstec.ru/vul/2025-08697" type="self" id="BDU:2025-08697" title="BDU:2025-08697" />
			<reference href="https://bdu.fstec.ru/vul/2025-11097" type="self" id="BDU:2025-11097" title="BDU:2025-11097" />
			<reference href="https://bdu.fstec.ru/vul/2025-11096" type="self" id="BDU:2025-11096" title="BDU:2025-11096" />
			<reference href="https://bdu.fstec.ru/vul/2025-09599" type="self" id="BDU:2025-09599" title="BDU:2025-09599" />
			<reference href="https://bdu.fstec.ru/vul/2024-09408" type="self" id="BDU:2024-09408" title="BDU:2024-09408" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nvidia-container" epoch="0" version="1.18.0~rc.4" release="1.el7" arch="x86_64" src="">
					<filename>nvidia-container-0:1.18.0~rc.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251028-11</id>
		<issued date="2025-10-28" />
		<updated date="2025-10-28" />
		<title>Множественные уязвимости nvidia-container-toolkit</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nvidia-container-toolkit</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nvidia-container-toolkit-28102028/</description>
               <solution>
                    Запретить использование в ОС пакета nvidia-container-toolkit
                или
                    Установить обновление для пакета(ов) nvidia-container-toolkit
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nvidia-container-toolkit-28102028/" type="self" id="ROS-20251028-11" title="ROS-20251028-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0135" type="cve" id="CVE-2024-0135" title="CVE-2024-0135" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0132" type="cve" id="CVE-2024-0132" title="CVE-2024-0132" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23359" type="cve" id="CVE-2025-23359" title="CVE-2025-23359" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23266" type="cve" id="CVE-2025-23266" title="CVE-2025-23266" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0137" type="cve" id="CVE-2024-0137" title="CVE-2024-0137" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0136" type="cve" id="CVE-2024-0136" title="CVE-2024-0136" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23267" type="cve" id="CVE-2025-23267" title="CVE-2025-23267" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0134" type="cve" id="CVE-2024-0134" title="CVE-2024-0134" />
			<reference href="https://bdu.fstec.ru/vul/2025-13807" type="self" id="BDU:2025-13807" title="BDU:2025-13807" />
			<reference href="https://bdu.fstec.ru/vul/2024-07816" type="self" id="BDU:2024-07816" title="BDU:2024-07816" />
			<reference href="https://bdu.fstec.ru/vul/2025-02018" type="self" id="BDU:2025-02018" title="BDU:2025-02018" />
			<reference href="https://bdu.fstec.ru/vul/2025-08697" type="self" id="BDU:2025-08697" title="BDU:2025-08697" />
			<reference href="https://bdu.fstec.ru/vul/2025-11097" type="self" id="BDU:2025-11097" title="BDU:2025-11097" />
			<reference href="https://bdu.fstec.ru/vul/2025-11096" type="self" id="BDU:2025-11096" title="BDU:2025-11096" />
			<reference href="https://bdu.fstec.ru/vul/2025-09599" type="self" id="BDU:2025-09599" title="BDU:2025-09599" />
			<reference href="https://bdu.fstec.ru/vul/2024-09408" type="self" id="BDU:2024-09408" title="BDU:2024-09408" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nvidia-container-toolkit" epoch="0" version="1.18.0~rc.4" release="1.el7" arch="x86_64" src="">
					<filename>nvidia-container-toolkit-0:1.18.0~rc.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251029-01</id>
		<issued date="2025-10-29" />
		<updated date="2025-10-29" />
		<title>Уязвимость gstreamer1-plugins-bad-free </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gstreamer1-plugins-bad-free</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gstreamer1-plugins-bad-free-cve-2025-3887/</description>
               <solution>
                    Запретить использование в ОС пакета gstreamer1-plugins-bad-free
                или
                    Установить обновление для пакета(ов) gstreamer1-plugins-bad-free
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gstreamer1-plugins-bad-free-cve-2025-3887/" type="self" id="ROS-20251029-01" title="ROS-20251029-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3887" type="cve" id="CVE-2025-3887" title="CVE-2025-3887" />
			<reference href="https://bdu.fstec.ru/vul/2025-11788" type="self" id="BDU:2025-11788" title="BDU:2025-11788" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gstreamer1-plugins-bad-free" epoch="0" version="1.16.3" release="3.el7" arch="x86_64" src="">
					<filename>gstreamer1-plugins-bad-free-0:1.16.3-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251029-02</id>
		<issued date="2025-10-29" />
		<updated date="2025-10-29" />
		<title>Уязвимость rabbitmq-server </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в rabbitmq-server</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rabbitmq-server-cve-2025-50200/</description>
               <solution>
                    Запретить использование в ОС пакета rabbitmq-server
                или
                    Установить обновление для пакета(ов) rabbitmq-server
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rabbitmq-server-cve-2025-50200/" type="self" id="ROS-20251029-02" title="ROS-20251029-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50200" type="cve" id="CVE-2025-50200" title="CVE-2025-50200" />
			<reference href="https://bdu.fstec.ru/vul/2026-04665" type="self" id="BDU:2026-04665" title="BDU:2026-04665" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rabbitmq-server" epoch="0" version="4.1.4" release="1.el7" arch="x86_64" src="">
					<filename>rabbitmq-server-0:4.1.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251029-03</id>
		<issued date="2025-10-29" />
		<updated date="2025-10-29" />
		<title>Уязвимость python3-pip </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-pip</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-pip-cve-2025-8869/</description>
               <solution>
                    Запретить использование в ОС пакета python3-pip
                или
                    Установить обновление для пакета(ов) python3-pip
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-pip-cve-2025-8869/" type="self" id="ROS-20251029-03" title="ROS-20251029-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8869" type="cve" id="CVE-2025-8869" title="CVE-2025-8869" />
			<reference href="https://bdu.fstec.ru/vul/2025-13251" type="self" id="BDU:2025-13251" title="BDU:2025-13251" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-pip" epoch="0" version="20.2.2" release="3.el7" arch="noarch" src="">
					<filename>python3-pip-0:20.2.2-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251029-04</id>
		<issued date="2025-10-29" />
		<updated date="2025-10-29" />
		<title>Уязвимость grafana-zabbix </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в grafana-zabbix</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grafana-zabbix-cve-2025-10630/</description>
               <solution>
                    Запретить использование в ОС пакета grafana-zabbix
                или
                    Установить обновление для пакета(ов) grafana-zabbix
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grafana-zabbix-cve-2025-10630/" type="self" id="ROS-20251029-04" title="ROS-20251029-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10630" type="cve" id="CVE-2025-10630" title="CVE-2025-10630" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="grafana-zabbix" epoch="0" version="6.0.2" release="1.el7" arch="x86_64" src="">
					<filename>grafana-zabbix-0:6.0.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251029-05</id>
		<issued date="2025-10-29" />
		<updated date="2025-10-29" />
		<title>Уязвимость pgadmin4 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в pgadmin4</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pgadmin4-cve-2025-9636/</description>
               <solution>
                    Запретить использование в ОС пакета pgadmin4
                или
                    Установить обновление для пакета(ов) pgadmin4
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pgadmin4-cve-2025-9636/" type="self" id="ROS-20251029-05" title="ROS-20251029-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9636" type="cve" id="CVE-2025-9636" title="CVE-2025-9636" />
			<reference href="https://bdu.fstec.ru/vul/2025-11501" type="self" id="BDU:2025-11501" title="BDU:2025-11501" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pgadmin4" epoch="0" version="8.6" release="4.el7" arch="x86_64" src="">
					<filename>pgadmin4-0:8.6-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251029-06</id>
		<issued date="2025-10-29" />
		<updated date="2025-11-18" />
		<title>Множественные уязвимости redis </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в redis</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-redis-cve-2025-49844-cve-2025-46819-cve-2025-46818-cve-2025-46817/</description>
               <solution>
                    Запретить использование в ОС пакета redis
                или
                    Установить обновление для пакета(ов) redis
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-redis-cve-2025-49844-cve-2025-46819-cve-2025-46818-cve-2025-46817/" type="self" id="ROS-20251029-06" title="ROS-20251029-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46817" type="cve" id="CVE-2025-46817" title="CVE-2025-46817" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49844" type="cve" id="CVE-2025-49844" title="CVE-2025-49844" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46819" type="cve" id="CVE-2025-46819" title="CVE-2025-46819" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46818" type="cve" id="CVE-2025-46818" title="CVE-2025-46818" />
			<reference href="https://bdu.fstec.ru/vul/2025-12820" type="self" id="BDU:2025-12820" title="BDU:2025-12820" />
			<reference href="https://bdu.fstec.ru/vul/2025-12553" type="self" id="BDU:2025-12553" title="BDU:2025-12553" />
			<reference href="https://bdu.fstec.ru/vul/2025-12557" type="self" id="BDU:2025-12557" title="BDU:2025-12557" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="redis" epoch="0" version="8.2.2" release="1.el7" arch="x86_64" src="">
					<filename>redis-0:8.2.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251029-07</id>
		<issued date="2025-10-29" />
		<updated date="2025-10-29" />
		<title>Множественные уязвимости golang</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-golang-29102025/</description>
               <solution>
                    Запретить использование в ОС пакета golang
                или
                    Установить обновление для пакета(ов) golang
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-golang-29102025/" type="self" id="ROS-20251029-07" title="ROS-20251029-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61725" type="cve" id="CVE-2025-61725" title="CVE-2025-61725" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58187" type="cve" id="CVE-2025-58187" title="CVE-2025-58187" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58189" type="cve" id="CVE-2025-58189" title="CVE-2025-58189" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61723" type="cve" id="CVE-2025-61723" title="CVE-2025-61723" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47912" type="cve" id="CVE-2025-47912" title="CVE-2025-47912" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58185" type="cve" id="CVE-2025-58185" title="CVE-2025-58185" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58186" type="cve" id="CVE-2025-58186" title="CVE-2025-58186" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58188" type="cve" id="CVE-2025-58188" title="CVE-2025-58188" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58183" type="cve" id="CVE-2025-58183" title="CVE-2025-58183" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61724" type="cve" id="CVE-2025-61724" title="CVE-2025-61724" />
			<reference href="https://bdu.fstec.ru/vul/2025-13936" type="self" id="BDU:2025-13936" title="BDU:2025-13936" />
			<reference href="https://bdu.fstec.ru/vul/2025-13562" type="self" id="BDU:2025-13562" title="BDU:2025-13562" />
			<reference href="https://bdu.fstec.ru/vul/2025-14526" type="self" id="BDU:2025-14526" title="BDU:2025-14526" />
			<reference href="https://bdu.fstec.ru/vul/2025-13937" type="self" id="BDU:2025-13937" title="BDU:2025-13937" />
			<reference href="https://bdu.fstec.ru/vul/2025-14527" type="self" id="BDU:2025-14527" title="BDU:2025-14527" />
			<reference href="https://bdu.fstec.ru/vul/2025-14530" type="self" id="BDU:2025-14530" title="BDU:2025-14530" />
			<reference href="https://bdu.fstec.ru/vul/2025-14529" type="self" id="BDU:2025-14529" title="BDU:2025-14529" />
			<reference href="https://bdu.fstec.ru/vul/2025-14525" type="self" id="BDU:2025-14525" title="BDU:2025-14525" />
			<reference href="https://bdu.fstec.ru/vul/2025-14528" type="self" id="BDU:2025-14528" title="BDU:2025-14528" />
			<reference href="https://bdu.fstec.ru/vul/2025-13938" type="self" id="BDU:2025-13938" title="BDU:2025-13938" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.24.8" release="1.el7" arch="x86_64" src="">
					<filename>golang-0:1.24.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251030-01</id>
		<issued date="2025-10-30" />
		<updated date="2025-10-30" />
		<title>Множественные уязвимости nvidia-container </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nvidia-container</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nvidia-container-cve-2024-0133-cve-2025-23245-cve-2025-23246/</description>
               <solution>
                    Запретить использование в ОС пакета nvidia-container
                или
                    Установить обновление для пакета(ов) nvidia-container
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nvidia-container-cve-2024-0133-cve-2025-23245-cve-2025-23246/" type="self" id="ROS-20251030-01" title="ROS-20251030-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23246" type="cve" id="CVE-2025-23246" title="CVE-2025-23246" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0133" type="cve" id="CVE-2024-0133" title="CVE-2024-0133" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23245" type="cve" id="CVE-2025-23245" title="CVE-2025-23245" />
			<reference href="https://bdu.fstec.ru/vul/2025-10370" type="self" id="BDU:2025-10370" title="BDU:2025-10370" />
			<reference href="https://bdu.fstec.ru/vul/2024-09498" type="self" id="BDU:2024-09498" title="BDU:2024-09498" />
			<reference href="https://bdu.fstec.ru/vul/2025-10372" type="self" id="BDU:2025-10372" title="BDU:2025-10372" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nvidia-container" epoch="0" version="1.18.0~rc.4" release="1.el7" arch="x86_64" src="">
					<filename>nvidia-container-0:1.18.0~rc.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251030-02</id>
		<issued date="2025-10-30" />
		<updated date="2025-10-30" />
		<title>Множественные уязвимости nvidia-container-toolkit </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nvidia-container-toolkit</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nvidia-container-toolkit-cve-2024-0133-cve-2025-23245-cve-2025-23246/</description>
               <solution>
                    Запретить использование в ОС пакета nvidia-container-toolkit
                или
                    Установить обновление для пакета(ов) nvidia-container-toolkit
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nvidia-container-toolkit-cve-2024-0133-cve-2025-23245-cve-2025-23246/" type="self" id="ROS-20251030-02" title="ROS-20251030-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23246" type="cve" id="CVE-2025-23246" title="CVE-2025-23246" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0133" type="cve" id="CVE-2024-0133" title="CVE-2024-0133" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23245" type="cve" id="CVE-2025-23245" title="CVE-2025-23245" />
			<reference href="https://bdu.fstec.ru/vul/2025-10370" type="self" id="BDU:2025-10370" title="BDU:2025-10370" />
			<reference href="https://bdu.fstec.ru/vul/2024-09498" type="self" id="BDU:2024-09498" title="BDU:2024-09498" />
			<reference href="https://bdu.fstec.ru/vul/2025-10372" type="self" id="BDU:2025-10372" title="BDU:2025-10372" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nvidia-container-toolkit" epoch="0" version="1.18.0~rc.4" release="1.el7" arch="x86_64" src="">
					<filename>nvidia-container-toolkit-0:1.18.0~rc.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251030-03</id>
		<issued date="2025-10-30" />
		<updated date="2025-10-30" />
		<title>Уязвимость mongodb-org-6 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-6-cve-2025-10059/</description>
               <solution>
                    Запретить использование в ОС пакета mongodb-org
                или
                    Установить обновление для пакета(ов) mongodb-org
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-6-cve-2025-10059/" type="self" id="ROS-20251030-03" title="ROS-20251030-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10059" type="cve" id="CVE-2025-10059" title="CVE-2025-10059" />
			<reference href="https://bdu.fstec.ru/vul/2025-13816" type="self" id="BDU:2025-13816" title="BDU:2025-13816" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mongodb-org" epoch="0" version="6.0.25" release="1.el7" arch="x86_64" src="">
					<filename>mongodb-org-0:6.0.25-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251030-04</id>
		<issued date="2025-10-30" />
		<updated date="2025-10-30" />
		<title>Уязвимость mongodb-org-7 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-7-cve-2025-10059/</description>
               <solution>
                    Запретить использование в ОС пакета mongodb-org
                или
                    Установить обновление для пакета(ов) mongodb-org
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-7-cve-2025-10059/" type="self" id="ROS-20251030-04" title="ROS-20251030-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10059" type="cve" id="CVE-2025-10059" title="CVE-2025-10059" />
			<reference href="https://bdu.fstec.ru/vul/2025-13816" type="self" id="BDU:2025-13816" title="BDU:2025-13816" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mongodb-org" epoch="0" version="7.0.21" release="1.el7" arch="x86_64" src="">
					<filename>mongodb-org-0:7.0.21-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251030-05</id>
		<issued date="2025-10-30" />
		<updated date="2025-10-30" />
		<title>Множественные уязвимости erlang</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в erlang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-erlang-30102025/</description>
               <solution>
                    Запретить использование в ОС пакета erlang
                или
                    Установить обновление для пакета(ов) erlang
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-erlang-30102025/" type="self" id="ROS-20251030-05" title="ROS-20251030-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46712" type="cve" id="CVE-2025-46712" title="CVE-2025-46712" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4748" type="cve" id="CVE-2025-4748" title="CVE-2025-4748" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48038" type="cve" id="CVE-2025-48038" title="CVE-2025-48038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48039" type="cve" id="CVE-2025-48039" title="CVE-2025-48039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48040" type="cve" id="CVE-2025-48040" title="CVE-2025-48040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48041" type="cve" id="CVE-2025-48041" title="CVE-2025-48041" />
			<reference href="https://bdu.fstec.ru/vul/2025-13872" type="self" id="BDU:2025-13872" title="BDU:2025-13872" />
			<reference href="https://bdu.fstec.ru/vul/2025-13871" type="self" id="BDU:2025-13871" title="BDU:2025-13871" />
			<reference href="https://bdu.fstec.ru/vul/2025-13915" type="self" id="BDU:2025-13915" title="BDU:2025-13915" />
			<reference href="https://bdu.fstec.ru/vul/2025-13916" type="self" id="BDU:2025-13916" title="BDU:2025-13916" />
			<reference href="https://bdu.fstec.ru/vul/2025-13917" type="self" id="BDU:2025-13917" title="BDU:2025-13917" />
			<reference href="https://bdu.fstec.ru/vul/2025-13918" type="self" id="BDU:2025-13918" title="BDU:2025-13918" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="erlang" epoch="0" version="26.2.5.15" release="2.el7" arch="x86_64" src="">
					<filename>erlang-0:26.2.5.15-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251030-06</id>
		<issued date="2025-10-30" />
		<updated date="2025-10-30" />
		<title>Уязвимость perl-Cpanel-JSON-XS </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в perl-Cpanel-JSON-XS</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-cpanel-json-xs-cve-2025-40929/</description>
               <solution>
                    Запретить использование в ОС пакета perl-Cpanel-JSON-XS
                или
                    Установить обновление для пакета(ов) perl-Cpanel-JSON-XS
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-cpanel-json-xs-cve-2025-40929/" type="self" id="ROS-20251030-06" title="ROS-20251030-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40929" type="cve" id="CVE-2025-40929" title="CVE-2025-40929" />
			<reference href="https://bdu.fstec.ru/vul/2025-13817" type="self" id="BDU:2025-13817" title="BDU:2025-13817" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="perl-Cpanel-JSON-XS" epoch="0" version="4.40" release="1.el7" arch="x86_64" src="">
					<filename>perl-Cpanel-JSON-XS-0:4.40-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251030-07</id>
		<issued date="2025-10-30" />
		<updated date="2025-10-30" />
		<title>Уязвимость ImageMagick7 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в ImageMagick7</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick7-cve-2025-57807/</description>
               <solution>
                    Запретить использование в ОС пакета ImageMagick7
                или
                    Установить обновление для пакета(ов) ImageMagick7
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick7-cve-2025-57807/" type="self" id="ROS-20251030-07" title="ROS-20251030-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-57807" type="cve" id="CVE-2025-57807" title="CVE-2025-57807" />
			<reference href="https://bdu.fstec.ru/vul/2025-12702" type="self" id="BDU:2025-12702" title="BDU:2025-12702" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ImageMagick7" epoch="0" version="7.1.2.3" release="1.el7" arch="x86_64" src="">
					<filename>ImageMagick7-0:7.1.2.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251030-08</id>
		<issued date="2025-10-30" />
		<updated date="2025-10-30" />
		<title>Уязвимость ImageMagick </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в ImageMagick</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick-cve-2025-57807/</description>
               <solution>
                    Запретить использование в ОС пакета ImageMagick
                или
                    Установить обновление для пакета(ов) ImageMagick
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick-cve-2025-57807/" type="self" id="ROS-20251030-08" title="ROS-20251030-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-57807" type="cve" id="CVE-2025-57807" title="CVE-2025-57807" />
			<reference href="https://bdu.fstec.ru/vul/2025-12702" type="self" id="BDU:2025-12702" title="BDU:2025-12702" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ImageMagick" epoch="1" version="6.9.13.29" release="1.el7" arch="x86_64" src="">
					<filename>ImageMagick-1:6.9.13.29-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251030-09</id>
		<issued date="2025-10-30" />
		<updated date="2025-10-30" />
		<title>Уязвимость qt6-qtbase </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в qt6-qtbase-0:6.6.3-4.el7.x86_64</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qt6-qtbase-cve-2025-5455/</description>
               <solution>
                    Запретить использование в ОС пакета qt6-qtbase
                или
                    Установить обновление для пакета(ов) qt6-qtbase
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qt6-qtbase-cve-2025-5455/" type="self" id="ROS-20251030-09" title="ROS-20251030-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5455" type="cve" id="CVE-2025-5455" title="CVE-2025-5455" />
			<reference href="https://bdu.fstec.ru/vul/2025-06498" type="self" id="BDU:2025-06498" title="BDU:2025-06498" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="qt6-qtbase" epoch="0" version="6.6.3" release="4.el7" arch="x86_64" src="">
					<filename>qt6-qtbase-0:6.6.3-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251030-10</id>
		<issued date="2025-10-30" />
		<updated date="2025-10-30" />
		<title>Уязвимость qt5-qtbase </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в qt5-qtbase</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qt5-qtbase-cve-2025-5455/</description>
               <solution>
                    Запретить использование в ОС пакета qt5-qtbase
                или
                    Установить обновление для пакета(ов) qt5-qtbase
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qt5-qtbase-cve-2025-5455/" type="self" id="ROS-20251030-10" title="ROS-20251030-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5455" type="cve" id="CVE-2025-5455" title="CVE-2025-5455" />
			<reference href="https://bdu.fstec.ru/vul/2025-06498" type="self" id="BDU:2025-06498" title="BDU:2025-06498" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="qt5-qtbase" epoch="0" version="5.15.9" release="3.el7" arch="x86_64" src="">
					<filename>qt5-qtbase-0:5.15.9-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251031-01</id>
		<issued date="2025-10-31" />
		<updated date="2025-10-31" />
		<title>Уязвимость mongodb-org </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2025-10061/</description>
               <solution>
                    Запретить использование в ОС пакета mongodb-org
                или
                    Установить обновление для пакета(ов) mongodb-org
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2025-10061/" type="self" id="ROS-20251031-01" title="ROS-20251031-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10061" type="cve" id="CVE-2025-10061" title="CVE-2025-10061" />
			<reference href="https://bdu.fstec.ru/vul/2025-13815" type="self" id="BDU:2025-13815" title="BDU:2025-13815" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mongodb-org" epoch="0" version="7.0.24" release="1.el7" arch="x86_64" src="">
					<filename>mongodb-org-0:7.0.24-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251031-02</id>
		<issued date="2025-10-31" />
		<updated date="2025-10-31" />
		<title>Множественные уязвимости cuda </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в cuda</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-cuda-cve-2025-23273-cve-2025-23275/</description>
               <solution>
                    Запретить использование в ОС пакета cuda
                или
                    Установить обновление для пакета(ов) cuda
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-cuda-cve-2025-23273-cve-2025-23275/" type="self" id="ROS-20251031-02" title="ROS-20251031-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23273" type="cve" id="CVE-2025-23273" title="CVE-2025-23273" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23275" type="cve" id="CVE-2025-23275" title="CVE-2025-23275" />
			<reference href="https://bdu.fstec.ru/vul/2025-12623" type="self" id="BDU:2025-12623" title="BDU:2025-12623" />
			<reference href="https://bdu.fstec.ru/vul/2025-12627" type="self" id="BDU:2025-12627" title="BDU:2025-12627" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cuda" epoch="1" version="13.0.39" release="1.el7" arch="x86_64" src="">
					<filename>cuda-1:13.0.39-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251031-03</id>
		<issued date="2025-10-31" />
		<updated date="2025-10-31" />
		<title>Уязвимость apache-activemq </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в apache-activemq</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-activemq-cve-2023-46604/</description>
               <solution>
                    Запретить использование в ОС пакета apache-activemq
                или
                    Установить обновление для пакета(ов) apache-activemq
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-activemq-cve-2023-46604/" type="self" id="ROS-20251031-03" title="ROS-20251031-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46604" type="cve" id="CVE-2023-46604" title="CVE-2023-46604" />
			<reference href="https://bdu.fstec.ru/vul/2023-07372" type="self" id="BDU:2023-07372" title="BDU:2023-07372" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="apache-activemq" epoch="0" version="5.17.7" release="1.el7" arch="x86_64" src="">
					<filename>apache-activemq-0:5.17.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251031-04</id>
		<issued date="2025-10-31" />
		<updated date="2025-10-31" />
		<title>Множественные уязвимости cuda-cuobjdump </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в cuda-cuobjdump</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-cuda-cuobjdump-cve-2025-23255-cve-2025-23339-cve-2025-23346/</description>
               <solution>
                    Запретить использование в ОС пакета cuda-cuobjdump
                или
                    Установить обновление для пакета(ов) cuda-cuobjdump
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-cuda-cuobjdump-cve-2025-23255-cve-2025-23339-cve-2025-23346/" type="self" id="ROS-20251031-04" title="ROS-20251031-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23346" type="cve" id="CVE-2025-23346" title="CVE-2025-23346" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23255" type="cve" id="CVE-2025-23255" title="CVE-2025-23255" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23339" type="cve" id="CVE-2025-23339" title="CVE-2025-23339" />
			<reference href="https://bdu.fstec.ru/vul/2025-12625" type="self" id="BDU:2025-12625" title="BDU:2025-12625" />
			<reference href="https://bdu.fstec.ru/vul/2025-12622" type="self" id="BDU:2025-12622" title="BDU:2025-12622" />
			<reference href="https://bdu.fstec.ru/vul/2025-12629" type="self" id="BDU:2025-12629" title="BDU:2025-12629" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cuda-cuobjdump" epoch="1" version="13.0.39" release="1.el7" arch="x86_64" src="">
					<filename>cuda-cuobjdump-1:13.0.39-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251031-05</id>
		<issued date="2025-10-31" />
		<updated date="2025-10-31" />
		<title>Множественные уязвимости cuda-nvdisasm</title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в cuda-nvdisasm</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-cuda-nvdisasm-31102025/</description>
               <solution>
                    Запретить использование в ОС пакета cuda-nvdisasm
                или
                    Установить обновление для пакета(ов) cuda-nvdisasm
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-cuda-nvdisasm-31102025/" type="self" id="ROS-20251031-05" title="ROS-20251031-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23340" type="cve" id="CVE-2025-23340" title="CVE-2025-23340" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23248" type="cve" id="CVE-2025-23248" title="CVE-2025-23248" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23271" type="cve" id="CVE-2025-23271" title="CVE-2025-23271" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23308" type="cve" id="CVE-2025-23308" title="CVE-2025-23308" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23338" type="cve" id="CVE-2025-23338" title="CVE-2025-23338" />
			<reference href="https://bdu.fstec.ru/vul/2025-11738" type="self" id="BDU:2025-11738" title="BDU:2025-11738" />
			<reference href="https://bdu.fstec.ru/vul/2025-11739" type="self" id="BDU:2025-11739" title="BDU:2025-11739" />
			<reference href="https://bdu.fstec.ru/vul/2025-11740" type="self" id="BDU:2025-11740" title="BDU:2025-11740" />
			<reference href="https://bdu.fstec.ru/vul/2025-12628" type="self" id="BDU:2025-12628" title="BDU:2025-12628" />
			<reference href="https://bdu.fstec.ru/vul/2025-11737" type="self" id="BDU:2025-11737" title="BDU:2025-11737" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cuda-nvdisasm" epoch="1" version="13.0.39" release="1.el7" arch="x86_64" src="">
					<filename>cuda-nvdisasm-1:13.0.39-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251105-01</id>
		<issued date="2025-11-05" />
		<updated date="2025-11-05" />
		<title>Уязвимость open-vm-tools </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в open-vm-tools</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-open-vm-tools-cve-2025-41244/</description>
               <solution>
                    Запретить использование в ОС пакета open-vm-tools
                или
                    Установить обновление для пакета(ов) open-vm-tools
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-open-vm-tools-cve-2025-41244/" type="self" id="ROS-20251105-01" title="ROS-20251105-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-41244" type="cve" id="CVE-2025-41244" title="CVE-2025-41244" />
			<reference href="https://bdu.fstec.ru/vul/2025-12421" type="self" id="BDU:2025-12421" title="BDU:2025-12421" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="open-vm-tools" epoch="0" version="13.0.5" release="1.el7" arch="x86_64" src="">
					<filename>open-vm-tools-0:13.0.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251105-02</id>
		<issued date="2025-11-05" />
		<updated date="2025-11-05" />
		<title>Множественные уязвимости libtiff</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libtiff</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libtiff-05112025/</description>
               <solution>
                    Запретить использование в ОС пакета libtiff
                или
                    Установить обновление для пакета(ов) libtiff
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libtiff-05112025/" type="self" id="ROS-20251105-02" title="ROS-20251105-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9900" type="cve" id="CVE-2025-9900" title="CVE-2025-9900" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9165" type="cve" id="CVE-2025-9165" title="CVE-2025-9165" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8961" type="cve" id="CVE-2025-8961" title="CVE-2025-8961" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8851" type="cve" id="CVE-2025-8851" title="CVE-2025-8851" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8534" type="cve" id="CVE-2025-8534" title="CVE-2025-8534" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-13978" type="cve" id="CVE-2024-13978" title="CVE-2024-13978" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8176" type="cve" id="CVE-2025-8176" title="CVE-2025-8176" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8177" type="cve" id="CVE-2025-8177" title="CVE-2025-8177" />
			<reference href="https://bdu.fstec.ru/vul/2025-13921" type="self" id="BDU:2025-13921" title="BDU:2025-13921" />
			<reference href="https://bdu.fstec.ru/vul/2025-12470" type="self" id="BDU:2025-12470" title="BDU:2025-12470" />
			<reference href="https://bdu.fstec.ru/vul/2025-13924" type="self" id="BDU:2025-13924" title="BDU:2025-13924" />
			<reference href="https://bdu.fstec.ru/vul/2025-13922" type="self" id="BDU:2025-13922" title="BDU:2025-13922" />
			<reference href="https://bdu.fstec.ru/vul/2025-09847" type="self" id="BDU:2025-09847" title="BDU:2025-09847" />
			<reference href="https://bdu.fstec.ru/vul/2025-13923" type="self" id="BDU:2025-13923" title="BDU:2025-13923" />
			<reference href="https://bdu.fstec.ru/vul/2025-13919" type="self" id="BDU:2025-13919" title="BDU:2025-13919" />
			<reference href="https://bdu.fstec.ru/vul/2025-13920" type="self" id="BDU:2025-13920" title="BDU:2025-13920" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libtiff" epoch="0" version="4.5.1" release="11.el7" arch="x86_64" src="">
					<filename>libtiff-0:4.5.1-11.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251105-03</id>
		<issued date="2025-11-05" />
		<updated date="2025-11-06" />
		<title>Множественные уязвимости log4cxx </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в log4cxx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-log4cxx-cve-2025-54812-cve-2025-54813-cve-2023-31038/</description>
               <solution>
                    Запретить использование в ОС пакета log4cxx
                или
                    Установить обновление для пакета(ов) log4cxx
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-log4cxx-cve-2025-54812-cve-2025-54813-cve-2023-31038/" type="self" id="ROS-20251105-03" title="ROS-20251105-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31038" type="cve" id="CVE-2023-31038" title="CVE-2023-31038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54812" type="cve" id="CVE-2025-54812" title="CVE-2025-54812" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54813" type="cve" id="CVE-2025-54813" title="CVE-2025-54813" />
			<reference href="https://bdu.fstec.ru/vul/2025-13810" type="self" id="BDU:2025-13810" title="BDU:2025-13810" />
			<reference href="https://bdu.fstec.ru/vul/2025-13811" type="self" id="BDU:2025-13811" title="BDU:2025-13811" />
			<reference href="https://bdu.fstec.ru/vul/2025-13812" type="self" id="BDU:2025-13812" title="BDU:2025-13812" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="log4cxx" epoch="0" version="1.5.0" release="1.el7" arch="x86_64" src="">
					<filename>log4cxx-0:1.5.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251105-04</id>
		<issued date="2025-11-05" />
		<updated date="2025-11-05" />
		<title>Множественные уязвимости binutils </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в binutils-</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-binutils-cve-2025-5245-cve-2025-5244/</description>
               <solution>
                    Запретить использование в ОС пакета binutils
                или
                    Установить обновление для пакета(ов) binutils
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-binutils-cve-2025-5245-cve-2025-5244/" type="self" id="ROS-20251105-04" title="ROS-20251105-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5244" type="cve" id="CVE-2025-5244" title="CVE-2025-5244" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5245" type="cve" id="CVE-2025-5245" title="CVE-2025-5245" />
			<reference href="https://bdu.fstec.ru/vul/2025-10924" type="self" id="BDU:2025-10924" title="BDU:2025-10924" />
			<reference href="https://bdu.fstec.ru/vul/2025-10925" type="self" id="BDU:2025-10925" title="BDU:2025-10925" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="binutils" epoch="0" version="2.40" release="15.el7" arch="x86_64" src="">
					<filename>binutils-0:2.40-15.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251105-05</id>
		<issued date="2025-11-05" />
		<updated date="2025-11-05" />
		<title>Уязвимость webmin </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в webmin</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-webmin-cve-2024-44762/</description>
               <solution>
                    Запретить использование в ОС пакета webmin
                или
                    Установить обновление для пакета(ов) webmin
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-webmin-cve-2024-44762/" type="self" id="ROS-20251105-05" title="ROS-20251105-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44762" type="cve" id="CVE-2024-44762" title="CVE-2024-44762" />
			<reference href="https://bdu.fstec.ru/vul/2024-08762" type="self" id="BDU:2024-08762" title="BDU:2024-08762" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="webmin" epoch="0" version="2.520" release="2.el7" arch="noarch" src="">
					<filename>webmin-0:2.520-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251105-06</id>
		<issued date="2025-11-05" />
		<updated date="2025-11-05" />
		<title>Множественные уязвимости dotnet-sdk-8.0 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в dotnet-sdk-8.0</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-dotnet-sdk-8-0-cve-2025-55247-cve-2025-55248-cve-2025-55315/</description>
               <solution>
                    Запретить использование в ОС пакета dotnet-sdk-8.0
                или
                    Установить обновление для пакета(ов) dotnet-sdk-8.0
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-dotnet-sdk-8-0-cve-2025-55247-cve-2025-55248-cve-2025-55315/" type="self" id="ROS-20251105-06" title="ROS-20251105-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55315" type="cve" id="CVE-2025-55315" title="CVE-2025-55315" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55247" type="cve" id="CVE-2025-55247" title="CVE-2025-55247" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55248" type="cve" id="CVE-2025-55248" title="CVE-2025-55248" />
			<reference href="https://bdu.fstec.ru/vul/2025-13247" type="self" id="BDU:2025-13247" title="BDU:2025-13247" />
			<reference href="https://bdu.fstec.ru/vul/2025-13256" type="self" id="BDU:2025-13256" title="BDU:2025-13256" />
			<reference href="https://bdu.fstec.ru/vul/2025-13257" type="self" id="BDU:2025-13257" title="BDU:2025-13257" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="с" epoch="0" version="8.0.121" release="1.el7" arch="x86_64" src="">
					<filename>с-0:8.0.121-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251105-07</id>
		<issued date="2025-11-05" />
		<updated date="2025-11-05" />
		<title>Множественные уязвимости dotnet-sdk-9.0 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в dotnet-sdk-9.0</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-dotnet-sdk-9-0-cve-2025-55247-cve-2025-55248-cve-2025-55315/</description>
               <solution>
                    Запретить использование в ОС пакета dotnet-sdk-9.0
                или
                    Установить обновление для пакета(ов) dotnet-sdk-9.0
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-dotnet-sdk-9-0-cve-2025-55247-cve-2025-55248-cve-2025-55315/" type="self" id="ROS-20251105-07" title="ROS-20251105-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55315" type="cve" id="CVE-2025-55315" title="CVE-2025-55315" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55247" type="cve" id="CVE-2025-55247" title="CVE-2025-55247" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55248" type="cve" id="CVE-2025-55248" title="CVE-2025-55248" />
			<reference href="https://bdu.fstec.ru/vul/2025-13247" type="self" id="BDU:2025-13247" title="BDU:2025-13247" />
			<reference href="https://bdu.fstec.ru/vul/2025-13256" type="self" id="BDU:2025-13256" title="BDU:2025-13256" />
			<reference href="https://bdu.fstec.ru/vul/2025-13257" type="self" id="BDU:2025-13257" title="BDU:2025-13257" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dotnet-sdk-9.0" epoch="0" version="9.0.110" release="1.el7" arch="x86_64" src="">
					<filename>dotnet-sdk-9.0-0:9.0.110-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251105-08</id>
		<issued date="2025-11-05" />
		<updated date="2025-11-05" />
		<title>Множественные уязвимости zabbix-lts-agent </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в zabbix-lts-agent</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix-lts-agent-cve-2025-27236-cve-2025-49641-cve-2025-27231/</description>
               <solution>
                    Запретить использование в ОС пакета zabbix-lts-agent
                или
                    Установить обновление для пакета(ов) zabbix-lts-agent
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix-lts-agent-cve-2025-27236-cve-2025-49641-cve-2025-27231/" type="self" id="ROS-20251105-08" title="ROS-20251105-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27231" type="cve" id="CVE-2025-27231" title="CVE-2025-27231" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27236" type="cve" id="CVE-2025-27236" title="CVE-2025-27236" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49641" type="cve" id="CVE-2025-49641" title="CVE-2025-49641" />
			<reference href="https://bdu.fstec.ru/vul/2025-13818" type="self" id="BDU:2025-13818" title="BDU:2025-13818" />
			<reference href="https://bdu.fstec.ru/vul/2025-12725" type="self" id="BDU:2025-12725" title="BDU:2025-12725" />
			<reference href="https://bdu.fstec.ru/vul/2025-12726" type="self" id="BDU:2025-12726" title="BDU:2025-12726" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix-lts-agent" epoch="1" version="6.0.42" release="1.el7" arch="x86_64" src="">
					<filename>zabbix-lts-agent-1:6.0.42-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251105-09</id>
		<issued date="2025-11-05" />
		<updated date="2025-11-05" />
		<title>Множественные уязвимости zabbix-lts-agent2-plugin-mongodb </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в zabbix-lts-agent2-plugin-mongodb</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix-lts-agent2-plugin-mongodb-cve-2025-27236-cve-2025-49641-cve-2025-2/</description>
               <solution>
                    Запретить использование в ОС пакета zabbix-lts-agent2-plugin-mongodb
                или
                    Установить обновление для пакета(ов) zabbix-lts-agent2-plugin-mongodb
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix-lts-agent2-plugin-mongodb-cve-2025-27236-cve-2025-49641-cve-2025-2/" type="self" id="ROS-20251105-09" title="ROS-20251105-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27231" type="cve" id="CVE-2025-27231" title="CVE-2025-27231" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27236" type="cve" id="CVE-2025-27236" title="CVE-2025-27236" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49641" type="cve" id="CVE-2025-49641" title="CVE-2025-49641" />
			<reference href="https://bdu.fstec.ru/vul/2025-13818" type="self" id="BDU:2025-13818" title="BDU:2025-13818" />
			<reference href="https://bdu.fstec.ru/vul/2025-12725" type="self" id="BDU:2025-12725" title="BDU:2025-12725" />
			<reference href="https://bdu.fstec.ru/vul/2025-12726" type="self" id="BDU:2025-12726" title="BDU:2025-12726" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix-lts-agent2-plugin-mongodb" epoch="0" version="6.0.42" release="1.el7" arch="x86_64" src="">
					<filename>zabbix-lts-agent2-plugin-mongodb-0:6.0.42-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251105-10</id>
		<issued date="2025-11-05" />
		<updated date="2025-11-05" />
		<title>Множественные уязвимости zabbix-lts-agent2-plugin-postgresql </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в zabbix-lts-agent2-plugin-postgresql</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix-lts-agent2-plugin-postgresql-cve-2025-27236-cve-2025-49641-cve-202/</description>
               <solution>
                    Запретить использование в ОС пакета zabbix-lts-agent2-plugin-postgresql
                или
                    Установить обновление для пакета(ов) zabbix-lts-agent2-plugin-postgresql
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix-lts-agent2-plugin-postgresql-cve-2025-27236-cve-2025-49641-cve-202/" type="self" id="ROS-20251105-10" title="ROS-20251105-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27231" type="cve" id="CVE-2025-27231" title="CVE-2025-27231" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27236" type="cve" id="CVE-2025-27236" title="CVE-2025-27236" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49641" type="cve" id="CVE-2025-49641" title="CVE-2025-49641" />
			<reference href="https://bdu.fstec.ru/vul/2025-13818" type="self" id="BDU:2025-13818" title="BDU:2025-13818" />
			<reference href="https://bdu.fstec.ru/vul/2025-12725" type="self" id="BDU:2025-12725" title="BDU:2025-12725" />
			<reference href="https://bdu.fstec.ru/vul/2025-12726" type="self" id="BDU:2025-12726" title="BDU:2025-12726" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix-lts-agent2-plugin-postgresql" epoch="0" version="6.0.42" release="1.el7" arch="x86_64" src="">
					<filename>zabbix-lts-agent2-plugin-postgresql-0:6.0.42-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251105-11</id>
		<issued date="2025-11-05" />
		<updated date="2025-11-05" />
		<title>Множественные уязвимости zabbix-lts-agent2-plugin-mssql </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в zabbix-lts-agent2-plugin-mssql</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix-lts-agent2-plugin-mssql-cve-2025-27236-cve-2025-49641-cve-2025-272/</description>
               <solution>
                    Запретить использование в ОС пакета zabbix-lts-agent2-plugin-mssql
                или
                    Установить обновление для пакета(ов) zabbix-lts-agent2-plugin-mssql
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-zabbix-lts-agent2-plugin-mssql-cve-2025-27236-cve-2025-49641-cve-2025-272/" type="self" id="ROS-20251105-11" title="ROS-20251105-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27231" type="cve" id="CVE-2025-27231" title="CVE-2025-27231" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27236" type="cve" id="CVE-2025-27236" title="CVE-2025-27236" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49641" type="cve" id="CVE-2025-49641" title="CVE-2025-49641" />
			<reference href="https://bdu.fstec.ru/vul/2025-13818" type="self" id="BDU:2025-13818" title="BDU:2025-13818" />
			<reference href="https://bdu.fstec.ru/vul/2025-12725" type="self" id="BDU:2025-12725" title="BDU:2025-12725" />
			<reference href="https://bdu.fstec.ru/vul/2025-12726" type="self" id="BDU:2025-12726" title="BDU:2025-12726" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix-lts-agent2-plugin-mssql" epoch="0" version="6.0.42" release="1.el7" arch="x86_64" src="">
					<filename>zabbix-lts-agent2-plugin-mssql-0:6.0.42-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251105-12</id>
		<issued date="2025-11-05" />
		<updated date="2025-11-06" />
		<title>Уязвимость qemu </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в qemu-15</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qemu-cve-2024-8354/</description>
               <solution>
                    Запретить использование в ОС пакета qemu
                или
                    Установить обновление для пакета(ов) qemu
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qemu-cve-2024-8354/" type="self" id="ROS-20251105-12" title="ROS-20251105-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8354" type="cve" id="CVE-2024-8354" title="CVE-2024-8354" />
			<reference href="https://bdu.fstec.ru/vul/2024-08773" type="self" id="BDU:2024-08773" title="BDU:2024-08773" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="qemu" epoch="15" version="9.0.0" release="4.el7" arch="x86_64" src="">
					<filename>qemu-15:9.0.0-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251106-01</id>
		<issued date="2025-11-06" />
		<updated date="2025-11-06" />
		<title>Уязвимость portainer-ce </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в portainer-ce</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-portainer-ce-cve-2025-4676/</description>
               <solution>
                    Запретить использование в ОС пакета portainer-ce
                или
                    Установить обновление для пакета(ов) portainer-ce
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-portainer-ce-cve-2025-4676/" type="self" id="ROS-20251106-01" title="ROS-20251106-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4676" type="cve" id="CVE-2025-4676" title="CVE-2025-4676" />
			<reference href="https://bdu.fstec.ru/vul/2025-14440" type="self" id="BDU:2025-14440" title="BDU:2025-14440" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="portainer-ce" epoch="0" version="2.33.2" release="1.el7" arch="x86_64" src="">
					<filename>portainer-ce-0:2.33.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251106-02</id>
		<issued date="2025-11-06" />
		<updated date="2025-11-06" />
		<title>Уязвимость netty </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в netty</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-netty-cve-2025-59419/</description>
               <solution>
                    Запретить использование в ОС пакета netty
                или
                    Установить обновление для пакета(ов) netty
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-netty-cve-2025-59419/" type="self" id="ROS-20251106-02" title="ROS-20251106-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59419" type="cve" id="CVE-2025-59419" title="CVE-2025-59419" />
			<reference href="https://bdu.fstec.ru/vul/2025-14439" type="self" id="BDU:2025-14439" title="BDU:2025-14439" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="netty" epoch="0" version="4.1.128" release="1.el7" arch="x86_64" src="">
					<filename>netty-0:4.1.128-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251106-03</id>
		<issued date="2025-11-06" />
		<updated date="2025-11-06" />
		<title>Множественные уязвимости rubygem-rack</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в rubygem-rack</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rubygem-rack-06112025/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-rack
                или
                    Установить обновление для пакета(ов) rubygem-rack
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-rubygem-rack-06112025/" type="self" id="ROS-20251106-03" title="ROS-20251106-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61919" type="cve" id="CVE-2025-61919" title="CVE-2025-61919" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61771" type="cve" id="CVE-2025-61771" title="CVE-2025-61771" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61780" type="cve" id="CVE-2025-61780" title="CVE-2025-61780" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61772" type="cve" id="CVE-2025-61772" title="CVE-2025-61772" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61770" type="cve" id="CVE-2025-61770" title="CVE-2025-61770" />
			<reference href="https://bdu.fstec.ru/vul/2025-13874" type="self" id="BDU:2025-13874" title="BDU:2025-13874" />
			<reference href="https://bdu.fstec.ru/vul/2025-13876" type="self" id="BDU:2025-13876" title="BDU:2025-13876" />
			<reference href="https://bdu.fstec.ru/vul/2025-13873" type="self" id="BDU:2025-13873" title="BDU:2025-13873" />
			<reference href="https://bdu.fstec.ru/vul/2025-14431" type="self" id="BDU:2025-14431" title="BDU:2025-14431" />
			<reference href="https://bdu.fstec.ru/vul/2025-13875" type="self" id="BDU:2025-13875" title="BDU:2025-13875" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-rack" epoch="1" version="2.2.20" release="1.el7" arch="noarch" src="">
					<filename>rubygem-rack-1:2.2.20-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251106-04</id>
		<issued date="2025-11-06" />
		<updated date="2025-11-06" />
		<title>Множественные уязвимости python3-django </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-django</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-django-cve-2025-59681-cve-2025-59682/</description>
               <solution>
                    Запретить использование в ОС пакета python3-django
                или
                    Установить обновление для пакета(ов) python3-django
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-python3-django-cve-2025-59681-cve-2025-59682/" type="self" id="ROS-20251106-04" title="ROS-20251106-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59682" type="cve" id="CVE-2025-59682" title="CVE-2025-59682" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59681" type="cve" id="CVE-2025-59681" title="CVE-2025-59681" />
			<reference href="https://bdu.fstec.ru/vul/2025-12661" type="self" id="BDU:2025-12661" title="BDU:2025-12661" />
			<reference href="https://bdu.fstec.ru/vul/2025-12461" type="self" id="BDU:2025-12461" title="BDU:2025-12461" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-django" epoch="0" version="4.2.25" release="1.el7" arch="noarch" src="">
					<filename>python3-django-0:4.2.25-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251106-05</id>
		<issued date="2025-11-06" />
		<updated date="2025-11-06" />
		<title>Множественные уязвимости binutils </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в binutils</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-binutils-cve-2025-11083-cve-2025-11082/</description>
               <solution>
                    Запретить использование в ОС пакета binutils
                или
                    Установить обновление для пакета(ов) binutils
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-binutils-cve-2025-11083-cve-2025-11082/" type="self" id="ROS-20251106-05" title="ROS-20251106-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11083" type="cve" id="CVE-2025-11083" title="CVE-2025-11083" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11082" type="cve" id="CVE-2025-11082" title="CVE-2025-11082" />
			<reference href="https://bdu.fstec.ru/vul/2025-14438" type="self" id="BDU:2025-14438" title="BDU:2025-14438" />
			<reference href="https://bdu.fstec.ru/vul/2025-13243" type="self" id="BDU:2025-13243" title="BDU:2025-13243" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="binutils" epoch="0" version="2.40" release="15.el7" arch="x86_64" src="">
					<filename>binutils-0:2.40-15.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251106-06</id>
		<issued date="2025-11-06" />
		<updated date="2025-11-06" />
		<title>Уязвимость asterisk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в asterisk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-asterisk-cve-2025-54995/</description>
               <solution>
                    Запретить использование в ОС пакета asterisk
                или
                    Установить обновление для пакета(ов) asterisk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-asterisk-cve-2025-54995/" type="self" id="ROS-20251106-06" title="ROS-20251106-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54995" type="cve" id="CVE-2025-54995" title="CVE-2025-54995" />
			<reference href="https://bdu.fstec.ru/vul/2025-14436" type="self" id="BDU:2025-14436" title="BDU:2025-14436" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="asterisk" epoch="0" version="18.4.0" release="10.el7" arch="x86_64" src="">
					<filename>asterisk-0:18.4.0-10.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251106-07</id>
		<issued date="2025-11-06" />
		<updated date="2025-11-06" />
		<title>Множественные уязвимости phpMyAdmin </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в phpMyAdmin</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-phpmyadmin-cve-2025-24529-cve-2025-24530/</description>
               <solution>
                    Запретить использование в ОС пакета phpMyAdmin
                или
                    Установить обновление для пакета(ов) phpMyAdmin
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-phpmyadmin-cve-2025-24529-cve-2025-24530/" type="self" id="ROS-20251106-07" title="ROS-20251106-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24530" type="cve" id="CVE-2025-24530" title="CVE-2025-24530" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24529" type="cve" id="CVE-2025-24529" title="CVE-2025-24529" />
			<reference href="https://bdu.fstec.ru/vul/2025-14435" type="self" id="BDU:2025-14435" title="BDU:2025-14435" />
			<reference href="https://bdu.fstec.ru/vul/2025-14434" type="self" id="BDU:2025-14434" title="BDU:2025-14434" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="phpMyAdmin" epoch="0" version="5.2.3" release="1.el7" arch="noarch" src="">
					<filename>phpMyAdmin-0:5.2.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251106-08</id>
		<issued date="2025-11-06" />
		<updated date="2025-11-06" />
		<title>Множественные уязвимости gstreamer1-plugins-base </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gstreamer1-plugins-base</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gstreamer1-plugins-base-cve-2025-47808-cve-2025-47807-cve-2025-47806/</description>
               <solution>
                    Запретить использование в ОС пакета gstreamer1-plugins-base
                или
                    Установить обновление для пакета(ов) gstreamer1-plugins-base
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gstreamer1-plugins-base-cve-2025-47808-cve-2025-47807-cve-2025-47806/" type="self" id="ROS-20251106-08" title="ROS-20251106-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47808" type="cve" id="CVE-2025-47808" title="CVE-2025-47808" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47807" type="cve" id="CVE-2025-47807" title="CVE-2025-47807" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47806" type="cve" id="CVE-2025-47806" title="CVE-2025-47806" />
			<reference href="https://bdu.fstec.ru/vul/2025-14441" type="self" id="BDU:2025-14441" title="BDU:2025-14441" />
			<reference href="https://bdu.fstec.ru/vul/2025-14444" type="self" id="BDU:2025-14444" title="BDU:2025-14444" />
			<reference href="https://bdu.fstec.ru/vul/2025-14442" type="self" id="BDU:2025-14442" title="BDU:2025-14442" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gstreamer1-plugins-base" epoch="0" version="1.16.3" release="5.el7" arch="x86_64" src="">
					<filename>gstreamer1-plugins-base-0:1.16.3-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251106-09</id>
		<issued date="2025-11-06" />
		<updated date="2025-11-06" />
		<title>Уязвимость qemu </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в qemu-common</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qemu-cve-2024-4693/</description>
               <solution>
                    Запретить использование в ОС пакета qemu-common
                или
                    Установить обновление для пакета(ов) qemu-common
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qemu-cve-2024-4693/" type="self" id="ROS-20251106-09" title="ROS-20251106-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4693" type="cve" id="CVE-2024-4693" title="CVE-2024-4693" />
			<reference href="https://bdu.fstec.ru/vul/2025-14443" type="self" id="BDU:2025-14443" title="BDU:2025-14443" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="qemu-common" epoch="15" version="9.0.0" release="4.el7" arch="x86_64" src="">
					<filename>qemu-common-15:9.0.0-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251110-01</id>
		<issued date="2025-11-10" />
		<updated date="2025-11-10" />
		<title>Множественные уязвимости ffmpeg</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ffmpeg</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-ffmpeg-10112025/</description>
               <solution>
                    Запретить использование в ОС пакета ffmpeg
                или
                    Установить обновление для пакета(ов) ffmpeg
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-ffmpeg-10112025/" type="self" id="ROS-20251110-01" title="ROS-20251110-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6603" type="cve" id="CVE-2023-6603" title="CVE-2023-6603" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1816" type="cve" id="CVE-2025-1816" title="CVE-2025-1816" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59733" type="cve" id="CVE-2025-59733" title="CVE-2025-59733" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59732" type="cve" id="CVE-2025-59732" title="CVE-2025-59732" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59731" type="cve" id="CVE-2025-59731" title="CVE-2025-59731" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59728" type="cve" id="CVE-2025-59728" title="CVE-2025-59728" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-25473" type="cve" id="CVE-2025-25473" title="CVE-2025-25473" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22921" type="cve" id="CVE-2025-22921" title="CVE-2025-22921" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22919" type="cve" id="CVE-2025-22919" title="CVE-2025-22919" />
			<reference href="https://bdu.fstec.ru/vul/2025-14437" type="self" id="BDU:2025-14437" title="BDU:2025-14437" />
			<reference href="https://bdu.fstec.ru/vul/2025-03525" type="self" id="BDU:2025-03525" title="BDU:2025-03525" />
			<reference href="https://bdu.fstec.ru/vul/2025-12714" type="self" id="BDU:2025-12714" title="BDU:2025-12714" />
			<reference href="https://bdu.fstec.ru/vul/2025-12720" type="self" id="BDU:2025-12720" title="BDU:2025-12720" />
			<reference href="https://bdu.fstec.ru/vul/2025-12718" type="self" id="BDU:2025-12718" title="BDU:2025-12718" />
			<reference href="https://bdu.fstec.ru/vul/2025-12716" type="self" id="BDU:2025-12716" title="BDU:2025-12716" />
			<reference href="https://bdu.fstec.ru/vul/2025-02163" type="self" id="BDU:2025-02163" title="BDU:2025-02163" />
			<reference href="https://bdu.fstec.ru/vul/2025-02149" type="self" id="BDU:2025-02149" title="BDU:2025-02149" />
			<reference href="https://bdu.fstec.ru/vul/2025-02164" type="self" id="BDU:2025-02164" title="BDU:2025-02164" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ffmpeg" epoch="0" version="4.4.3" release="6.el7" arch="x86_64" src="">
					<filename>ffmpeg-0:4.4.3-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251110-02</id>
		<issued date="2025-11-10" />
		<updated date="2025-11-10" />
		<title>Уязвимость 7zip </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в 7zip</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-7zip-cve-2025-11001/</description>
               <solution>
                    Запретить использование в ОС пакета 7zip
                или
                    Установить обновление для пакета(ов) 7zip
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-7zip-cve-2025-11001/" type="self" id="ROS-20251110-02" title="ROS-20251110-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11001" type="cve" id="CVE-2025-11001" title="CVE-2025-11001" />
			<reference href="https://bdu.fstec.ru/vul/2025-12910" type="self" id="BDU:2025-12910" title="BDU:2025-12910" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="7zip" epoch="0" version="25.00" release="1.el7" arch="x86_64" src="">
					<filename>7zip-0:25.00-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251110-03</id>
		<issued date="2025-11-10" />
		<updated date="2025-11-10" />
		<title>Множественные уязвимости chromium</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-10112025/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-10112025/" type="self" id="ROS-20251110-03" title="ROS-20251110-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8292" type="cve" id="CVE-2025-8292" title="CVE-2025-8292" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8576" type="cve" id="CVE-2025-8576" title="CVE-2025-8576" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8577" type="cve" id="CVE-2025-8577" title="CVE-2025-8577" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8579" type="cve" id="CVE-2025-8579" title="CVE-2025-8579" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8580" type="cve" id="CVE-2025-8580" title="CVE-2025-8580" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8581" type="cve" id="CVE-2025-8581" title="CVE-2025-8581" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8582" type="cve" id="CVE-2025-8582" title="CVE-2025-8582" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8583" type="cve" id="CVE-2025-8583" title="CVE-2025-8583" />
			<reference href="https://bdu.fstec.ru/vul/2025-09421" type="self" id="BDU:2025-09421" title="BDU:2025-09421" />
			<reference href="https://bdu.fstec.ru/vul/2025-09933" type="self" id="BDU:2025-09933" title="BDU:2025-09933" />
			<reference href="https://bdu.fstec.ru/vul/2025-09932" type="self" id="BDU:2025-09932" title="BDU:2025-09932" />
			<reference href="https://bdu.fstec.ru/vul/2025-09934" type="self" id="BDU:2025-09934" title="BDU:2025-09934" />
			<reference href="https://bdu.fstec.ru/vul/2025-09475" type="self" id="BDU:2025-09475" title="BDU:2025-09475" />
			<reference href="https://bdu.fstec.ru/vul/2025-09456" type="self" id="BDU:2025-09456" title="BDU:2025-09456" />
			<reference href="https://bdu.fstec.ru/vul/2025-09454" type="self" id="BDU:2025-09454" title="BDU:2025-09454" />
			<reference href="https://bdu.fstec.ru/vul/2025-09455" type="self" id="BDU:2025-09455" title="BDU:2025-09455" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="141.0.7390.122" release="1.el7" arch="x86_64" src="">
					<filename>chromium-0:141.0.7390.122-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251110-04</id>
		<issued date="2025-11-10" />
		<updated date="2025-11-10" />
		<title>Множественные уязвимости gstreamer1-plugins-good </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gstreamer1-plugins-good</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gstreamer1-plugins-good-cve-2025-47183-cve-2025-47219/</description>
               <solution>
                    Запретить использование в ОС пакета gstreamer1-plugins-good
                или
                    Установить обновление для пакета(ов) gstreamer1-plugins-good
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gstreamer1-plugins-good-cve-2025-47183-cve-2025-47219/" type="self" id="ROS-20251110-04" title="ROS-20251110-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47183" type="cve" id="CVE-2025-47183" title="CVE-2025-47183" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47219" type="cve" id="CVE-2025-47219" title="CVE-2025-47219" />
			<reference href="https://bdu.fstec.ru/vul/2025-14432" type="self" id="BDU:2025-14432" title="BDU:2025-14432" />
			<reference href="https://bdu.fstec.ru/vul/2025-14433" type="self" id="BDU:2025-14433" title="BDU:2025-14433" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gstreamer1-plugins-good" epoch="0" version="1.16.3" release="4.el7" arch="x86_64" src="">
					<filename>gstreamer1-plugins-good-0:1.16.3-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251110-05</id>
		<issued date="2025-11-10" />
		<updated date="2025-11-10" />
		<title>Уязвимость pam </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в pam</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pam-cve-2024-10041/</description>
               <solution>
                    Запретить использование в ОС пакета pam
                или
                    Установить обновление для пакета(ов) pam
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pam-cve-2024-10041/" type="self" id="ROS-20251110-05" title="ROS-20251110-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10041" type="cve" id="CVE-2024-10041" title="CVE-2024-10041" />
			<reference href="https://bdu.fstec.ru/vul/2025-05059" type="self" id="BDU:2025-05059" title="BDU:2025-05059" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pam" epoch="0" version="1.4.0" release="12.el7" arch="x86_64" src="">
					<filename>pam-0:1.4.0-12.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251111-01</id>
		<issued date="2025-11-11" />
		<updated date="2025-11-11" />
		<title>Множественные уязвимости libxml2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libxml2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libxml2-cve-2025-9714-cve-2025-8732/</description>
               <solution>
                    Запретить использование в ОС пакета libxml2
                или
                    Установить обновление для пакета(ов) libxml2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-libxml2-cve-2025-9714-cve-2025-8732/" type="self" id="ROS-20251111-01" title="ROS-20251111-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9714" type="cve" id="CVE-2025-9714" title="CVE-2025-9714" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8732" type="cve" id="CVE-2025-8732" title="CVE-2025-8732" />
			<reference href="https://bdu.fstec.ru/vul/2026-02937" type="self" id="BDU:2026-02937" title="BDU:2026-02937" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libxml2" epoch="0" version="2.9.8" release="23.el7.3" arch="x86_64" src="">
					<filename>libxml2-0:2.9.8-23.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251111-02</id>
		<issued date="2025-11-11" />
		<updated date="2025-11-11" />
		<title>Уязвимость cuda </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в cuda</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cuda-cve-2024-0072/</description>
               <solution>
                    Запретить использование в ОС пакета cuda
                или
                    Установить обновление для пакета(ов) cuda
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cuda-cve-2024-0072/" type="self" id="ROS-20251111-02" title="ROS-20251111-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0072" type="cve" id="CVE-2024-0072" title="CVE-2024-0072" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cuda" epoch="1" version="13.0.39" release="1.el7" arch="x86_64" src="">
					<filename>cuda-1:13.0.39-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251111-03</id>
		<issued date="2025-11-11" />
		<updated date="2025-11-11" />
		<title>Уязвимость DPDK </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в dpdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dpdk-cve-2025-23259/</description>
               <solution>
                    Запретить использование в ОС пакета DPDK
                или
                    Установить обновление для пакета(ов) DPDK
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dpdk-cve-2025-23259/" type="self" id="ROS-20251111-03" title="ROS-20251111-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23259" type="cve" id="CVE-2025-23259" title="CVE-2025-23259" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dpdk" epoch="2" version="22.11.7" release="1.el7" arch="x86_64" src="">
					<filename>dpdk-2:22.11.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251111-04</id>
		<issued date="2025-11-11" />
		<updated date="2025-11-11" />
		<title>Уязвимость DPDK21 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в dpdk21</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dpdk21-cve-2025-23259/</description>
               <solution>
                    Запретить использование в ОС пакета DPDK21
                или
                    Установить обновление для пакета(ов) DPDK21
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dpdk21-cve-2025-23259/" type="self" id="ROS-20251111-04" title="ROS-20251111-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23259" type="cve" id="CVE-2025-23259" title="CVE-2025-23259" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dpdk21" epoch="1" version="21.11.9" release="1.el7" arch="x86_64" src="">
					<filename>dpdk21-1:21.11.9-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251111-05</id>
		<issued date="2025-11-11" />
		<updated date="2025-11-11" />
		<title>Уязвимость rubygem-rexml </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в rubygem-rexml</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-rexml-cve-2025-58767/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-rexml
                или
                    Установить обновление для пакета(ов) rubygem-rexml
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-rexml-cve-2025-58767/" type="self" id="ROS-20251111-05" title="ROS-20251111-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58767" type="cve" id="CVE-2025-58767" title="CVE-2025-58767" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-rexml" epoch="0" version="3.4.4" release="1.el7" arch="noarch" src="">
					<filename>rubygem-rexml-0:3.4.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251111-06</id>
		<issued date="2025-11-11" />
		<updated date="2025-11-11" />
		<title>Уязвимость glib2 </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в glib2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glib2-cve-2025-7039/</description>
               <solution>
                    Запретить использование в ОС пакета glib2
                или
                    Установить обновление для пакета(ов) glib2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glib2-cve-2025-7039/" type="self" id="ROS-20251111-06" title="ROS-20251111-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7039" type="cve" id="CVE-2025-7039" title="CVE-2025-7039" />
			<reference href="https://bdu.fstec.ru/vul/2026-05134" type="self" id="BDU:2026-05134" title="BDU:2026-05134" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glib2" epoch="0" version="2.65.3" release="8.el7" arch="x86_64" src="">
					<filename>glib2-0:2.65.3-8.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251111-07</id>
		<issued date="2025-11-11" />
		<updated date="2025-11-11" />
		<title>Множественные уязвимости chromium</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-11112025/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-11112025/" type="self" id="ROS-20251111-07" title="ROS-20251111-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8578" type="cve" id="CVE-2025-8578" title="CVE-2025-8578" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8879" type="cve" id="CVE-2025-8879" title="CVE-2025-8879" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8901" type="cve" id="CVE-2025-8901" title="CVE-2025-8901" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8881" type="cve" id="CVE-2025-8881" title="CVE-2025-8881" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8882" type="cve" id="CVE-2025-8882" title="CVE-2025-8882" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9132" type="cve" id="CVE-2025-9132" title="CVE-2025-9132" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9478" type="cve" id="CVE-2025-9478" title="CVE-2025-9478" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9864" type="cve" id="CVE-2025-9864" title="CVE-2025-9864" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9865" type="cve" id="CVE-2025-9865" title="CVE-2025-9865" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9866" type="cve" id="CVE-2025-9866" title="CVE-2025-9866" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9867" type="cve" id="CVE-2025-9867" title="CVE-2025-9867" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10200" type="cve" id="CVE-2025-10200" title="CVE-2025-10200" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8880" type="cve" id="CVE-2025-8880" title="CVE-2025-8880" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10201" type="cve" id="CVE-2025-10201" title="CVE-2025-10201" />
			<reference href="https://bdu.fstec.ru/vul/2025-09463" type="self" id="BDU:2025-09463" title="BDU:2025-09463" />
			<reference href="https://bdu.fstec.ru/vul/2025-10159" type="self" id="BDU:2025-10159" title="BDU:2025-10159" />
			<reference href="https://bdu.fstec.ru/vul/2025-10160" type="self" id="BDU:2025-10160" title="BDU:2025-10160" />
			<reference href="https://bdu.fstec.ru/vul/2025-10158" type="self" id="BDU:2025-10158" title="BDU:2025-10158" />
			<reference href="https://bdu.fstec.ru/vul/2025-10157" type="self" id="BDU:2025-10157" title="BDU:2025-10157" />
			<reference href="https://bdu.fstec.ru/vul/2025-11093" type="self" id="BDU:2025-11093" title="BDU:2025-11093" />
			<reference href="https://bdu.fstec.ru/vul/2025-10882" type="self" id="BDU:2025-10882" title="BDU:2025-10882" />
			<reference href="https://bdu.fstec.ru/vul/2025-11125" type="self" id="BDU:2025-11125" title="BDU:2025-11125" />
			<reference href="https://bdu.fstec.ru/vul/2025-11128" type="self" id="BDU:2025-11128" title="BDU:2025-11128" />
			<reference href="https://bdu.fstec.ru/vul/2025-11126" type="self" id="BDU:2025-11126" title="BDU:2025-11126" />
			<reference href="https://bdu.fstec.ru/vul/2025-11127" type="self" id="BDU:2025-11127" title="BDU:2025-11127" />
			<reference href="https://bdu.fstec.ru/vul/2025-11244" type="self" id="BDU:2025-11244" title="BDU:2025-11244" />
			<reference href="https://bdu.fstec.ru/vul/2025-10156" type="self" id="BDU:2025-10156" title="BDU:2025-10156" />
			<reference href="https://bdu.fstec.ru/vul/2025-11245" type="self" id="BDU:2025-11245" title="BDU:2025-11245" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="141.0.7390.122" release="1.el7" arch="x86_64" src="">
					<filename>chromium-0:141.0.7390.122-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251111-08</id>
		<issued date="2025-11-11" />
		<updated date="2025-11-11" />
		<title>Уязвимость c-ares </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в c-ares</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-c-ares-cve-2025-48945/</description>
               <solution>
                    Запретить использование в ОС пакета c-ares
                или
                    Установить обновление для пакета(ов) c-ares
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-c-ares-cve-2025-48945/" type="self" id="ROS-20251111-08" title="ROS-20251111-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48945" type="cve" id="CVE-2025-48945" title="CVE-2025-48945" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="c-ares" epoch="0" version="1.34.5" release="1.el7" arch="x86_64" src="">
					<filename>c-ares-0:1.34.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251111-09</id>
		<issued date="2025-11-11" />
		<updated date="2025-11-11" />
		<title>Уязвимость python3-pycares </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3-pycares</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-pycares-cve-2025-48945/</description>
               <solution>
                    Запретить использование в ОС пакета python3-pycares
                или
                    Установить обновление для пакета(ов) python3-pycares
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-pycares-cve-2025-48945/" type="self" id="ROS-20251111-09" title="ROS-20251111-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48945" type="cve" id="CVE-2025-48945" title="CVE-2025-48945" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-pycares" epoch="0" version="4.9.0" release="1.el7" arch="x86_64" src="">
					<filename>python3-pycares-0:4.9.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251111-10</id>
		<issued date="2025-11-11" />
		<updated date="2025-11-11" />
		<title>Множественные уязвимости elfutils </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в elfutils</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-elfutils-cve-2025-1365-cve-2025-1371-cve-2025-1372-cve-2025-1377/</description>
               <solution>
                    Запретить использование в ОС пакета elfutils
                или
                    Установить обновление для пакета(ов) elfutils
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-elfutils-cve-2025-1365-cve-2025-1371-cve-2025-1372-cve-2025-1377/" type="self" id="ROS-20251111-10" title="ROS-20251111-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1371" type="cve" id="CVE-2025-1371" title="CVE-2025-1371" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1365" type="cve" id="CVE-2025-1365" title="CVE-2025-1365" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1372" type="cve" id="CVE-2025-1372" title="CVE-2025-1372" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1377" type="cve" id="CVE-2025-1377" title="CVE-2025-1377" />
			<reference href="https://bdu.fstec.ru/vul/2025-02224" type="self" id="BDU:2025-02224" title="BDU:2025-02224" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="elfutils" epoch="0" version="0.194" release="1.el7" arch="x86_64" src="">
					<filename>elfutils-0:0.194-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251111-11</id>
		<issued date="2025-11-11" />
		<updated date="2025-11-11" />
		<title>Уязвимость ffmpeg </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в ffmpeg</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ffmpeg-cve-2025-1594/</description>
               <solution>
                    Запретить использование в ОС пакета ffmpeg
                или
                    Установить обновление для пакета(ов) ffmpeg
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ffmpeg-cve-2025-1594/" type="self" id="ROS-20251111-11" title="ROS-20251111-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1594" type="cve" id="CVE-2025-1594" title="CVE-2025-1594" />
			<reference href="https://bdu.fstec.ru/vul/2025-11468" type="self" id="BDU:2025-11468" title="BDU:2025-11468" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ffmpeg" epoch="0" version="4.4.3" release="6.el7" arch="x86_64" src="">
					<filename>ffmpeg-0:4.4.3-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251112-01</id>
		<issued date="2025-11-12" />
		<updated date="2025-11-12" />
		<title>Множественные уязвимости squid </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в squid</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-squid-cve-2025-62168-cve-2025-59362/</description>
               <solution>
                    Запретить использование в ОС пакета squid
                или
                    Установить обновление для пакета(ов) squid
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-squid-cve-2025-62168-cve-2025-59362/" type="self" id="ROS-20251112-01" title="ROS-20251112-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59362" type="cve" id="CVE-2025-59362" title="CVE-2025-59362" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62168" type="cve" id="CVE-2025-62168" title="CVE-2025-62168" />
			<reference href="https://bdu.fstec.ru/vul/2025-14411" type="self" id="BDU:2025-14411" title="BDU:2025-14411" />
			<reference href="https://bdu.fstec.ru/vul/2025-13226" type="self" id="BDU:2025-13226" title="BDU:2025-13226" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="squid" epoch="7" version="6.14" release="2.el7" arch="x86_64" src="">
					<filename>squid-7:6.14-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251112-02</id>
		<issued date="2025-11-12" />
		<updated date="2025-11-12" />
		<title>Уязвимость openssl </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в openssl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/Uyazvimost-openssl-cve-2020-1971/</description>
               <solution>
                    Запретить использование в ОС пакета openssl
                или
                    Установить обновление для пакета(ов) openssl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/Uyazvimost-openssl-cve-2020-1971/" type="self" id="ROS-20251112-02" title="ROS-20251112-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1971" type="cve" id="CVE-2020-1971" title="CVE-2020-1971" />
			<reference href="https://bdu.fstec.ru/vul/2021-00872" type="self" id="BDU:2021-00872" title="BDU:2021-00872" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl" epoch="1" version="1.1.1q" release="1.el7.3" arch="x86_64" src="">
					<filename>openssl-1:1.1.1q-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251112-03</id>
		<issued date="2025-11-12" />
		<updated date="2025-11-12" />
		<title>Уязвимость openssl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openssl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl-cve-2024-2511/</description>
               <solution>
                    Запретить использование в ОС пакета openssl
                или
                    Установить обновление для пакета(ов) openssl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl-cve-2024-2511/" type="self" id="ROS-20251112-03" title="ROS-20251112-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2511" type="cve" id="CVE-2024-2511" title="CVE-2024-2511" />
			<reference href="https://bdu.fstec.ru/vul/2024-04109" type="self" id="BDU:2024-04109" title="BDU:2024-04109" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl" epoch="1" version="1.1.1w" release="3.el7" arch="x86_64" src="">
					<filename>openssl-1:1.1.1w-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251112-04</id>
		<issued date="2025-11-12" />
		<updated date="2025-11-12" />
		<title>Уязвимость 389-ds-base </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в 389-ds-base</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-389-ds-base-cve-2025-7493/</description>
               <solution>
                    Запретить использование в ОС пакета 389-ds-base
                или
                    Установить обновление для пакета(ов) 389-ds-base
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-389-ds-base-cve-2025-7493/" type="self" id="ROS-20251112-04" title="ROS-20251112-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7493" type="cve" id="CVE-2025-7493" title="CVE-2025-7493" />
			<reference href="https://bdu.fstec.ru/vul/2025-14421" type="self" id="BDU:2025-14421" title="BDU:2025-14421" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="389-ds-base" epoch="0" version="2.4.5" release="4.el7" arch="x86_64" src="">
					<filename>389-ds-base-0:2.4.5-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251112-05</id>
		<issued date="2025-11-12" />
		<updated date="2025-11-12" />
		<title>Уязвимость openjpeg2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openjpeg2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openjpeg2-cve-2023-39327/</description>
               <solution>
                    Запретить использование в ОС пакета openjpeg2
                или
                    Установить обновление для пакета(ов) openjpeg2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openjpeg2-cve-2023-39327/" type="self" id="ROS-20251112-05" title="ROS-20251112-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39327" type="cve" id="CVE-2023-39327" title="CVE-2023-39327" />
			<reference href="https://bdu.fstec.ru/vul/2025-12484" type="self" id="BDU:2025-12484" title="BDU:2025-12484" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openjpeg2" epoch="0" version="2.5.3" release="1.el7" arch="x86_64" src="">
					<filename>openjpeg2-0:2.5.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251112-06</id>
		<issued date="2025-11-12" />
		<updated date="2025-11-12" />
		<title>Уязвимость cuda </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в cuda</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cuda-cve-2024-0076/</description>
               <solution>
                    Запретить использование в ОС пакета cuda
                или
                    Установить обновление для пакета(ов) cuda
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cuda-cve-2024-0076/" type="self" id="ROS-20251112-06" title="ROS-20251112-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0076" type="cve" id="CVE-2024-0076" title="CVE-2024-0076" />
			<reference href="https://bdu.fstec.ru/vul/2025-14424" type="self" id="BDU:2025-14424" title="BDU:2025-14424" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cuda" epoch="1" version="13.0.39" release="1.el7" arch="x86_64" src="">
					<filename>cuda-1:13.0.39-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251112-07</id>
		<issued date="2025-11-12" />
		<updated date="2025-11-12" />
		<title>Множественные уязвимости chromium</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-12112025/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-12112025/" type="self" id="ROS-20251112-07" title="ROS-20251112-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10892" type="cve" id="CVE-2025-10892" title="CVE-2025-10892" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10500" type="cve" id="CVE-2025-10500" title="CVE-2025-10500" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10501" type="cve" id="CVE-2025-10501" title="CVE-2025-10501" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10502" type="cve" id="CVE-2025-10502" title="CVE-2025-10502" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10891" type="cve" id="CVE-2025-10891" title="CVE-2025-10891" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10890" type="cve" id="CVE-2025-10890" title="CVE-2025-10890" />
			<reference href="https://bdu.fstec.ru/vul/2025-12390" type="self" id="BDU:2025-12390" title="BDU:2025-12390" />
			<reference href="https://bdu.fstec.ru/vul/2025-11453" type="self" id="BDU:2025-11453" title="BDU:2025-11453" />
			<reference href="https://bdu.fstec.ru/vul/2025-11454" type="self" id="BDU:2025-11454" title="BDU:2025-11454" />
			<reference href="https://bdu.fstec.ru/vul/2025-11455" type="self" id="BDU:2025-11455" title="BDU:2025-11455" />
			<reference href="https://bdu.fstec.ru/vul/2025-12391" type="self" id="BDU:2025-12391" title="BDU:2025-12391" />
			<reference href="https://bdu.fstec.ru/vul/2025-12392" type="self" id="BDU:2025-12392" title="BDU:2025-12392" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="141.0.7390.122" release="1.el7" arch="x86_64" src="">
					<filename>chromium-0:141.0.7390.122-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251112-08</id>
		<issued date="2025-11-12" />
		<updated date="2025-11-12" />
		<title>Уязвимость python3-eventlet </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в python3-eventlet</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-eventlet-cve-2025-58068/</description>
               <solution>
                    Запретить использование в ОС пакета python3-eventlet
                или
                    Установить обновление для пакета(ов) python3-eventlet
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-eventlet-cve-2025-58068/" type="self" id="ROS-20251112-08" title="ROS-20251112-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58068" type="cve" id="CVE-2025-58068" title="CVE-2025-58068" />
			<reference href="https://bdu.fstec.ru/vul/2025-14415" type="self" id="BDU:2025-14415" title="BDU:2025-14415" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-eventlet" epoch="0" version="0.33.3" release="3.el7" arch="noarch" src="">
					<filename>python3-eventlet-0:0.33.3-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251112-09</id>
		<issued date="2025-11-12" />
		<updated date="2025-11-12" />
		<title>Множественные уязвимости openbabel</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в openbabel</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-openbabel-12112025/</description>
               <solution>
                    Запретить использование в ОС пакета openbabel
                или
                    Установить обновление для пакета(ов) openbabel
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-openbabel-12112025/" type="self" id="ROS-20251112-09" title="ROS-20251112-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10999" type="cve" id="CVE-2025-10999" title="CVE-2025-10999" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10998" type="cve" id="CVE-2025-10998" title="CVE-2025-10998" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10997" type="cve" id="CVE-2025-10997" title="CVE-2025-10997" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10996" type="cve" id="CVE-2025-10996" title="CVE-2025-10996" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10995" type="cve" id="CVE-2025-10995" title="CVE-2025-10995" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10994" type="cve" id="CVE-2025-10994" title="CVE-2025-10994" />
			<reference href="https://bdu.fstec.ru/vul/2025-14404" type="self" id="BDU:2025-14404" title="BDU:2025-14404" />
			<reference href="https://bdu.fstec.ru/vul/2025-14405" type="self" id="BDU:2025-14405" title="BDU:2025-14405" />
			<reference href="https://bdu.fstec.ru/vul/2025-14407" type="self" id="BDU:2025-14407" title="BDU:2025-14407" />
			<reference href="https://bdu.fstec.ru/vul/2025-14408" type="self" id="BDU:2025-14408" title="BDU:2025-14408" />
			<reference href="https://bdu.fstec.ru/vul/2025-14409" type="self" id="BDU:2025-14409" title="BDU:2025-14409" />
			<reference href="https://bdu.fstec.ru/vul/2025-14410" type="self" id="BDU:2025-14410" title="BDU:2025-14410" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openbabel" epoch="0" version="3.1.1" release="1.el7" arch="x86_64" src="">
					<filename>openbabel-0:3.1.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251112-10</id>
		<issued date="2025-11-12" />
		<updated date="2025-11-12" />
		<title>Множественные уязвимости xdrawchem</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в xdrawchem</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-xdrawchem-12112025/</description>
               <solution>
                    Запретить использование в ОС пакета xdrawchem
                или
                    Установить обновление для пакета(ов) xdrawchem
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-xdrawchem-12112025/" type="self" id="ROS-20251112-10" title="ROS-20251112-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10999" type="cve" id="CVE-2025-10999" title="CVE-2025-10999" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10998" type="cve" id="CVE-2025-10998" title="CVE-2025-10998" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10997" type="cve" id="CVE-2025-10997" title="CVE-2025-10997" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10996" type="cve" id="CVE-2025-10996" title="CVE-2025-10996" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10995" type="cve" id="CVE-2025-10995" title="CVE-2025-10995" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10994" type="cve" id="CVE-2025-10994" title="CVE-2025-10994" />
			<reference href="https://bdu.fstec.ru/vul/2025-14404" type="self" id="BDU:2025-14404" title="BDU:2025-14404" />
			<reference href="https://bdu.fstec.ru/vul/2025-14405" type="self" id="BDU:2025-14405" title="BDU:2025-14405" />
			<reference href="https://bdu.fstec.ru/vul/2025-14407" type="self" id="BDU:2025-14407" title="BDU:2025-14407" />
			<reference href="https://bdu.fstec.ru/vul/2025-14408" type="self" id="BDU:2025-14408" title="BDU:2025-14408" />
			<reference href="https://bdu.fstec.ru/vul/2025-14409" type="self" id="BDU:2025-14409" title="BDU:2025-14409" />
			<reference href="https://bdu.fstec.ru/vul/2025-14410" type="self" id="BDU:2025-14410" title="BDU:2025-14410" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="xdrawchem" epoch="0" version="1.10.2" release="2.el7" arch="x86_64" src="">
					<filename>xdrawchem-0:1.10.2-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251113-01</id>
		<issued date="2025-11-13" />
		<updated date="2025-11-13" />
		<title>Множественные уязвимости chromium</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-13112025/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-13112025/" type="self" id="ROS-20251113-01" title="ROS-20251113-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11219" type="cve" id="CVE-2025-11219" title="CVE-2025-11219" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12036" type="cve" id="CVE-2025-12036" title="CVE-2025-12036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11756" type="cve" id="CVE-2025-11756" title="CVE-2025-11756" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11458" type="cve" id="CVE-2025-11458" title="CVE-2025-11458" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11460" type="cve" id="CVE-2025-11460" title="CVE-2025-11460" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11211" type="cve" id="CVE-2025-11211" title="CVE-2025-11211" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11205" type="cve" id="CVE-2025-11205" title="CVE-2025-11205" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11206" type="cve" id="CVE-2025-11206" title="CVE-2025-11206" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11207" type="cve" id="CVE-2025-11207" title="CVE-2025-11207" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11208" type="cve" id="CVE-2025-11208" title="CVE-2025-11208" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11209" type="cve" id="CVE-2025-11209" title="CVE-2025-11209" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11210" type="cve" id="CVE-2025-11210" title="CVE-2025-11210" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11212" type="cve" id="CVE-2025-11212" title="CVE-2025-11212" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11213" type="cve" id="CVE-2025-11213" title="CVE-2025-11213" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11215" type="cve" id="CVE-2025-11215" title="CVE-2025-11215" />
			<reference href="https://bdu.fstec.ru/vul/2025-13634" type="self" id="BDU:2025-13634" title="BDU:2025-13634" />
			<reference href="https://bdu.fstec.ru/vul/2025-13845" type="self" id="BDU:2025-13845" title="BDU:2025-13845" />
			<reference href="https://bdu.fstec.ru/vul/2025-13191" type="self" id="BDU:2025-13191" title="BDU:2025-13191" />
			<reference href="https://bdu.fstec.ru/vul/2025-13066" type="self" id="BDU:2025-13066" title="BDU:2025-13066" />
			<reference href="https://bdu.fstec.ru/vul/2025-13067" type="self" id="BDU:2025-13067" title="BDU:2025-13067" />
			<reference href="https://bdu.fstec.ru/vul/2025-13254" type="self" id="BDU:2025-13254" title="BDU:2025-13254" />
			<reference href="https://bdu.fstec.ru/vul/2025-12620" type="self" id="BDU:2025-12620" title="BDU:2025-12620" />
			<reference href="https://bdu.fstec.ru/vul/2025-12621" type="self" id="BDU:2025-12621" title="BDU:2025-12621" />
			<reference href="https://bdu.fstec.ru/vul/2025-13628" type="self" id="BDU:2025-13628" title="BDU:2025-13628" />
			<reference href="https://bdu.fstec.ru/vul/2025-13629" type="self" id="BDU:2025-13629" title="BDU:2025-13629" />
			<reference href="https://bdu.fstec.ru/vul/2025-13631" type="self" id="BDU:2025-13631" title="BDU:2025-13631" />
			<reference href="https://bdu.fstec.ru/vul/2025-13190" type="self" id="BDU:2025-13190" title="BDU:2025-13190" />
			<reference href="https://bdu.fstec.ru/vul/2025-13630" type="self" id="BDU:2025-13630" title="BDU:2025-13630" />
			<reference href="https://bdu.fstec.ru/vul/2025-13632" type="self" id="BDU:2025-13632" title="BDU:2025-13632" />
			<reference href="https://bdu.fstec.ru/vul/2025-13633" type="self" id="BDU:2025-13633" title="BDU:2025-13633" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="141.0.7390.122" release="1.el7" arch="x86_64" src="">
					<filename>chromium-0:141.0.7390.122-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251113-02</id>
		<issued date="2025-11-13" />
		<updated date="2025-11-13" />
		<title>Уязвимость webmin </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в webmin</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-webmin-cve-2025-61541/</description>
               <solution>
                    Запретить использование в ОС пакета webmin
                или
                    Установить обновление для пакета(ов) webmin
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-webmin-cve-2025-61541/" type="self" id="ROS-20251113-02" title="ROS-20251113-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61541" type="cve" id="CVE-2025-61541" title="CVE-2025-61541" />
			<reference href="https://bdu.fstec.ru/vul/2025-14429" type="self" id="BDU:2025-14429" title="BDU:2025-14429" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="webmin" epoch="0" version="2.520" release="2.el7" arch="noarch" src="">
					<filename>webmin-0:2.520-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251113-03</id>
		<issued date="2025-11-13" />
		<updated date="2025-11-13" />
		<title>Уязвимость minio-client </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в minio-client</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-minio-client-cve-2025-62506/</description>
               <solution>
                    Запретить использование в ОС пакета minio-client
                или
                    Установить обновление для пакета(ов) minio-client
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-minio-client-cve-2025-62506/" type="self" id="ROS-20251113-03" title="ROS-20251113-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62506" type="cve" id="CVE-2025-62506" title="CVE-2025-62506" />
			<reference href="https://bdu.fstec.ru/vul/2025-13411" type="self" id="BDU:2025-13411" title="BDU:2025-13411" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="minio-client" epoch="0" version="20250813T083541Z" release="1.el7" arch="x86_64" src="">
					<filename>minio-client-0:20250813T083541Z-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251113-04</id>
		<issued date="2025-11-13" />
		<updated date="2026-03-19" />
		<title>Уязвимость minio </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в minio</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-minio-cve-2025-62506/</description>
               <solution>
                    Запретить использование в ОС пакета minio
                или
                    Установить обновление для пакета(ов) minio
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-minio-cve-2025-62506/" type="self" id="ROS-20251113-04" title="ROS-20251113-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62506" type="cve" id="CVE-2025-62506" title="CVE-2025-62506" />
			<reference href="https://bdu.fstec.ru/vul/2025-13411" type="self" id="BDU:2025-13411" title="BDU:2025-13411" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="minio" epoch="0" version="20251015T172955Z" release="1.el7" arch="x86_64" src="">
					<filename>minio-0:20251015T172955Z-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251113-05</id>
		<issued date="2025-11-13" />
		<updated date="2025-11-13" />
		<title>Множественные уязвимости nvidia-drivers </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nvidia-drivers</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nvidia-drivers-cve-2025-23309-cve-2025-23280-cve-2025-23282/</description>
               <solution>
                    Запретить использование в ОС пакета nvidia-drivers
                или
                    Установить обновление для пакета(ов) nvidia-drivers
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nvidia-drivers-cve-2025-23309-cve-2025-23280-cve-2025-23282/" type="self" id="ROS-20251113-05" title="ROS-20251113-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23309" type="cve" id="CVE-2025-23309" title="CVE-2025-23309" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23280" type="cve" id="CVE-2025-23280" title="CVE-2025-23280" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23282" type="cve" id="CVE-2025-23282" title="CVE-2025-23282" />
			<reference href="https://bdu.fstec.ru/vul/2025-14390" type="self" id="BDU:2025-14390" title="BDU:2025-14390" />
			<reference href="https://bdu.fstec.ru/vul/2025-14389" type="self" id="BDU:2025-14389" title="BDU:2025-14389" />
			<reference href="https://bdu.fstec.ru/vul/2025-14388" type="self" id="BDU:2025-14388" title="BDU:2025-14388" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nvidia-drivers" epoch="3" version="580.95.05" release="1.el7" arch="x86_64" src="">
					<filename>nvidia-drivers-3:580.95.05-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251113-06</id>
		<issued date="2025-11-13" />
		<updated date="2025-11-13" />
		<title>Множественные уязвимости bind </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в bind</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-bind-cve-2025-40778-cve-2025-40780-cve-2025-8677/</description>
               <solution>
                    Запретить использование в ОС пакета bind
                или
                    Установить обновление для пакета(ов) bind
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-bind-cve-2025-40778-cve-2025-40780-cve-2025-8677/" type="self" id="ROS-20251113-06" title="ROS-20251113-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40780" type="cve" id="CVE-2025-40780" title="CVE-2025-40780" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40778" type="cve" id="CVE-2025-40778" title="CVE-2025-40778" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8677" type="cve" id="CVE-2025-8677" title="CVE-2025-8677" />
			<reference href="https://bdu.fstec.ru/vul/2025-14391" type="self" id="BDU:2025-14391" title="BDU:2025-14391" />
			<reference href="https://bdu.fstec.ru/vul/2025-13637" type="self" id="BDU:2025-13637" title="BDU:2025-13637" />
			<reference href="https://bdu.fstec.ru/vul/2025-14392" type="self" id="BDU:2025-14392" title="BDU:2025-14392" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="bind" epoch="32" version="9.18.41" release="1.el7" arch="x86_64" src="">
					<filename>bind-32:9.18.41-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251113-07</id>
		<issued date="2025-11-13" />
		<updated date="2025-11-13" />
		<title>Множественные уязвимости bind-dyndb-ldap </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в bind-dyndb-ldap</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-bind-dyndb-ldap-cve-2025-40778-cve-2025-40780-cve-2025-8677/</description>
               <solution>
                    Запретить использование в ОС пакета bind-dyndb-ldap
                или
                    Установить обновление для пакета(ов) bind-dyndb-ldap
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-bind-dyndb-ldap-cve-2025-40778-cve-2025-40780-cve-2025-8677/" type="self" id="ROS-20251113-07" title="ROS-20251113-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40780" type="cve" id="CVE-2025-40780" title="CVE-2025-40780" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40778" type="cve" id="CVE-2025-40778" title="CVE-2025-40778" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8677" type="cve" id="CVE-2025-8677" title="CVE-2025-8677" />
			<reference href="https://bdu.fstec.ru/vul/2025-14391" type="self" id="BDU:2025-14391" title="BDU:2025-14391" />
			<reference href="https://bdu.fstec.ru/vul/2025-13637" type="self" id="BDU:2025-13637" title="BDU:2025-13637" />
			<reference href="https://bdu.fstec.ru/vul/2025-14392" type="self" id="BDU:2025-14392" title="BDU:2025-14392" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="bind-dyndb-ldap" epoch="0" version="11.10" release="5.el7" arch="x86_64" src="">
					<filename>bind-dyndb-ldap-0:11.10-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251113-08</id>
		<issued date="2025-11-13" />
		<updated date="2025-11-13" />
		<title>Уязвимость docker-compose </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в docker-compose</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-docker-compose-cve-2025-62725/</description>
               <solution>
                    Запретить использование в ОС пакета docker-compose
                или
                    Установить обновление для пакета(ов) docker-compose
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-docker-compose-cve-2025-62725/" type="self" id="ROS-20251113-08" title="ROS-20251113-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62725" type="cve" id="CVE-2025-62725" title="CVE-2025-62725" />
			<reference href="https://bdu.fstec.ru/vul/2025-14002" type="self" id="BDU:2025-14002" title="BDU:2025-14002" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="docker-compose" epoch="0" version="2.40.2" release="1.el7" arch="x86_64" src="">
					<filename>docker-compose-0:2.40.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251113-09</id>
		<issued date="2025-11-13" />
		<updated date="2025-11-13" />
		<title>Множественные уязвимости binutils </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в binutils</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-binutils-cve-2025-11412-cve-2025-11414/</description>
               <solution>
                    Запретить использование в ОС пакета binutils
                или
                    Установить обновление для пакета(ов) binutils
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-binutils-cve-2025-11412-cve-2025-11414/" type="self" id="ROS-20251113-09" title="ROS-20251113-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11414" type="cve" id="CVE-2025-11414" title="CVE-2025-11414" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11412" type="cve" id="CVE-2025-11412" title="CVE-2025-11412" />
			<reference href="https://bdu.fstec.ru/vul/2025-14399" type="self" id="BDU:2025-14399" title="BDU:2025-14399" />
			<reference href="https://bdu.fstec.ru/vul/2025-14400" type="self" id="BDU:2025-14400" title="BDU:2025-14400" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="binutils" epoch="0" version="2.40" release="15.el7" arch="x86_64" src="">
					<filename>binutils-0:2.40-15.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251117-01</id>
		<issued date="2025-11-17" />
		<updated date="2025-11-17" />
		<title>Множественные уязвимости nvidia-drivers </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nvidia-drivers</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nvidia-drivers-cve-2025-23300-cve-2025-23330-cve-2025-23345-cve-2025-2333/</description>
               <solution>
                    Запретить использование в ОС пакета nvidia-drivers
                или
                    Установить обновление для пакета(ов) nvidia-drivers
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-nvidia-drivers-cve-2025-23300-cve-2025-23330-cve-2025-23345-cve-2025-2333/" type="self" id="ROS-20251117-01" title="ROS-20251117-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23345" type="cve" id="CVE-2025-23345" title="CVE-2025-23345" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23332" type="cve" id="CVE-2025-23332" title="CVE-2025-23332" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23330" type="cve" id="CVE-2025-23330" title="CVE-2025-23330" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23300" type="cve" id="CVE-2025-23300" title="CVE-2025-23300" />
			<reference href="https://bdu.fstec.ru/vul/2025-14746" type="self" id="BDU:2025-14746" title="BDU:2025-14746" />
			<reference href="https://bdu.fstec.ru/vul/2025-13806" type="self" id="BDU:2025-13806" title="BDU:2025-13806" />
			<reference href="https://bdu.fstec.ru/vul/2025-14742" type="self" id="BDU:2025-14742" title="BDU:2025-14742" />
			<reference href="https://bdu.fstec.ru/vul/2025-14737" type="self" id="BDU:2025-14737" title="BDU:2025-14737" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nvidia-drivers" epoch="3" version="580.95.05" release="1.el7" arch="x86_64" src="">
					<filename>nvidia-drivers-3:580.95.05-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251117-02</id>
		<issued date="2025-11-17" />
		<updated date="2025-11-17" />
		<title>Уязвимость phpldapadmin </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в phpldapadmin</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-phpldapadmin-cve-2024-9102/</description>
               <solution>
                    Запретить использование в ОС пакета phpldapadmin
                или
                    Установить обновление для пакета(ов) phpldapadmin
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-phpldapadmin-cve-2024-9102/" type="self" id="ROS-20251117-02" title="ROS-20251117-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9102" type="cve" id="CVE-2024-9102" title="CVE-2024-9102" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="phpldapadmin" epoch="0" version="2.3.4" release="1.el7" arch="noarch" src="">
					<filename>phpldapadmin-0:2.3.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251117-03</id>
		<issued date="2025-11-17" />
		<updated date="2025-11-17" />
		<title>Уязвимость firebird </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в firebird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firebird-cve-2025-54989/</description>
               <solution>
                    Запретить использование в ОС пакета firebird
                или
                    Установить обновление для пакета(ов) firebird
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firebird-cve-2025-54989/" type="self" id="ROS-20251117-03" title="ROS-20251117-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54989" type="cve" id="CVE-2025-54989" title="CVE-2025-54989" />
			<reference href="https://bdu.fstec.ru/vul/2025-11068" type="self" id="BDU:2025-11068" title="BDU:2025-11068" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firebird" epoch="0" version="3.0.13.33818" release="1.el7" arch="x86_64" src="">
					<filename>firebird-0:3.0.13.33818-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251117-04</id>
		<issued date="2025-11-17" />
		<updated date="2025-11-17" />
		<title>Множественные уязвимости lxd</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в lxd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-lxd-17112025/</description>
               <solution>
                    Запретить использование в ОС пакета lxd
                или
                    Установить обновление для пакета(ов) lxd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-lxd-17112025/" type="self" id="ROS-20251117-04" title="ROS-20251117-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54286" type="cve" id="CVE-2025-54286" title="CVE-2025-54286" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54287" type="cve" id="CVE-2025-54287" title="CVE-2025-54287" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54288" type="cve" id="CVE-2025-54288" title="CVE-2025-54288" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54289" type="cve" id="CVE-2025-54289" title="CVE-2025-54289" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54290" type="cve" id="CVE-2025-54290" title="CVE-2025-54290" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54291" type="cve" id="CVE-2025-54291" title="CVE-2025-54291" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54292" type="cve" id="CVE-2025-54292" title="CVE-2025-54292" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54293" type="cve" id="CVE-2025-54293" title="CVE-2025-54293" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6156" type="cve" id="CVE-2024-6156" title="CVE-2024-6156" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="lxd" epoch="0" version="5.21.4" release="1.el7" arch="x86_64" src="">
					<filename>lxd-0:5.21.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251117-05</id>
		<issued date="2025-11-17" />
		<updated date="2025-11-17" />
		<title>Множественные уязвимости dqlite</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dqlite</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-dqlite-17112025/</description>
               <solution>
                    Запретить использование в ОС пакета dqlite
                или
                    Установить обновление для пакета(ов) dqlite
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-dqlite-17112025/" type="self" id="ROS-20251117-05" title="ROS-20251117-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54286" type="cve" id="CVE-2025-54286" title="CVE-2025-54286" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54287" type="cve" id="CVE-2025-54287" title="CVE-2025-54287" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54288" type="cve" id="CVE-2025-54288" title="CVE-2025-54288" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54289" type="cve" id="CVE-2025-54289" title="CVE-2025-54289" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54290" type="cve" id="CVE-2025-54290" title="CVE-2025-54290" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54291" type="cve" id="CVE-2025-54291" title="CVE-2025-54291" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54292" type="cve" id="CVE-2025-54292" title="CVE-2025-54292" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54293" type="cve" id="CVE-2025-54293" title="CVE-2025-54293" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6156" type="cve" id="CVE-2024-6156" title="CVE-2024-6156" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dqlite" epoch="0" version="1.18.2" release="1.el7" arch="x86_64" src="">
					<filename>dqlite-0:1.18.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251117-06</id>
		<issued date="2025-11-17" />
		<updated date="2025-11-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37947/</description>
               <solution>
                    Установить обновление для пакета(ов) kernel-lt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37947/" type="self" id="ROS-20251117-06" title="ROS-20251117-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37947" type="cve" id="CVE-2025-37947" title="CVE-2025-37947" />
			<reference href="https://bdu.fstec.ru/vul/2025-11865" type="self" id="BDU:2025-11865" title="BDU:2025-11865" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251117-07</id>
		<issued date="2025-11-17" />
		<updated date="2025-11-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58239/</description>
               <solution>
                    Установить обновление для пакета(ов) kernel-lt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58239/" type="self" id="ROS-20251117-07" title="ROS-20251117-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58239" type="cve" id="CVE-2024-58239" title="CVE-2024-58239" />
			<reference href="https://bdu.fstec.ru/vul/2025-12996" type="self" id="BDU:2025-12996" title="BDU:2025-12996" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251117-08</id>
		<issued date="2025-11-17" />
		<updated date="2025-11-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50286/</description>
               <solution>
                    Запретить использование в ОС пакета kernel-lt
                или
                    Установить обновление для пакета(ов) kernel-lt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50286/" type="self" id="ROS-20251117-08" title="ROS-20251117-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50286" type="cve" id="CVE-2024-50286" title="CVE-2024-50286" />
			<reference href="https://bdu.fstec.ru/vul/2025-00148" type="self" id="BDU:2025-00148" title="BDU:2025-00148" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251124-01</id>
		<issued date="2025-11-24" />
		<updated date="2025-11-24" />
		<title>Уязвимость dotnet </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в dotnet</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet-cve-2025-24070/</description>
               <solution>
                    Запретить использование в ОС пакета dotnet
                или
                    Установить обновление для пакета(ов) dotnet
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet-cve-2025-24070/" type="self" id="ROS-20251124-01" title="ROS-20251124-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24070" type="cve" id="CVE-2025-24070" title="CVE-2025-24070" />
			<reference href="https://bdu.fstec.ru/vul/2025-04300" type="self" id="BDU:2025-04300" title="BDU:2025-04300" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="dotnet" epoch="0" version="8.0.115" release="1.el7" arch="x86_64" src="">
					<filename>dotnet-0:8.0.115-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251124-02</id>
		<issued date="2025-11-24" />
		<updated date="2025-11-24" />
		<title>Уязвимость frr </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в frr</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-frr-cve-2024-27913/</description>
               <solution>
                    Запретить использование в ОС пакета frr
                или
                    Установить обновление для пакета(ов) frr
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-frr-cve-2024-27913/" type="self" id="ROS-20251124-02" title="ROS-20251124-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27913" type="cve" id="CVE-2024-27913" title="CVE-2024-27913" />
			<reference href="https://bdu.fstec.ru/vul/2025-15605" type="self" id="BDU:2025-15605" title="BDU:2025-15605" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="frr" epoch="0" version="10.1.2" release="3.el7" arch="x86_64" src="">
					<filename>frr-0:10.1.2-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251124-03</id>
		<issued date="2025-11-24" />
		<updated date="2025-11-24" />
		<title>Уязвимость php </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в php</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-cve-2022-31628/</description>
               <solution>
                    Запретить использование в ОС пакета php
                или
                    Установить обновление для пакета(ов) php
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-cve-2022-31628/" type="self" id="ROS-20251124-03" title="ROS-20251124-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31628" type="cve" id="CVE-2022-31628" title="CVE-2022-31628" />
			<reference href="https://bdu.fstec.ru/vul/2024-07319" type="self" id="BDU:2024-07319" title="BDU:2024-07319" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php" epoch="0" version="7.4.33" release="1.el7" arch="x86_64" src="">
					<filename>php-0:7.4.33-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251124-04</id>
		<issued date="2025-11-24" />
		<updated date="2025-11-24" />
		<title>Уязвимость golang-github-ulikunitz-xz </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang-github-ulikunitz-xz</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-github-ulikunitz-xz-cve-2025-58058/</description>
               <solution>
                    Запретить использование в ОС пакета golang-github-ulikunitz-xz
                или
                    Установить обновление для пакета(ов) golang-github-ulikunitz-xz
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-github-ulikunitz-xz-cve-2025-58058/" type="self" id="ROS-20251124-04" title="ROS-20251124-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58058" type="cve" id="CVE-2025-58058" title="CVE-2025-58058" />
			<reference href="https://bdu.fstec.ru/vul/2025-12797" type="self" id="BDU:2025-12797" title="BDU:2025-12797" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang-github-ulikunitz-xz" epoch="0" version="0.5.15" release="1.el7" arch="x86_64" src="">
					<filename>golang-github-ulikunitz-xz-0:0.5.15-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251124-05</id>
		<issued date="2025-11-24" />
		<updated date="2025-11-24" />
		<title>Уязвимость redis </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в redis7</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-redis-cve-2025-49844/</description>
               <solution>
                    Запретить использование в ОС пакета redis7
                или
                    Установить обновление для пакета(ов) redis7
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-redis-cve-2025-49844/" type="self" id="ROS-20251124-05" title="ROS-20251124-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49844" type="cve" id="CVE-2025-49844" title="CVE-2025-49844" />
			<reference href="https://bdu.fstec.ru/vul/2025-12553" type="self" id="BDU:2025-12553" title="BDU:2025-12553" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="redis7" epoch="0" version="7.4.6" release="1.el7" arch="x86_64" src="">
					<filename>redis7-0:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251124-06</id>
		<issued date="2025-11-24" />
		<updated date="2025-11-24" />
		<title>Уязвимость assimp </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в assimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-assimp-cve-2025-11277/</description>
               <solution>
                    Запретить использование в ОС пакета assimp
                или
                    Установить обновление для пакета(ов) assimp
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-assimp-cve-2025-11277/" type="self" id="ROS-20251124-06" title="ROS-20251124-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3016" type="cve" id="CVE-2025-3016" title="CVE-2025-3016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11277" type="cve" id="CVE-2025-11277" title="CVE-2025-11277" />
			<reference href="https://bdu.fstec.ru/vul/2025-15598" type="self" id="BDU:2025-15598" title="BDU:2025-15598" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="assimp" epoch="0" version="5.4.3" release="5.el7" arch="x86_64" src="">
					<filename>assimp-0:5.4.3-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251124-07</id>
		<issued date="2025-11-24" />
		<updated date="2025-11-24" />
		<title>Множественные уязвимости samba </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в samba</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-samba-cve-2025-9640-cve-2025-10230/</description>
               <solution>
                    Запретить использование в ОС пакета samba
                или
                    Установить обновление для пакета(ов) samba
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-samba-cve-2025-9640-cve-2025-10230/" type="self" id="ROS-20251124-07" title="ROS-20251124-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9640" type="cve" id="CVE-2025-9640" title="CVE-2025-9640" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10230" type="cve" id="CVE-2025-10230" title="CVE-2025-10230" />
			<reference href="https://bdu.fstec.ru/vul/2025-15225" type="self" id="BDU:2025-15225" title="BDU:2025-15225" />
			<reference href="https://bdu.fstec.ru/vul/2025-13037" type="self" id="BDU:2025-13037" title="BDU:2025-13037" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="samba" epoch="0" version="4.19.9" release="3m.el7" arch="x86_64" src="">
					<filename>samba-0:4.19.9-3m.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251124-08</id>
		<issued date="2025-11-24" />
		<updated date="2025-11-24" />
		<title>Множественные уязвимости xen </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в xen</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-xen-cve-2025-58148-cve-2025-58147/</description>
               <solution>
                    Запретить использование в ОС пакета xen
                или
                    Установить обновление для пакета(ов) xen
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-xen-cve-2025-58148-cve-2025-58147/" type="self" id="ROS-20251124-08" title="ROS-20251124-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58147" type="cve" id="CVE-2025-58147" title="CVE-2025-58147" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58148" type="cve" id="CVE-2025-58148" title="CVE-2025-58148" />
			<reference href="https://bdu.fstec.ru/vul/2025-15608" type="self" id="BDU:2025-15608" title="BDU:2025-15608" />
			<reference href="https://bdu.fstec.ru/vul/2025-15609" type="self" id="BDU:2025-15609" title="BDU:2025-15609" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="xen" epoch="0" version="4.19.3" release="2.el7" arch="x86_64" src="">
					<filename>xen-0:4.19.3-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251124-09</id>
		<issued date="2025-11-24" />
		<updated date="2025-11-24" />
		<title>Уязвимость python3-aiomysql </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в python3-aiomysql</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-aiomysql-cve-2025-62611/</description>
               <solution>
                    Запретить использование в ОС пакета python3-aiomysql
                или
                    Установить обновление для пакета(ов) python3-aiomysql
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-aiomysql-cve-2025-62611/" type="self" id="ROS-20251124-09" title="ROS-20251124-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62611" type="cve" id="CVE-2025-62611" title="CVE-2025-62611" />
			<reference href="https://bdu.fstec.ru/vul/2025-15607" type="self" id="BDU:2025-15607" title="BDU:2025-15607" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-aiomysql" epoch="0" version="0.2.0" release="3.el7" arch="noarch" src="">
					<filename>python3-aiomysql-0:0.2.0-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251124-10</id>
		<issued date="2025-11-24" />
		<updated date="2025-11-24" />
		<title>Уязвимость kea </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kea</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kea-cve-2025-11232/</description>
               <solution>
                    Запретить использование в ОС пакета kea
                или
                    Установить обновление для пакета(ов) kea
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kea-cve-2025-11232/" type="self" id="ROS-20251124-10" title="ROS-20251124-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11232" type="cve" id="CVE-2025-11232" title="CVE-2025-11232" />
			<reference href="https://bdu.fstec.ru/vul/2025-15604" type="self" id="BDU:2025-15604" title="BDU:2025-15604" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kea" epoch="0" version="3.0.2" release="1.el7" arch="x86_64" src="">
					<filename>kea-0:3.0.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251124-11</id>
		<issued date="2025-11-24" />
		<updated date="2025-11-24" />
		<title>Множественные уязвимости java-21-openjdk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-21-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-21-openjdk-cve-2025-53057-cve-2025-53066-cve-2025-61748/</description>
               <solution>
                    Запретить использование в ОС пакета java-21-openjdk
                или
                    Установить обновление для пакета(ов) java-21-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-21-openjdk-cve-2025-53057-cve-2025-53066-cve-2025-61748/" type="self" id="ROS-20251124-11" title="ROS-20251124-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53057" type="cve" id="CVE-2025-53057" title="CVE-2025-53057" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53066" type="cve" id="CVE-2025-53066" title="CVE-2025-53066" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61748" type="cve" id="CVE-2025-61748" title="CVE-2025-61748" />
			<reference href="https://bdu.fstec.ru/vul/2025-14035" type="self" id="BDU:2025-14035" title="BDU:2025-14035" />
			<reference href="https://bdu.fstec.ru/vul/2025-13795" type="self" id="BDU:2025-13795" title="BDU:2025-13795" />
			<reference href="https://bdu.fstec.ru/vul/2025-14036" type="self" id="BDU:2025-14036" title="BDU:2025-14036" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-21-openjdk" epoch="1" version="21.0.9.0.10" release="1.el7" arch="x86_64" src="">
					<filename>java-21-openjdk-1:21.0.9.0.10-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251124-12</id>
		<issued date="2025-11-24" />
		<updated date="2025-11-24" />
		<title>Множественные уязвимости java-17-openjdk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-17-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-17-openjdk-cve-2025-53057-cve-2025-53066/</description>
               <solution>
                    Запретить использование в ОС пакета java-17-openjdk
                или
                    Установить обновление для пакета(ов) java-17-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-17-openjdk-cve-2025-53057-cve-2025-53066/" type="self" id="ROS-20251124-12" title="ROS-20251124-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53057" type="cve" id="CVE-2025-53057" title="CVE-2025-53057" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53066" type="cve" id="CVE-2025-53066" title="CVE-2025-53066" />
			<reference href="https://bdu.fstec.ru/vul/2025-14035" type="self" id="BDU:2025-14035" title="BDU:2025-14035" />
			<reference href="https://bdu.fstec.ru/vul/2025-13795" type="self" id="BDU:2025-13795" title="BDU:2025-13795" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-17-openjdk" epoch="1" version="17.0.17.0.10" release="1.el7" arch="x86_64" src="">
					<filename>java-17-openjdk-1:17.0.17.0.10-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251124-13</id>
		<issued date="2025-11-24" />
		<updated date="2025-11-24" />
		<title>Множественные уязвимости java-11-openjdk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-11-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-11-openjdk-cve-2025-53057-cve-2025-53066/</description>
               <solution>
                    Запретить использование в ОС пакета java-11-openjdk
                или
                    Установить обновление для пакета(ов) java-11-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-11-openjdk-cve-2025-53057-cve-2025-53066/" type="self" id="ROS-20251124-13" title="ROS-20251124-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53057" type="cve" id="CVE-2025-53057" title="CVE-2025-53057" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53066" type="cve" id="CVE-2025-53066" title="CVE-2025-53066" />
			<reference href="https://bdu.fstec.ru/vul/2025-14035" type="self" id="BDU:2025-14035" title="BDU:2025-14035" />
			<reference href="https://bdu.fstec.ru/vul/2025-13795" type="self" id="BDU:2025-13795" title="BDU:2025-13795" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-11-openjdk" epoch="1" version="11.0.29.0.7" release="1.el7" arch="x86_64" src="">
					<filename>java-11-openjdk-1:11.0.29.0.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251124-14</id>
		<issued date="2025-11-24" />
		<updated date="2025-11-24" />
		<title>Множественные уязвимости java-1.8.0-openjdk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-1.8.0-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-1-8-0-openjdk-cve-2025-53057-cve-2025-53066/</description>
               <solution>
                    Запретить использование в ОС пакета java-1.8.0-openjdk
                или
                    Установить обновление для пакета(ов) java-1.8.0-openjdk
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-java-1-8-0-openjdk-cve-2025-53057-cve-2025-53066/" type="self" id="ROS-20251124-14" title="ROS-20251124-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53057" type="cve" id="CVE-2025-53057" title="CVE-2025-53057" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53066" type="cve" id="CVE-2025-53066" title="CVE-2025-53066" />
			<reference href="https://bdu.fstec.ru/vul/2025-14035" type="self" id="BDU:2025-14035" title="BDU:2025-14035" />
			<reference href="https://bdu.fstec.ru/vul/2025-13795" type="self" id="BDU:2025-13795" title="BDU:2025-13795" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-1.8.0-openjdk" epoch="1" version="1.8.0.472.b08" release="1.el7" arch="x86_64" src="">
					<filename>java-1.8.0-openjdk-1:1.8.0.472.b08-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251125-01</id>
		<issued date="2025-11-25" />
		<updated date="2025-11-25" />
		<title>Уязвимость qt6-qtconnectivity </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в qt6-qtconnectivity</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qt6-qtconnectivity-cve-2025-23050/</description>
               <solution>
                    Запретить использование в ОС пакета qt6-qtconnectivity
                или
                    Установить обновление для пакета(ов) qt6-qtconnectivity
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qt6-qtconnectivity-cve-2025-23050/" type="self" id="ROS-20251125-01" title="ROS-20251125-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23050" type="cve" id="CVE-2025-23050" title="CVE-2025-23050" />
			<reference href="https://bdu.fstec.ru/vul/2025-15602" type="self" id="BDU:2025-15602" title="BDU:2025-15602" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="qt6-qtconnectivity" epoch="0" version="6.6.3" release="2.el7" arch="x86_64" src="">
					<filename>qt6-qtconnectivity-0:6.6.3-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251125-02</id>
		<issued date="2025-11-25" />
		<updated date="2025-11-25" />
		<title>Уязвимость apache-mina </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в apache-mina</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-mina-cve-2021-41973/</description>
               <solution>
                    Запретить использование в ОС пакета apache-mina
                или
                    Установить обновление для пакета(ов) apache-mina
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-mina-cve-2021-41973/" type="self" id="ROS-20251125-02" title="ROS-20251125-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31122" type="cve" id="CVE-2023-31122" title="CVE-2023-31122" />
			<reference href="https://bdu.fstec.ru/vul/2023-07124" type="self" id="BDU:2023-07124" title="BDU:2023-07124" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="apache-mina" epoch="0" version="2.0.27" release="2.el7" arch="noarch" src="">
					<filename>apache-mina-0:2.0.27-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251125-03</id>
		<issued date="2025-11-25" />
		<updated date="2025-11-25" />
		<title>Уязвимость python3-gunicorn </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-gunicorn</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-gunicorn-cve-2024-6827/</description>
               <solution>
                    Запретить использование в ОС пакета python3-gunicorn
                или
                    Установить обновление для пакета(ов) python3-gunicorn
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-gunicorn-cve-2024-6827/" type="self" id="ROS-20251125-03" title="ROS-20251125-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6827" type="cve" id="CVE-2024-6827" title="CVE-2024-6827" />
			<reference href="https://bdu.fstec.ru/vul/2024-06308" type="self" id="BDU:2024-06308" title="BDU:2024-06308" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-gunicorn" epoch="0" version="22.0.0" release="1.el7" arch="noarch" src="">
					<filename>python3-gunicorn-0:22.0.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251125-04</id>
		<issued date="2025-11-25" />
		<updated date="2025-11-25" />
		<title>Уязвимость openbao </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в openbao</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openbao-cve-2025-62513/</description>
               <solution>
                    Запретить использование в ОС пакета openbao
                или
                    Установить обновление для пакета(ов) openbao
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openbao-cve-2025-62513/" type="self" id="ROS-20251125-04" title="ROS-20251125-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62513" type="cve" id="CVE-2025-62513" title="CVE-2025-62513" />
			<reference href="https://bdu.fstec.ru/vul/2025-15603" type="self" id="BDU:2025-15603" title="BDU:2025-15603" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openbao" epoch="0" version="2.4.3" release="1.el7" arch="x86_64" src="">
					<filename>openbao-0:2.4.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251125-05</id>
		<issued date="2025-11-25" />
		<updated date="2025-11-25" />
		<title>Уязвимость vault </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в vault</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vault-cve-2025-11621/</description>
               <solution>
                    Запретить использование в ОС пакета vault
                или
                    Установить обновление для пакета(ов) vault
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vault-cve-2025-11621/" type="self" id="ROS-20251125-05" title="ROS-20251125-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11621" type="cve" id="CVE-2025-11621" title="CVE-2025-11621" />
			<reference href="https://bdu.fstec.ru/vul/2025-15600" type="self" id="BDU:2025-15600" title="BDU:2025-15600" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vault" epoch="0" version="1.21.0" release="1.el7" arch="x86_64" src="">
					<filename>vault-0:1.21.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251125-06</id>
		<issued date="2025-11-25" />
		<updated date="2025-11-25" />
		<title>Множественные уязвимости moodle </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-moodle-cve-2025-62400-cve-2025-62401/</description>
               <solution>
                    Запретить использование в ОС пакета moodle
                или
                    Установить обновление для пакета(ов) moodle
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-moodle-cve-2025-62400-cve-2025-62401/" type="self" id="ROS-20251125-06" title="ROS-20251125-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62400" type="cve" id="CVE-2025-62400" title="CVE-2025-62400" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62401" type="cve" id="CVE-2025-62401" title="CVE-2025-62401" />
			<reference href="https://bdu.fstec.ru/vul/2025-15612" type="self" id="BDU:2025-15612" title="BDU:2025-15612" />
			<reference href="https://bdu.fstec.ru/vul/2025-15611" type="self" id="BDU:2025-15611" title="BDU:2025-15611" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="moodle" epoch="0" version="4.5.7" release="1.el7" arch="noarch" src="">
					<filename>moodle-0:4.5.7-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251125-07</id>
		<issued date="2025-11-25" />
		<updated date="2025-11-25" />
		<title>Множественные уязвимости tomcat </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-tomcat-cve-2025-55752-cve-2025-55754-cve-2025-61795/</description>
               <solution>
                    Запретить использование в ОС пакета tomcat
                или
                    Установить обновление для пакета(ов) tomcat
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-tomcat-cve-2025-55752-cve-2025-55754-cve-2025-61795/" type="self" id="ROS-20251125-07" title="ROS-20251125-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61795" type="cve" id="CVE-2025-61795" title="CVE-2025-61795" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55752" type="cve" id="CVE-2025-55752" title="CVE-2025-55752" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55754" type="cve" id="CVE-2025-55754" title="CVE-2025-55754" />
			<reference href="https://bdu.fstec.ru/vul/2025-13926" type="self" id="BDU:2025-13926" title="BDU:2025-13926" />
			<reference href="https://bdu.fstec.ru/vul/2025-13742" type="self" id="BDU:2025-13742" title="BDU:2025-13742" />
			<reference href="https://bdu.fstec.ru/vul/2025-13927" type="self" id="BDU:2025-13927" title="BDU:2025-13927" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat" epoch="1" version="9.0.112" release="1.el7" arch="noarch" src="">
					<filename>tomcat-1:9.0.112-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251125-09</id>
		<issued date="2025-11-25" />
		<updated date="2025-11-25" />
		<title>Множественные уязвимости tomcat11 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-tomcat11-cve-2025-55752-cve-2025-55754-cve-2025-61795/</description>
               <solution>
                    Запретить использование в ОС пакета tomcat11
                или
                    Установить обновление для пакета(ов) tomcat11
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-tomcat11-cve-2025-55752-cve-2025-55754-cve-2025-61795/" type="self" id="ROS-20251125-09" title="ROS-20251125-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61795" type="cve" id="CVE-2025-61795" title="CVE-2025-61795" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55752" type="cve" id="CVE-2025-55752" title="CVE-2025-55752" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55754" type="cve" id="CVE-2025-55754" title="CVE-2025-55754" />
			<reference href="https://bdu.fstec.ru/vul/2025-13926" type="self" id="BDU:2025-13926" title="BDU:2025-13926" />
			<reference href="https://bdu.fstec.ru/vul/2025-13742" type="self" id="BDU:2025-13742" title="BDU:2025-13742" />
			<reference href="https://bdu.fstec.ru/vul/2025-13927" type="self" id="BDU:2025-13927" title="BDU:2025-13927" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat11" epoch="1" version="11.0.14" release="1.el7" arch="noarch" src="">
					<filename>tomcat11-1:11.0.14-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251125-08</id>
		<issued date="2025-11-25" />
		<updated date="2025-11-25" />
		<title>Множественные уязвимости tomcat10 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat10</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-tomcat10-cve-2025-55752-cve-2025-55754-cve-2025-61795/</description>
               <solution>
                    Запретить использование в ОС пакета tomcat10
                или
                    Установить обновление для пакета(ов) tomcat10
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-tomcat10-cve-2025-55752-cve-2025-55754-cve-2025-61795/" type="self" id="ROS-20251125-08" title="ROS-20251125-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61795" type="cve" id="CVE-2025-61795" title="CVE-2025-61795" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55752" type="cve" id="CVE-2025-55752" title="CVE-2025-55752" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55754" type="cve" id="CVE-2025-55754" title="CVE-2025-55754" />
			<reference href="https://bdu.fstec.ru/vul/2025-13926" type="self" id="BDU:2025-13926" title="BDU:2025-13926" />
			<reference href="https://bdu.fstec.ru/vul/2025-13742" type="self" id="BDU:2025-13742" title="BDU:2025-13742" />
			<reference href="https://bdu.fstec.ru/vul/2025-13927" type="self" id="BDU:2025-13927" title="BDU:2025-13927" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat10" epoch="1" version="10.1.49" release="1.el7" arch="noarch" src="">
					<filename>tomcat10-1:10.1.49-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251125-10</id>
		<issued date="2025-11-25" />
		<updated date="2025-11-25" />
		<title>Уязвимость brotli </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в brotli</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-brotli-cve-2020-8927/</description>
               <solution>
                    Запретить использование в ОС пакета brotli
                или
                    Установить обновление для пакета(ов) brotli
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-brotli-cve-2020-8927/" type="self" id="ROS-20251125-10" title="ROS-20251125-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8927" type="cve" id="CVE-2020-8927" title="CVE-2020-8927" />
			<reference href="https://bdu.fstec.ru/vul/2021-01775" type="self" id="BDU:2021-01775" title="BDU:2021-01775" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="brotli" epoch="0" version="1.0.8" release="1.el7" arch="x86_64" src="">
					<filename>brotli-0:1.0.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251125-11</id>
		<issued date="2025-11-25" />
		<updated date="2025-11-25" />
		<title>Уязвимость redis </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в redis</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-redis-cve-2025-62507/</description>
               <solution>
                    Запретить использование в ОС пакета redis
                или
                    Установить обновление для пакета(ов) redis
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-redis-cve-2025-62507/" type="self" id="ROS-20251125-11" title="ROS-20251125-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62507" type="cve" id="CVE-2025-62507" title="CVE-2025-62507" />
			<reference href="https://bdu.fstec.ru/vul/2025-15613" type="self" id="BDU:2025-15613" title="BDU:2025-15613" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="redis" epoch="0" version="8.2.3" release="1.el7" arch="x86_64" src="">
					<filename>redis-0:8.2.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251125-12</id>
		<issued date="2025-11-25" />
		<updated date="2025-11-25" />
		<title>Уязвимость python3-django </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в python3-django</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-django-cve-2025-64459/</description>
               <solution>
                    Запретить использование в ОС пакета python3-django
                или
                    Установить обновление для пакета(ов) python3-django
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-django-cve-2025-64459/" type="self" id="ROS-20251125-12" title="ROS-20251125-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64459" type="cve" id="CVE-2025-64459" title="CVE-2025-64459" />
			<reference href="https://bdu.fstec.ru/vul/2025-13913" type="self" id="BDU:2025-13913" title="BDU:2025-13913" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-django" epoch="0" version="4.2.26" release="1.el7" arch="noarch" src="">
					<filename>python3-django-0:4.2.26-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251125-13</id>
		<issued date="2025-11-25" />
		<updated date="2025-11-25" />
		<title>Уязвимость runc </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в runc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-runc-cve-2025-31133/</description>
               <solution>
                    Запретить использование в ОС пакета runc
                или
                    Установить обновление для пакета(ов) runc
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-runc-cve-2025-31133/" type="self" id="ROS-20251125-13" title="ROS-20251125-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31133" type="cve" id="CVE-2025-31133" title="CVE-2025-31133" />
			<reference href="https://bdu.fstec.ru/vul/2025-14041" type="self" id="BDU:2025-14041" title="BDU:2025-14041" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="runc" epoch="2" version="1.2.8" release="1.el7" arch="x86_64" src="">
					<filename>runc-2:1.2.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251128-01</id>
		<issued date="2025-11-28" />
		<updated date="2025-11-28" />
		<title>Уязвимость libssh </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в libssh</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libssh-cve-2025-8277/</description>
               <solution>
                    Запретить использование в ОС пакета libssh
                или
                    Установить обновление для пакета(ов) libssh
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libssh-cve-2025-8277/" type="self" id="ROS-20251128-01" title="ROS-20251128-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8277" type="cve" id="CVE-2025-8277" title="CVE-2025-8277" />
			<reference href="https://bdu.fstec.ru/vul/2025-13879" type="self" id="BDU:2025-13879" title="BDU:2025-13879" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libssh" epoch="0" version="0.11.3" release="1.el7" arch="x86_64" src="">
					<filename>libssh-0:0.11.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251128-02</id>
		<issued date="2025-11-28" />
		<updated date="2025-11-28" />
		<title>Уязвимость openbao </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в openbao</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openbao-cve-2025-62705/</description>
               <solution>
                    Запретить использование в ОС пакета openbao
                или
                    Установить обновление для пакета(ов) openbao
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openbao-cve-2025-62705/" type="self" id="ROS-20251128-02" title="ROS-20251128-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62705" type="cve" id="CVE-2025-62705" title="CVE-2025-62705" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openbao" epoch="0" version="2.4.3" release="1.el7" arch="x86_64" src="">
					<filename>openbao-0:2.4.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251128-03</id>
		<issued date="2025-11-28" />
		<updated date="2025-11-28" />
		<title>Множественные уязвимости vault </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в vault</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vault-cve-2025-11621-cve-2025-12044/</description>
               <solution>
                    Запретить использование в ОС пакета vault
                или
                    Установить обновление для пакета(ов) vault
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-vault-cve-2025-11621-cve-2025-12044/" type="self" id="ROS-20251128-03" title="ROS-20251128-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11621" type="cve" id="CVE-2025-11621" title="CVE-2025-11621" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12044" type="cve" id="CVE-2025-12044" title="CVE-2025-12044" />
			<reference href="https://bdu.fstec.ru/vul/2025-15600" type="self" id="BDU:2025-15600" title="BDU:2025-15600" />
			<reference href="https://bdu.fstec.ru/vul/2025-13410" type="self" id="BDU:2025-13410" title="BDU:2025-13410" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vault" epoch="0" version="1.21.0" release="1.el7" arch="x86_64" src="">
					<filename>vault-0:1.21.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251128-04</id>
		<issued date="2025-11-28" />
		<updated date="2025-11-28" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-28112025/</description>
               <solution>
                    Установить обновление для пакета(ов) kernel-lt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-28112025/" type="self" id="ROS-20251128-04" title="ROS-20251128-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52582" type="cve" id="CVE-2023-52582" title="CVE-2023-52582" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35999" type="cve" id="CVE-2024-35999" title="CVE-2024-35999" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35998" type="cve" id="CVE-2024-35998" title="CVE-2024-35998" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36000" type="cve" id="CVE-2024-36000" title="CVE-2024-36000" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35971" type="cve" id="CVE-2024-35971" title="CVE-2024-35971" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27389" type="cve" id="CVE-2024-27389" title="CVE-2024-27389" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35965" type="cve" id="CVE-2024-35965" title="CVE-2024-35965" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35865" type="cve" id="CVE-2024-35865" title="CVE-2024-35865" />
			<reference href="https://bdu.fstec.ru/vul/2024-01804" type="self" id="BDU:2024-01804" title="BDU:2024-01804" />
			<reference href="https://bdu.fstec.ru/vul/2025-03062" type="self" id="BDU:2025-03062" title="BDU:2025-03062" />
			<reference href="https://bdu.fstec.ru/vul/2025-03065" type="self" id="BDU:2025-03065" title="BDU:2025-03065" />
			<reference href="https://bdu.fstec.ru/vul/2025-08077" type="self" id="BDU:2025-08077" title="BDU:2025-08077" />
			<reference href="https://bdu.fstec.ru/vul/2026-04273" type="self" id="BDU:2026-04273" title="BDU:2026-04273" />
			<reference href="https://bdu.fstec.ru/vul/2026-04308" type="self" id="BDU:2026-04308" title="BDU:2026-04308" />
			<reference href="https://bdu.fstec.ru/vul/2025-08082" type="self" id="BDU:2025-08082" title="BDU:2025-08082" />
			<reference href="https://bdu.fstec.ru/vul/2024-04222" type="self" id="BDU:2024-04222" title="BDU:2024-04222" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251128-05</id>
		<issued date="2025-11-28" />
		<updated date="2025-11-28" />
		<title>Множественные уязвимости kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-cve-2024-35956-cve-2024-35943/</description>
               <solution>
                    Установить обновление для пакета(ов) kernel-lt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-cve-2024-35956-cve-2024-35943/" type="self" id="ROS-20251128-05" title="ROS-20251128-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35943" type="cve" id="CVE-2024-35943" title="CVE-2024-35943" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35956" type="cve" id="CVE-2024-35956" title="CVE-2024-35956" />
			<reference href="https://bdu.fstec.ru/vul/2025-08085" type="self" id="BDU:2025-08085" title="BDU:2025-08085" />
			<reference href="https://bdu.fstec.ru/vul/2025-08083" type="self" id="BDU:2025-08083" title="BDU:2025-08083" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251128-06</id>
		<issued date="2025-11-28" />
		<updated date="2025-11-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2022-48670/</description>
               <solution>
                    Установить обновление для пакета(ов) kernel-lt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2022-48670/" type="self" id="ROS-20251128-06" title="ROS-20251128-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48670" type="cve" id="CVE-2022-48670" title="CVE-2022-48670" />
			<reference href="https://bdu.fstec.ru/vul/2024-04571" type="self" id="BDU:2024-04571" title="BDU:2024-04571" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.20" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.20-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251128-07</id>
		<issued date="2025-11-28" />
		<updated date="2025-11-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-0340/</description>
               <solution>
                    Установить обновление для пакета(ов) kernel-lt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-0340/" type="self" id="ROS-20251128-07" title="ROS-20251128-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0340" type="cve" id="CVE-2024-0340" title="CVE-2024-0340" />
			<reference href="https://bdu.fstec.ru/vul/2024-00258" type="self" id="BDU:2024-00258" title="BDU:2024-00258" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251201-01</id>
		<issued date="2025-12-01" />
		<updated date="2025-12-01" />
		<title>Множественные уязвимости VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-virtualbox-cve-2024-21263-cve-2024-21273-cve-2024-21248-cve-2024-21253/</description>
               <solution>
                    Запретить использование в ОС пакета VirtualBox
                или
                    Установить обновление для пакета(ов) VirtualBox
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-virtualbox-cve-2024-21263-cve-2024-21273-cve-2024-21248-cve-2024-21253/" type="self" id="ROS-20251201-01" title="ROS-20251201-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21253" type="cve" id="CVE-2024-21253" title="CVE-2024-21253" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21263" type="cve" id="CVE-2024-21263" title="CVE-2024-21263" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21273" type="cve" id="CVE-2024-21273" title="CVE-2024-21273" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21248" type="cve" id="CVE-2024-21248" title="CVE-2024-21248" />
			<reference href="https://bdu.fstec.ru/vul/2024-08505" type="self" id="BDU:2024-08505" title="BDU:2024-08505" />
			<reference href="https://bdu.fstec.ru/vul/2024-08499" type="self" id="BDU:2024-08499" title="BDU:2024-08499" />
			<reference href="https://bdu.fstec.ru/vul/2024-08602" type="self" id="BDU:2024-08602" title="BDU:2024-08602" />
			<reference href="https://bdu.fstec.ru/vul/2024-08294" type="self" id="BDU:2024-08294" title="BDU:2024-08294" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox" epoch="0" version="7.0.22" release="2.el7" arch="x86_64" src="">
					<filename>VirtualBox-0:7.0.22-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251201-02</id>
		<issued date="2025-12-01" />
		<updated date="2025-12-01" />
		<title>Множественные уязвимости kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-cve-2024-36923-cve-2024-36915/</description>
               <solution>
                    Установить обновление для пакета(ов) kernel-lt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-cve-2024-36923-cve-2024-36915/" type="self" id="ROS-20251201-02" title="ROS-20251201-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36915" type="cve" id="CVE-2024-36915" title="CVE-2024-36915" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36923" type="cve" id="CVE-2024-36923" title="CVE-2024-36923" />
			<reference href="https://bdu.fstec.ru/vul/2025-08069" type="self" id="BDU:2025-08069" title="BDU:2025-08069" />
			<reference href="https://bdu.fstec.ru/vul/2025-08065" type="self" id="BDU:2025-08065" title="BDU:2025-08065" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251201-03</id>
		<issued date="2025-12-01" />
		<updated date="2025-12-01" />
		<title>Множественные уязвимости kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-cve-2023-6535-cve-2023-6536-cve-2023-6356/</description>
               <solution>
                    Установить обновление для пакета(ов) kernel-lt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-cve-2023-6535-cve-2023-6536-cve-2023-6356/" type="self" id="ROS-20251201-03" title="ROS-20251201-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6535" type="cve" id="CVE-2023-6535" title="CVE-2023-6535" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6536" type="cve" id="CVE-2023-6536" title="CVE-2023-6536" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6356" type="cve" id="CVE-2023-6356" title="CVE-2023-6356" />
			<reference href="https://bdu.fstec.ru/vul/2023-09025" type="self" id="BDU:2023-09025" title="BDU:2023-09025" />
			<reference href="https://bdu.fstec.ru/vul/2023-09024" type="self" id="BDU:2023-09024" title="BDU:2023-09024" />
			<reference href="https://bdu.fstec.ru/vul/2023-09026" type="self" id="BDU:2023-09026" title="BDU:2023-09026" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251201-04</id>
		<issued date="2025-12-01" />
		<updated date="2025-12-01" />
		<title>Множественные уязвимости kernel-lt</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-01122025/</description>
               <solution>
                    Установить обновление для пакета(ов) kernel-lt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-01122025/" type="self" id="ROS-20251201-04" title="ROS-20251201-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36920" type="cve" id="CVE-2024-36920" title="CVE-2024-36920" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36924" type="cve" id="CVE-2024-36924" title="CVE-2024-36924" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36918" type="cve" id="CVE-2024-36918" title="CVE-2024-36918" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5345" type="cve" id="CVE-2023-5345" title="CVE-2023-5345" />
			<reference href="https://bdu.fstec.ru/vul/2025-08066" type="self" id="BDU:2025-08066" title="BDU:2025-08066" />
			<reference href="https://bdu.fstec.ru/vul/2025-03052" type="self" id="BDU:2025-03052" title="BDU:2025-03052" />
			<reference href="https://bdu.fstec.ru/vul/2025-08067" type="self" id="BDU:2025-08067" title="BDU:2025-08067" />
			<reference href="https://bdu.fstec.ru/vul/2023-06347" type="self" id="BDU:2023-06347" title="BDU:2023-06347" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251202-01</id>
		<issued date="2025-12-02" />
		<updated date="2025-12-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58086/</description>
               <solution>
                    Установить обновление для пакета(ов) kernel-lt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58086/" type="self" id="ROS-20251202-01" title="ROS-20251202-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58086" type="cve" id="CVE-2024-58086" title="CVE-2024-58086" />
			<reference href="https://bdu.fstec.ru/vul/2025-11953" type="self" id="BDU:2025-11953" title="BDU:2025-11953" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251202-02</id>
		<issued date="2025-12-02" />
		<updated date="2025-12-02" />
		<title>Множественные уязвимости kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-cve-2025-39682-cve-2025-39946/</description>
               <solution>
                    Установить обновление для пакета(ов) kernel-lt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-kernel-lt-cve-2025-39682-cve-2025-39946/" type="self" id="ROS-20251202-02" title="ROS-20251202-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39946" type="cve" id="CVE-2025-39946" title="CVE-2025-39946" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39682" type="cve" id="CVE-2025-39682" title="CVE-2025-39682" />
			<reference href="https://bdu.fstec.ru/vul/2025-12556" type="self" id="BDU:2025-12556" title="BDU:2025-12556" />
			<reference href="https://bdu.fstec.ru/vul/2025-12988" type="self" id="BDU:2025-12988" title="BDU:2025-12988" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251202-03</id>
		<issued date="2025-12-02" />
		<updated date="2025-12-02" />
		<title>Множественные уязвимости chromium</title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-02122025/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-chromium-02122025/" type="self" id="ROS-20251202-03" title="ROS-20251202-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13107" type="cve" id="CVE-2025-13107" title="CVE-2025-13107" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12905" type="cve" id="CVE-2025-12905" title="CVE-2025-12905" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12906" type="cve" id="CVE-2025-12906" title="CVE-2025-12906" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12907" type="cve" id="CVE-2025-12907" title="CVE-2025-12907" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12910" type="cve" id="CVE-2025-12910" title="CVE-2025-12910" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12911" type="cve" id="CVE-2025-12911" title="CVE-2025-12911" />
			<reference href="https://bdu.fstec.ru/vul/2025-14878" type="self" id="BDU:2025-14878" title="BDU:2025-14878" />
			<reference href="https://bdu.fstec.ru/vul/2025-14029" type="self" id="BDU:2025-14029" title="BDU:2025-14029" />
			<reference href="https://bdu.fstec.ru/vul/2025-14032" type="self" id="BDU:2025-14032" title="BDU:2025-14032" />
			<reference href="https://bdu.fstec.ru/vul/2025-14028" type="self" id="BDU:2025-14028" title="BDU:2025-14028" />
			<reference href="https://bdu.fstec.ru/vul/2025-14031" type="self" id="BDU:2025-14031" title="BDU:2025-14031" />
			<reference href="https://bdu.fstec.ru/vul/2025-14033" type="self" id="BDU:2025-14033" title="BDU:2025-14033" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="141.0.7390.122" release="1.el7" arch="x86_64" src="">
					<filename>chromium-0:141.0.7390.122-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251202-04</id>
		<issued date="2025-12-02" />
		<updated date="2025-12-02" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13102-cve-2025-9479/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13102-cve-2025-9479/" type="self" id="ROS-20251202-04" title="ROS-20251202-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9479" type="cve" id="CVE-2025-9479" title="CVE-2025-9479" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13102" type="cve" id="CVE-2025-13102" title="CVE-2025-13102" />
			<reference href="https://bdu.fstec.ru/vul/2025-14879" type="self" id="BDU:2025-14879" title="BDU:2025-14879" />
			<reference href="https://bdu.fstec.ru/vul/2025-14883" type="self" id="BDU:2025-14883" title="BDU:2025-14883" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="134.0.6998.89" release="1.el7" arch="x86_64" src="">
					<filename>chromium-0:134.0.6998.89-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251202-05</id>
		<issued date="2025-12-02" />
		<updated date="2025-12-02" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13097/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13097/" type="self" id="ROS-20251202-05" title="ROS-20251202-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13097" type="cve" id="CVE-2025-13097" title="CVE-2025-13097" />
			<reference href="https://bdu.fstec.ru/vul/2025-14879" type="self" id="BDU:2025-14879" title="BDU:2025-14879" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="137.0.7151.119" release="2.el7" arch="x86_64" src="">
					<filename>chromium-0:137.0.7151.119-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251202-06</id>
		<issued date="2025-12-02" />
		<updated date="2025-12-02" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2024-7021/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2024-7021/" type="self" id="ROS-20251202-06" title="ROS-20251202-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7021" type="cve" id="CVE-2024-7021" title="CVE-2024-7021" />
			<reference href="https://bdu.fstec.ru/vul/2025-14880" type="self" id="BDU:2025-14880" title="BDU:2025-14880" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="124.0.6367.78" release="1.el7" arch="x86_64" src="">
					<filename>chromium-0:124.0.6367.78-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251202-07</id>
		<issued date="2025-12-02" />
		<updated date="2025-12-02" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2024-7017/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2024-7017/" type="self" id="ROS-20251202-07" title="ROS-20251202-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7017" type="cve" id="CVE-2024-7017" title="CVE-2024-7017" />
			<reference href="https://bdu.fstec.ru/vul/2025-14428" type="self" id="BDU:2025-14428" title="BDU:2025-14428" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="127.0.6533.88" release="1.el7" arch="x86_64" src="">
					<filename>chromium-0:127.0.6533.88-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251202-08</id>
		<issued date="2025-12-02" />
		<updated date="2025-12-02" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2024-11920/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2024-11920/" type="self" id="ROS-20251202-08" title="ROS-20251202-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7017" type="cve" id="CVE-2024-7017" title="CVE-2024-7017" />
			<reference href="https://bdu.fstec.ru/vul/2025-14882" type="self" id="BDU:2025-14882" title="BDU:2025-14882" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="131.0.6778.204" release="1.el7" arch="x86_64" src="">
					<filename>chromium-0:131.0.6778.204-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251202-09</id>
		<issued date="2025-12-02" />
		<updated date="2025-12-02" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2024-13178/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2024-13178/" type="self" id="ROS-20251202-09" title="ROS-20251202-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-13178" type="cve" id="CVE-2024-13178" title="CVE-2024-13178" />
			<reference href="https://bdu.fstec.ru/vul/2025-14874" type="self" id="BDU:2025-14874" title="BDU:2025-14874" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="128.0.6613.119" release="1.el7" arch="x86_64" src="">
					<filename>chromium-0:128.0.6613.119-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251203-01</id>
		<issued date="2025-12-03" />
		<updated date="2025-12-03" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2024-13983/</description>
               <solution>
                    Запретить использование в ОС пакета chromium
                или
                    Установить обновление для пакета(ов) chromium
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2024-13983/" type="self" id="ROS-20251203-01" title="ROS-20251203-01" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-13983" type="cve" id="CVE-2024-13983" title="CVE-2024-13983" />
			<reference href="https://bdu.fstec.ru/vul/2025-14881" type="self" id="BDU:2025-14881" title="BDU:2025-14881" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromium" epoch="0" version="137.0.7151.119" release="2.el7" arch="x86_64" src="">
					<filename>chromium-0:137.0.7151.119-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251203-02</id>
		<issued date="2025-12-03" />
		<updated date="2025-12-03" />
		<title>Уязвимость foreman </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в foreman</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-foreman-cve-2024-7923/</description>
               <solution>
                    Запретить использование в ОС пакета foreman
                или
                    Установить обновление для пакета(ов) foreman
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-foreman-cve-2024-7923/" type="self" id="ROS-20251203-02" title="ROS-20251203-02" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7923" type="cve" id="CVE-2024-7923" title="CVE-2024-7923" />
			<reference href="https://bdu.fstec.ru/vul/2025-15588" type="self" id="BDU:2025-15588" title="BDU:2025-15588" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="foreman" epoch="0" version="3.8.0" release="3.el7" arch="noarch" src="">
					<filename>foreman-0:3.8.0-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251203-03</id>
		<issued date="2025-12-03" />
		<updated date="2025-12-03" />
		<title>Множественные уязвимости Cassandra </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в cassandra</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-cassandra-cve-2025-24860-cve-2024-27137/</description>
               <solution>
                    Запретить использование в ОС пакета cassandra
                или
                    Установить обновление для пакета(ов) cassandra
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-cassandra-cve-2025-24860-cve-2024-27137/" type="self" id="ROS-20251203-03" title="ROS-20251203-03" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27137" type="cve" id="CVE-2024-27137" title="CVE-2024-27137" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24860" type="cve" id="CVE-2025-24860" title="CVE-2025-24860" />
			<reference href="https://bdu.fstec.ru/vul/2025-01150" type="self" id="BDU:2025-01150" title="BDU:2025-01150" />
			<reference href="https://bdu.fstec.ru/vul/2025-01159" type="self" id="BDU:2025-01159" title="BDU:2025-01159" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cassandra" epoch="0" version="4.1.8" release="1.el7" arch="noarch" src="">
					<filename>cassandra-0:4.1.8-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251203-04</id>
		<issued date="2025-12-03" />
		<updated date="2025-12-03" />
		<title>Уязвимость qt6-qtbase </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в qt6-qtbase</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qt6-qtbase-cve-2024-33861/</description>
               <solution>
                    Запретить использование в ОС пакета qt6-qtbase
                или
                    Установить обновление для пакета(ов) qt6-qtbase
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qt6-qtbase-cve-2024-33861/" type="self" id="ROS-20251203-04" title="ROS-20251203-04" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33861" type="cve" id="CVE-2024-33861" title="CVE-2024-33861" />
			<reference href="https://bdu.fstec.ru/vul/2025-15592" type="self" id="BDU:2025-15592" title="BDU:2025-15592" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="qt6-qtbase" epoch="0" version="6.6.3" release="5.el7" arch="x86_64" src="">
					<filename>qt6-qtbase-0:6.6.3-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251203-05</id>
		<issued date="2025-12-03" />
		<updated date="2025-12-03" />
		<title>Уязвимость apache-commons-configuration </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в apache-commons-configuration2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-commons-configuration-cve-2025-46392/</description>
               <solution>
                    Запретить использование в ОС пакета apache-commons-configuration2
                или
                    Установить обновление для пакета(ов) apache-commons-configuration2
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-commons-configuration-cve-2025-46392/" type="self" id="ROS-20251203-05" title="ROS-20251203-05" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46392" type="cve" id="CVE-2025-46392" title="CVE-2025-46392" />
			<reference href="https://bdu.fstec.ru/vul/2025-15579" type="self" id="BDU:2025-15579" title="BDU:2025-15579" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="apache-commons-configuration2" epoch="0" version="2.11.0" release="2.el7" arch="noarch" src="">
					<filename>apache-commons-configuration2-0:2.11.0-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251203-06</id>
		<issued date="2025-12-03" />
		<updated date="2025-12-03" />
		<title>Уязвимость varnish </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в varnish</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-varnish-cve-2025-47905/</description>
               <solution>
                    Запретить использование в ОС пакета varnish
                или
                    Установить обновление для пакета(ов) varnish
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-varnish-cve-2025-47905/" type="self" id="ROS-20251203-06" title="ROS-20251203-06" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47905" type="cve" id="CVE-2025-47905" title="CVE-2025-47905" />
			<reference href="https://bdu.fstec.ru/vul/2025-15593" type="self" id="BDU:2025-15593" title="BDU:2025-15593" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="varnish" epoch="0" version="7.7.1" release="1.el7" arch="x86_64" src="">
					<filename>varnish-0:7.7.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251203-07</id>
		<issued date="2025-12-03" />
		<updated date="2025-12-03" />
		<title>Уязвимость jose </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в jose</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jose-cve-2023-50967/</description>
               <solution>
                    Запретить использование в ОС пакета jose
                или
                    Установить обновление для пакета(ов) jose
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jose-cve-2023-50967/" type="self" id="ROS-20251203-07" title="ROS-20251203-07" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50967" type="cve" id="CVE-2023-50967" title="CVE-2023-50967" />
			<reference href="https://bdu.fstec.ru/vul/2024-02461" type="self" id="BDU:2024-02461" title="BDU:2024-02461" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jose" epoch="0" version="14" release="1.el7" arch="x86_64" src="">
					<filename>jose-0:14-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251203-08</id>
		<issued date="2025-12-03" />
		<updated date="2026-02-17" />
		<title>Уязвимость python3-aiohttp </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3-aiohttp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-aiohttp-cve-2025-53643/</description>
               <solution>
                    Запретить использование в ОС пакета python3-aiohttp
                или
                    Установить обновление для пакета(ов) python3-aiohttp
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-aiohttp-cve-2025-53643/" type="self" id="ROS-20251203-08" title="ROS-20251203-08" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53643" type="cve" id="CVE-2025-53643" title="CVE-2025-53643" />
			<reference href="https://bdu.fstec.ru/vul/2025-15590" type="self" id="BDU:2025-15590" title="BDU:2025-15590" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-aiohttp" epoch="0" version="3.10.11" release="2.el7" arch="x86_64" src="">
					<filename>python3-aiohttp-0:3.10.11-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251203-09</id>
		<issued date="2025-12-03" />
		<updated date="2025-12-03" />
		<title>Уязвимость openssh </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в openssh</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssh-cve-2025-61985/</description>
               <solution>
                    Запретить использование в ОС пакета openssh
                или
                    Установить обновление для пакета(ов) openssh
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssh-cve-2025-61985/" type="self" id="ROS-20251203-09" title="ROS-20251203-09" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61985" type="cve" id="CVE-2025-61985" title="CVE-2025-61985" />
			<reference href="https://bdu.fstec.ru/vul/2025-12566" type="self" id="BDU:2025-12566" title="BDU:2025-12566" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssh" epoch="0" version="8.9p1" release="16.el7" arch="x86_64" src="">
					<filename>openssh-0:8.9p1-16.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251203-10</id>
		<issued date="2025-12-03" />
		<updated date="2025-12-03" />
		<title>Множественные уязвимости etcd</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в etcd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-etcd-03122025/</description>
               <solution>
                    Запретить использование в ОС пакета etcd
                или
                    Установить обновление для пакета(ов) etcd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-etcd-03122025/" type="self" id="ROS-20251203-10" title="ROS-20251203-10" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22872" type="cve" id="CVE-2025-22872" title="CVE-2025-22872" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22870" type="cve" id="CVE-2025-22870" title="CVE-2025-22870" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22869" type="cve" id="CVE-2025-22869" title="CVE-2025-22869" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45338" type="cve" id="CVE-2024-45338" title="CVE-2024-45338" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45337" type="cve" id="CVE-2024-45337" title="CVE-2024-45337" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30204" type="cve" id="CVE-2025-30204" title="CVE-2025-30204" />
			<reference href="https://bdu.fstec.ru/vul/2025-08473" type="self" id="BDU:2025-08473" title="BDU:2025-08473" />
			<reference href="https://bdu.fstec.ru/vul/2025-02476" type="self" id="BDU:2025-02476" title="BDU:2025-02476" />
			<reference href="https://bdu.fstec.ru/vul/2025-06560" type="self" id="BDU:2025-06560" title="BDU:2025-06560" />
			<reference href="https://bdu.fstec.ru/vul/2025-01010" type="self" id="BDU:2025-01010" title="BDU:2025-01010" />
			<reference href="https://bdu.fstec.ru/vul/2024-11338" type="self" id="BDU:2024-11338" title="BDU:2024-11338" />
			<reference href="https://bdu.fstec.ru/vul/2025-08472" type="self" id="BDU:2025-08472" title="BDU:2025-08472" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="etcd" epoch="0" version="3.5.23" release="1.el7" arch="x86_64" src="">
					<filename>etcd-0:3.5.23-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251203-11</id>
		<issued date="2025-12-03" />
		<updated date="2025-12-03" />
		<title>Множественные уязвимости etcd</title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в etcd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-etcd-0312202502/</description>
               <solution>
                    Запретить использование в ОС пакета etcd
                или
                    Установить обновление для пакета(ов) etcd
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-etcd-0312202502/" type="self" id="ROS-20251203-11" title="ROS-20251203-11" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22872" type="cve" id="CVE-2025-22872" title="CVE-2025-22872" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22870" type="cve" id="CVE-2025-22870" title="CVE-2025-22870" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22869" type="cve" id="CVE-2025-22869" title="CVE-2025-22869" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45338" type="cve" id="CVE-2024-45338" title="CVE-2024-45338" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45337" type="cve" id="CVE-2024-45337" title="CVE-2024-45337" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30204" type="cve" id="CVE-2025-30204" title="CVE-2025-30204" />
			<reference href="https://bdu.fstec.ru/vul/2025-08473" type="self" id="BDU:2025-08473" title="BDU:2025-08473" />
			<reference href="https://bdu.fstec.ru/vul/2025-02476" type="self" id="BDU:2025-02476" title="BDU:2025-02476" />
			<reference href="https://bdu.fstec.ru/vul/2025-06560" type="self" id="BDU:2025-06560" title="BDU:2025-06560" />
			<reference href="https://bdu.fstec.ru/vul/2025-01010" type="self" id="BDU:2025-01010" title="BDU:2025-01010" />
			<reference href="https://bdu.fstec.ru/vul/2024-11338" type="self" id="BDU:2024-11338" title="BDU:2024-11338" />
			<reference href="https://bdu.fstec.ru/vul/2025-08472" type="self" id="BDU:2025-08472" title="BDU:2025-08472" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="etcd" epoch="0" version="3.5.15" release="3.el7" arch="x86_64" src="">
					<filename>etcd-0:3.5.15-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251203-12</id>
		<issued date="2025-12-03" />
		<updated date="2025-12-03" />
		<title>Уязвимость perl-YAML-Syck </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в perl-YAML-Syck</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-yaml-syck-cve-2025-11683/</description>
               <solution>
                    Запретить использование в ОС пакета perl-YAML-Syck
                или
                    Установить обновление для пакета(ов) perl-YAML-Syck
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-yaml-syck-cve-2025-11683/" type="self" id="ROS-20251203-12" title="ROS-20251203-12" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40908" type="cve" id="CVE-2025-40908" title="CVE-2025-40908" />
			<reference href="https://bdu.fstec.ru/vul/2025-08363" type="self" id="BDU:2025-08363" title="BDU:2025-08363" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="perl-YAML-Syck" epoch="0" version="1.36" release="1.el7" arch="x86_64" src="">
					<filename>perl-YAML-Syck-0:1.36-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251203-13</id>
		<issued date="2025-12-03" />
		<updated date="2025-12-03" />
		<title>Уязвимость git-lfs </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в git-lfs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-git-lfs-cve-2025-26625/</description>
               <solution>
                    Запретить использование в ОС пакета git-lfs
                или
                    Установить обновление для пакета(ов) git-lfs
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-git-lfs-cve-2025-26625/" type="self" id="ROS-20251203-13" title="ROS-20251203-13" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26625" type="cve" id="CVE-2025-26625" title="CVE-2025-26625" />
			<reference href="https://bdu.fstec.ru/vul/2025-13253" type="self" id="BDU:2025-13253" title="BDU:2025-13253" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="git-lfs" epoch="0" version="3.7.1" release="1.el7" arch="x86_64" src="">
					<filename>git-lfs-0:3.7.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251203-14</id>
		<issued date="2025-12-03" />
		<updated date="2025-12-03" />
		<title>Уязвимость mongodb-org </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2025-11979/</description>
               <solution>
                    Запретить использование в ОС пакета mongodb-org
                или
                    Установить обновление для пакета(ов) mongodb-org
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2025-11979/" type="self" id="ROS-20251203-14" title="ROS-20251203-14" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11979" type="cve" id="CVE-2025-11979" title="CVE-2025-11979" />
			<reference href="https://bdu.fstec.ru/vul/2025-15582" type="self" id="BDU:2025-15582" title="BDU:2025-15582" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mongodb-org" epoch="0" version="7.0.26" release="1.el7" arch="x86_64" src="">
					<filename>mongodb-org-0:7.0.26-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251203-15</id>
		<issued date="2025-12-03" />
		<updated date="2025-12-03" />
		<title>Уязвимость golang-github-spf13-viper-devel </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang-github-spf13-viper-devel</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-github-spf13-viper-devel-cve-2025-11065/</description>
               <solution>
                    Запретить использование в ОС пакета golang-github-spf13-viper-devel
                или
                    Установить обновление для пакета(ов) golang-github-spf13-viper-devel
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-github-spf13-viper-devel-cve-2025-11065/" type="self" id="ROS-20251203-15" title="ROS-20251203-15" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11065" type="cve" id="CVE-2025-11065" title="CVE-2025-11065" />
			<reference href="https://bdu.fstec.ru/vul/2025-15587" type="self" id="BDU:2025-15587" title="BDU:2025-15587" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang-github-spf13-viper-devel" epoch="0" version="1.19.0" release="1.el7" arch="noarch" src="">
					<filename>golang-github-spf13-viper-devel-0:1.19.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251203-16</id>
		<issued date="2025-12-03" />
		<updated date="2025-12-03" />
		<title>Множественные уязвимости consul </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в consul</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-consul-cve-2025-11375-cve-2025-11374/</description>
               <solution>
                    Запретить использование в ОС пакета consul
                или
                    Установить обновление для пакета(ов) consul
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-consul-cve-2025-11375-cve-2025-11374/" type="self" id="ROS-20251203-16" title="ROS-20251203-16" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11375" type="cve" id="CVE-2025-11375" title="CVE-2025-11375" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11374" type="cve" id="CVE-2025-11374" title="CVE-2025-11374" />
			<reference href="https://bdu.fstec.ru/vul/2025-15596" type="self" id="BDU:2025-15596" title="BDU:2025-15596" />
			<reference href="https://bdu.fstec.ru/vul/2025-15597" type="self" id="BDU:2025-15597" title="BDU:2025-15597" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="consul" epoch="0" version="1.22.0" release="1.el7" arch="x86_64" src="">
					<filename>consul-0:1.22.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251203-17</id>
		<issued date="2025-12-03" />
		<updated date="2025-12-03" />
		<title>Уязвимость glpi-plugin-glpiinventory </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в glpi-plugin-glpiinventory</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-plugin-glpiinventory-cve-2025-32786/</description>
               <solution>
                    Запретить использование в ОС пакета glpi-plugin-glpiinventory
                или
                    Установить обновление для пакета(ов) glpi-plugin-glpiinventory
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-plugin-glpiinventory-cve-2025-32786/" type="self" id="ROS-20251203-17" title="ROS-20251203-17" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32786" type="cve" id="CVE-2025-32786" title="CVE-2025-32786" />
			<reference href="https://bdu.fstec.ru/vul/2025-15581" type="self" id="BDU:2025-15581" title="BDU:2025-15581" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi-plugin-glpiinventory" epoch="0" version="1.6.2" release="1.el7" arch="noarch" src="">
					<filename>glpi-plugin-glpiinventory-0:1.6.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251203-18</id>
		<issued date="2025-12-03" />
		<updated date="2025-12-03" />
		<title>Уязвимость curl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2025-10966/</description>
               <solution>
                    Запретить использование в ОС пакета curl
                или
                    Установить обновление для пакета(ов) curl
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2025-10966/" type="self" id="ROS-20251203-18" title="ROS-20251203-18" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10966" type="cve" id="CVE-2025-10966" title="CVE-2025-10966" />
			<reference href="https://bdu.fstec.ru/vul/2025-15585" type="self" id="BDU:2025-15585" title="BDU:2025-15585" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="curl" epoch="0" version="7.86.0" release="7.el7" arch="x86_64" src="">
					<filename>curl-0:7.86.0-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251203-19</id>
		<issued date="2025-12-03" />
		<updated date="2025-12-03" />
		<title>Уязвимость rubygem-mqtt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в rubygem-mqtt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-mqtt-cve-2025-12790/</description>
               <solution>
                    Запретить использование в ОС пакета rubygem-mqtt
                или
                    Установить обновление для пакета(ов) rubygem-mqtt
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-mqtt-cve-2025-12790/" type="self" id="ROS-20251203-19" title="ROS-20251203-19" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12790" type="cve" id="CVE-2025-12790" title="CVE-2025-12790" />
			<reference href="https://bdu.fstec.ru/vul/2025-15584" type="self" id="BDU:2025-15584" title="BDU:2025-15584" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-mqtt" epoch="0" version="0.7.0" release="1.el7" arch="noarch" src="">
					<filename>rubygem-mqtt-0:0.7.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251203-20</id>
		<issued date="2025-12-03" />
		<updated date="2025-12-03" />
		<title>Уязвимость sqlite </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в sqlite</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sqlite-cve-2025-52099/</description>
               <solution>
                    Запретить использование в ОС пакета sqlite
                или
                    Установить обновление для пакета(ов) sqlite
                </solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sqlite-cve-2025-52099/" type="self" id="ROS-20251203-20" title="ROS-20251203-20" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52099" type="cve" id="CVE-2025-52099" title="CVE-2025-52099" />
			<reference href="https://bdu.fstec.ru/vul/2025-13413" type="self" id="BDU:2025-13413" title="BDU:2025-13413" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="sqlite" epoch="0" version="3.35.3" release="7.el7" arch="x86_64" src="">
					<filename>sqlite-0:3.35.3-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251215-7301</id>
		<issued date="2025-12-15" />
		<updated date="2025-12-15" />
		<title>Уязвимость mongodb-org </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2025-14345-7.3/</description>
               <solution>Установить обновление для пакета(ов) mongodb-org
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2025-14345-7.3/" type="self" id="ROS-20251215-7301" title="ROS-20251215-7301" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14345" type="cve" id="CVE-2025-14345" title="CVE-2025-14345" />
			<reference href="https://bdu.fstec.ru/vul/2025-16095" type="self" id="BDU:2025-16095" title="BDU:2025-16095" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mongodb-org" epoch="0" version="7.0.26" release="1.el7" arch="x86_64" src="mongodb-org-7.0.26-1.el7.src.rpm">
					<filename>mongodb-org-0:7.0.26-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-mongos" epoch="0" version="7.0.26" release="1.el7" arch="x86_64" src="mongodb-org-7.0.26-1.el7.src.rpm">
					<filename>mongodb-org-mongos-0:7.0.26-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-server" epoch="0" version="7.0.26" release="1.el7" arch="x86_64" src="mongodb-org-7.0.26-1.el7.src.rpm">
					<filename>mongodb-org-server-0:7.0.26-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-shell" epoch="0" version="7.0.26" release="1.el7" arch="x86_64" src="mongodb-org-7.0.26-1.el7.src.rpm">
					<filename>mongodb-org-shell-0:7.0.26-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251215-7302</id>
		<issued date="2025-12-15" />
		<updated date="2025-12-15" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38001-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38001-7.3/" type="self" id="ROS-20251215-7302" title="ROS-20251215-7302" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38001" type="cve" id="CVE-2025-38001" title="CVE-2025-38001" />
			<reference href="https://bdu.fstec.ru/vul/2025-12349" type="self" id="BDU:2025-12349" title="BDU:2025-12349" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251215-7303</id>
		<issued date="2025-12-15" />
		<updated date="2025-12-15" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2025-11714-7.3/</description>
               <solution>Установить обновление для пакета(ов) firefox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2025-11714-7.3/" type="self" id="ROS-20251215-7303" title="ROS-20251215-7303" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11714" type="cve" id="CVE-2025-11714" title="CVE-2025-11714" />
			<reference href="https://bdu.fstec.ru/vul/2025-13250" type="self" id="BDU:2025-13250" title="BDU:2025-13250" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.29.0" release="1.el7" arch="x86_64" src="firefox-115.29.0-1.el7.src.rpm">
					<filename>firefox-0:115.29.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251215-7304</id>
		<issued date="2025-12-15" />
		<updated date="2025-12-15" />
		<title>Уязвимость advancecomp </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в advancecomp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-advancecomp-cve-2023-2961-7.3/</description>
               <solution>Установить обновление для пакета(ов) advancecomp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-advancecomp-cve-2023-2961-7.3/" type="self" id="ROS-20251215-7304" title="ROS-20251215-7304" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2961" type="cve" id="CVE-2023-2961" title="CVE-2023-2961" />
			<reference href="https://bdu.fstec.ru/vul/2025-16092" type="self" id="BDU:2025-16092" title="BDU:2025-16092" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="advancecomp" epoch="0" version="2.6" release="1.el7" arch="x86_64" src="advancecomp-2.6-1.el7.src.rpm">
					<filename>advancecomp-0:2.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251215-7305</id>
		<issued date="2025-12-15" />
		<updated date="2025-12-15" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2024-24788-7.3/</description>
               <solution>Установить обновление для пакета(ов) golang
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2024-24788-7.3/" type="self" id="ROS-20251215-7305" title="ROS-20251215-7305" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24788" type="cve" id="CVE-2024-24788" title="CVE-2024-24788" />
			<reference href="https://bdu.fstec.ru/vul/2024-07420" type="self" id="BDU:2024-07420" title="BDU:2024-07420" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.22.5" release="1.el7" arch="x86_64" src="golang-1.22.5-1.el7.src.rpm">
					<filename>golang-0:1.22.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.22.5" release="1.el7" arch="x86_64" src="golang-1.22.5-1.el7.src.rpm">
					<filename>golang-bin-0:1.22.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.22.5" release="1.el7" arch="x86_64" src="golang-1.22.5-1.el7.src.rpm">
					<filename>golang-shared-0:1.22.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-docs" epoch="0" version="1.22.5" release="1.el7" arch="noarch" src="golang-1.22.5-1.el7.src.rpm">
					<filename>golang-docs-0:1.22.5-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-misc" epoch="0" version="1.22.5" release="1.el7" arch="noarch" src="golang-1.22.5-1.el7.src.rpm">
					<filename>golang-misc-0:1.22.5-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-src" epoch="0" version="1.22.5" release="1.el7" arch="noarch" src="golang-1.22.5-1.el7.src.rpm">
					<filename>golang-src-0:1.22.5-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-tests" epoch="0" version="1.22.5" release="1.el7" arch="noarch" src="golang-1.22.5-1.el7.src.rpm">
					<filename>golang-tests-0:1.22.5-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251215-7306</id>
		<issued date="2025-12-15" />
		<updated date="2025-12-15" />
		<title>Уязвимость perl-Crypt-OpenSSL-RSA </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в perl-Crypt-OpenSSL-RSA</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-crypt-openssl-rsa-cve-2024-2467-7.3/</description>
               <solution>Установить обновление для пакета(ов) perl-Crypt-OpenSSL-RSA
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-crypt-openssl-rsa-cve-2024-2467-7.3/" type="self" id="ROS-20251215-7306" title="ROS-20251215-7306" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2467" type="cve" id="CVE-2024-2467" title="CVE-2024-2467" />
			<reference href="https://bdu.fstec.ru/vul/2024-05718" type="self" id="BDU:2024-05718" title="BDU:2024-05718" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="perl-Crypt-OpenSSL-RSA" epoch="0" version="0.35" release="1.el7" arch="x86_64" src="perl-Crypt-OpenSSL-RSA-0.35-1.el7.src.rpm">
					<filename>perl-Crypt-OpenSSL-RSA-0:0.35-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251215-7307</id>
		<issued date="2025-12-15" />
		<updated date="2025-12-15" />
		<title>Уязвимость wget </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в wget</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-wget-cve-2024-10524-7.3/</description>
               <solution>Установить обновление для пакета(ов) wget
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-wget-cve-2024-10524-7.3/" type="self" id="ROS-20251215-7307" title="ROS-20251215-7307" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10524" type="cve" id="CVE-2024-10524" title="CVE-2024-10524" />
			<reference href="https://bdu.fstec.ru/vul/2024-10463" type="self" id="BDU:2024-10463" title="BDU:2024-10463" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="wget" epoch="0" version="1.25.0" release="1.el7" arch="x86_64" src="wget-1.25.0-1.el7.src.rpm">
					<filename>wget-0:1.25.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251215-7308</id>
		<issued date="2025-12-15" />
		<updated date="2025-12-15" />
		<title>Уязвимость phpldapadmin </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в phpldapadmin</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-phpldapadmin-cve-2024-9101-7.3/</description>
               <solution>Установить обновление для пакета(ов) phpldapadmin
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-phpldapadmin-cve-2024-9101-7.3/" type="self" id="ROS-20251215-7308" title="ROS-20251215-7308" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9101" type="cve" id="CVE-2024-9101" title="CVE-2024-9101" />
			<reference href="https://bdu.fstec.ru/vul/2025-16093" type="self" id="BDU:2025-16093" title="BDU:2025-16093" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="phpldapadmin" epoch="0" version="2.3.4" release="1.el7" arch="noarch" src="phpldapadmin-2.3.4-1.el7.src.rpm">
					<filename>phpldapadmin-0:2.3.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251215-7309</id>
		<issued date="2025-12-15" />
		<updated date="2025-12-15" />
		<title>Уязвимость elasticsearch </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в elasticsearch</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-elasticsearch-cve-2024-43709-7.3/</description>
               <solution>Установить обновление для пакета(ов) elasticsearch
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-elasticsearch-cve-2024-43709-7.3/" type="self" id="ROS-20251215-7309" title="ROS-20251215-7309" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43709" type="cve" id="CVE-2024-43709" title="CVE-2024-43709" />
			<reference href="https://bdu.fstec.ru/vul/2025-06249" type="self" id="BDU:2025-06249" title="BDU:2025-06249" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="elasticsearch" epoch="1" version="7.17.29" release="1.el7" arch="x86_64" src="elasticsearch-7.17.29-1.el7.src.rpm">
					<filename>elasticsearch-1:7.17.29-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251215-7310</id>
		<issued date="2025-12-15" />
		<updated date="2025-12-15" />
		<title>Уязвимость elasticsearch </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в elasticsearch</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-elasticsearch-cve-2024-52981-7.3/</description>
               <solution>Установить обновление для пакета(ов) elasticsearch
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-elasticsearch-cve-2024-52981-7.3/" type="self" id="ROS-20251215-7310" title="ROS-20251215-7310" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52981" type="cve" id="CVE-2024-52981" title="CVE-2024-52981" />
			<reference href="https://bdu.fstec.ru/vul/2025-16094" type="self" id="BDU:2025-16094" title="BDU:2025-16094" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="elasticsearch" epoch="1" version="7.17.29" release="1.el7" arch="x86_64" src="elasticsearch-7.17.29-1.el7.src.rpm">
					<filename>elasticsearch-1:7.17.29-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251215-7311</id>
		<issued date="2025-12-15" />
		<updated date="2025-12-15" />
		<title>Уязвимость qt6-qtbase </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в qt6-qtbase</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qt6-qtbase-cve-2025-30348-7.3/</description>
               <solution>Установить обновление для пакета(ов) qt6-qtbase
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qt6-qtbase-cve-2025-30348-7.3/" type="self" id="ROS-20251215-7311" title="ROS-20251215-7311" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30348" type="cve" id="CVE-2025-30348" title="CVE-2025-30348" />
			<reference href="https://bdu.fstec.ru/vul/2025-16090" type="self" id="BDU:2025-16090" title="BDU:2025-16090" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="qt6-qtbase" epoch="0" version="6.6.3" release="5.el7" arch="x86_64" src="qt6-qtbase-6.6.3-5.el7.src.rpm">
					<filename>qt6-qtbase-0:6.6.3-5.el7.x86_64.rpm</filename>
				</package>
				<package name="qt6-qtbase-devel" epoch="0" version="6.6.3" release="5.el7" arch="x86_64" src="qt6-qtbase-6.6.3-5.el7.src.rpm">
					<filename>qt6-qtbase-devel-0:6.6.3-5.el7.x86_64.rpm</filename>
				</package>
				<package name="qt6-qtbase-examples" epoch="0" version="6.6.3" release="5.el7" arch="x86_64" src="qt6-qtbase-6.6.3-5.el7.src.rpm">
					<filename>qt6-qtbase-examples-0:6.6.3-5.el7.x86_64.rpm</filename>
				</package>
				<package name="qt6-qtbase-gui" epoch="0" version="6.6.3" release="5.el7" arch="x86_64" src="qt6-qtbase-6.6.3-5.el7.src.rpm">
					<filename>qt6-qtbase-gui-0:6.6.3-5.el7.x86_64.rpm</filename>
				</package>
				<package name="qt6-qtbase-ibase" epoch="0" version="6.6.3" release="5.el7" arch="x86_64" src="qt6-qtbase-6.6.3-5.el7.src.rpm">
					<filename>qt6-qtbase-ibase-0:6.6.3-5.el7.x86_64.rpm</filename>
				</package>
				<package name="qt6-qtbase-mysql" epoch="0" version="6.6.3" release="5.el7" arch="x86_64" src="qt6-qtbase-6.6.3-5.el7.src.rpm">
					<filename>qt6-qtbase-mysql-0:6.6.3-5.el7.x86_64.rpm</filename>
				</package>
				<package name="qt6-qtbase-odbc" epoch="0" version="6.6.3" release="5.el7" arch="x86_64" src="qt6-qtbase-6.6.3-5.el7.src.rpm">
					<filename>qt6-qtbase-odbc-0:6.6.3-5.el7.x86_64.rpm</filename>
				</package>
				<package name="qt6-qtbase-postgresql" epoch="0" version="6.6.3" release="5.el7" arch="x86_64" src="qt6-qtbase-6.6.3-5.el7.src.rpm">
					<filename>qt6-qtbase-postgresql-0:6.6.3-5.el7.x86_64.rpm</filename>
				</package>
				<package name="qt6-qtbase-private-devel" epoch="0" version="6.6.3" release="5.el7" arch="x86_64" src="qt6-qtbase-6.6.3-5.el7.src.rpm">
					<filename>qt6-qtbase-private-devel-0:6.6.3-5.el7.x86_64.rpm</filename>
				</package>
				<package name="qt6-qtbase-static" epoch="0" version="6.6.3" release="5.el7" arch="x86_64" src="qt6-qtbase-6.6.3-5.el7.src.rpm">
					<filename>qt6-qtbase-static-0:6.6.3-5.el7.x86_64.rpm</filename>
				</package>
				<package name="qt6-qtbase-common" epoch="0" version="6.6.3" release="5.el7" arch="noarch" src="qt6-qtbase-6.6.3-5.el7.src.rpm">
					<filename>qt6-qtbase-common-0:6.6.3-5.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251215-7312</id>
		<issued date="2025-12-15" />
		<updated date="2025-12-15" />
		<title>Уязвимость varnish </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в varnish</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-varnish-cve-2025-30346-7.3/</description>
               <solution>Установить обновление для пакета(ов) varnish
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-varnish-cve-2025-30346-7.3/" type="self" id="ROS-20251215-7312" title="ROS-20251215-7312" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30346" type="cve" id="CVE-2025-30346" title="CVE-2025-30346" />
			<reference href="https://bdu.fstec.ru/vul/2025-16096" type="self" id="BDU:2025-16096" title="BDU:2025-16096" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="varnish" epoch="0" version="7.7.1" release="1.el7" arch="x86_64" src="varnish-7.7.1-1.el7.src.rpm">
					<filename>varnish-0:7.7.1-1.el7.x86_64.rpm</filename>
				</package>
				<package name="varnish-devel" epoch="0" version="7.7.1" release="1.el7" arch="x86_64" src="varnish-7.7.1-1.el7.src.rpm">
					<filename>varnish-devel-0:7.7.1-1.el7.x86_64.rpm</filename>
				</package>
				<package name="varnish-docs" epoch="0" version="7.7.1" release="1.el7" arch="x86_64" src="varnish-7.7.1-1.el7.src.rpm">
					<filename>varnish-docs-0:7.7.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251215-7313</id>
		<issued date="2025-12-15" />
		<updated date="2025-12-15" />
		<title>Уязвимость cifs-utils </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в cifs-utils</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cifs-utils-cve-2025-2312-7.3/</description>
               <solution>Установить обновление для пакета(ов) cifs-utils
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cifs-utils-cve-2025-2312-7.3/" type="self" id="ROS-20251215-7313" title="ROS-20251215-7313" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2312" type="cve" id="CVE-2025-2312" title="CVE-2025-2312" />
			<reference href="https://bdu.fstec.ru/vul/2025-10951" type="self" id="BDU:2025-10951" title="BDU:2025-10951" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cifs-utils" epoch="0" version="6.15" release="2.el7" arch="x86_64" src="cifs-utils-6.15-2.el7.src.rpm">
					<filename>cifs-utils-0:6.15-2.el7.x86_64.rpm</filename>
				</package>
				<package name="cifs-utils-devel" epoch="0" version="6.15" release="2.el7" arch="x86_64" src="cifs-utils-6.15-2.el7.src.rpm">
					<filename>cifs-utils-devel-0:6.15-2.el7.x86_64.rpm</filename>
				</package>
				<package name="cifs-utils-info" epoch="0" version="6.15" release="2.el7" arch="x86_64" src="cifs-utils-6.15-2.el7.src.rpm">
					<filename>cifs-utils-info-0:6.15-2.el7.x86_64.rpm</filename>
				</package>
				<package name="pam_cifscreds" epoch="0" version="6.15" release="2.el7" arch="x86_64" src="cifs-utils-6.15-2.el7.src.rpm">
					<filename>pam_cifscreds-0:6.15-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251215-7314</id>
		<issued date="2025-12-15" />
		<updated date="2025-12-15" />
		<title>Уязвимость yelp </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в yelp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-yelp-cve-2025-3155-7.3/</description>
               <solution>Установить обновление для пакета(ов) yelp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-yelp-cve-2025-3155-7.3/" type="self" id="ROS-20251215-7314" title="ROS-20251215-7314" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3155" type="cve" id="CVE-2025-3155" title="CVE-2025-3155" />
			<reference href="https://bdu.fstec.ru/vul/2025-03944" type="self" id="BDU:2025-03944" title="BDU:2025-03944" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="yelp" epoch="2" version="3.38.3" release="2.el7" arch="x86_64" src="yelp-3.38.3-2.el7.src.rpm">
					<filename>yelp-2:3.38.3-2.el7.x86_64.rpm</filename>
				</package>
				<package name="yelp-devel" epoch="2" version="3.38.3" release="2.el7" arch="x86_64" src="yelp-3.38.3-2.el7.src.rpm">
					<filename>yelp-devel-2:3.38.3-2.el7.x86_64.rpm</filename>
				</package>
				<package name="yelp-libs" epoch="2" version="3.38.3" release="2.el7" arch="x86_64" src="yelp-3.38.3-2.el7.src.rpm">
					<filename>yelp-libs-2:3.38.3-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7301</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость GraphicsMagick </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в GraphicsMagick</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-graphicsmagick-cve-2025-27795-7.3/</description>
               <solution>Установить обновление для пакета(ов) GraphicsMagick
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-graphicsmagick-cve-2025-27795-7.3/" type="self" id="ROS-20251216-7301" title="ROS-20251216-7301" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27795" type="cve" id="CVE-2025-27795" title="CVE-2025-27795" />
			<reference href="https://bdu.fstec.ru/vul/2025-03871" type="self" id="BDU:2025-03871" title="BDU:2025-03871" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="GraphicsMagick" epoch="0" version="1.3.46" release="1.el7" arch="x86_64" src="GraphicsMagick-1.3.46-1.el7.src.rpm">
					<filename>GraphicsMagick-0:1.3.46-1.el7.x86_64.rpm</filename>
				</package>
				<package name="GraphicsMagick-c++" epoch="0" version="1.3.46" release="1.el7" arch="x86_64" src="GraphicsMagick-1.3.46-1.el7.src.rpm">
					<filename>GraphicsMagick-c++-0:1.3.46-1.el7.x86_64.rpm</filename>
				</package>
				<package name="GraphicsMagick-c++-devel" epoch="0" version="1.3.46" release="1.el7" arch="x86_64" src="GraphicsMagick-1.3.46-1.el7.src.rpm">
					<filename>GraphicsMagick-c++-devel-0:1.3.46-1.el7.x86_64.rpm</filename>
				</package>
				<package name="GraphicsMagick-devel" epoch="0" version="1.3.46" release="1.el7" arch="x86_64" src="GraphicsMagick-1.3.46-1.el7.src.rpm">
					<filename>GraphicsMagick-devel-0:1.3.46-1.el7.x86_64.rpm</filename>
				</package>
				<package name="GraphicsMagick-doc" epoch="0" version="1.3.46" release="1.el7" arch="x86_64" src="GraphicsMagick-1.3.46-1.el7.src.rpm">
					<filename>GraphicsMagick-doc-0:1.3.46-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7302</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость GraphicsMagick </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в GraphicsMagick</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-graphicsmagick-cve-2025-27796-7.3/</description>
               <solution>Установить обновление для пакета(ов) GraphicsMagick
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-graphicsmagick-cve-2025-27796-7.3/" type="self" id="ROS-20251216-7302" title="ROS-20251216-7302" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27796" type="cve" id="CVE-2025-27796" title="CVE-2025-27796" />
			<reference href="https://bdu.fstec.ru/vul/2025-16105" type="self" id="BDU:2025-16105" title="BDU:2025-16105" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="GraphicsMagick" epoch="0" version="1.3.46" release="1.el7" arch="x86_64" src="GraphicsMagick-1.3.46-1.el7.src.rpm">
					<filename>GraphicsMagick-0:1.3.46-1.el7.x86_64.rpm</filename>
				</package>
				<package name="GraphicsMagick-c++" epoch="0" version="1.3.46" release="1.el7" arch="x86_64" src="GraphicsMagick-1.3.46-1.el7.src.rpm">
					<filename>GraphicsMagick-c++-0:1.3.46-1.el7.x86_64.rpm</filename>
				</package>
				<package name="GraphicsMagick-c++-devel" epoch="0" version="1.3.46" release="1.el7" arch="x86_64" src="GraphicsMagick-1.3.46-1.el7.src.rpm">
					<filename>GraphicsMagick-c++-devel-0:1.3.46-1.el7.x86_64.rpm</filename>
				</package>
				<package name="GraphicsMagick-devel" epoch="0" version="1.3.46" release="1.el7" arch="x86_64" src="GraphicsMagick-1.3.46-1.el7.src.rpm">
					<filename>GraphicsMagick-devel-0:1.3.46-1.el7.x86_64.rpm</filename>
				</package>
				<package name="GraphicsMagick-doc" epoch="0" version="1.3.46" release="1.el7" arch="x86_64" src="GraphicsMagick-1.3.46-1.el7.src.rpm">
					<filename>GraphicsMagick-doc-0:1.3.46-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7303</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость GraphicsMagick </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в GraphicsMagick</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-graphicsmagick-cve-2025-32460-7.3/</description>
               <solution>Установить обновление для пакета(ов) GraphicsMagick
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-graphicsmagick-cve-2025-32460-7.3/" type="self" id="ROS-20251216-7303" title="ROS-20251216-7303" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32460" type="cve" id="CVE-2025-32460" title="CVE-2025-32460" />
			<reference href="https://bdu.fstec.ru/vul/2025-16109" type="self" id="BDU:2025-16109" title="BDU:2025-16109" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="GraphicsMagick" epoch="0" version="1.3.46" release="1.el7" arch="x86_64" src="GraphicsMagick-1.3.46-1.el7.src.rpm">
					<filename>GraphicsMagick-0:1.3.46-1.el7.x86_64.rpm</filename>
				</package>
				<package name="GraphicsMagick-c++" epoch="0" version="1.3.46" release="1.el7" arch="x86_64" src="GraphicsMagick-1.3.46-1.el7.src.rpm">
					<filename>GraphicsMagick-c++-0:1.3.46-1.el7.x86_64.rpm</filename>
				</package>
				<package name="GraphicsMagick-c++-devel" epoch="0" version="1.3.46" release="1.el7" arch="x86_64" src="GraphicsMagick-1.3.46-1.el7.src.rpm">
					<filename>GraphicsMagick-c++-devel-0:1.3.46-1.el7.x86_64.rpm</filename>
				</package>
				<package name="GraphicsMagick-devel" epoch="0" version="1.3.46" release="1.el7" arch="x86_64" src="GraphicsMagick-1.3.46-1.el7.src.rpm">
					<filename>GraphicsMagick-devel-0:1.3.46-1.el7.x86_64.rpm</filename>
				</package>
				<package name="GraphicsMagick-doc" epoch="0" version="1.3.46" release="1.el7" arch="x86_64" src="GraphicsMagick-1.3.46-1.el7.src.rpm">
					<filename>GraphicsMagick-doc-0:1.3.46-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7304</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость gnuplot </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gnuplot</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gnuplot-cve-2025-31180-7.3/</description>
               <solution>Установить обновление для пакета(ов) gnuplot
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gnuplot-cve-2025-31180-7.3/" type="self" id="ROS-20251216-7304" title="ROS-20251216-7304" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31180" type="cve" id="CVE-2025-31180" title="CVE-2025-31180" />
			<reference href="https://bdu.fstec.ru/vul/2025-16107" type="self" id="BDU:2025-16107" title="BDU:2025-16107" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gnuplot" epoch="0" version="6.0.3" release="1.el7" arch="x86_64" src="gnuplot-6.0.3-1.el7.src.rpm">
					<filename>gnuplot-0:6.0.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="gnuplot-common" epoch="0" version="6.0.3" release="1.el7" arch="x86_64" src="gnuplot-6.0.3-1.el7.src.rpm">
					<filename>gnuplot-common-0:6.0.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="gnuplot-minimal" epoch="0" version="6.0.3" release="1.el7" arch="x86_64" src="gnuplot-6.0.3-1.el7.src.rpm">
					<filename>gnuplot-minimal-0:6.0.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="gnuplot-doc" epoch="0" version="6.0.3" release="1.el7" arch="noarch" src="gnuplot-6.0.3-1.el7.src.rpm">
					<filename>gnuplot-doc-0:6.0.3-1.el7.noarch.rpm</filename>
				</package>
				<package name="gnuplot-latex" epoch="0" version="6.0.3" release="1.el7" arch="noarch" src="gnuplot-6.0.3-1.el7.src.rpm">
					<filename>gnuplot-latex-0:6.0.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7305</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость gnuplot </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gnuplot</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gnuplot-cve-2025-31181-7.3/</description>
               <solution>Установить обновление для пакета(ов) gnuplot
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gnuplot-cve-2025-31181-7.3/" type="self" id="ROS-20251216-7305" title="ROS-20251216-7305" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31181" type="cve" id="CVE-2025-31181" title="CVE-2025-31181" />
			<reference href="https://bdu.fstec.ru/vul/2025-16108" type="self" id="BDU:2025-16108" title="BDU:2025-16108" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gnuplot" epoch="0" version="6.0.3" release="1.el7" arch="x86_64" src="gnuplot-6.0.3-1.el7.src.rpm">
					<filename>gnuplot-0:6.0.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="gnuplot-common" epoch="0" version="6.0.3" release="1.el7" arch="x86_64" src="gnuplot-6.0.3-1.el7.src.rpm">
					<filename>gnuplot-common-0:6.0.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="gnuplot-minimal" epoch="0" version="6.0.3" release="1.el7" arch="x86_64" src="gnuplot-6.0.3-1.el7.src.rpm">
					<filename>gnuplot-minimal-0:6.0.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="gnuplot-doc" epoch="0" version="6.0.3" release="1.el7" arch="noarch" src="gnuplot-6.0.3-1.el7.src.rpm">
					<filename>gnuplot-doc-0:6.0.3-1.el7.noarch.rpm</filename>
				</package>
				<package name="gnuplot-latex" epoch="0" version="6.0.3" release="1.el7" arch="noarch" src="gnuplot-6.0.3-1.el7.src.rpm">
					<filename>gnuplot-latex-0:6.0.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7306</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость gnuplot </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gnuplot</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gnuplot-cve-2025-3359-7.3/</description>
               <solution>Установить обновление для пакета(ов) gnuplot
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gnuplot-cve-2025-3359-7.3/" type="self" id="ROS-20251216-7306" title="ROS-20251216-7306" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3359" type="cve" id="CVE-2025-3359" title="CVE-2025-3359" />
			<reference href="https://bdu.fstec.ru/vul/2025-16099" type="self" id="BDU:2025-16099" title="BDU:2025-16099" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gnuplot" epoch="0" version="6.0.3" release="1.el7" arch="x86_64" src="gnuplot-6.0.3-1.el7.src.rpm">
					<filename>gnuplot-0:6.0.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="gnuplot-common" epoch="0" version="6.0.3" release="1.el7" arch="x86_64" src="gnuplot-6.0.3-1.el7.src.rpm">
					<filename>gnuplot-common-0:6.0.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="gnuplot-minimal" epoch="0" version="6.0.3" release="1.el7" arch="x86_64" src="gnuplot-6.0.3-1.el7.src.rpm">
					<filename>gnuplot-minimal-0:6.0.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="gnuplot-doc" epoch="0" version="6.0.3" release="1.el7" arch="noarch" src="gnuplot-6.0.3-1.el7.src.rpm">
					<filename>gnuplot-doc-0:6.0.3-1.el7.noarch.rpm</filename>
				</package>
				<package name="gnuplot-latex" epoch="0" version="6.0.3" release="1.el7" arch="noarch" src="gnuplot-6.0.3-1.el7.src.rpm">
					<filename>gnuplot-latex-0:6.0.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7307</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость apache-commons-net </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в apache-commons-net</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-commons-net-cve-2021-37533-7.3/</description>
               <solution>Установить обновление для пакета(ов) apache-commons-net
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-commons-net-cve-2021-37533-7.3/" type="self" id="ROS-20251216-7307" title="ROS-20251216-7307" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37533" type="cve" id="CVE-2021-37533" title="CVE-2021-37533" />
			<reference href="https://bdu.fstec.ru/vul/2023-00080" type="self" id="BDU:2023-00080" title="BDU:2023-00080" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="apache-commons-net" epoch="0" version="3.4" release="4.el7" arch="noarch" src="apache-commons-net-3.4-4.el7.src.rpm">
					<filename>apache-commons-net-0:3.4-4.el7.noarch.rpm</filename>
				</package>
				<package name="apache-commons-net-javadoc" epoch="0" version="3.4" release="4.el7" arch="noarch" src="apache-commons-net-3.4-4.el7.src.rpm">
					<filename>apache-commons-net-javadoc-0:3.4-4.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7308</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость guacamole </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в guacamole</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-guacamole-cve-2024-35164-7.3/</description>
               <solution>Установить обновление для пакета(ов) guacamole
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-guacamole-cve-2024-35164-7.3/" type="self" id="ROS-20251216-7308" title="ROS-20251216-7308" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35164" type="cve" id="CVE-2024-35164" title="CVE-2024-35164" />
			<reference href="https://bdu.fstec.ru/vul/2025-16097" type="self" id="BDU:2025-16097" title="BDU:2025-16097" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="guacamole-auth-ban" epoch="0" version="1.6.0" release="1.el7" arch="noarch" src="guacamole-1.6.0-1.el7.src.rpm">
					<filename>guacamole-auth-ban-0:1.6.0-1.el7.noarch.rpm</filename>
				</package>
				<package name="guacamole-auth-duo" epoch="0" version="1.6.0" release="1.el7" arch="noarch" src="guacamole-1.6.0-1.el7.src.rpm">
					<filename>guacamole-auth-duo-0:1.6.0-1.el7.noarch.rpm</filename>
				</package>
				<package name="guacamole-auth-header" epoch="0" version="1.6.0" release="1.el7" arch="noarch" src="guacamole-1.6.0-1.el7.src.rpm">
					<filename>guacamole-auth-header-0:1.6.0-1.el7.noarch.rpm</filename>
				</package>
				<package name="guacamole-auth-jdbc-mysql" epoch="0" version="1.6.0" release="1.el7" arch="noarch" src="guacamole-1.6.0-1.el7.src.rpm">
					<filename>guacamole-auth-jdbc-mysql-0:1.6.0-1.el7.noarch.rpm</filename>
				</package>
				<package name="guacamole-auth-jdbc-postgresql" epoch="0" version="1.6.0" release="1.el7" arch="noarch" src="guacamole-1.6.0-1.el7.src.rpm">
					<filename>guacamole-auth-jdbc-postgresql-0:1.6.0-1.el7.noarch.rpm</filename>
				</package>
				<package name="guacamole-auth-jdbc-sqlserver" epoch="0" version="1.6.0" release="1.el7" arch="noarch" src="guacamole-1.6.0-1.el7.src.rpm">
					<filename>guacamole-auth-jdbc-sqlserver-0:1.6.0-1.el7.noarch.rpm</filename>
				</package>
				<package name="guacamole-auth-json" epoch="0" version="1.6.0" release="1.el7" arch="noarch" src="guacamole-1.6.0-1.el7.src.rpm">
					<filename>guacamole-auth-json-0:1.6.0-1.el7.noarch.rpm</filename>
				</package>
				<package name="guacamole-auth-ldap" epoch="0" version="1.6.0" release="1.el7" arch="noarch" src="guacamole-1.6.0-1.el7.src.rpm">
					<filename>guacamole-auth-ldap-0:1.6.0-1.el7.noarch.rpm</filename>
				</package>
				<package name="guacamole-auth-quickconnect" epoch="0" version="1.6.0" release="1.el7" arch="noarch" src="guacamole-1.6.0-1.el7.src.rpm">
					<filename>guacamole-auth-quickconnect-0:1.6.0-1.el7.noarch.rpm</filename>
				</package>
				<package name="guacamole-auth-restrict" epoch="0" version="1.6.0" release="1.el7" arch="noarch" src="guacamole-1.6.0-1.el7.src.rpm">
					<filename>guacamole-auth-restrict-0:1.6.0-1.el7.noarch.rpm</filename>
				</package>
				<package name="guacamole-auth-sso" epoch="0" version="1.6.0" release="1.el7" arch="noarch" src="guacamole-1.6.0-1.el7.src.rpm">
					<filename>guacamole-auth-sso-0:1.6.0-1.el7.noarch.rpm</filename>
				</package>
				<package name="guacamole-auth-totp" epoch="0" version="1.6.0" release="1.el7" arch="noarch" src="guacamole-1.6.0-1.el7.src.rpm">
					<filename>guacamole-auth-totp-0:1.6.0-1.el7.noarch.rpm</filename>
				</package>
				<package name="guacamole-client" epoch="0" version="1.6.0" release="1.el7" arch="noarch" src="guacamole-1.6.0-1.el7.src.rpm">
					<filename>guacamole-client-0:1.6.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7309</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость guacamole-server </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в guacamole-server</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-guacamole-server-cve-2024-35164-7.3/</description>
               <solution>Установить обновление для пакета(ов) guacamole-server
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-guacamole-server-cve-2024-35164-7.3/" type="self" id="ROS-20251216-7309" title="ROS-20251216-7309" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35164" type="cve" id="CVE-2024-35164" title="CVE-2024-35164" />
			<reference href="https://bdu.fstec.ru/vul/2025-16097" type="self" id="BDU:2025-16097" title="BDU:2025-16097" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="guacd" epoch="0" version="1.6.0" release="1.el7" arch="x86_64" src="guacamole-server-1.6.0-1.el7.src.rpm">
					<filename>guacd-0:1.6.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libguac" epoch="0" version="1.6.0" release="1.el7" arch="x86_64" src="guacamole-server-1.6.0-1.el7.src.rpm">
					<filename>libguac-0:1.6.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libguac-client-kubernetes" epoch="0" version="1.6.0" release="1.el7" arch="x86_64" src="guacamole-server-1.6.0-1.el7.src.rpm">
					<filename>libguac-client-kubernetes-0:1.6.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libguac-client-rdp" epoch="0" version="1.6.0" release="1.el7" arch="x86_64" src="guacamole-server-1.6.0-1.el7.src.rpm">
					<filename>libguac-client-rdp-0:1.6.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libguac-client-ssh" epoch="0" version="1.6.0" release="1.el7" arch="x86_64" src="guacamole-server-1.6.0-1.el7.src.rpm">
					<filename>libguac-client-ssh-0:1.6.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libguac-client-telnet" epoch="0" version="1.6.0" release="1.el7" arch="x86_64" src="guacamole-server-1.6.0-1.el7.src.rpm">
					<filename>libguac-client-telnet-0:1.6.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libguac-client-vnc" epoch="0" version="1.6.0" release="1.el7" arch="x86_64" src="guacamole-server-1.6.0-1.el7.src.rpm">
					<filename>libguac-client-vnc-0:1.6.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libguac-devel" epoch="0" version="1.6.0" release="1.el7" arch="x86_64" src="guacamole-server-1.6.0-1.el7.src.rpm">
					<filename>libguac-devel-0:1.6.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7310</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость mediawiki </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в mediawiki</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mediawiki-cve-2025-6926-7.3/</description>
               <solution>Установить обновление для пакета(ов) mediawiki
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mediawiki-cve-2025-6926-7.3/" type="self" id="ROS-20251216-7310" title="ROS-20251216-7310" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6926" type="cve" id="CVE-2025-6926" title="CVE-2025-6926" />
			<reference href="https://bdu.fstec.ru/vul/2025-16101" type="self" id="BDU:2025-16101" title="BDU:2025-16101" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mediawiki" epoch="0" version="1.40.3" release="7.el7" arch="noarch" src="mediawiki-1.40.3-7.el7.src.rpm">
					<filename>mediawiki-0:1.40.3-7.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7311</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость apache-commons-lang3 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в apache-commons-lang3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-commons-lang3-cve-2025-48924-7.3/</description>
               <solution>Установить обновление для пакета(ов) apache-commons-lang3
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-commons-lang3-cve-2025-48924-7.3/" type="self" id="ROS-20251216-7311" title="ROS-20251216-7311" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48924" type="cve" id="CVE-2025-48924" title="CVE-2025-48924" />
			<reference href="https://bdu.fstec.ru/vul/2025-08956" type="self" id="BDU:2025-08956" title="BDU:2025-08956" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="apache-commons-lang3" epoch="0" version="3.18.0" release="2.el7" arch="noarch" src="apache-commons-lang3-3.18.0-2.el7.src.rpm">
					<filename>apache-commons-lang3-0:3.18.0-2.el7.noarch.rpm</filename>
				</package>
				<package name="apache-commons-lang3-javadoc" epoch="0" version="3.18.0" release="2.el7" arch="noarch" src="apache-commons-lang3-3.18.0-2.el7.src.rpm">
					<filename>apache-commons-lang3-javadoc-0:3.18.0-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7312</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость gnuplot </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gnuplot</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gnuplot-cve-2025-31178-7.3/</description>
               <solution>Установить обновление для пакета(ов) gnuplot
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gnuplot-cve-2025-31178-7.3/" type="self" id="ROS-20251216-7312" title="ROS-20251216-7312" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31178" type="cve" id="CVE-2025-31178" title="CVE-2025-31178" />
			<reference href="https://bdu.fstec.ru/vul/2025-16106" type="self" id="BDU:2025-16106" title="BDU:2025-16106" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gnuplot" epoch="0" version="6.0.3" release="1.el7" arch="x86_64" src="gnuplot-6.0.3-1.el7.src.rpm">
					<filename>gnuplot-0:6.0.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="gnuplot-common" epoch="0" version="6.0.3" release="1.el7" arch="x86_64" src="gnuplot-6.0.3-1.el7.src.rpm">
					<filename>gnuplot-common-0:6.0.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="gnuplot-minimal" epoch="0" version="6.0.3" release="1.el7" arch="x86_64" src="gnuplot-6.0.3-1.el7.src.rpm">
					<filename>gnuplot-minimal-0:6.0.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="gnuplot-doc" epoch="0" version="6.0.3" release="1.el7" arch="noarch" src="gnuplot-6.0.3-1.el7.src.rpm">
					<filename>gnuplot-doc-0:6.0.3-1.el7.noarch.rpm</filename>
				</package>
				<package name="gnuplot-latex" epoch="0" version="6.0.3" release="1.el7" arch="noarch" src="gnuplot-6.0.3-1.el7.src.rpm">
					<filename>gnuplot-latex-0:6.0.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7313</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-10585-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-10585-7.3/" type="self" id="ROS-20251216-7313" title="ROS-20251216-7313" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10585" type="cve" id="CVE-2025-10585" title="CVE-2025-10585" />
			<reference href="https://bdu.fstec.ru/vul/2025-11457" type="self" id="BDU:2025-11457" title="BDU:2025-11457" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="141.0.7390.122" release="1.el7" arch="x86_64" src="chromium-141.0.7390.122-1.el7.src.rpm">
					<filename>chromedriver-0:141.0.7390.122-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="141.0.7390.122" release="1.el7" arch="x86_64" src="chromium-141.0.7390.122-1.el7.src.rpm">
					<filename>chromium-0:141.0.7390.122-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="141.0.7390.122" release="1.el7" arch="x86_64" src="chromium-141.0.7390.122-1.el7.src.rpm">
					<filename>chromium-common-0:141.0.7390.122-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7314</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость qt6-qtbase </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в qt6-qtbase</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qt6-qtbase-cve-2025-3512-7.3/</description>
               <solution>Установить обновление для пакета(ов) qt6-qtbase
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-qt6-qtbase-cve-2025-3512-7.3/" type="self" id="ROS-20251216-7314" title="ROS-20251216-7314" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3512" type="cve" id="CVE-2025-3512" title="CVE-2025-3512" />
			<reference href="https://bdu.fstec.ru/vul/2025-16100" type="self" id="BDU:2025-16100" title="BDU:2025-16100" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="qt6-qtbase" epoch="0" version="6.6.3" release="5.el7" arch="x86_64" src="qt6-qtbase-6.6.3-5.el7.src.rpm">
					<filename>qt6-qtbase-0:6.6.3-5.el7.x86_64.rpm</filename>
				</package>
				<package name="qt6-qtbase-devel" epoch="0" version="6.6.3" release="5.el7" arch="x86_64" src="qt6-qtbase-6.6.3-5.el7.src.rpm">
					<filename>qt6-qtbase-devel-0:6.6.3-5.el7.x86_64.rpm</filename>
				</package>
				<package name="qt6-qtbase-examples" epoch="0" version="6.6.3" release="5.el7" arch="x86_64" src="qt6-qtbase-6.6.3-5.el7.src.rpm">
					<filename>qt6-qtbase-examples-0:6.6.3-5.el7.x86_64.rpm</filename>
				</package>
				<package name="qt6-qtbase-gui" epoch="0" version="6.6.3" release="5.el7" arch="x86_64" src="qt6-qtbase-6.6.3-5.el7.src.rpm">
					<filename>qt6-qtbase-gui-0:6.6.3-5.el7.x86_64.rpm</filename>
				</package>
				<package name="qt6-qtbase-ibase" epoch="0" version="6.6.3" release="5.el7" arch="x86_64" src="qt6-qtbase-6.6.3-5.el7.src.rpm">
					<filename>qt6-qtbase-ibase-0:6.6.3-5.el7.x86_64.rpm</filename>
				</package>
				<package name="qt6-qtbase-mysql" epoch="0" version="6.6.3" release="5.el7" arch="x86_64" src="qt6-qtbase-6.6.3-5.el7.src.rpm">
					<filename>qt6-qtbase-mysql-0:6.6.3-5.el7.x86_64.rpm</filename>
				</package>
				<package name="qt6-qtbase-odbc" epoch="0" version="6.6.3" release="5.el7" arch="x86_64" src="qt6-qtbase-6.6.3-5.el7.src.rpm">
					<filename>qt6-qtbase-odbc-0:6.6.3-5.el7.x86_64.rpm</filename>
				</package>
				<package name="qt6-qtbase-postgresql" epoch="0" version="6.6.3" release="5.el7" arch="x86_64" src="qt6-qtbase-6.6.3-5.el7.src.rpm">
					<filename>qt6-qtbase-postgresql-0:6.6.3-5.el7.x86_64.rpm</filename>
				</package>
				<package name="qt6-qtbase-private-devel" epoch="0" version="6.6.3" release="5.el7" arch="x86_64" src="qt6-qtbase-6.6.3-5.el7.src.rpm">
					<filename>qt6-qtbase-private-devel-0:6.6.3-5.el7.x86_64.rpm</filename>
				</package>
				<package name="qt6-qtbase-static" epoch="0" version="6.6.3" release="5.el7" arch="x86_64" src="qt6-qtbase-6.6.3-5.el7.src.rpm">
					<filename>qt6-qtbase-static-0:6.6.3-5.el7.x86_64.rpm</filename>
				</package>
				<package name="qt6-qtbase-common" epoch="0" version="6.6.3" release="5.el7" arch="noarch" src="qt6-qtbase-6.6.3-5.el7.src.rpm">
					<filename>qt6-qtbase-common-0:6.6.3-5.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7315</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость openssh </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в openssh</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssh-cve-2025-61984-7.3/</description>
               <solution>Установить обновление для пакета(ов) openssh
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssh-cve-2025-61984-7.3/" type="self" id="ROS-20251216-7315" title="ROS-20251216-7315" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61984" type="cve" id="CVE-2025-61984" title="CVE-2025-61984" />
			<reference href="https://bdu.fstec.ru/vul/2025-12884" type="self" id="BDU:2025-12884" title="BDU:2025-12884" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssh" epoch="0" version="8.9p1" release="16.el7" arch="x86_64" src="openssh-8.9p1-16.el7.src.rpm">
					<filename>openssh-0:8.9p1-16.el7.x86_64.rpm</filename>
				</package>
				<package name="openssh-askpass" epoch="0" version="8.9p1" release="16.el7" arch="x86_64" src="openssh-8.9p1-16.el7.src.rpm">
					<filename>openssh-askpass-0:8.9p1-16.el7.x86_64.rpm</filename>
				</package>
				<package name="openssh-clients" epoch="0" version="8.9p1" release="16.el7" arch="x86_64" src="openssh-8.9p1-16.el7.src.rpm">
					<filename>openssh-clients-0:8.9p1-16.el7.x86_64.rpm</filename>
				</package>
				<package name="openssh-keycat" epoch="0" version="8.9p1" release="16.el7" arch="x86_64" src="openssh-8.9p1-16.el7.src.rpm">
					<filename>openssh-keycat-0:8.9p1-16.el7.x86_64.rpm</filename>
				</package>
				<package name="openssh-server" epoch="0" version="8.9p1" release="16.el7" arch="x86_64" src="openssh-8.9p1-16.el7.src.rpm">
					<filename>openssh-server-0:8.9p1-16.el7.x86_64.rpm</filename>
				</package>
				<package name="pam_ssh_agent_auth" epoch="0" version="0.10.4" release="16.16.el7" arch="x86_64" src="openssh-8.9p1-16.el7.src.rpm">
					<filename>pam_ssh_agent_auth-0:0.10.4-16.16.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7316</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость ImageMagick7 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ImageMagick7</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick7-cve-2025-62171-7.3/</description>
               <solution>Установить обновление для пакета(ов) ImageMagick7
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick7-cve-2025-62171-7.3/" type="self" id="ROS-20251216-7316" title="ROS-20251216-7316" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62171" type="cve" id="CVE-2025-62171" title="CVE-2025-62171" />
			<reference href="https://bdu.fstec.ru/vul/2025-16112" type="self" id="BDU:2025-16112" title="BDU:2025-16112" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ImageMagick7" epoch="0" version="7.1.2.3" release="3.el7" arch="x86_64" src="ImageMagick7-7.1.2.3-3.el7.src.rpm">
					<filename>ImageMagick7-0:7.1.2.3-3.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick7-c++" epoch="0" version="7.1.2.3" release="3.el7" arch="x86_64" src="ImageMagick7-7.1.2.3-3.el7.src.rpm">
					<filename>ImageMagick7-c++-0:7.1.2.3-3.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick7-c++-devel" epoch="0" version="7.1.2.3" release="3.el7" arch="x86_64" src="ImageMagick7-7.1.2.3-3.el7.src.rpm">
					<filename>ImageMagick7-c++-devel-0:7.1.2.3-3.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick7-devel" epoch="0" version="7.1.2.3" release="3.el7" arch="x86_64" src="ImageMagick7-7.1.2.3-3.el7.src.rpm">
					<filename>ImageMagick7-devel-0:7.1.2.3-3.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick7-djvu" epoch="0" version="7.1.2.3" release="3.el7" arch="x86_64" src="ImageMagick7-7.1.2.3-3.el7.src.rpm">
					<filename>ImageMagick7-djvu-0:7.1.2.3-3.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick7-doc" epoch="0" version="7.1.2.3" release="3.el7" arch="x86_64" src="ImageMagick7-7.1.2.3-3.el7.src.rpm">
					<filename>ImageMagick7-doc-0:7.1.2.3-3.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick7-libs" epoch="0" version="7.1.2.3" release="3.el7" arch="x86_64" src="ImageMagick7-7.1.2.3-3.el7.src.rpm">
					<filename>ImageMagick7-libs-0:7.1.2.3-3.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick7-perl" epoch="0" version="7.1.2.3" release="3.el7" arch="x86_64" src="ImageMagick7-7.1.2.3-3.el7.src.rpm">
					<filename>ImageMagick7-perl-0:7.1.2.3-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7317</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость ImageMagick </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ImageMagick</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick-cve-2025-62171-7.3/</description>
               <solution>Установить обновление для пакета(ов) ImageMagick
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick-cve-2025-62171-7.3/" type="self" id="ROS-20251216-7317" title="ROS-20251216-7317" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62171" type="cve" id="CVE-2025-62171" title="CVE-2025-62171" />
			<reference href="https://bdu.fstec.ru/vul/2025-16112" type="self" id="BDU:2025-16112" title="BDU:2025-16112" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ImageMagick" epoch="1" version="6.9.13.29" release="3.el7" arch="x86_64" src="ImageMagick-6.9.13.29-3.el7.src.rpm">
					<filename>ImageMagick-1:6.9.13.29-3.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-c++" epoch="1" version="6.9.13.29" release="3.el7" arch="x86_64" src="ImageMagick-6.9.13.29-3.el7.src.rpm">
					<filename>ImageMagick-c++-1:6.9.13.29-3.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-c++-devel" epoch="1" version="6.9.13.29" release="3.el7" arch="x86_64" src="ImageMagick-6.9.13.29-3.el7.src.rpm">
					<filename>ImageMagick-c++-devel-1:6.9.13.29-3.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-devel" epoch="1" version="6.9.13.29" release="3.el7" arch="x86_64" src="ImageMagick-6.9.13.29-3.el7.src.rpm">
					<filename>ImageMagick-devel-1:6.9.13.29-3.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-djvu" epoch="1" version="6.9.13.29" release="3.el7" arch="x86_64" src="ImageMagick-6.9.13.29-3.el7.src.rpm">
					<filename>ImageMagick-djvu-1:6.9.13.29-3.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-doc" epoch="1" version="6.9.13.29" release="3.el7" arch="x86_64" src="ImageMagick-6.9.13.29-3.el7.src.rpm">
					<filename>ImageMagick-doc-1:6.9.13.29-3.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-heic" epoch="1" version="6.9.13.29" release="3.el7" arch="x86_64" src="ImageMagick-6.9.13.29-3.el7.src.rpm">
					<filename>ImageMagick-heic-1:6.9.13.29-3.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-libs" epoch="1" version="6.9.13.29" release="3.el7" arch="x86_64" src="ImageMagick-6.9.13.29-3.el7.src.rpm">
					<filename>ImageMagick-libs-1:6.9.13.29-3.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-perl" epoch="1" version="6.9.13.29" release="3.el7" arch="x86_64" src="ImageMagick-6.9.13.29-3.el7.src.rpm">
					<filename>ImageMagick-perl-1:6.9.13.29-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7318</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2025-61759-7.3/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2025-61759-7.3/" type="self" id="ROS-20251216-7318" title="ROS-20251216-7318" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61759" type="cve" id="CVE-2025-61759" title="CVE-2025-61759" />
			<reference href="https://bdu.fstec.ru/vul/2025-15859" type="self" id="BDU:2025-15859" title="BDU:2025-15859" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-devel" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-devel-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-server" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-server-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-vnc" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-vnc-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-webservice" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-webservice-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-VirtualBox" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>python3-VirtualBox-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmodsrc" epoch="0" version="7.1.14" release="1.el7" arch="noarch" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-kmodsrc-0:7.1.14-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7319</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость VirtualBox-kmod </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в VirtualBox-kmod</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-kmod-cve-2025-61759-7.3/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox-kmod
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-kmod-cve-2025-61759-7.3/" type="self" id="ROS-20251216-7319" title="ROS-20251216-7319" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61759" type="cve" id="CVE-2025-61759" title="CVE-2025-61759" />
			<reference href="https://bdu.fstec.ru/vul/2025-15859" type="self" id="BDU:2025-15859" title="BDU:2025-15859" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox-kmod" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-kmod-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-kmod-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmod_6.1.158-1.el7.3.x86_64" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-kmod-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-kmod_6.1.158-1.el7.3.x86_64-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7320</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость virtualbox-guest-additions </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в virtualbox-guest-additions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2025-61759-7.3/</description>
               <solution>Установить обновление для пакета(ов) virtualbox-guest-additions
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2025-61759-7.3/" type="self" id="ROS-20251216-7320" title="ROS-20251216-7320" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61759" type="cve" id="CVE-2025-61759" title="CVE-2025-61759" />
			<reference href="https://bdu.fstec.ru/vul/2025-15859" type="self" id="BDU:2025-15859" title="BDU:2025-15859" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="virtualbox-guest-additions" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="virtualbox-guest-additions-7.1.14-1.el7.src.rpm">
					<filename>virtualbox-guest-additions-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7321</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2025-61760-7.3/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2025-61760-7.3/" type="self" id="ROS-20251216-7321" title="ROS-20251216-7321" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61760" type="cve" id="CVE-2025-61760" title="CVE-2025-61760" />
			<reference href="https://bdu.fstec.ru/vul/2025-10635" type="self" id="BDU:2025-10635" title="BDU:2025-10635" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-devel" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-devel-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-server" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-server-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-vnc" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-vnc-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-webservice" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-webservice-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-VirtualBox" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>python3-VirtualBox-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmodsrc" epoch="0" version="7.1.14" release="1.el7" arch="noarch" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-kmodsrc-0:7.1.14-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7322</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость VirtualBox-kmod </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox-kmod</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-kmod-cve-2025-61760-7.3/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox-kmod
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-kmod-cve-2025-61760-7.3/" type="self" id="ROS-20251216-7322" title="ROS-20251216-7322" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61760" type="cve" id="CVE-2025-61760" title="CVE-2025-61760" />
			<reference href="https://bdu.fstec.ru/vul/2025-10635" type="self" id="BDU:2025-10635" title="BDU:2025-10635" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox-kmod" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-kmod-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-kmod-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmod_6.1.158-1.el7.3.x86_64" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-kmod-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-kmod_6.1.158-1.el7.3.x86_64-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7323</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость virtualbox-guest-additions </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в virtualbox-guest-additions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2025-61760-7.3/</description>
               <solution>Установить обновление для пакета(ов) virtualbox-guest-additions
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2025-61760-7.3/" type="self" id="ROS-20251216-7323" title="ROS-20251216-7323" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61760" type="cve" id="CVE-2025-61760" title="CVE-2025-61760" />
			<reference href="https://bdu.fstec.ru/vul/2025-10635" type="self" id="BDU:2025-10635" title="BDU:2025-10635" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="virtualbox-guest-additions" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="virtualbox-guest-additions-7.1.14-1.el7.src.rpm">
					<filename>virtualbox-guest-additions-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7324</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2025-62587-7.3/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2025-62587-7.3/" type="self" id="ROS-20251216-7324" title="ROS-20251216-7324" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62587" type="cve" id="CVE-2025-62587" title="CVE-2025-62587" />
			<reference href="https://bdu.fstec.ru/vul/2025-13295" type="self" id="BDU:2025-13295" title="BDU:2025-13295" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-devel" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-devel-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-server" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-server-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-vnc" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-vnc-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-webservice" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-webservice-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-VirtualBox" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>python3-VirtualBox-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmodsrc" epoch="0" version="7.1.14" release="1.el7" arch="noarch" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-kmodsrc-0:7.1.14-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7325</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость VirtualBox-kmod </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox-kmod</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-kmod-cve-2025-62587-7.3/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox-kmod
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-kmod-cve-2025-62587-7.3/" type="self" id="ROS-20251216-7325" title="ROS-20251216-7325" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62587" type="cve" id="CVE-2025-62587" title="CVE-2025-62587" />
			<reference href="https://bdu.fstec.ru/vul/2025-13295" type="self" id="BDU:2025-13295" title="BDU:2025-13295" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox-kmod" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-kmod-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-kmod-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmod_6.1.158-1.el7.3.x86_64" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-kmod-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-kmod_6.1.158-1.el7.3.x86_64-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7326</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость virtualbox-guest-additions </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в virtualbox-guest-additions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2025-62587-7.3/</description>
               <solution>Установить обновление для пакета(ов) virtualbox-guest-additions
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2025-62587-7.3/" type="self" id="ROS-20251216-7326" title="ROS-20251216-7326" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62587" type="cve" id="CVE-2025-62587" title="CVE-2025-62587" />
			<reference href="https://bdu.fstec.ru/vul/2025-13295" type="self" id="BDU:2025-13295" title="BDU:2025-13295" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="virtualbox-guest-additions" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="virtualbox-guest-additions-7.1.14-1.el7.src.rpm">
					<filename>virtualbox-guest-additions-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7327</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2025-62588-7.3/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2025-62588-7.3/" type="self" id="ROS-20251216-7327" title="ROS-20251216-7327" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62588" type="cve" id="CVE-2025-62588" title="CVE-2025-62588" />
			<reference href="https://bdu.fstec.ru/vul/2025-13298" type="self" id="BDU:2025-13298" title="BDU:2025-13298" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-devel" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-devel-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-server" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-server-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-vnc" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-vnc-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-webservice" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-webservice-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-VirtualBox" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>python3-VirtualBox-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmodsrc" epoch="0" version="7.1.14" release="1.el7" arch="noarch" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-kmodsrc-0:7.1.14-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7328</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость VirtualBox-kmod </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox-kmod</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-kmod-cve-2025-62588-7.3/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox-kmod
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-kmod-cve-2025-62588-7.3/" type="self" id="ROS-20251216-7328" title="ROS-20251216-7328" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62588" type="cve" id="CVE-2025-62588" title="CVE-2025-62588" />
			<reference href="https://bdu.fstec.ru/vul/2025-13298" type="self" id="BDU:2025-13298" title="BDU:2025-13298" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox-kmod" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-kmod-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-kmod-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmod_6.1.158-1.el7.3.x86_64" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-kmod-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-kmod_6.1.158-1.el7.3.x86_64-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7329</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость virtualbox-guest-additions </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в virtualbox-guest-additions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2025-62588-7.3/</description>
               <solution>Установить обновление для пакета(ов) virtualbox-guest-additions
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2025-62588-7.3/" type="self" id="ROS-20251216-7329" title="ROS-20251216-7329" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62588" type="cve" id="CVE-2025-62588" title="CVE-2025-62588" />
			<reference href="https://bdu.fstec.ru/vul/2025-13298" type="self" id="BDU:2025-13298" title="BDU:2025-13298" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="virtualbox-guest-additions" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="virtualbox-guest-additions-7.1.14-1.el7.src.rpm">
					<filename>virtualbox-guest-additions-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7330</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2025-62589-7.3/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2025-62589-7.3/" type="self" id="ROS-20251216-7330" title="ROS-20251216-7330" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62589" type="cve" id="CVE-2025-62589" title="CVE-2025-62589" />
			<reference href="https://bdu.fstec.ru/vul/2025-13296" type="self" id="BDU:2025-13296" title="BDU:2025-13296" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-devel" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-devel-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-server" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-server-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-vnc" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-vnc-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-webservice" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-webservice-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-VirtualBox" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>python3-VirtualBox-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmodsrc" epoch="0" version="7.1.14" release="1.el7" arch="noarch" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-kmodsrc-0:7.1.14-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7331</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость VirtualBox-kmod </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox-kmod</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-kmod-cve-2025-62589-7.3/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox-kmod
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-kmod-cve-2025-62589-7.3/" type="self" id="ROS-20251216-7331" title="ROS-20251216-7331" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62589" type="cve" id="CVE-2025-62589" title="CVE-2025-62589" />
			<reference href="https://bdu.fstec.ru/vul/2025-13296" type="self" id="BDU:2025-13296" title="BDU:2025-13296" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox-kmod" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-kmod-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-kmod-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmod_6.1.158-1.el7.3.x86_64" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-kmod-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-kmod_6.1.158-1.el7.3.x86_64-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7332</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость virtualbox-guest-additions </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в virtualbox-guest-additions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2025-62589-7.3/</description>
               <solution>Установить обновление для пакета(ов) virtualbox-guest-additions
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2025-62589-7.3/" type="self" id="ROS-20251216-7332" title="ROS-20251216-7332" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62589" type="cve" id="CVE-2025-62589" title="CVE-2025-62589" />
			<reference href="https://bdu.fstec.ru/vul/2025-13296" type="self" id="BDU:2025-13296" title="BDU:2025-13296" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="virtualbox-guest-additions" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="virtualbox-guest-additions-7.1.14-1.el7.src.rpm">
					<filename>virtualbox-guest-additions-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7333</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2025-62590-7.3/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2025-62590-7.3/" type="self" id="ROS-20251216-7333" title="ROS-20251216-7333" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62590" type="cve" id="CVE-2025-62590" title="CVE-2025-62590" />
			<reference href="https://bdu.fstec.ru/vul/2025-13297" type="self" id="BDU:2025-13297" title="BDU:2025-13297" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-devel" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-devel-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-server" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-server-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-vnc" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-vnc-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-webservice" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-webservice-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-VirtualBox" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>python3-VirtualBox-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmodsrc" epoch="0" version="7.1.14" release="1.el7" arch="noarch" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-kmodsrc-0:7.1.14-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7334</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость VirtualBox-kmod </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox-kmod</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-kmod-cve-2025-62590-7.3/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox-kmod
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-kmod-cve-2025-62590-7.3/" type="self" id="ROS-20251216-7334" title="ROS-20251216-7334" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62590" type="cve" id="CVE-2025-62590" title="CVE-2025-62590" />
			<reference href="https://bdu.fstec.ru/vul/2025-13297" type="self" id="BDU:2025-13297" title="BDU:2025-13297" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox-kmod" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-kmod-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-kmod-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmod_6.1.158-1.el7.3.x86_64" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-kmod-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-kmod_6.1.158-1.el7.3.x86_64-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7335</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость virtualbox-guest-additions </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в virtualbox-guest-additions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2025-62590-7.3/</description>
               <solution>Установить обновление для пакета(ов) virtualbox-guest-additions
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2025-62590-7.3/" type="self" id="ROS-20251216-7335" title="ROS-20251216-7335" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62590" type="cve" id="CVE-2025-62590" title="CVE-2025-62590" />
			<reference href="https://bdu.fstec.ru/vul/2025-13297" type="self" id="BDU:2025-13297" title="BDU:2025-13297" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="virtualbox-guest-additions" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="virtualbox-guest-additions-7.1.14-1.el7.src.rpm">
					<filename>virtualbox-guest-additions-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7336</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2025-62591-7.3/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2025-62591-7.3/" type="self" id="ROS-20251216-7336" title="ROS-20251216-7336" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62591" type="cve" id="CVE-2025-62591" title="CVE-2025-62591" />
			<reference href="https://bdu.fstec.ru/vul/2025-13300" type="self" id="BDU:2025-13300" title="BDU:2025-13300" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-devel" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-devel-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-server" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-server-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-vnc" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-vnc-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-webservice" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-webservice-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-VirtualBox" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>python3-VirtualBox-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmodsrc" epoch="0" version="7.1.14" release="1.el7" arch="noarch" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-kmodsrc-0:7.1.14-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7337</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость VirtualBox-kmod </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в VirtualBox-kmod</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-kmod-cve-2025-62591-7.3/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox-kmod
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-kmod-cve-2025-62591-7.3/" type="self" id="ROS-20251216-7337" title="ROS-20251216-7337" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62591" type="cve" id="CVE-2025-62591" title="CVE-2025-62591" />
			<reference href="https://bdu.fstec.ru/vul/2025-13300" type="self" id="BDU:2025-13300" title="BDU:2025-13300" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox-kmod" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-kmod-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-kmod-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmod_6.1.158-1.el7.3.x86_64" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-kmod-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-kmod_6.1.158-1.el7.3.x86_64-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7338</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость virtualbox-guest-additions </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в virtualbox-guest-additions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2025-62591-7.3/</description>
               <solution>Установить обновление для пакета(ов) virtualbox-guest-additions
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2025-62591-7.3/" type="self" id="ROS-20251216-7338" title="ROS-20251216-7338" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62591" type="cve" id="CVE-2025-62591" title="CVE-2025-62591" />
			<reference href="https://bdu.fstec.ru/vul/2025-13300" type="self" id="BDU:2025-13300" title="BDU:2025-13300" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="virtualbox-guest-additions" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="virtualbox-guest-additions-7.1.14-1.el7.src.rpm">
					<filename>virtualbox-guest-additions-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7339</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2025-62592-7.3/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2025-62592-7.3/" type="self" id="ROS-20251216-7339" title="ROS-20251216-7339" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62592" type="cve" id="CVE-2025-62592" title="CVE-2025-62592" />
			<reference href="https://bdu.fstec.ru/vul/2025-13214" type="self" id="BDU:2025-13214" title="BDU:2025-13214" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-devel" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-devel-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-server" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-server-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-vnc" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-vnc-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-webservice" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-webservice-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-VirtualBox" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>python3-VirtualBox-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmodsrc" epoch="0" version="7.1.14" release="1.el7" arch="noarch" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-kmodsrc-0:7.1.14-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7340</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость VirtualBox-kmod </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в VirtualBox-kmod</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-kmod-cve-2025-62592-7.3/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox-kmod
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-kmod-cve-2025-62592-7.3/" type="self" id="ROS-20251216-7340" title="ROS-20251216-7340" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62592" type="cve" id="CVE-2025-62592" title="CVE-2025-62592" />
			<reference href="https://bdu.fstec.ru/vul/2025-13214" type="self" id="BDU:2025-13214" title="BDU:2025-13214" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox-kmod" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-kmod-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-kmod-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmod_6.1.158-1.el7.3.x86_64" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-kmod-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-kmod_6.1.158-1.el7.3.x86_64-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7341</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость virtualbox-guest-additions </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в virtualbox-guest-additions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2025-62592-7.3/</description>
               <solution>Установить обновление для пакета(ов) virtualbox-guest-additions
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2025-62592-7.3/" type="self" id="ROS-20251216-7341" title="ROS-20251216-7341" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62592" type="cve" id="CVE-2025-62592" title="CVE-2025-62592" />
			<reference href="https://bdu.fstec.ru/vul/2025-13214" type="self" id="BDU:2025-13214" title="BDU:2025-13214" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="virtualbox-guest-additions" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="virtualbox-guest-additions-7.1.14-1.el7.src.rpm">
					<filename>virtualbox-guest-additions-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7342</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2025-62641-7.3/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2025-62641-7.3/" type="self" id="ROS-20251216-7342" title="ROS-20251216-7342" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62641" type="cve" id="CVE-2025-62641" title="CVE-2025-62641" />
			<reference href="https://bdu.fstec.ru/vul/2025-13299" type="self" id="BDU:2025-13299" title="BDU:2025-13299" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-devel" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-devel-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-server" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-server-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-vnc" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-vnc-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-webservice" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-webservice-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-VirtualBox" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>python3-VirtualBox-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmodsrc" epoch="0" version="7.1.14" release="1.el7" arch="noarch" src="VirtualBox-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-kmodsrc-0:7.1.14-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7343</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость VirtualBox-kmod </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox-kmod</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-kmod-cve-2025-62641-7.3/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox-kmod
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-kmod-cve-2025-62641-7.3/" type="self" id="ROS-20251216-7343" title="ROS-20251216-7343" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62641" type="cve" id="CVE-2025-62641" title="CVE-2025-62641" />
			<reference href="https://bdu.fstec.ru/vul/2025-13299" type="self" id="BDU:2025-13299" title="BDU:2025-13299" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox-kmod" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-kmod-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-kmod-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmod_6.1.158-1.el7.3.x86_64" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="VirtualBox-kmod-7.1.14-1.el7.src.rpm">
					<filename>VirtualBox-kmod_6.1.158-1.el7.3.x86_64-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7344</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость virtualbox-guest-additions </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в virtualbox-guest-additions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2025-62641-7.3/</description>
               <solution>Установить обновление для пакета(ов) virtualbox-guest-additions
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2025-62641-7.3/" type="self" id="ROS-20251216-7344" title="ROS-20251216-7344" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62641" type="cve" id="CVE-2025-62641" title="CVE-2025-62641" />
			<reference href="https://bdu.fstec.ru/vul/2025-13299" type="self" id="BDU:2025-13299" title="BDU:2025-13299" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="virtualbox-guest-additions" epoch="0" version="7.1.14" release="1.el7" arch="x86_64" src="virtualbox-guest-additions-7.1.14-1.el7.src.rpm">
					<filename>virtualbox-guest-additions-0:7.1.14-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7345</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость gimp </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2025-10934-7.3/</description>
               <solution>Установить обновление для пакета(ов) gimp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2025-10934-7.3/" type="self" id="ROS-20251216-7345" title="ROS-20251216-7345" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10934" type="cve" id="CVE-2025-10934" title="CVE-2025-10934" />
			<reference href="https://bdu.fstec.ru/vul/2025-13877" type="self" id="BDU:2025-13877" title="BDU:2025-13877" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gimp" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-devel-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-devel-tools-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-libs-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7346</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость gimp </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в gimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2025-10925-7.3/</description>
               <solution>Установить обновление для пакета(ов) gimp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2025-10925-7.3/" type="self" id="ROS-20251216-7346" title="ROS-20251216-7346" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10925" type="cve" id="CVE-2025-10925" title="CVE-2025-10925" />
			<reference href="https://bdu.fstec.ru/vul/2025-16103" type="self" id="BDU:2025-16103" title="BDU:2025-16103" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gimp" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-devel-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-devel-tools-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-libs-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7347</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость gimp </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в gimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2025-10924-7.3/</description>
               <solution>Установить обновление для пакета(ов) gimp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2025-10924-7.3/" type="self" id="ROS-20251216-7347" title="ROS-20251216-7347" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10924" type="cve" id="CVE-2025-10924" title="CVE-2025-10924" />
			<reference href="https://bdu.fstec.ru/vul/2025-16104" type="self" id="BDU:2025-16104" title="BDU:2025-16104" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gimp" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-devel-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-devel-tools-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-libs-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7348</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость gimp </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в gimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2025-10923-7.3/</description>
               <solution>Установить обновление для пакета(ов) gimp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2025-10923-7.3/" type="self" id="ROS-20251216-7348" title="ROS-20251216-7348" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10923" type="cve" id="CVE-2025-10923" title="CVE-2025-10923" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gimp" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-devel-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-devel-tools-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-libs-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7349</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость gimp </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2025-10920-7.3/</description>
               <solution>Установить обновление для пакета(ов) gimp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2025-10920-7.3/" type="self" id="ROS-20251216-7349" title="ROS-20251216-7349" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10920" type="cve" id="CVE-2025-10920" title="CVE-2025-10920" />
			<reference href="https://bdu.fstec.ru/vul/2025-13626" type="self" id="BDU:2025-13626" title="BDU:2025-13626" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gimp" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-devel-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-devel-tools-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-libs-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7350</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость runc </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в runc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-runc-cve-2025-52881-7.3/</description>
               <solution>Установить обновление для пакета(ов) runc
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-runc-cve-2025-52881-7.3/" type="self" id="ROS-20251216-7350" title="ROS-20251216-7350" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52881" type="cve" id="CVE-2025-52881" title="CVE-2025-52881" />
			<reference href="https://bdu.fstec.ru/vul/2025-14040" type="self" id="BDU:2025-14040" title="BDU:2025-14040" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="runc" epoch="2" version="1.2.8" release="1.el7" arch="x86_64" src="runc-1.2.8-1.el7.src.rpm">
					<filename>runc-2:1.2.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7351</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость containerd </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в containerd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-containerd-cve-2025-64329-7.3/</description>
               <solution>Установить обновление для пакета(ов) containerd
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-containerd-cve-2025-64329-7.3/" type="self" id="ROS-20251216-7351" title="ROS-20251216-7351" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64329" type="cve" id="CVE-2025-64329" title="CVE-2025-64329" />
			<reference href="https://bdu.fstec.ru/vul/2025-16113" type="self" id="BDU:2025-16113" title="BDU:2025-16113" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="containerd" epoch="0" version="1.7.17" release="8.el7" arch="x86_64" src="containerd-1.7.17-8.el7.src.rpm">
					<filename>containerd-0:1.7.17-8.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7352</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость incus </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в incus</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-incus-cve-2025-64507-7.3/</description>
               <solution>Установить обновление для пакета(ов) incus
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-incus-cve-2025-64507-7.3/" type="self" id="ROS-20251216-7352" title="ROS-20251216-7352" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64507" type="cve" id="CVE-2025-64507" title="CVE-2025-64507" />
			<reference href="https://bdu.fstec.ru/vul/2025-16114" type="self" id="BDU:2025-16114" title="BDU:2025-16114" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="incus" epoch="0" version="6.18.0" release="1.el7" arch="x86_64" src="incus-6.18.0-1.el7.src.rpm">
					<filename>incus-0:6.18.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="incus-agent" epoch="0" version="6.18.0" release="1.el7" arch="x86_64" src="incus-6.18.0-1.el7.src.rpm">
					<filename>incus-agent-0:6.18.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="incus-client" epoch="0" version="6.18.0" release="1.el7" arch="x86_64" src="incus-6.18.0-1.el7.src.rpm">
					<filename>incus-client-0:6.18.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="incus-tools" epoch="0" version="6.18.0" release="1.el7" arch="x86_64" src="incus-6.18.0-1.el7.src.rpm">
					<filename>incus-tools-0:6.18.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="incus-selinux" epoch="0" version="6.18.0" release="1.el7" arch="noarch" src="incus-6.18.0-1.el7.src.rpm">
					<filename>incus-selinux-0:6.18.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7353</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость golang-x-crypto </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang-x-crypto</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-x-crypto-cve-2025-47913-7.3/</description>
               <solution>Установить обновление для пакета(ов) golang-x-crypto
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-x-crypto-cve-2025-47913-7.3/" type="self" id="ROS-20251216-7353" title="ROS-20251216-7353" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47913" type="cve" id="CVE-2025-47913" title="CVE-2025-47913" />
			<reference href="https://bdu.fstec.ru/vul/2025-16110" type="self" id="BDU:2025-16110" title="BDU:2025-16110" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang-x-crypto-devel" epoch="0" version="0.45.0" release="1.el7" arch="noarch" src="golang-x-crypto-0.45.0-1.el7.src.rpm">
					<filename>golang-x-crypto-devel-0:0.45.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7354</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость podman </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в podman</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-podman-cve-2025-52881-7.3/</description>
               <solution>Установить обновление для пакета(ов) podman
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-podman-cve-2025-52881-7.3/" type="self" id="ROS-20251216-7354" title="ROS-20251216-7354" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52881" type="cve" id="CVE-2025-52881" title="CVE-2025-52881" />
			<reference href="https://bdu.fstec.ru/vul/2025-14040" type="self" id="BDU:2025-14040" title="BDU:2025-14040" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="podman" epoch="0" version="4.9.5" release="7.el7" arch="x86_64" src="podman-4.9.5-7.el7.src.rpm">
					<filename>podman-0:4.9.5-7.el7.x86_64.rpm</filename>
				</package>
				<package name="podman-plugins" epoch="0" version="4.9.5" release="7.el7" arch="x86_64" src="podman-4.9.5-7.el7.src.rpm">
					<filename>podman-plugins-0:4.9.5-7.el7.x86_64.rpm</filename>
				</package>
				<package name="podman-remote" epoch="0" version="4.9.5" release="7.el7" arch="x86_64" src="podman-4.9.5-7.el7.src.rpm">
					<filename>podman-remote-0:4.9.5-7.el7.x86_64.rpm</filename>
				</package>
				<package name="podman-tests" epoch="0" version="4.9.5" release="7.el7" arch="x86_64" src="podman-4.9.5-7.el7.src.rpm">
					<filename>podman-tests-0:4.9.5-7.el7.x86_64.rpm</filename>
				</package>
				<package name="podman-docker" epoch="0" version="4.9.5" release="7.el7" arch="noarch" src="podman-4.9.5-7.el7.src.rpm">
					<filename>podman-docker-0:4.9.5-7.el7.noarch.rpm</filename>
				</package>
				<package name="podman-fish-completion" epoch="0" version="4.9.5" release="7.el7" arch="noarch" src="podman-4.9.5-7.el7.src.rpm">
					<filename>podman-fish-completion-0:4.9.5-7.el7.noarch.rpm</filename>
				</package>
				<package name="podman-zsh-completion" epoch="0" version="4.9.5" release="7.el7" arch="noarch" src="podman-4.9.5-7.el7.src.rpm">
					<filename>podman-zsh-completion-0:4.9.5-7.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7355</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12428-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12428-7.3/" type="self" id="ROS-20251216-7355" title="ROS-20251216-7355" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12428" type="cve" id="CVE-2025-12428" title="CVE-2025-12428" />
			<reference href="https://bdu.fstec.ru/vul/2025-16061" type="self" id="BDU:2025-16061" title="BDU:2025-16061" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7356</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12429-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12429-7.3/" type="self" id="ROS-20251216-7356" title="ROS-20251216-7356" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12429" type="cve" id="CVE-2025-12429" title="CVE-2025-12429" />
			<reference href="https://bdu.fstec.ru/vul/2025-14019" type="self" id="BDU:2025-14019" title="BDU:2025-14019" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7357</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12430-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12430-7.3/" type="self" id="ROS-20251216-7357" title="ROS-20251216-7357" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12430" type="cve" id="CVE-2025-12430" title="CVE-2025-12430" />
			<reference href="https://bdu.fstec.ru/vul/2025-14007" type="self" id="BDU:2025-14007" title="BDU:2025-14007" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7358</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12431-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12431-7.3/" type="self" id="ROS-20251216-7358" title="ROS-20251216-7358" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12431" type="cve" id="CVE-2025-12431" title="CVE-2025-12431" />
			<reference href="https://bdu.fstec.ru/vul/2025-14009" type="self" id="BDU:2025-14009" title="BDU:2025-14009" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7359</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12432-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12432-7.3/" type="self" id="ROS-20251216-7359" title="ROS-20251216-7359" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12432" type="cve" id="CVE-2025-12432" title="CVE-2025-12432" />
			<reference href="https://bdu.fstec.ru/vul/2025-14008" type="self" id="BDU:2025-14008" title="BDU:2025-14008" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7360</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12433-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12433-7.3/" type="self" id="ROS-20251216-7360" title="ROS-20251216-7360" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12433" type="cve" id="CVE-2025-12433" title="CVE-2025-12433" />
			<reference href="https://bdu.fstec.ru/vul/2025-14012" type="self" id="BDU:2025-14012" title="BDU:2025-14012" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7361</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12434-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12434-7.3/" type="self" id="ROS-20251216-7361" title="ROS-20251216-7361" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12434" type="cve" id="CVE-2025-12434" title="CVE-2025-12434" />
			<reference href="https://bdu.fstec.ru/vul/2025-14021" type="self" id="BDU:2025-14021" title="BDU:2025-14021" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7362</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12435-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12435-7.3/" type="self" id="ROS-20251216-7362" title="ROS-20251216-7362" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12435" type="cve" id="CVE-2025-12435" title="CVE-2025-12435" />
			<reference href="https://bdu.fstec.ru/vul/2025-14014" type="self" id="BDU:2025-14014" title="BDU:2025-14014" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7363</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12436-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12436-7.3/" type="self" id="ROS-20251216-7363" title="ROS-20251216-7363" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12436" type="cve" id="CVE-2025-12436" title="CVE-2025-12436" />
			<reference href="https://bdu.fstec.ru/vul/2025-14016" type="self" id="BDU:2025-14016" title="BDU:2025-14016" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7364</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12437-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12437-7.3/" type="self" id="ROS-20251216-7364" title="ROS-20251216-7364" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12437" type="cve" id="CVE-2025-12437" title="CVE-2025-12437" />
			<reference href="https://bdu.fstec.ru/vul/2025-14017" type="self" id="BDU:2025-14017" title="BDU:2025-14017" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7365</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12438-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12438-7.3/" type="self" id="ROS-20251216-7365" title="ROS-20251216-7365" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12438" type="cve" id="CVE-2025-12438" title="CVE-2025-12438" />
			<reference href="https://bdu.fstec.ru/vul/2025-14018" type="self" id="BDU:2025-14018" title="BDU:2025-14018" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7366</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12439-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12439-7.3/" type="self" id="ROS-20251216-7366" title="ROS-20251216-7366" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12439" type="cve" id="CVE-2025-12439" title="CVE-2025-12439" />
			<reference href="https://bdu.fstec.ru/vul/2025-14022" type="self" id="BDU:2025-14022" title="BDU:2025-14022" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7367</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12440-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12440-7.3/" type="self" id="ROS-20251216-7367" title="ROS-20251216-7367" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12440" type="cve" id="CVE-2025-12440" title="CVE-2025-12440" />
			<reference href="https://bdu.fstec.ru/vul/2025-14023" type="self" id="BDU:2025-14023" title="BDU:2025-14023" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7368</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12441-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12441-7.3/" type="self" id="ROS-20251216-7368" title="ROS-20251216-7368" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12441" type="cve" id="CVE-2025-12441" title="CVE-2025-12441" />
			<reference href="https://bdu.fstec.ru/vul/2025-14020" type="self" id="BDU:2025-14020" title="BDU:2025-14020" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7369</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12443-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12443-7.3/" type="self" id="ROS-20251216-7369" title="ROS-20251216-7369" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12443" type="cve" id="CVE-2025-12443" title="CVE-2025-12443" />
			<reference href="https://bdu.fstec.ru/vul/2025-14025" type="self" id="BDU:2025-14025" title="BDU:2025-14025" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7370</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12444-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12444-7.3/" type="self" id="ROS-20251216-7370" title="ROS-20251216-7370" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12444" type="cve" id="CVE-2025-12444" title="CVE-2025-12444" />
			<reference href="https://bdu.fstec.ru/vul/2025-14024" type="self" id="BDU:2025-14024" title="BDU:2025-14024" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7371</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12445-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12445-7.3/" type="self" id="ROS-20251216-7371" title="ROS-20251216-7371" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12445" type="cve" id="CVE-2025-12445" title="CVE-2025-12445" />
			<reference href="https://bdu.fstec.ru/vul/2025-14026" type="self" id="BDU:2025-14026" title="BDU:2025-14026" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7372</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12446-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12446-7.3/" type="self" id="ROS-20251216-7372" title="ROS-20251216-7372" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12446" type="cve" id="CVE-2025-12446" title="CVE-2025-12446" />
			<reference href="https://bdu.fstec.ru/vul/2025-14013" type="self" id="BDU:2025-14013" title="BDU:2025-14013" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-7373</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12447-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12447-7.3/" type="self" id="ROS-20251216-7373" title="ROS-20251216-7373" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12447" type="cve" id="CVE-2025-12447" title="CVE-2025-12447" />
			<reference href="https://bdu.fstec.ru/vul/2025-14015" type="self" id="BDU:2025-14015" title="BDU:2025-14015" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-7301</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость runc </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в runc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-runc-cve-2025-52565-7.3/</description>
               <solution>Установить обновление для пакета(ов) runc
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-runc-cve-2025-52565-7.3/" type="self" id="ROS-20251217-7301" title="ROS-20251217-7301" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52565" type="cve" id="CVE-2025-52565" title="CVE-2025-52565" />
			<reference href="https://bdu.fstec.ru/vul/2025-14042" type="self" id="BDU:2025-14042" title="BDU:2025-14042" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="runc" epoch="2" version="1.2.8" release="1.el7" arch="x86_64" src="runc-1.2.8-1.el7.src.rpm">
					<filename>runc-2:1.2.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-7302</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12725-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12725-7.3/" type="self" id="ROS-20251217-7302" title="ROS-20251217-7302" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12725" type="cve" id="CVE-2025-12725" title="CVE-2025-12725" />
			<reference href="https://bdu.fstec.ru/vul/2025-13846" type="self" id="BDU:2025-13846" title="BDU:2025-13846" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-7303</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12726-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12726-7.3/" type="self" id="ROS-20251217-7303" title="ROS-20251217-7303" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12726" type="cve" id="CVE-2025-12726" title="CVE-2025-12726" />
			<reference href="https://bdu.fstec.ru/vul/2025-13847" type="self" id="BDU:2025-13847" title="BDU:2025-13847" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-7304</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12727-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12727-7.3/" type="self" id="ROS-20251217-7304" title="ROS-20251217-7304" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12727" type="cve" id="CVE-2025-12727" title="CVE-2025-12727" />
			<reference href="https://bdu.fstec.ru/vul/2025-13848" type="self" id="BDU:2025-13848" title="BDU:2025-13848" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-7305</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12728-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12728-7.3/" type="self" id="ROS-20251217-7305" title="ROS-20251217-7305" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12728" type="cve" id="CVE-2025-12728" title="CVE-2025-12728" />
			<reference href="https://bdu.fstec.ru/vul/2025-13849" type="self" id="BDU:2025-13849" title="BDU:2025-13849" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-7306</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12729-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-12729-7.3/" type="self" id="ROS-20251217-7306" title="ROS-20251217-7306" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12729" type="cve" id="CVE-2025-12729" title="CVE-2025-12729" />
			<reference href="https://bdu.fstec.ru/vul/2025-13850" type="self" id="BDU:2025-13850" title="BDU:2025-13850" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-7307</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2025-13012-7.3/</description>
               <solution>Установить обновление для пакета(ов) firefox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2025-13012-7.3/" type="self" id="ROS-20251217-7307" title="ROS-20251217-7307" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13012" type="cve" id="CVE-2025-13012" title="CVE-2025-13012" />
			<reference href="https://bdu.fstec.ru/vul/2025-14551" type="self" id="BDU:2025-14551" title="BDU:2025-14551" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.30.0" release="1.el7" arch="x86_64" src="firefox-115.30.0-1.el7.src.rpm">
					<filename>firefox-0:115.30.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-7308</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2025-13013-7.3/</description>
               <solution>Установить обновление для пакета(ов) firefox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2025-13013-7.3/" type="self" id="ROS-20251217-7308" title="ROS-20251217-7308" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13013" type="cve" id="CVE-2025-13013" title="CVE-2025-13013" />
			<reference href="https://bdu.fstec.ru/vul/2025-14552" type="self" id="BDU:2025-14552" title="BDU:2025-14552" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.30.0" release="1.el7" arch="x86_64" src="firefox-115.30.0-1.el7.src.rpm">
					<filename>firefox-0:115.30.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-7309</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2025-13014-7.3/</description>
               <solution>Установить обновление для пакета(ов) firefox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2025-13014-7.3/" type="self" id="ROS-20251217-7309" title="ROS-20251217-7309" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13014" type="cve" id="CVE-2025-13014" title="CVE-2025-13014" />
			<reference href="https://bdu.fstec.ru/vul/2025-14550" type="self" id="BDU:2025-14550" title="BDU:2025-14550" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.30.0" release="1.el7" arch="x86_64" src="firefox-115.30.0-1.el7.src.rpm">
					<filename>firefox-0:115.30.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-7310</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2025-13015-7.3/</description>
               <solution>Установить обновление для пакета(ов) firefox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2025-13015-7.3/" type="self" id="ROS-20251217-7310" title="ROS-20251217-7310" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13015" type="cve" id="CVE-2025-13015" title="CVE-2025-13015" />
			<reference href="https://bdu.fstec.ru/vul/2025-14549" type="self" id="BDU:2025-14549" title="BDU:2025-14549" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.30.0" release="1.el7" arch="x86_64" src="firefox-115.30.0-1.el7.src.rpm">
					<filename>firefox-0:115.30.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-7311</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13042-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13042-7.3/" type="self" id="ROS-20251217-7311" title="ROS-20251217-7311" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13042" type="cve" id="CVE-2025-13042" title="CVE-2025-13042" />
			<reference href="https://bdu.fstec.ru/vul/2025-14373" type="self" id="BDU:2025-14373" title="BDU:2025-14373" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-7312</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13223-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13223-7.3/" type="self" id="ROS-20251217-7312" title="ROS-20251217-7312" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13223" type="cve" id="CVE-2025-13223" title="CVE-2025-13223" />
			<reference href="https://bdu.fstec.ru/vul/2025-14497" type="self" id="BDU:2025-14497" title="BDU:2025-14497" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-7313</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13224-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13224-7.3/" type="self" id="ROS-20251217-7313" title="ROS-20251217-7313" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13224" type="cve" id="CVE-2025-13224" title="CVE-2025-13224" />
			<reference href="https://bdu.fstec.ru/vul/2025-14498" type="self" id="BDU:2025-14498" title="BDU:2025-14498" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-7314</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13226-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13226-7.3/" type="self" id="ROS-20251217-7314" title="ROS-20251217-7314" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13226" type="cve" id="CVE-2025-13226" title="CVE-2025-13226" />
			<reference href="https://bdu.fstec.ru/vul/2025-14823" type="self" id="BDU:2025-14823" title="BDU:2025-14823" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-7315</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13227-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13227-7.3/" type="self" id="ROS-20251217-7315" title="ROS-20251217-7315" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13227" type="cve" id="CVE-2025-13227" title="CVE-2025-13227" />
			<reference href="https://bdu.fstec.ru/vul/2025-14819" type="self" id="BDU:2025-14819" title="BDU:2025-14819" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-7316</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13228-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13228-7.3/" type="self" id="ROS-20251217-7316" title="ROS-20251217-7316" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13228" type="cve" id="CVE-2025-13228" title="CVE-2025-13228" />
			<reference href="https://bdu.fstec.ru/vul/2025-14821" type="self" id="BDU:2025-14821" title="BDU:2025-14821" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-7317</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13229-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13229-7.3/" type="self" id="ROS-20251217-7317" title="ROS-20251217-7317" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13229" type="cve" id="CVE-2025-13229" title="CVE-2025-13229" />
			<reference href="https://bdu.fstec.ru/vul/2025-14820" type="self" id="BDU:2025-14820" title="BDU:2025-14820" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-7318</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13230-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13230-7.3/" type="self" id="ROS-20251217-7318" title="ROS-20251217-7318" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13230" type="cve" id="CVE-2025-13230" title="CVE-2025-13230" />
			<reference href="https://bdu.fstec.ru/vul/2025-14822" type="self" id="BDU:2025-14822" title="BDU:2025-14822" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.el7" arch="x86_64" src="chromium-142.0.7444.175-1.el7.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-7319</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2025-61727-7.3/</description>
               <solution>Установить обновление для пакета(ов) golang
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2025-61727-7.3/" type="self" id="ROS-20251217-7319" title="ROS-20251217-7319" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61727" type="cve" id="CVE-2025-61727" title="CVE-2025-61727" />
			<reference href="https://bdu.fstec.ru/vul/2026-00268" type="self" id="BDU:2026-00268" title="BDU:2026-00268" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.25.5" release="1.el7" arch="x86_64" src="golang-1.25.5-1.el7.src.rpm">
					<filename>golang-0:1.25.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.25.5" release="1.el7" arch="x86_64" src="golang-1.25.5-1.el7.src.rpm">
					<filename>golang-bin-0:1.25.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.25.5" release="1.el7" arch="x86_64" src="golang-1.25.5-1.el7.src.rpm">
					<filename>golang-shared-0:1.25.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-docs" epoch="0" version="1.25.5" release="1.el7" arch="noarch" src="golang-1.25.5-1.el7.src.rpm">
					<filename>golang-docs-0:1.25.5-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-misc" epoch="0" version="1.25.5" release="1.el7" arch="noarch" src="golang-1.25.5-1.el7.src.rpm">
					<filename>golang-misc-0:1.25.5-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-src" epoch="0" version="1.25.5" release="1.el7" arch="noarch" src="golang-1.25.5-1.el7.src.rpm">
					<filename>golang-src-0:1.25.5-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-tests" epoch="0" version="1.25.5" release="1.el7" arch="noarch" src="golang-1.25.5-1.el7.src.rpm">
					<filename>golang-tests-0:1.25.5-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-7320</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2025-61729-7.3/</description>
               <solution>Установить обновление для пакета(ов) golang
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2025-61729-7.3/" type="self" id="ROS-20251217-7320" title="ROS-20251217-7320" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61729" type="cve" id="CVE-2025-61729" title="CVE-2025-61729" />
			<reference href="https://bdu.fstec.ru/vul/2025-16242" type="self" id="BDU:2025-16242" title="BDU:2025-16242" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.25.5" release="1.el7" arch="x86_64" src="golang-1.25.5-1.el7.src.rpm">
					<filename>golang-0:1.25.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.25.5" release="1.el7" arch="x86_64" src="golang-1.25.5-1.el7.src.rpm">
					<filename>golang-bin-0:1.25.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.25.5" release="1.el7" arch="x86_64" src="golang-1.25.5-1.el7.src.rpm">
					<filename>golang-shared-0:1.25.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-docs" epoch="0" version="1.25.5" release="1.el7" arch="noarch" src="golang-1.25.5-1.el7.src.rpm">
					<filename>golang-docs-0:1.25.5-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-misc" epoch="0" version="1.25.5" release="1.el7" arch="noarch" src="golang-1.25.5-1.el7.src.rpm">
					<filename>golang-misc-0:1.25.5-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-src" epoch="0" version="1.25.5" release="1.el7" arch="noarch" src="golang-1.25.5-1.el7.src.rpm">
					<filename>golang-src-0:1.25.5-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-tests" epoch="0" version="1.25.5" release="1.el7" arch="noarch" src="golang-1.25.5-1.el7.src.rpm">
					<filename>golang-tests-0:1.25.5-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-7321</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость valkey </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в valkey</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-valkey-cve-2025-49844-7.3/</description>
               <solution>Установить обновление для пакета(ов) valkey
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-valkey-cve-2025-49844-7.3/" type="self" id="ROS-20251217-7321" title="ROS-20251217-7321" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49844" type="cve" id="CVE-2025-49844" title="CVE-2025-49844" />
			<reference href="https://bdu.fstec.ru/vul/2025-12553" type="self" id="BDU:2025-12553" title="BDU:2025-12553" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="valkey" epoch="0" version="8.1.4" release="1.el7" arch="x86_64" src="valkey-8.1.4-1.el7.src.rpm">
					<filename>valkey-0:8.1.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="valkey-devel" epoch="0" version="8.1.4" release="1.el7" arch="x86_64" src="valkey-8.1.4-1.el7.src.rpm">
					<filename>valkey-devel-0:8.1.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="valkey-compat-redis" epoch="0" version="8.1.4" release="1.el7" arch="noarch" src="valkey-8.1.4-1.el7.src.rpm">
					<filename>valkey-compat-redis-0:8.1.4-1.el7.noarch.rpm</filename>
				</package>
				<package name="valkey-compat-redis-devel" epoch="0" version="8.1.4" release="1.el7" arch="noarch" src="valkey-8.1.4-1.el7.src.rpm">
					<filename>valkey-compat-redis-devel-0:8.1.4-1.el7.noarch.rpm</filename>
				</package>
				<package name="valkey-doc" epoch="0" version="8.1.4" release="1.el7" arch="noarch" src="valkey-8.1.4-1.el7.src.rpm">
					<filename>valkey-doc-0:8.1.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-7322</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость valkey </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в valkey</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-valkey-cve-2025-46817-7.3/</description>
               <solution>Установить обновление для пакета(ов) valkey
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-valkey-cve-2025-46817-7.3/" type="self" id="ROS-20251217-7322" title="ROS-20251217-7322" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46817" type="cve" id="CVE-2025-46817" title="CVE-2025-46817" />
			<reference href="https://bdu.fstec.ru/vul/2025-12820" type="self" id="BDU:2025-12820" title="BDU:2025-12820" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="valkey" epoch="0" version="8.1.4" release="1.el7" arch="x86_64" src="valkey-8.1.4-1.el7.src.rpm">
					<filename>valkey-0:8.1.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="valkey-devel" epoch="0" version="8.1.4" release="1.el7" arch="x86_64" src="valkey-8.1.4-1.el7.src.rpm">
					<filename>valkey-devel-0:8.1.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="valkey-compat-redis" epoch="0" version="8.1.4" release="1.el7" arch="noarch" src="valkey-8.1.4-1.el7.src.rpm">
					<filename>valkey-compat-redis-0:8.1.4-1.el7.noarch.rpm</filename>
				</package>
				<package name="valkey-compat-redis-devel" epoch="0" version="8.1.4" release="1.el7" arch="noarch" src="valkey-8.1.4-1.el7.src.rpm">
					<filename>valkey-compat-redis-devel-0:8.1.4-1.el7.noarch.rpm</filename>
				</package>
				<package name="valkey-doc" epoch="0" version="8.1.4" release="1.el7" arch="noarch" src="valkey-8.1.4-1.el7.src.rpm">
					<filename>valkey-doc-0:8.1.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-7323</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость valkey </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в valkey</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-valkey-cve-2025-46818-7.3/</description>
               <solution>Установить обновление для пакета(ов) valkey
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-valkey-cve-2025-46818-7.3/" type="self" id="ROS-20251217-7323" title="ROS-20251217-7323" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46818" type="cve" id="CVE-2025-46818" title="CVE-2025-46818" />
			<reference href="https://bdu.fstec.ru/vul/2025-12557" type="self" id="BDU:2025-12557" title="BDU:2025-12557" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="valkey" epoch="0" version="8.1.4" release="1.el7" arch="x86_64" src="valkey-8.1.4-1.el7.src.rpm">
					<filename>valkey-0:8.1.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="valkey-devel" epoch="0" version="8.1.4" release="1.el7" arch="x86_64" src="valkey-8.1.4-1.el7.src.rpm">
					<filename>valkey-devel-0:8.1.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="valkey-compat-redis" epoch="0" version="8.1.4" release="1.el7" arch="noarch" src="valkey-8.1.4-1.el7.src.rpm">
					<filename>valkey-compat-redis-0:8.1.4-1.el7.noarch.rpm</filename>
				</package>
				<package name="valkey-compat-redis-devel" epoch="0" version="8.1.4" release="1.el7" arch="noarch" src="valkey-8.1.4-1.el7.src.rpm">
					<filename>valkey-compat-redis-devel-0:8.1.4-1.el7.noarch.rpm</filename>
				</package>
				<package name="valkey-doc" epoch="0" version="8.1.4" release="1.el7" arch="noarch" src="valkey-8.1.4-1.el7.src.rpm">
					<filename>valkey-doc-0:8.1.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-7324</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость valkey </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в valkey</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-valkey-cve-2025-46819-7.3/</description>
               <solution>Установить обновление для пакета(ов) valkey
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-valkey-cve-2025-46819-7.3/" type="self" id="ROS-20251217-7324" title="ROS-20251217-7324" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46819" type="cve" id="CVE-2025-46819" title="CVE-2025-46819" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="valkey" epoch="0" version="8.1.4" release="1.el7" arch="x86_64" src="valkey-8.1.4-1.el7.src.rpm">
					<filename>valkey-0:8.1.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="valkey-devel" epoch="0" version="8.1.4" release="1.el7" arch="x86_64" src="valkey-8.1.4-1.el7.src.rpm">
					<filename>valkey-devel-0:8.1.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="valkey-compat-redis" epoch="0" version="8.1.4" release="1.el7" arch="noarch" src="valkey-8.1.4-1.el7.src.rpm">
					<filename>valkey-compat-redis-0:8.1.4-1.el7.noarch.rpm</filename>
				</package>
				<package name="valkey-compat-redis-devel" epoch="0" version="8.1.4" release="1.el7" arch="noarch" src="valkey-8.1.4-1.el7.src.rpm">
					<filename>valkey-compat-redis-devel-0:8.1.4-1.el7.noarch.rpm</filename>
				</package>
				<package name="valkey-doc" epoch="0" version="8.1.4" release="1.el7" arch="noarch" src="valkey-8.1.4-1.el7.src.rpm">
					<filename>valkey-doc-0:8.1.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251219-7301</id>
		<issued date="2025-12-19" />
		<updated date="2025-12-19" />
		<title>Уязвимость nomad </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nomad</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nomad-cve-2025-8959-7.3/</description>
               <solution>Установить обновление для пакета(ов) nomad
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nomad-cve-2025-8959-7.3/" type="self" id="ROS-20251219-7301" title="ROS-20251219-7301" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8959" type="cve" id="CVE-2025-8959" title="CVE-2025-8959" />
			<reference href="https://bdu.fstec.ru/vul/2026-00036" type="self" id="BDU:2026-00036" title="BDU:2026-00036" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nomad" epoch="0" version="1.10.5" release="1.el7" arch="x86_64" src="nomad-1.10.5-1.el7.src.rpm">
					<filename>nomad-0:1.10.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251219-7302</id>
		<issued date="2025-12-19" />
		<updated date="2025-12-19" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13992-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13992-7.3/" type="self" id="ROS-20251219-7302" title="ROS-20251219-7302" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13992" type="cve" id="CVE-2025-13992" title="CVE-2025-13992" />
			<reference href="https://bdu.fstec.ru/vul/2026-00271" type="self" id="BDU:2026-00271" title="BDU:2026-00271" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="141.0.7390.122" release="1.el7" arch="x86_64" src="chromium-141.0.7390.122-1.el7.src.rpm">
					<filename>chromedriver-0:141.0.7390.122-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="141.0.7390.122" release="1.el7" arch="x86_64" src="chromium-141.0.7390.122-1.el7.src.rpm">
					<filename>chromium-0:141.0.7390.122-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="141.0.7390.122" release="1.el7" arch="x86_64" src="chromium-141.0.7390.122-1.el7.src.rpm">
					<filename>chromium-common-0:141.0.7390.122-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251219-7303</id>
		<issued date="2025-12-19" />
		<updated date="2025-12-19" />
		<title>Уязвимость mongodb-org </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2025-13644-7.3/</description>
               <solution>Установить обновление для пакета(ов) mongodb-org
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2025-13644-7.3/" type="self" id="ROS-20251219-7303" title="ROS-20251219-7303" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13644" type="cve" id="CVE-2025-13644" title="CVE-2025-13644" />
			<reference href="https://bdu.fstec.ru/vul/2025-14799" type="self" id="BDU:2025-14799" title="BDU:2025-14799" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mongodb-org" epoch="0" version="7.0.26" release="1.el7" arch="x86_64" src="mongodb-org-7.0.26-1.el7.src.rpm">
					<filename>mongodb-org-0:7.0.26-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-mongos" epoch="0" version="7.0.26" release="1.el7" arch="x86_64" src="mongodb-org-7.0.26-1.el7.src.rpm">
					<filename>mongodb-org-mongos-0:7.0.26-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-server" epoch="0" version="7.0.26" release="1.el7" arch="x86_64" src="mongodb-org-7.0.26-1.el7.src.rpm">
					<filename>mongodb-org-server-0:7.0.26-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-shell" epoch="0" version="7.0.26" release="1.el7" arch="x86_64" src="mongodb-org-7.0.26-1.el7.src.rpm">
					<filename>mongodb-org-shell-0:7.0.26-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251219-7304</id>
		<issued date="2025-12-19" />
		<updated date="2025-12-19" />
		<title>Уязвимость mongodb-org </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2025-13643-7.3/</description>
               <solution>Установить обновление для пакета(ов) mongodb-org
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2025-13643-7.3/" type="self" id="ROS-20251219-7304" title="ROS-20251219-7304" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13643" type="cve" id="CVE-2025-13643" title="CVE-2025-13643" />
			<reference href="https://bdu.fstec.ru/vul/2026-00269" type="self" id="BDU:2026-00269" title="BDU:2026-00269" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mongodb-org" epoch="0" version="7.0.26" release="1.el7" arch="x86_64" src="mongodb-org-7.0.26-1.el7.src.rpm">
					<filename>mongodb-org-0:7.0.26-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-mongos" epoch="0" version="7.0.26" release="1.el7" arch="x86_64" src="mongodb-org-7.0.26-1.el7.src.rpm">
					<filename>mongodb-org-mongos-0:7.0.26-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-server" epoch="0" version="7.0.26" release="1.el7" arch="x86_64" src="mongodb-org-7.0.26-1.el7.src.rpm">
					<filename>mongodb-org-server-0:7.0.26-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-shell" epoch="0" version="7.0.26" release="1.el7" arch="x86_64" src="mongodb-org-7.0.26-1.el7.src.rpm">
					<filename>mongodb-org-shell-0:7.0.26-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251219-7305</id>
		<issued date="2025-12-19" />
		<updated date="2025-12-19" />
		<title>Уязвимость mongodb-org </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2025-13507-7.3/</description>
               <solution>Установить обновление для пакета(ов) mongodb-org
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2025-13507-7.3/" type="self" id="ROS-20251219-7305" title="ROS-20251219-7305" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13507" type="cve" id="CVE-2025-13507" title="CVE-2025-13507" />
			<reference href="https://bdu.fstec.ru/vul/2026-00270" type="self" id="BDU:2026-00270" title="BDU:2026-00270" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mongodb-org" epoch="0" version="7.0.26" release="1.el7" arch="x86_64" src="mongodb-org-7.0.26-1.el7.src.rpm">
					<filename>mongodb-org-0:7.0.26-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-mongos" epoch="0" version="7.0.26" release="1.el7" arch="x86_64" src="mongodb-org-7.0.26-1.el7.src.rpm">
					<filename>mongodb-org-mongos-0:7.0.26-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-server" epoch="0" version="7.0.26" release="1.el7" arch="x86_64" src="mongodb-org-7.0.26-1.el7.src.rpm">
					<filename>mongodb-org-server-0:7.0.26-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-shell" epoch="0" version="7.0.26" release="1.el7" arch="x86_64" src="mongodb-org-7.0.26-1.el7.src.rpm">
					<filename>mongodb-org-shell-0:7.0.26-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251219-7306</id>
		<issued date="2025-12-19" />
		<updated date="2025-12-19" />
		<title>Уязвимость 7-zip </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в 7zip</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-7-zip-cve-2025-11002/</description>
               <solution>Установить обновление для пакета(ов) 7-zip
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-7-zip-cve-2025-11002/" type="self" id="ROS-20251219-7306" title="ROS-20251219-7306" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11002" type="cve" id="CVE-2025-11002" title="CVE-2025-11002" />
			<reference href="https://bdu.fstec.ru/vul/2025-12912" type="self" id="BDU:2025-12912" title="BDU:2025-12912" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="7zip" epoch="0" version="25.00" release="1.el7.x86_64" arch="rpm" src="7zip-25.00-1.el7.src.rpm">
					<filename>7zip-25.00-1.el7.x86_64.rpm.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251222-7301</id>
		<issued date="2025-12-22" />
		<updated date="2025-12-22" />
		<title>Уязвимость nomad </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nomad</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nomad-cve-2025-22873-7.3/</description>
               <solution>Установить обновление для пакета(ов) nomad
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nomad-cve-2025-22873-7.3/" type="self" id="ROS-20251222-7301" title="ROS-20251222-7301" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22873" type="cve" id="CVE-2025-22873" title="CVE-2025-22873" />
			<reference href="https://bdu.fstec.ru/vul/2025-07316" type="self" id="BDU:2025-07316" title="BDU:2025-07316" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nomad" epoch="0" version="1.10.2" release="1.el7" arch="x86_64" src="nomad-1.10.2-1.el7.src.rpm">
					<filename>nomad-0:1.10.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251223-7301</id>
		<issued date="2025-12-23" />
		<updated date="2025-12-23" />
		<title>Уязвимость ImageMagick </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в ImageMagick</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick-cve-2025-65955-7.3/</description>
               <solution>Установить обновление для пакета(ов) ImageMagick
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick-cve-2025-65955-7.3/" type="self" id="ROS-20251223-7301" title="ROS-20251223-7301" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65955" type="cve" id="CVE-2025-65955" title="CVE-2025-65955" />
			<reference href="https://bdu.fstec.ru/vul/2026-00323" type="self" id="BDU:2026-00323" title="BDU:2026-00323" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ImageMagick" epoch="1" version="6.9.13.34" release="1.el7" arch="x86_64" src="ImageMagick-6.9.13.34-1.el7.src.rpm">
					<filename>ImageMagick-1:6.9.13.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-c++" epoch="1" version="6.9.13.34" release="1.el7" arch="x86_64" src="ImageMagick-6.9.13.34-1.el7.src.rpm">
					<filename>ImageMagick-c++-1:6.9.13.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-c++-devel" epoch="1" version="6.9.13.34" release="1.el7" arch="x86_64" src="ImageMagick-6.9.13.34-1.el7.src.rpm">
					<filename>ImageMagick-c++-devel-1:6.9.13.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-devel" epoch="1" version="6.9.13.34" release="1.el7" arch="x86_64" src="ImageMagick-6.9.13.34-1.el7.src.rpm">
					<filename>ImageMagick-devel-1:6.9.13.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-djvu" epoch="1" version="6.9.13.34" release="1.el7" arch="x86_64" src="ImageMagick-6.9.13.34-1.el7.src.rpm">
					<filename>ImageMagick-djvu-1:6.9.13.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-doc" epoch="1" version="6.9.13.34" release="1.el7" arch="x86_64" src="ImageMagick-6.9.13.34-1.el7.src.rpm">
					<filename>ImageMagick-doc-1:6.9.13.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-heic" epoch="1" version="6.9.13.34" release="1.el7" arch="x86_64" src="ImageMagick-6.9.13.34-1.el7.src.rpm">
					<filename>ImageMagick-heic-1:6.9.13.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-libs" epoch="1" version="6.9.13.34" release="1.el7" arch="x86_64" src="ImageMagick-6.9.13.34-1.el7.src.rpm">
					<filename>ImageMagick-libs-1:6.9.13.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-perl" epoch="1" version="6.9.13.34" release="1.el7" arch="x86_64" src="ImageMagick-6.9.13.34-1.el7.src.rpm">
					<filename>ImageMagick-perl-1:6.9.13.34-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251223-7302</id>
		<issued date="2025-12-23" />
		<updated date="2025-12-23" />
		<title>Уязвимость ImageMagick7 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в ImageMagick7</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick7-cve-2025-65955-7.3/</description>
               <solution>Установить обновление для пакета(ов) ImageMagick7
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick7-cve-2025-65955-7.3/" type="self" id="ROS-20251223-7302" title="ROS-20251223-7302" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65955" type="cve" id="CVE-2025-65955" title="CVE-2025-65955" />
			<reference href="https://bdu.fstec.ru/vul/2026-00323" type="self" id="BDU:2026-00323" title="BDU:2026-00323" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ImageMagick7" epoch="0" version="7.1.2.9" release="2.el7" arch="x86_64" src="ImageMagick7-7.1.2.9-2.el7.src.rpm">
					<filename>ImageMagick7-0:7.1.2.9-2.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick7-c++" epoch="0" version="7.1.2.9" release="2.el7" arch="x86_64" src="ImageMagick7-7.1.2.9-2.el7.src.rpm">
					<filename>ImageMagick7-c++-0:7.1.2.9-2.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick7-c++-devel" epoch="0" version="7.1.2.9" release="2.el7" arch="x86_64" src="ImageMagick7-7.1.2.9-2.el7.src.rpm">
					<filename>ImageMagick7-c++-devel-0:7.1.2.9-2.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick7-devel" epoch="0" version="7.1.2.9" release="2.el7" arch="x86_64" src="ImageMagick7-7.1.2.9-2.el7.src.rpm">
					<filename>ImageMagick7-devel-0:7.1.2.9-2.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick7-djvu" epoch="0" version="7.1.2.9" release="2.el7" arch="x86_64" src="ImageMagick7-7.1.2.9-2.el7.src.rpm">
					<filename>ImageMagick7-djvu-0:7.1.2.9-2.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick7-doc" epoch="0" version="7.1.2.9" release="2.el7" arch="x86_64" src="ImageMagick7-7.1.2.9-2.el7.src.rpm">
					<filename>ImageMagick7-doc-0:7.1.2.9-2.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick7-heic" epoch="0" version="7.1.2.9" release="2.el7" arch="x86_64" src="ImageMagick7-7.1.2.9-2.el7.src.rpm">
					<filename>ImageMagick7-heic-0:7.1.2.9-2.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick7-libs" epoch="0" version="7.1.2.9" release="2.el7" arch="x86_64" src="ImageMagick7-7.1.2.9-2.el7.src.rpm">
					<filename>ImageMagick7-libs-0:7.1.2.9-2.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick7-perl" epoch="0" version="7.1.2.9" release="2.el7" arch="x86_64" src="ImageMagick7-7.1.2.9-2.el7.src.rpm">
					<filename>ImageMagick7-perl-0:7.1.2.9-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251223-7303</id>
		<issued date="2025-12-23" />
		<updated date="2025-12-23" />
		<title>Уязвимость 389-ds-base </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в 389-ds-base</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-389-ds-base-cve-2025-2487-7.3/</description>
               <solution>Установить обновление для пакета(ов) 389-ds-base
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-389-ds-base-cve-2025-2487-7.3/" type="self" id="ROS-20251223-7303" title="ROS-20251223-7303" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2487" type="cve" id="CVE-2025-2487" title="CVE-2025-2487" />
			<reference href="https://bdu.fstec.ru/vul/2026-00276" type="self" id="BDU:2026-00276" title="BDU:2026-00276" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="389-ds-base" epoch="0" version="2.4.5" release="5.el7" arch="x86_64" src="389-ds-base-2.4.5-5.el7.src.rpm">
					<filename>389-ds-base-0:2.4.5-5.el7.x86_64.rpm</filename>
				</package>
				<package name="389-ds-base-devel" epoch="0" version="2.4.5" release="5.el7" arch="x86_64" src="389-ds-base-2.4.5-5.el7.src.rpm">
					<filename>389-ds-base-devel-0:2.4.5-5.el7.x86_64.rpm</filename>
				</package>
				<package name="389-ds-base-libs" epoch="0" version="2.4.5" release="5.el7" arch="x86_64" src="389-ds-base-2.4.5-5.el7.src.rpm">
					<filename>389-ds-base-libs-0:2.4.5-5.el7.x86_64.rpm</filename>
				</package>
				<package name="389-ds-base-snmp" epoch="0" version="2.4.5" release="5.el7" arch="x86_64" src="389-ds-base-2.4.5-5.el7.src.rpm">
					<filename>389-ds-base-snmp-0:2.4.5-5.el7.x86_64.rpm</filename>
				</package>
				<package name="cockpit-389-ds" epoch="0" version="2.4.5" release="5.el7" arch="noarch" src="389-ds-base-2.4.5-5.el7.src.rpm">
					<filename>cockpit-389-ds-0:2.4.5-5.el7.noarch.rpm</filename>
				</package>
				<package name="python3-lib389" epoch="0" version="2.4.5" release="5.el7" arch="noarch" src="389-ds-base-2.4.5-5.el7.src.rpm">
					<filename>python3-lib389-0:2.4.5-5.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251223-7304</id>
		<issued date="2025-12-23" />
		<updated date="2025-12-23" />
		<title>Уязвимость PackageKit </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в PackageKit</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-packagekit-cve-2024-0217-7.3/</description>
               <solution>Установить обновление для пакета(ов) PackageKit
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-packagekit-cve-2024-0217-7.3/" type="self" id="ROS-20251223-7304" title="ROS-20251223-7304" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0217" type="cve" id="CVE-2024-0217" title="CVE-2024-0217" />
			<reference href="https://bdu.fstec.ru/vul/2026-00324" type="self" id="BDU:2026-00324" title="BDU:2026-00324" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="PackageKit" epoch="0" version="1.2.7" release="1.el7" arch="x86_64" src="PackageKit-1.2.7-1.el7.src.rpm">
					<filename>PackageKit-0:1.2.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="PackageKit-command-not-found" epoch="0" version="1.2.7" release="1.el7" arch="x86_64" src="PackageKit-1.2.7-1.el7.src.rpm">
					<filename>PackageKit-command-not-found-0:1.2.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="PackageKit-cron" epoch="0" version="1.2.7" release="1.el7" arch="x86_64" src="PackageKit-1.2.7-1.el7.src.rpm">
					<filename>PackageKit-cron-0:1.2.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="PackageKit-glib" epoch="0" version="1.2.7" release="1.el7" arch="x86_64" src="PackageKit-1.2.7-1.el7.src.rpm">
					<filename>PackageKit-glib-0:1.2.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="PackageKit-glib-devel" epoch="0" version="1.2.7" release="1.el7" arch="x86_64" src="PackageKit-1.2.7-1.el7.src.rpm">
					<filename>PackageKit-glib-devel-0:1.2.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="PackageKit-gstreamer-plugin" epoch="0" version="1.2.7" release="1.el7" arch="x86_64" src="PackageKit-1.2.7-1.el7.src.rpm">
					<filename>PackageKit-gstreamer-plugin-0:1.2.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="PackageKit-gtk3-module" epoch="0" version="1.2.7" release="1.el7" arch="x86_64" src="PackageKit-1.2.7-1.el7.src.rpm">
					<filename>PackageKit-gtk3-module-0:1.2.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251223-7305</id>
		<issued date="2025-12-23" />
		<updated date="2025-12-23" />
		<title>Уязвимость libxslt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libxslt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libxslt-cve-2025-10911-7.3/</description>
               <solution>Установить обновление для пакета(ов) libxslt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libxslt-cve-2025-10911-7.3/" type="self" id="ROS-20251223-7305" title="ROS-20251223-7305" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10911" type="cve" id="CVE-2025-10911" title="CVE-2025-10911" />
			<reference href="https://bdu.fstec.ru/vul/2026-00311" type="self" id="BDU:2026-00311" title="BDU:2026-00311" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libxslt" epoch="0" version="1.1.43" release="4.el7" arch="x86_64" src="libxslt-1.1.43-4.el7.src.rpm">
					<filename>libxslt-0:1.1.43-4.el7.x86_64.rpm</filename>
				</package>
				<package name="libxslt-devel" epoch="0" version="1.1.43" release="4.el7" arch="x86_64" src="libxslt-1.1.43-4.el7.src.rpm">
					<filename>libxslt-devel-0:1.1.43-4.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-libxslt" epoch="0" version="1.1.43" release="4.el7" arch="x86_64" src="libxslt-1.1.43-4.el7.src.rpm">
					<filename>python3-libxslt-0:1.1.43-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251223-7306</id>
		<issued date="2025-12-23" />
		<updated date="2025-12-23" />
		<title>Уязвимость libarchive </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libarchive</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libarchive-cve-2025-60753-7.3/</description>
               <solution>Установить обновление для пакета(ов) libarchive
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libarchive-cve-2025-60753-7.3/" type="self" id="ROS-20251223-7306" title="ROS-20251223-7306" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-60753" type="cve" id="CVE-2025-60753" title="CVE-2025-60753" />
			<reference href="https://bdu.fstec.ru/vul/2026-00318" type="self" id="BDU:2026-00318" title="BDU:2026-00318" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="bsdcat" epoch="0" version="3.8.1" release="2.el7" arch="x86_64" src="libarchive-3.8.1-2.el7.src.rpm">
					<filename>bsdcat-0:3.8.1-2.el7.x86_64.rpm</filename>
				</package>
				<package name="bsdcpio" epoch="0" version="3.8.1" release="2.el7" arch="x86_64" src="libarchive-3.8.1-2.el7.src.rpm">
					<filename>bsdcpio-0:3.8.1-2.el7.x86_64.rpm</filename>
				</package>
				<package name="bsdtar" epoch="0" version="3.8.1" release="2.el7" arch="x86_64" src="libarchive-3.8.1-2.el7.src.rpm">
					<filename>bsdtar-0:3.8.1-2.el7.x86_64.rpm</filename>
				</package>
				<package name="bsdunzip" epoch="0" version="3.8.1" release="2.el7" arch="x86_64" src="libarchive-3.8.1-2.el7.src.rpm">
					<filename>bsdunzip-0:3.8.1-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libarchive" epoch="0" version="3.8.1" release="2.el7" arch="x86_64" src="libarchive-3.8.1-2.el7.src.rpm">
					<filename>libarchive-0:3.8.1-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libarchive-devel" epoch="0" version="3.8.1" release="2.el7" arch="x86_64" src="libarchive-3.8.1-2.el7.src.rpm">
					<filename>libarchive-devel-0:3.8.1-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251223-7307</id>
		<issued date="2025-12-23" />
		<updated date="2025-12-23" />
		<title>Уязвимость python3 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2025-8291-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2025-8291-7.3/" type="self" id="ROS-20251223-7307" title="ROS-20251223-7307" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8291" type="cve" id="CVE-2025-8291" title="CVE-2025-8291" />
			<reference href="https://bdu.fstec.ru/vul/2026-00313" type="self" id="BDU:2026-00313" title="BDU:2026-00313" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3" epoch="0" version="3.8.20" release="7.el7" arch="x86_64" src="python3-3.8.20-7.el7.src.rpm">
					<filename>python3-0:3.8.20-7.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-debug" epoch="0" version="3.8.20" release="7.el7" arch="x86_64" src="python3-3.8.20-7.el7.src.rpm">
					<filename>python3-debug-0:3.8.20-7.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-devel" epoch="0" version="3.8.20" release="7.el7" arch="x86_64" src="python3-3.8.20-7.el7.src.rpm">
					<filename>python3-devel-0:3.8.20-7.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-idle" epoch="0" version="3.8.20" release="7.el7" arch="x86_64" src="python3-3.8.20-7.el7.src.rpm">
					<filename>python3-idle-0:3.8.20-7.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-libs" epoch="0" version="3.8.20" release="7.el7" arch="x86_64" src="python3-3.8.20-7.el7.src.rpm">
					<filename>python3-libs-0:3.8.20-7.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-test" epoch="0" version="3.8.20" release="7.el7" arch="x86_64" src="python3-3.8.20-7.el7.src.rpm">
					<filename>python3-test-0:3.8.20-7.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-tkinter" epoch="0" version="3.8.20" release="7.el7" arch="x86_64" src="python3-3.8.20-7.el7.src.rpm">
					<filename>python3-tkinter-0:3.8.20-7.el7.x86_64.rpm</filename>
				</package>
				<package name="python-unversioned-command" epoch="0" version="3.8.20" release="7.el7" arch="noarch" src="python3-3.8.20-7.el7.src.rpm">
					<filename>python-unversioned-command-0:3.8.20-7.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251223-7308</id>
		<issued date="2025-12-23" />
		<updated date="2025-12-23" />
		<title>Уязвимость python3.10 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.10</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-10-cve-2025-8291-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.10
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-10-cve-2025-8291-7.3/" type="self" id="ROS-20251223-7308" title="ROS-20251223-7308" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8291" type="cve" id="CVE-2025-8291" title="CVE-2025-8291" />
			<reference href="https://bdu.fstec.ru/vul/2026-00313" type="self" id="BDU:2026-00313" title="BDU:2026-00313" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.10" epoch="0" version="3.10.19" release="1.el7" arch="x86_64" src="python3.10-3.10.19-1.el7.src.rpm">
					<filename>python3.10-0:3.10.19-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251223-7309</id>
		<issued date="2025-12-23" />
		<updated date="2025-12-23" />
		<title>Уязвимость python3.11 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2025-8291-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.11
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2025-8291-7.3/" type="self" id="ROS-20251223-7309" title="ROS-20251223-7309" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8291" type="cve" id="CVE-2025-8291" title="CVE-2025-8291" />
			<reference href="https://bdu.fstec.ru/vul/2026-00313" type="self" id="BDU:2026-00313" title="BDU:2026-00313" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.11" epoch="0" version="3.11.14" release="1.el7" arch="x86_64" src="python3.11-3.11.14-1.el7.src.rpm">
					<filename>python3.11-0:3.11.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-debug" epoch="0" version="3.11.14" release="1.el7" arch="x86_64" src="python3.11-3.11.14-1.el7.src.rpm">
					<filename>python3.11-debug-0:3.11.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-devel" epoch="0" version="3.11.14" release="1.el7" arch="x86_64" src="python3.11-3.11.14-1.el7.src.rpm">
					<filename>python3.11-devel-0:3.11.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-idle" epoch="0" version="3.11.14" release="1.el7" arch="x86_64" src="python3.11-3.11.14-1.el7.src.rpm">
					<filename>python3.11-idle-0:3.11.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-libs" epoch="0" version="3.11.14" release="1.el7" arch="x86_64" src="python3.11-3.11.14-1.el7.src.rpm">
					<filename>python3.11-libs-0:3.11.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-test" epoch="0" version="3.11.14" release="1.el7" arch="x86_64" src="python3.11-3.11.14-1.el7.src.rpm">
					<filename>python3.11-test-0:3.11.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-tkinter" epoch="0" version="3.11.14" release="1.el7" arch="x86_64" src="python3.11-3.11.14-1.el7.src.rpm">
					<filename>python3.11-tkinter-0:3.11.14-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251223-7310</id>
		<issued date="2025-12-23" />
		<updated date="2025-12-23" />
		<title>Уязвимость python3.13 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.13</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-13-cve-2025-8291-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.13
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-13-cve-2025-8291-7.3/" type="self" id="ROS-20251223-7310" title="ROS-20251223-7310" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8291" type="cve" id="CVE-2025-8291" title="CVE-2025-8291" />
			<reference href="https://bdu.fstec.ru/vul/2026-00313" type="self" id="BDU:2026-00313" title="BDU:2026-00313" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.13" epoch="0" version="3.13.7" release="2.el7" arch="x86_64" src="python3.13-3.13.7-2.el7.src.rpm">
					<filename>python3.13-0:3.13.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-debug" epoch="0" version="3.13.7" release="2.el7" arch="x86_64" src="python3.13-3.13.7-2.el7.src.rpm">
					<filename>python3.13-debug-0:3.13.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-devel" epoch="0" version="3.13.7" release="2.el7" arch="x86_64" src="python3.13-3.13.7-2.el7.src.rpm">
					<filename>python3.13-devel-0:3.13.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading" epoch="0" version="3.13.7" release="2.el7" arch="x86_64" src="python3.13-3.13.7-2.el7.src.rpm">
					<filename>python3.13-freethreading-0:3.13.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading-debug" epoch="0" version="3.13.7" release="2.el7" arch="x86_64" src="python3.13-3.13.7-2.el7.src.rpm">
					<filename>python3.13-freethreading-debug-0:3.13.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-idle" epoch="0" version="3.13.7" release="2.el7" arch="x86_64" src="python3.13-3.13.7-2.el7.src.rpm">
					<filename>python3.13-idle-0:3.13.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-libs" epoch="0" version="3.13.7" release="2.el7" arch="x86_64" src="python3.13-3.13.7-2.el7.src.rpm">
					<filename>python3.13-libs-0:3.13.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-test" epoch="0" version="3.13.7" release="2.el7" arch="x86_64" src="python3.13-3.13.7-2.el7.src.rpm">
					<filename>python3.13-test-0:3.13.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-tkinter" epoch="0" version="3.13.7" release="2.el7" arch="x86_64" src="python3.13-3.13.7-2.el7.src.rpm">
					<filename>python3.13-tkinter-0:3.13.7-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251223-7311</id>
		<issued date="2025-12-23" />
		<updated date="2025-12-23" />
		<title>Уязвимость perl-Module-ScanDeps </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в perl-Module-ScanDeps</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-module-scandeps-cve-2024-10224-7.3/</description>
               <solution>Установить обновление для пакета(ов) perl-Module-ScanDeps
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-module-scandeps-cve-2024-10224-7.3/" type="self" id="ROS-20251223-7311" title="ROS-20251223-7311" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10224" type="cve" id="CVE-2024-10224" title="CVE-2024-10224" />
			<reference href="https://bdu.fstec.ru/vul/2024-10103" type="self" id="BDU:2024-10103" title="BDU:2024-10103" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="perl-Module-ScanDeps" epoch="0" version="1.37" release="1.el7" arch="noarch" src="perl-Module-ScanDeps-1.37-1.el7.src.rpm">
					<filename>perl-Module-ScanDeps-0:1.37-1.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Module-ScanDeps-tests" epoch="0" version="1.37" release="1.el7" arch="noarch" src="perl-Module-ScanDeps-1.37-1.el7.src.rpm">
					<filename>perl-Module-ScanDeps-tests-0:1.37-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251223-7312</id>
		<issued date="2025-12-23" />
		<updated date="2025-12-23" />
		<title>Уязвимость iputils </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в iputils</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-iputils-cve-2025-47268-7.3/</description>
               <solution>Установить обновление для пакета(ов) iputils
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-iputils-cve-2025-47268-7.3/" type="self" id="ROS-20251223-7312" title="ROS-20251223-7312" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47268" type="cve" id="CVE-2025-47268" title="CVE-2025-47268" />
			<reference href="https://bdu.fstec.ru/vul/2025-11086" type="self" id="BDU:2025-11086" title="BDU:2025-11086" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="iputils" epoch="0" version="20250605" release="1.el7" arch="x86_64" src="iputils-20250605-1.el7.src.rpm">
					<filename>iputils-0:20250605-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251223-7313</id>
		<issued date="2025-12-23" />
		<updated date="2025-12-23" />
		<title>Уязвимость iputils </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в iputils</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-iputils-cve-2025-48964-7.3/</description>
               <solution>Установить обновление для пакета(ов) iputils
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-iputils-cve-2025-48964-7.3/" type="self" id="ROS-20251223-7313" title="ROS-20251223-7313" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48964" type="cve" id="CVE-2025-48964" title="CVE-2025-48964" />
			<reference href="https://bdu.fstec.ru/vul/2026-00319" type="self" id="BDU:2026-00319" title="BDU:2026-00319" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="iputils" epoch="0" version="20250605" release="1.el7" arch="x86_64" src="iputils-20250605-1.el7.src.rpm">
					<filename>iputils-0:20250605-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251223-7314</id>
		<issued date="2025-12-23" />
		<updated date="2025-12-23" />
		<title>Уязвимость zookeeper </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в zookeeper</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zookeeper-cve-2025-58457-7.3/</description>
               <solution>Установить обновление для пакета(ов) zookeeper
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zookeeper-cve-2025-58457-7.3/" type="self" id="ROS-20251223-7314" title="ROS-20251223-7314" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58457" type="cve" id="CVE-2025-58457" title="CVE-2025-58457" />
			<reference href="https://bdu.fstec.ru/vul/2025-12605" type="self" id="BDU:2025-12605" title="BDU:2025-12605" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python-zookeeper" epoch="0" version="3.9.4" release="1.el7" arch="x86_64" src="zookeeper-3.9.4-1.el7.src.rpm">
					<filename>python-zookeeper-0:3.9.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zookeeper" epoch="0" version="3.9.4" release="1.el7" arch="x86_64" src="zookeeper-3.9.4-1.el7.src.rpm">
					<filename>zookeeper-0:3.9.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zookeeper-devel" epoch="0" version="3.9.4" release="1.el7" arch="x86_64" src="zookeeper-3.9.4-1.el7.src.rpm">
					<filename>zookeeper-devel-0:3.9.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zookeeper-java" epoch="0" version="3.9.4" release="1.el7" arch="x86_64" src="zookeeper-3.9.4-1.el7.src.rpm">
					<filename>zookeeper-java-0:3.9.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zookeeper-javadoc" epoch="0" version="3.9.4" release="1.el7" arch="noarch" src="zookeeper-3.9.4-1.el7.src.rpm">
					<filename>zookeeper-javadoc-0:3.9.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251223-7315</id>
		<issued date="2025-12-23" />
		<updated date="2025-12-23" />
		<title>Уязвимость php-symfony4 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в php-symfony4</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-symfony4-cve-2025-64500-7.3/</description>
               <solution>Установить обновление для пакета(ов) php-symfony4
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-symfony4-cve-2025-64500-7.3/" type="self" id="ROS-20251223-7315" title="ROS-20251223-7315" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64500" type="cve" id="CVE-2025-64500" title="CVE-2025-64500" />
			<reference href="https://bdu.fstec.ru/vul/2026-00312" type="self" id="BDU:2026-00312" title="BDU:2026-00312" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php-symfony4" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-asset" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-asset-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-browser-kit" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-browser-kit-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-cache" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-cache-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-common" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-common-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-config" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-config-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-console" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-console-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-css-selector" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-css-selector-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-debug" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-debug-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-debug-bundle" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-debug-bundle-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-dependency-injection" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-dependency-injection-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-doctrine-bridge" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-doctrine-bridge-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-dom-crawler" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-dom-crawler-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-dotenv" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-dotenv-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-error-handler" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-error-handler-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-event-dispatcher" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-event-dispatcher-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-expression-language" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-expression-language-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-filesystem" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-filesystem-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-finder" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-finder-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-form" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-form-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-framework-bundle" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-framework-bundle-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-http-client" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-http-client-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-http-foundation" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-http-foundation-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-http-kernel" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-http-kernel-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-inflector" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-inflector-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-intl" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-intl-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-ldap" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-ldap-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-lock" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-lock-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-mailer" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-mailer-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-messenger" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-messenger-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-mime" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-mime-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-monolog-bridge" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-monolog-bridge-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-options-resolver" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-options-resolver-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-phpunit-bridge" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-phpunit-bridge-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-process" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-process-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-property-access" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-property-access-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-property-info" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-property-info-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-routing" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-routing-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-security" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-security-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-security-bundle" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-security-bundle-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-serializer" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-serializer-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-stopwatch" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-stopwatch-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-templating" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-templating-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-translation" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-translation-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-twig-bridge" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-twig-bridge-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-twig-bundle" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-twig-bundle-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-validator" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-validator-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-var-dumper" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-var-dumper-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-var-exporter" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-var-exporter-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-web-link" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-web-link-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-web-profiler-bundle" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-web-profiler-bundle-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-web-server-bundle" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-web-server-bundle-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-workflow" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-workflow-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-yaml" epoch="0" version="4.4.50" release="6.el7" arch="noarch" src="php-symfony4-4.4.50-6.el7.src.rpm">
					<filename>php-symfony4-yaml-0:4.4.50-6.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251223-7316</id>
		<issued date="2025-12-23" />
		<updated date="2025-12-23" />
		<title>Уязвимость jenkins </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в jenkins</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jenkins-cve-2025-67639-7.3/</description>
               <solution>Установить обновление для пакета(ов) jenkins
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jenkins-cve-2025-67639-7.3/" type="self" id="ROS-20251223-7316" title="ROS-20251223-7316" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67639" type="cve" id="CVE-2025-67639" title="CVE-2025-67639" />
			<reference href="https://bdu.fstec.ru/vul/2026-00314" type="self" id="BDU:2026-00314" title="BDU:2026-00314" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jenkins" epoch="0" version="2.528.3" release="1.el7" arch="noarch" src="jenkins-2.528.3-1.el7.src.rpm">
					<filename>jenkins-0:2.528.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251223-7317</id>
		<issued date="2025-12-23" />
		<updated date="2025-12-23" />
		<title>Уязвимость jenkins </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в jenkins</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jenkins-cve-2025-67635-7.3/</description>
               <solution>Установить обновление для пакета(ов) jenkins
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jenkins-cve-2025-67635-7.3/" type="self" id="ROS-20251223-7317" title="ROS-20251223-7317" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67635" type="cve" id="CVE-2025-67635" title="CVE-2025-67635" />
			<reference href="https://bdu.fstec.ru/vul/2025-15959" type="self" id="BDU:2025-15959" title="BDU:2025-15959" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jenkins" epoch="0" version="2.528.3" release="1.el7" arch="noarch" src="jenkins-2.528.3-1.el7.src.rpm">
					<filename>jenkins-0:2.528.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251223-7318</id>
		<issued date="2025-12-23" />
		<updated date="2025-12-23" />
		<title>Уязвимость jenkins </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в jenkins</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jenkins-cve-2025-67636-7.3/</description>
               <solution>Установить обновление для пакета(ов) jenkins
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jenkins-cve-2025-67636-7.3/" type="self" id="ROS-20251223-7318" title="ROS-20251223-7318" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67636" type="cve" id="CVE-2025-67636" title="CVE-2025-67636" />
			<reference href="https://bdu.fstec.ru/vul/2026-00315" type="self" id="BDU:2026-00315" title="BDU:2026-00315" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jenkins" epoch="0" version="2.528.3" release="1.el7" arch="noarch" src="jenkins-2.528.3-1.el7.src.rpm">
					<filename>jenkins-0:2.528.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251223-7319</id>
		<issued date="2025-12-23" />
		<updated date="2025-12-23" />
		<title>Уязвимость jenkins </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в jenkins</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jenkins-cve-2025-67637-7.3/</description>
               <solution>Установить обновление для пакета(ов) jenkins
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jenkins-cve-2025-67637-7.3/" type="self" id="ROS-20251223-7319" title="ROS-20251223-7319" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67637" type="cve" id="CVE-2025-67637" title="CVE-2025-67637" />
			<reference href="https://bdu.fstec.ru/vul/2025-15960" type="self" id="BDU:2025-15960" title="BDU:2025-15960" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jenkins" epoch="0" version="2.528.3" release="1.el7" arch="noarch" src="jenkins-2.528.3-1.el7.src.rpm">
					<filename>jenkins-0:2.528.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251223-7320</id>
		<issued date="2025-12-23" />
		<updated date="2025-12-23" />
		<title>Уязвимость jenkins </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в jenkins</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jenkins-cve-2025-67638-7.3/</description>
               <solution>Установить обновление для пакета(ов) jenkins
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jenkins-cve-2025-67638-7.3/" type="self" id="ROS-20251223-7320" title="ROS-20251223-7320" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67638" type="cve" id="CVE-2025-67638" title="CVE-2025-67638" />
			<reference href="https://bdu.fstec.ru/vul/2025-15961" type="self" id="BDU:2025-15961" title="BDU:2025-15961" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jenkins" epoch="0" version="2.528.3" release="1.el7" arch="noarch" src="jenkins-2.528.3-1.el7.src.rpm">
					<filename>jenkins-0:2.528.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251223-7321</id>
		<issued date="2025-12-23" />
		<updated date="2025-12-23" />
		<title>Уязвимость python3.13 </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в python3.13</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-13-cve-2024-11168-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.13
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-13-cve-2024-11168-7.3/" type="self" id="ROS-20251223-7321" title="ROS-20251223-7321" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11168" type="cve" id="CVE-2024-11168" title="CVE-2024-11168" />
			<reference href="https://bdu.fstec.ru/vul/2025-12374" type="self" id="BDU:2025-12374" title="BDU:2025-12374" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.13" epoch="0" version="3.13.7" release="2.el7" arch="x86_64" src="python3.13-3.13.7-2.el7.src.rpm">
					<filename>python3.13-0:3.13.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-debug" epoch="0" version="3.13.7" release="2.el7" arch="x86_64" src="python3.13-3.13.7-2.el7.src.rpm">
					<filename>python3.13-debug-0:3.13.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-devel" epoch="0" version="3.13.7" release="2.el7" arch="x86_64" src="python3.13-3.13.7-2.el7.src.rpm">
					<filename>python3.13-devel-0:3.13.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading" epoch="0" version="3.13.7" release="2.el7" arch="x86_64" src="python3.13-3.13.7-2.el7.src.rpm">
					<filename>python3.13-freethreading-0:3.13.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading-debug" epoch="0" version="3.13.7" release="2.el7" arch="x86_64" src="python3.13-3.13.7-2.el7.src.rpm">
					<filename>python3.13-freethreading-debug-0:3.13.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-idle" epoch="0" version="3.13.7" release="2.el7" arch="x86_64" src="python3.13-3.13.7-2.el7.src.rpm">
					<filename>python3.13-idle-0:3.13.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-libs" epoch="0" version="3.13.7" release="2.el7" arch="x86_64" src="python3.13-3.13.7-2.el7.src.rpm">
					<filename>python3.13-libs-0:3.13.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-test" epoch="0" version="3.13.7" release="2.el7" arch="x86_64" src="python3.13-3.13.7-2.el7.src.rpm">
					<filename>python3.13-test-0:3.13.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-tkinter" epoch="0" version="3.13.7" release="2.el7" arch="x86_64" src="python3.13-3.13.7-2.el7.src.rpm">
					<filename>python3.13-tkinter-0:3.13.7-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251223-7322</id>
		<issued date="2025-12-23" />
		<updated date="2025-12-23" />
		<title>Уязвимость python3.11 </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в python3.11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2024-11168-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.11
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2024-11168-7.3/" type="self" id="ROS-20251223-7322" title="ROS-20251223-7322" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11168" type="cve" id="CVE-2024-11168" title="CVE-2024-11168" />
			<reference href="https://bdu.fstec.ru/vul/2025-12374" type="self" id="BDU:2025-12374" title="BDU:2025-12374" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.11" epoch="0" version="3.11.14" release="1.el7" arch="x86_64" src="python3.11-3.11.14-1.el7.src.rpm">
					<filename>python3.11-0:3.11.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-debug" epoch="0" version="3.11.14" release="1.el7" arch="x86_64" src="python3.11-3.11.14-1.el7.src.rpm">
					<filename>python3.11-debug-0:3.11.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-devel" epoch="0" version="3.11.14" release="1.el7" arch="x86_64" src="python3.11-3.11.14-1.el7.src.rpm">
					<filename>python3.11-devel-0:3.11.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-idle" epoch="0" version="3.11.14" release="1.el7" arch="x86_64" src="python3.11-3.11.14-1.el7.src.rpm">
					<filename>python3.11-idle-0:3.11.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-libs" epoch="0" version="3.11.14" release="1.el7" arch="x86_64" src="python3.11-3.11.14-1.el7.src.rpm">
					<filename>python3.11-libs-0:3.11.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-test" epoch="0" version="3.11.14" release="1.el7" arch="x86_64" src="python3.11-3.11.14-1.el7.src.rpm">
					<filename>python3.11-test-0:3.11.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-tkinter" epoch="0" version="3.11.14" release="1.el7" arch="x86_64" src="python3.11-3.11.14-1.el7.src.rpm">
					<filename>python3.11-tkinter-0:3.11.14-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251223-7323</id>
		<issued date="2025-12-23" />
		<updated date="2025-12-23" />
		<title>Уязвимость python3.10 </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в python3.10</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-10-cve-2024-11168-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.10
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-10-cve-2024-11168-7.3/" type="self" id="ROS-20251223-7323" title="ROS-20251223-7323" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11168" type="cve" id="CVE-2024-11168" title="CVE-2024-11168" />
			<reference href="https://bdu.fstec.ru/vul/2025-12374" type="self" id="BDU:2025-12374" title="BDU:2025-12374" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.10" epoch="0" version="3.10.19" release="1.el7" arch="x86_64" src="python3.10-3.10.19-1.el7.src.rpm">
					<filename>python3.10-0:3.10.19-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251223-7324</id>
		<issued date="2025-12-23" />
		<updated date="2025-12-23" />
		<title>Уязвимость python3 </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в python3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2024-11168-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2024-11168-7.3/" type="self" id="ROS-20251223-7324" title="ROS-20251223-7324" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11168" type="cve" id="CVE-2024-11168" title="CVE-2024-11168" />
			<reference href="https://bdu.fstec.ru/vul/2025-12374" type="self" id="BDU:2025-12374" title="BDU:2025-12374" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3" epoch="0" version="3.8.20" release="7.el7" arch="x86_64" src="python3-3.8.20-7.el7.src.rpm">
					<filename>python3-0:3.8.20-7.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-debug" epoch="0" version="3.8.20" release="7.el7" arch="x86_64" src="python3-3.8.20-7.el7.src.rpm">
					<filename>python3-debug-0:3.8.20-7.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-devel" epoch="0" version="3.8.20" release="7.el7" arch="x86_64" src="python3-3.8.20-7.el7.src.rpm">
					<filename>python3-devel-0:3.8.20-7.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-idle" epoch="0" version="3.8.20" release="7.el7" arch="x86_64" src="python3-3.8.20-7.el7.src.rpm">
					<filename>python3-idle-0:3.8.20-7.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-libs" epoch="0" version="3.8.20" release="7.el7" arch="x86_64" src="python3-3.8.20-7.el7.src.rpm">
					<filename>python3-libs-0:3.8.20-7.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-test" epoch="0" version="3.8.20" release="7.el7" arch="x86_64" src="python3-3.8.20-7.el7.src.rpm">
					<filename>python3-test-0:3.8.20-7.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-tkinter" epoch="0" version="3.8.20" release="7.el7" arch="x86_64" src="python3-3.8.20-7.el7.src.rpm">
					<filename>python3-tkinter-0:3.8.20-7.el7.x86_64.rpm</filename>
				</package>
				<package name="python-unversioned-command" epoch="0" version="3.8.20" release="7.el7" arch="noarch" src="python3-3.8.20-7.el7.src.rpm">
					<filename>python-unversioned-command-0:3.8.20-7.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251226-7301</id>
		<issued date="2025-12-26" />
		<updated date="2025-12-26" />
		<title>Уязвимость cockpit </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в cockpit</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cockpit-cve-2020-35850-7.3/</description>
               <solution>Установить обновление для пакета(ов) cockpit
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cockpit-cve-2020-35850-7.3/" type="self" id="ROS-20251226-7301" title="ROS-20251226-7301" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35850" type="cve" id="CVE-2020-35850" title="CVE-2020-35850" />
			<reference href="https://bdu.fstec.ru/vul/2026-00316" type="self" id="BDU:2026-00316" title="BDU:2026-00316" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cockpit" epoch="0" version="331" release="2.el7" arch="x86_64" src="cockpit-331-2.el7.src.rpm">
					<filename>cockpit-0:331-2.el7.x86_64.rpm</filename>
				</package>
				<package name="cockpit-bridge" epoch="0" version="331" release="2.el7" arch="x86_64" src="cockpit-331-2.el7.src.rpm">
					<filename>cockpit-bridge-0:331-2.el7.x86_64.rpm</filename>
				</package>
				<package name="cockpit-ws" epoch="0" version="331" release="2.el7" arch="x86_64" src="cockpit-331-2.el7.src.rpm">
					<filename>cockpit-ws-0:331-2.el7.x86_64.rpm</filename>
				</package>
				<package name="cockpit-doc" epoch="0" version="331" release="2.el7" arch="noarch" src="cockpit-331-2.el7.src.rpm">
					<filename>cockpit-doc-0:331-2.el7.noarch.rpm</filename>
				</package>
				<package name="cockpit-kdump" epoch="0" version="331" release="2.el7" arch="noarch" src="cockpit-331-2.el7.src.rpm">
					<filename>cockpit-kdump-0:331-2.el7.noarch.rpm</filename>
				</package>
				<package name="cockpit-packagekit" epoch="0" version="331" release="2.el7" arch="noarch" src="cockpit-331-2.el7.src.rpm">
					<filename>cockpit-packagekit-0:331-2.el7.noarch.rpm</filename>
				</package>
				<package name="cockpit-selinux" epoch="0" version="331" release="2.el7" arch="noarch" src="cockpit-331-2.el7.src.rpm">
					<filename>cockpit-selinux-0:331-2.el7.noarch.rpm</filename>
				</package>
				<package name="cockpit-sosreport" epoch="0" version="331" release="2.el7" arch="noarch" src="cockpit-331-2.el7.src.rpm">
					<filename>cockpit-sosreport-0:331-2.el7.noarch.rpm</filename>
				</package>
				<package name="cockpit-storaged" epoch="0" version="331" release="2.el7" arch="noarch" src="cockpit-331-2.el7.src.rpm">
					<filename>cockpit-storaged-0:331-2.el7.noarch.rpm</filename>
				</package>
				<package name="cockpit-system" epoch="0" version="331" release="2.el7" arch="noarch" src="cockpit-331-2.el7.src.rpm">
					<filename>cockpit-system-0:331-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251226-7302</id>
		<issued date="2025-12-26" />
		<updated date="2025-12-26" />
		<title>Уязвимость python-twisted </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-twisted</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-twisted-cve-2022-39348-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-twisted
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-twisted-cve-2022-39348-7.3/" type="self" id="ROS-20251226-7302" title="ROS-20251226-7302" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39348" type="cve" id="CVE-2022-39348" title="CVE-2022-39348" />
			<reference href="https://bdu.fstec.ru/vul/2024-07354" type="self" id="BDU:2024-07354" title="BDU:2024-07354" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-twisted" epoch="0" version="25.5.0" release="1.el7" arch="noarch" src="python-twisted-25.5.0-1.el7.src.rpm">
					<filename>python3-twisted-0:25.5.0-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-twisted+tls" epoch="0" version="25.5.0" release="1.el7" arch="noarch" src="python-twisted-25.5.0-1.el7.src.rpm">
					<filename>python3-twisted+tls-0:25.5.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251226-7303</id>
		<issued date="2025-12-26" />
		<updated date="2025-12-26" />
		<title>Уязвимость python-twisted </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-twisted</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-twisted-cve-2024-41810-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-twisted
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-twisted-cve-2024-41810-7.3/" type="self" id="ROS-20251226-7303" title="ROS-20251226-7303" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41810" type="cve" id="CVE-2024-41810" title="CVE-2024-41810" />
			<reference href="https://bdu.fstec.ru/vul/2025-04172" type="self" id="BDU:2025-04172" title="BDU:2025-04172" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-twisted" epoch="0" version="25.5.0" release="1.el7" arch="noarch" src="python-twisted-25.5.0-1.el7.src.rpm">
					<filename>python3-twisted-0:25.5.0-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-twisted+tls" epoch="0" version="25.5.0" release="1.el7" arch="noarch" src="python-twisted-25.5.0-1.el7.src.rpm">
					<filename>python3-twisted+tls-0:25.5.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251226-7304</id>
		<issued date="2025-12-26" />
		<updated date="2025-12-26" />
		<title>Уязвимость openvpn </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openvpn</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openvpn-cve-2025-50055-7.3/</description>
               <solution>Установить обновление для пакета(ов) openvpn
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openvpn-cve-2025-50055-7.3/" type="self" id="ROS-20251226-7304" title="ROS-20251226-7304" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50055" type="cve" id="CVE-2025-50055" title="CVE-2025-50055" />
			<reference href="https://bdu.fstec.ru/vul/2026-00317" type="self" id="BDU:2026-00317" title="BDU:2026-00317" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openvpn" epoch="0" version="2.6.0" release="1.el7" arch="x86_64" src="openvpn-2.6.0-1.el7.src.rpm">
					<filename>openvpn-0:2.6.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openvpn-devel" epoch="0" version="2.6.0" release="1.el7" arch="x86_64" src="openvpn-2.6.0-1.el7.src.rpm">
					<filename>openvpn-devel-0:2.6.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251226-7305</id>
		<issued date="2025-12-26" />
		<updated date="2025-12-26" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2025-11709-7.3/</description>
               <solution>Установить обновление для пакета(ов) firefox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2025-11709-7.3/" type="self" id="ROS-20251226-7305" title="ROS-20251226-7305" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11709" type="cve" id="CVE-2025-11709" title="CVE-2025-11709" />
			<reference href="https://bdu.fstec.ru/vul/2025-13288" type="self" id="BDU:2025-13288" title="BDU:2025-13288" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.29.0" release="1.el7" arch="x86_64" src="firefox-115.29.0-1.el7.src.rpm">
					<filename>firefox-0:115.29.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251226-7306</id>
		<issued date="2025-12-26" />
		<updated date="2025-12-26" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2025-11710-7.3/</description>
               <solution>Установить обновление для пакета(ов) firefox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2025-11710-7.3/" type="self" id="ROS-20251226-7306" title="ROS-20251226-7306" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11710" type="cve" id="CVE-2025-11710" title="CVE-2025-11710" />
			<reference href="https://bdu.fstec.ru/vul/2025-13290" type="self" id="BDU:2025-13290" title="BDU:2025-13290" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.29.0" release="1.el7" arch="x86_64" src="firefox-115.29.0-1.el7.src.rpm">
					<filename>firefox-0:115.29.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251226-7307</id>
		<issued date="2025-12-26" />
		<updated date="2025-12-26" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2025-11711-7.3/</description>
               <solution>Установить обновление для пакета(ов) firefox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2025-11711-7.3/" type="self" id="ROS-20251226-7307" title="ROS-20251226-7307" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11711" type="cve" id="CVE-2025-11711" title="CVE-2025-11711" />
			<reference href="https://bdu.fstec.ru/vul/2025-13291" type="self" id="BDU:2025-13291" title="BDU:2025-13291" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.29.0" release="1.el7" arch="x86_64" src="firefox-115.29.0-1.el7.src.rpm">
					<filename>firefox-0:115.29.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251229-7301</id>
		<issued date="2025-12-29" />
		<updated date="2025-12-29" />
		<title>Уязвимость python-werkzeug </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-werkzeug</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-werkzeug-cve-2024-49767-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-werkzeug
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-werkzeug-cve-2024-49767-7.3/" type="self" id="ROS-20251229-7301" title="ROS-20251229-7301" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49767" type="cve" id="CVE-2024-49767" title="CVE-2024-49767" />
			<reference href="https://bdu.fstec.ru/vul/2025-06972" type="self" id="BDU:2025-06972" title="BDU:2025-06972" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-werkzeug" epoch="0" version="3.0.6" release="1.el7" arch="noarch" src="python-werkzeug-3.0.6-1.el7.src.rpm">
					<filename>python3-werkzeug-0:3.0.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-werkzeug-doc" epoch="0" version="3.0.6" release="1.el7" arch="noarch" src="python-werkzeug-3.0.6-1.el7.src.rpm">
					<filename>python3-werkzeug-doc-0:3.0.6-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7301</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-54326-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-54326-7.3/" type="self" id="ROS-20260112-7301" title="ROS-20260112-7301" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54326" type="cve" id="CVE-2023-54326" title="CVE-2023-54326" />
			<reference href="https://bdu.fstec.ru/vul/2026-01165" type="self" id="BDU:2026-01165" title="BDU:2026-01165" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.44" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.44-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7302</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-6546-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-6546-7.3/" type="self" id="ROS-20260112-7302" title="ROS-20260112-7302" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6546" type="cve" id="CVE-2023-6546" title="CVE-2023-6546" />
			<reference href="https://bdu.fstec.ru/vul/2023-09114" type="self" id="BDU:2023-09114" title="BDU:2023-09114" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>perf-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.52" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.52-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7303</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-7042-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-7042-7.3/" type="self" id="ROS-20260112-7303" title="ROS-20260112-7303" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042" type="cve" id="CVE-2023-7042" title="CVE-2023-7042" />
			<reference href="https://bdu.fstec.ru/vul/2024-00103" type="self" id="BDU:2024-00103" title="BDU:2024-00103" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.94" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.94-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7304</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-36009-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-36009-7.3/" type="self" id="ROS-20260112-7304" title="ROS-20260112-7304" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36009" type="cve" id="CVE-2024-36009" title="CVE-2024-36009" />
			<reference href="https://bdu.fstec.ru/vul/2025-08076" type="self" id="BDU:2025-08076" title="BDU:2025-08076" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.94" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.94-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7305</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2021-47432-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2021-47432-7.3/" type="self" id="ROS-20260112-7305" title="ROS-20260112-7305" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47432" type="cve" id="CVE-2021-47432" title="CVE-2021-47432" />
			<reference href="https://bdu.fstec.ru/vul/2025-14227" type="self" id="BDU:2025-14227" title="BDU:2025-14227" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.94" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.94-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7306</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-52760-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-52760-7.3/" type="self" id="ROS-20260112-7306" title="ROS-20260112-7306" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52760" type="cve" id="CVE-2023-52760" title="CVE-2023-52760" />
			<reference href="https://bdu.fstec.ru/vul/2024-04577" type="self" id="BDU:2024-04577" title="BDU:2024-04577" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7307</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-52812-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-52812-7.3/" type="self" id="ROS-20260112-7307" title="ROS-20260112-7307" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52812" type="cve" id="CVE-2023-52812" title="CVE-2023-52812" />
			<reference href="https://bdu.fstec.ru/vul/2025-04547" type="self" id="BDU:2025-04547" title="BDU:2025-04547" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7308</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-36914-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-36914-7.3/" type="self" id="ROS-20260112-7308" title="ROS-20260112-7308" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36914" type="cve" id="CVE-2024-36914" title="CVE-2024-36914" />
			<reference href="https://bdu.fstec.ru/vul/2025-08071" type="self" id="BDU:2025-08071" title="BDU:2025-08071" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7309</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-36915-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-36915-7.3/" type="self" id="ROS-20260112-7309" title="ROS-20260112-7309" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36915" type="cve" id="CVE-2024-36915" title="CVE-2024-36915" />
			<reference href="https://bdu.fstec.ru/vul/2025-08069" type="self" id="BDU:2025-08069" title="BDU:2025-08069" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7310</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-36917-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-36917-7.3/" type="self" id="ROS-20260112-7310" title="ROS-20260112-7310" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36917" type="cve" id="CVE-2024-36917" title="CVE-2024-36917" />
			<reference href="https://bdu.fstec.ru/vul/2025-08068" type="self" id="BDU:2025-08068" title="BDU:2025-08068" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.94" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.94-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7311</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-36927-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-36927-7.3/" type="self" id="ROS-20260112-7311" title="ROS-20260112-7311" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36927" type="cve" id="CVE-2024-36927" title="CVE-2024-36927" />
			<reference href="https://bdu.fstec.ru/vul/2025-11996" type="self" id="BDU:2025-11996" title="BDU:2025-11996" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7312</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-38540-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-38540-7.3/" type="self" id="ROS-20260112-7312" title="ROS-20260112-7312" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38540" type="cve" id="CVE-2024-38540" title="CVE-2024-38540" />
			<reference href="https://bdu.fstec.ru/vul/2025-08063" type="self" id="BDU:2025-08063" title="BDU:2025-08063" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7313</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-38541-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-38541-7.3/" type="self" id="ROS-20260112-7313" title="ROS-20260112-7313" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38541" type="cve" id="CVE-2024-38541" title="CVE-2024-38541" />
			<reference href="https://bdu.fstec.ru/vul/2024-10603" type="self" id="BDU:2024-10603" title="BDU:2024-10603" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7314</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-38543-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-38543-7.3/" type="self" id="ROS-20260112-7314" title="ROS-20260112-7314" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38543" type="cve" id="CVE-2024-38543" title="CVE-2024-38543" />
			<reference href="https://bdu.fstec.ru/vul/2025-03049" type="self" id="BDU:2025-03049" title="BDU:2025-03049" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.94" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.94-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7315</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-38553-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-38553-7.3/" type="self" id="ROS-20260112-7315" title="ROS-20260112-7315" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38553" type="cve" id="CVE-2024-38553" title="CVE-2024-38553" />
			<reference href="https://bdu.fstec.ru/vul/2025-03048" type="self" id="BDU:2025-03048" title="BDU:2025-03048" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7316</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-38554-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-38554-7.3/" type="self" id="ROS-20260112-7316" title="ROS-20260112-7316" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38554" type="cve" id="CVE-2024-38554" title="CVE-2024-38554" />
			<reference href="https://bdu.fstec.ru/vul/2025-03047" type="self" id="BDU:2025-03047" title="BDU:2025-03047" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.94" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.94-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7317</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-38556-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-38556-7.3/" type="self" id="ROS-20260112-7317" title="ROS-20260112-7317" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38556" type="cve" id="CVE-2024-38556" title="CVE-2024-38556" />
			<reference href="https://bdu.fstec.ru/vul/2025-08062" type="self" id="BDU:2025-08062" title="BDU:2025-08062" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.94" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.94-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7318</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-38581-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-38581-7.3/" type="self" id="ROS-20260112-7318" title="ROS-20260112-7318" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38581" type="cve" id="CVE-2024-38581" title="CVE-2024-38581" />
			<reference href="https://bdu.fstec.ru/vul/2024-06062" type="self" id="BDU:2024-06062" title="BDU:2024-06062" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.94" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.94-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7319</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-38602-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-38602-7.3/" type="self" id="ROS-20260112-7319" title="ROS-20260112-7319" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38602" type="cve" id="CVE-2024-38602" title="CVE-2024-38602" />
			<reference href="https://bdu.fstec.ru/vul/2025-03041" type="self" id="BDU:2025-03041" title="BDU:2025-03041" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.94" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.94-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7320</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-38611-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-38611-7.3/" type="self" id="ROS-20260112-7320" title="ROS-20260112-7320" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38611" type="cve" id="CVE-2024-38611" title="CVE-2024-38611" />
			<reference href="https://bdu.fstec.ru/vul/2025-12050" type="self" id="BDU:2025-12050" title="BDU:2025-12050" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7321</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-36244-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-36244-7.3/" type="self" id="ROS-20260112-7321" title="ROS-20260112-7321" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36244" type="cve" id="CVE-2024-36244" title="CVE-2024-36244" />
			<reference href="https://bdu.fstec.ru/vul/2025-08075" type="self" id="BDU:2025-08075" title="BDU:2025-08075" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7322</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-36478-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-36478-7.3/" type="self" id="ROS-20260112-7322" title="ROS-20260112-7322" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36478" type="cve" id="CVE-2024-36478" title="CVE-2024-36478" />
			<reference href="https://bdu.fstec.ru/vul/2025-03061" type="self" id="BDU:2025-03061" title="BDU:2025-03061" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7323</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-36479-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-36479-7.3/" type="self" id="ROS-20260112-7323" title="ROS-20260112-7323" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36479" type="cve" id="CVE-2024-36479" title="CVE-2024-36479" />
			<reference href="https://bdu.fstec.ru/vul/2025-03056" type="self" id="BDU:2025-03056" title="BDU:2025-03056" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7324</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-37021-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-37021-7.3/" type="self" id="ROS-20260112-7324" title="ROS-20260112-7324" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37021" type="cve" id="CVE-2024-37021" title="CVE-2024-37021" />
			<reference href="https://bdu.fstec.ru/vul/2025-03051" type="self" id="BDU:2025-03051" title="BDU:2025-03051" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7325</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-37354-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-37354-7.3/" type="self" id="ROS-20260112-7325" title="ROS-20260112-7325" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37354" type="cve" id="CVE-2024-37354" title="CVE-2024-37354" />
			<reference href="https://bdu.fstec.ru/vul/2024-05057" type="self" id="BDU:2024-05057" title="BDU:2024-05057" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.94" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.94-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7326</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-39496-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-39496-7.3/" type="self" id="ROS-20260112-7326" title="ROS-20260112-7326" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39496" type="cve" id="CVE-2024-39496" title="CVE-2024-39496" />
			<reference href="https://bdu.fstec.ru/vul/2024-06071" type="self" id="BDU:2024-06071" title="BDU:2024-06071" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7327</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-40910-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-40910-7.3/" type="self" id="ROS-20260112-7327" title="ROS-20260112-7327" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40910" type="cve" id="CVE-2024-40910" title="CVE-2024-40910" />
			<reference href="https://bdu.fstec.ru/vul/2025-03028" type="self" id="BDU:2025-03028" title="BDU:2025-03028" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7328</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-40915-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-40915-7.3/" type="self" id="ROS-20260112-7328" title="ROS-20260112-7328" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40915" type="cve" id="CVE-2024-40915" title="CVE-2024-40915" />
			<reference href="https://bdu.fstec.ru/vul/2025-08059" type="self" id="BDU:2025-08059" title="BDU:2025-08059" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7329</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-40945-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-40945-7.3/" type="self" id="ROS-20260112-7329" title="ROS-20260112-7329" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40945" type="cve" id="CVE-2024-40945" title="CVE-2024-40945" />
			<reference href="https://bdu.fstec.ru/vul/2025-03027" type="self" id="BDU:2025-03027" title="BDU:2025-03027" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7330</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-40966-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-40966-7.3/" type="self" id="ROS-20260112-7330" title="ROS-20260112-7330" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40966" type="cve" id="CVE-2024-40966" title="CVE-2024-40966" />
			<reference href="https://bdu.fstec.ru/vul/2025-08058" type="self" id="BDU:2025-08058" title="BDU:2025-08058" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7331</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-40972-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-40972-7.3/" type="self" id="ROS-20260112-7331" title="ROS-20260112-7331" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40972" type="cve" id="CVE-2024-40972" title="CVE-2024-40972" />
			<reference href="https://bdu.fstec.ru/vul/2025-03024" type="self" id="BDU:2025-03024" title="BDU:2025-03024" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7332</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-40973-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-40973-7.3/" type="self" id="ROS-20260112-7332" title="ROS-20260112-7332" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40973" type="cve" id="CVE-2024-40973" title="CVE-2024-40973" />
			<reference href="https://bdu.fstec.ru/vul/2025-03023" type="self" id="BDU:2025-03023" title="BDU:2025-03023" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7333</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-40977-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-40977-7.3/" type="self" id="ROS-20260112-7333" title="ROS-20260112-7333" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40977" type="cve" id="CVE-2024-40977" title="CVE-2024-40977" />
			<reference href="https://bdu.fstec.ru/vul/2025-03022" type="self" id="BDU:2025-03022" title="BDU:2025-03022" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7334</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-40989-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-40989-7.3/" type="self" id="ROS-20260112-7334" title="ROS-20260112-7334" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40989" type="cve" id="CVE-2024-40989" title="CVE-2024-40989" />
			<reference href="https://bdu.fstec.ru/vul/2025-08056" type="self" id="BDU:2025-08056" title="BDU:2025-08056" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7335</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-41001-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-41001-7.3/" type="self" id="ROS-20260112-7335" title="ROS-20260112-7335" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41001" type="cve" id="CVE-2024-41001" title="CVE-2024-41001" />
			<reference href="https://bdu.fstec.ru/vul/2024-07925" type="self" id="BDU:2024-07925" title="BDU:2024-07925" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7336</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-52885-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-52885-7.3/" type="self" id="ROS-20260112-7336" title="ROS-20260112-7336" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52885" type="cve" id="CVE-2023-52885" title="CVE-2023-52885" />
			<reference href="https://bdu.fstec.ru/vul/2024-06074" type="self" id="BDU:2024-06074" title="BDU:2024-06074" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.44" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.44-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7337</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2022-48832-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2022-48832-7.3/" type="self" id="ROS-20260112-7337" title="ROS-20260112-7337" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48832" type="cve" id="CVE-2022-48832" title="CVE-2022-48832" />
			<reference href="https://bdu.fstec.ru/vul/2025-14261" type="self" id="BDU:2025-14261" title="BDU:2025-14261" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.94" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.94-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7338</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2022-48833-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2022-48833-7.3/" type="self" id="ROS-20260112-7338" title="ROS-20260112-7338" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48833" type="cve" id="CVE-2022-48833" title="CVE-2022-48833" />
			<reference href="https://bdu.fstec.ru/vul/2025-14262" type="self" id="BDU:2025-14262" title="BDU:2025-14262" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.94" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.94-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7339</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-41090-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-41090-7.3/" type="self" id="ROS-20260112-7339" title="ROS-20260112-7339" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41090" type="cve" id="CVE-2024-41090" title="CVE-2024-41090" />
			<reference href="https://bdu.fstec.ru/vul/2025-04193" type="self" id="BDU:2025-04193" title="BDU:2025-04193" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7340</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-41091-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-41091-7.3/" type="self" id="ROS-20260112-7340" title="ROS-20260112-7340" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41091" type="cve" id="CVE-2024-41091" title="CVE-2024-41091" />
			<reference href="https://bdu.fstec.ru/vul/2025-04173" type="self" id="BDU:2025-04173" title="BDU:2025-04173" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7341</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-41013-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-41013-7.3/" type="self" id="ROS-20260112-7341" title="ROS-20260112-7341" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41013" type="cve" id="CVE-2024-41013" title="CVE-2024-41013" />
			<reference href="https://bdu.fstec.ru/vul/2025-15111" type="self" id="BDU:2025-15111" title="BDU:2025-15111" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7342</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-41014-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-41014-7.3/" type="self" id="ROS-20260112-7342" title="ROS-20260112-7342" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41014" type="cve" id="CVE-2024-41014" title="CVE-2024-41014" />
			<reference href="https://bdu.fstec.ru/vul/2024-08309" type="self" id="BDU:2024-08309" title="BDU:2024-08309" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7343</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-41030-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-41030-7.3/" type="self" id="ROS-20260112-7343" title="ROS-20260112-7343" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41030" type="cve" id="CVE-2024-41030" title="CVE-2024-41030" />
			<reference href="https://bdu.fstec.ru/vul/2025-08044" type="self" id="BDU:2025-08044" title="BDU:2025-08044" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7344</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-41036-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-41036-7.3/" type="self" id="ROS-20260112-7344" title="ROS-20260112-7344" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41036" type="cve" id="CVE-2024-41036" title="CVE-2024-41036" />
			<reference href="https://bdu.fstec.ru/vul/2025-03018" type="self" id="BDU:2025-03018" title="BDU:2025-03018" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7345</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-41062-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-41062-7.3/" type="self" id="ROS-20260112-7345" title="ROS-20260112-7345" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41062" type="cve" id="CVE-2024-41062" title="CVE-2024-41062" />
			<reference href="https://bdu.fstec.ru/vul/2024-09000" type="self" id="BDU:2024-09000" title="BDU:2024-09000" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7346</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-41066-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-41066-7.3/" type="self" id="ROS-20260112-7346" title="ROS-20260112-7346" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41066" type="cve" id="CVE-2024-41066" title="CVE-2024-41066" />
			<reference href="https://bdu.fstec.ru/vul/2025-03013" type="self" id="BDU:2025-03013" title="BDU:2025-03013" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7347</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-41069-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-41069-7.3/" type="self" id="ROS-20260112-7347" title="ROS-20260112-7347" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41069" type="cve" id="CVE-2024-41069" title="CVE-2024-41069" />
			<reference href="https://bdu.fstec.ru/vul/2025-08041" type="self" id="BDU:2025-08041" title="BDU:2025-08041" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7348</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-41071-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-41071-7.3/" type="self" id="ROS-20260112-7348" title="ROS-20260112-7348" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41071" type="cve" id="CVE-2024-41071" title="CVE-2024-41071" />
			<reference href="https://bdu.fstec.ru/vul/2024-08966" type="self" id="BDU:2024-08966" title="BDU:2024-08966" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7349</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-41074-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-41074-7.3/" type="self" id="ROS-20260112-7349" title="ROS-20260112-7349" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41074" type="cve" id="CVE-2024-41074" title="CVE-2024-41074" />
			<reference href="https://bdu.fstec.ru/vul/2025-08040" type="self" id="BDU:2025-08040" title="BDU:2025-08040" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7350</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-41075-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-41075-7.3/" type="self" id="ROS-20260112-7350" title="ROS-20260112-7350" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41075" type="cve" id="CVE-2024-41075" title="CVE-2024-41075" />
			<reference href="https://bdu.fstec.ru/vul/2025-08039" type="self" id="BDU:2025-08039" title="BDU:2025-08039" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7351</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-41076-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-41076-7.3/" type="self" id="ROS-20260112-7351" title="ROS-20260112-7351" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41076" type="cve" id="CVE-2024-41076" title="CVE-2024-41076" />
			<reference href="https://bdu.fstec.ru/vul/2025-03011" type="self" id="BDU:2025-03011" title="BDU:2025-03011" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7352</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-41079-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-41079-7.3/" type="self" id="ROS-20260112-7352" title="ROS-20260112-7352" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41079" type="cve" id="CVE-2024-41079" title="CVE-2024-41079" />
			<reference href="https://bdu.fstec.ru/vul/2025-08038" type="self" id="BDU:2025-08038" title="BDU:2025-08038" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7353</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-41088-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-41088-7.3/" type="self" id="ROS-20260112-7353" title="ROS-20260112-7353" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41088" type="cve" id="CVE-2024-41088" title="CVE-2024-41088" />
			<reference href="https://bdu.fstec.ru/vul/2025-03005" type="self" id="BDU:2025-03005" title="BDU:2025-03005" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7354</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-42063-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-42063-7.3/" type="self" id="ROS-20260112-7354" title="ROS-20260112-7354" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42063" type="cve" id="CVE-2024-42063" title="CVE-2024-42063" />
			<reference href="https://bdu.fstec.ru/vul/2025-03003" type="self" id="BDU:2025-03003" title="BDU:2025-03003" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7355</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-42110-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-42110-7.3/" type="self" id="ROS-20260112-7355" title="ROS-20260112-7355" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42110" type="cve" id="CVE-2024-42110" title="CVE-2024-42110" />
			<reference href="https://bdu.fstec.ru/vul/2025-08036" type="self" id="BDU:2025-08036" title="BDU:2025-08036" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7356</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-42122-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-42122-7.3/" type="self" id="ROS-20260112-7356" title="ROS-20260112-7356" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42122" type="cve" id="CVE-2024-42122" title="CVE-2024-42122" />
			<reference href="https://bdu.fstec.ru/vul/2025-02983" type="self" id="BDU:2025-02983" title="BDU:2025-02983" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7357</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-42129-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-42129-7.3/" type="self" id="ROS-20260112-7357" title="ROS-20260112-7357" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42129" type="cve" id="CVE-2024-42129" title="CVE-2024-42129" />
			<reference href="https://bdu.fstec.ru/vul/2025-12252" type="self" id="BDU:2025-12252" title="BDU:2025-12252" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7358</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-42136-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-42136-7.3/" type="self" id="ROS-20260112-7358" title="ROS-20260112-7358" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42136" type="cve" id="CVE-2024-42136" title="CVE-2024-42136" />
			<reference href="https://bdu.fstec.ru/vul/2024-08082" type="self" id="BDU:2024-08082" title="BDU:2024-08082" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7359</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-42147-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-42147-7.3/" type="self" id="ROS-20260112-7359" title="ROS-20260112-7359" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42147" type="cve" id="CVE-2024-42147" title="CVE-2024-42147" />
			<reference href="https://bdu.fstec.ru/vul/2025-04549" type="self" id="BDU:2025-04549" title="BDU:2025-04549" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7360</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-42159-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-42159-7.3/" type="self" id="ROS-20260112-7360" title="ROS-20260112-7360" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42159" type="cve" id="CVE-2024-42159" title="CVE-2024-42159" />
			<reference href="https://bdu.fstec.ru/vul/2024-07748" type="self" id="BDU:2024-07748" title="BDU:2024-07748" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7361</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-42160-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-42160-7.3/" type="self" id="ROS-20260112-7361" title="ROS-20260112-7361" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42160" type="cve" id="CVE-2024-42160" title="CVE-2024-42160" />
			<reference href="https://bdu.fstec.ru/vul/2024-07747" type="self" id="BDU:2024-07747" title="BDU:2024-07747" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7362</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-42226-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-42226-7.3/" type="self" id="ROS-20260112-7362" title="ROS-20260112-7362" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42226" type="cve" id="CVE-2024-42226" title="CVE-2024-42226" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7363</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-42230-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-42230-7.3/" type="self" id="ROS-20260112-7363" title="ROS-20260112-7363" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42230" type="cve" id="CVE-2024-42230" title="CVE-2024-42230" />
			<reference href="https://bdu.fstec.ru/vul/2025-08539" type="self" id="BDU:2025-08539" title="BDU:2025-08539" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7364</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-42252-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-42252-7.3/" type="self" id="ROS-20260112-7364" title="ROS-20260112-7364" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42252" type="cve" id="CVE-2024-42252" title="CVE-2024-42252" />
			<reference href="https://bdu.fstec.ru/vul/2025-02972" type="self" id="BDU:2025-02972" title="BDU:2025-02972" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7365</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-42253-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-42253-7.3/" type="self" id="ROS-20260112-7365" title="ROS-20260112-7365" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42253" type="cve" id="CVE-2024-42253" title="CVE-2024-42253" />
			<reference href="https://bdu.fstec.ru/vul/2024-08183" type="self" id="BDU:2024-08183" title="BDU:2024-08183" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7366</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-42273-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-42273-7.3/" type="self" id="ROS-20260112-7366" title="ROS-20260112-7366" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42273" type="cve" id="CVE-2024-42273" title="CVE-2024-42273" />
			<reference href="https://bdu.fstec.ru/vul/2025-06971" type="self" id="BDU:2025-06971" title="BDU:2025-06971" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7367</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-42319-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-42319-7.3/" type="self" id="ROS-20260112-7367" title="ROS-20260112-7367" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42319" type="cve" id="CVE-2024-42319" title="CVE-2024-42319" />
			<reference href="https://bdu.fstec.ru/vul/2025-08033" type="self" id="BDU:2025-08033" title="BDU:2025-08033" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7368</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-42320-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-42320-7.3/" type="self" id="ROS-20260112-7368" title="ROS-20260112-7368" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42320" type="cve" id="CVE-2024-42320" title="CVE-2024-42320" />
			<reference href="https://bdu.fstec.ru/vul/2025-02970" type="self" id="BDU:2025-02970" title="BDU:2025-02970" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7369</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-42321-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-42321-7.3/" type="self" id="ROS-20260112-7369" title="ROS-20260112-7369" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42321" type="cve" id="CVE-2024-42321" title="CVE-2024-42321" />
			<reference href="https://bdu.fstec.ru/vul/2025-08032" type="self" id="BDU:2025-08032" title="BDU:2025-08032" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7370</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-42322-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-42322-7.3/" type="self" id="ROS-20260112-7370" title="ROS-20260112-7370" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42322" type="cve" id="CVE-2024-42322" title="CVE-2024-42322" />
			<reference href="https://bdu.fstec.ru/vul/2025-08031" type="self" id="BDU:2025-08031" title="BDU:2025-08031" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7371</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-43823-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-43823-7.3/" type="self" id="ROS-20260112-7371" title="ROS-20260112-7371" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43823" type="cve" id="CVE-2024-43823" title="CVE-2024-43823" />
			<reference href="https://bdu.fstec.ru/vul/2025-02962" type="self" id="BDU:2025-02962" title="BDU:2025-02962" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7372</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-43832-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-43832-7.3/" type="self" id="ROS-20260112-7372" title="ROS-20260112-7372" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43832" type="cve" id="CVE-2024-43832" title="CVE-2024-43832" />
			<reference href="https://bdu.fstec.ru/vul/2025-08029" type="self" id="BDU:2025-08029" title="BDU:2025-08029" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7373</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-43866-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-43866-7.3/" type="self" id="ROS-20260112-7373" title="ROS-20260112-7373" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43866" type="cve" id="CVE-2024-43866" title="CVE-2024-43866" />
			<reference href="https://bdu.fstec.ru/vul/2025-08027" type="self" id="BDU:2025-08027" title="BDU:2025-08027" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7374</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-43895-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-43895-7.3/" type="self" id="ROS-20260112-7374" title="ROS-20260112-7374" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43895" type="cve" id="CVE-2024-43895" title="CVE-2024-43895" />
			<reference href="https://bdu.fstec.ru/vul/2025-03090" type="self" id="BDU:2025-03090" title="BDU:2025-03090" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7375</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-43900-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-43900-7.3/" type="self" id="ROS-20260112-7375" title="ROS-20260112-7375" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43900" type="cve" id="CVE-2024-43900" title="CVE-2024-43900" />
			<reference href="https://bdu.fstec.ru/vul/2026-02205" type="self" id="BDU:2026-02205" title="BDU:2026-02205" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7376</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-43904-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-43904-7.3/" type="self" id="ROS-20260112-7376" title="ROS-20260112-7376" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43904" type="cve" id="CVE-2024-43904" title="CVE-2024-43904" />
			<reference href="https://bdu.fstec.ru/vul/2025-03094" type="self" id="BDU:2025-03094" title="BDU:2025-03094" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7377</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-43911-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-43911-7.3/" type="self" id="ROS-20260112-7377" title="ROS-20260112-7377" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43911" type="cve" id="CVE-2024-43911" title="CVE-2024-43911" />
			<reference href="https://bdu.fstec.ru/vul/2025-03098" type="self" id="BDU:2025-03098" title="BDU:2025-03098" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7378</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-43912-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-43912-7.3/" type="self" id="ROS-20260112-7378" title="ROS-20260112-7378" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43912" type="cve" id="CVE-2024-43912" title="CVE-2024-43912" />
			<reference href="https://bdu.fstec.ru/vul/2025-03097" type="self" id="BDU:2025-03097" title="BDU:2025-03097" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7379</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-44938-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-44938-7.3/" type="self" id="ROS-20260112-7379" title="ROS-20260112-7379" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44938" type="cve" id="CVE-2024-44938" title="CVE-2024-44938" />
			<reference href="https://bdu.fstec.ru/vul/2025-03152" type="self" id="BDU:2025-03152" title="BDU:2025-03152" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7380</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-44939-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-44939-7.3/" type="self" id="ROS-20260112-7380" title="ROS-20260112-7380" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44939" type="cve" id="CVE-2024-44939" title="CVE-2024-44939" />
			<reference href="https://bdu.fstec.ru/vul/2025-03153" type="self" id="BDU:2025-03153" title="BDU:2025-03153" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7381</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-44950-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-44950-7.3/" type="self" id="ROS-20260112-7381" title="ROS-20260112-7381" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44950" type="cve" id="CVE-2024-44950" title="CVE-2024-44950" />
			<reference href="https://bdu.fstec.ru/vul/2025-03158" type="self" id="BDU:2025-03158" title="BDU:2025-03158" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7382</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-44970-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-44970-7.3/" type="self" id="ROS-20260112-7382" title="ROS-20260112-7382" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44970" type="cve" id="CVE-2024-44970" title="CVE-2024-44970" />
			<reference href="https://bdu.fstec.ru/vul/2025-03699" type="self" id="BDU:2025-03699" title="BDU:2025-03699" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7383</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-44977-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-44977-7.3/" type="self" id="ROS-20260112-7383" title="ROS-20260112-7383" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44977" type="cve" id="CVE-2024-44977" title="CVE-2024-44977" />
			<reference href="https://bdu.fstec.ru/vul/2024-08540" type="self" id="BDU:2024-08540" title="BDU:2024-08540" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7384</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-52916-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-52916-7.3/" type="self" id="ROS-20260112-7384" title="ROS-20260112-7384" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52916" type="cve" id="CVE-2023-52916" title="CVE-2023-52916" />
			<reference href="https://bdu.fstec.ru/vul/2025-15395" type="self" id="BDU:2025-15395" title="BDU:2025-15395" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-7385</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-45010-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-45010-7.3/" type="self" id="ROS-20260112-7385" title="ROS-20260112-7385" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45010" type="cve" id="CVE-2024-45010" title="CVE-2024-45010" />
			<reference href="https://bdu.fstec.ru/vul/2025-03751" type="self" id="BDU:2025-03751" title="BDU:2025-03751" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7301</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-46715-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-46715-7.3/" type="self" id="ROS-20260113-7301" title="ROS-20260113-7301" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46715" type="cve" id="CVE-2024-46715" title="CVE-2024-46715" />
			<reference href="https://bdu.fstec.ru/vul/2025-04658" type="self" id="BDU:2025-04658" title="BDU:2025-04658" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7302</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-46716-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-46716-7.3/" type="self" id="ROS-20260113-7302" title="ROS-20260113-7302" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46716" type="cve" id="CVE-2024-46716" title="CVE-2024-46716" />
			<reference href="https://bdu.fstec.ru/vul/2025-08023" type="self" id="BDU:2025-08023" title="BDU:2025-08023" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7303</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-46717-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-46717-7.3/" type="self" id="ROS-20260113-7303" title="ROS-20260113-7303" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46717" type="cve" id="CVE-2024-46717" title="CVE-2024-46717" />
			<reference href="https://bdu.fstec.ru/vul/2025-08022" type="self" id="BDU:2025-08022" title="BDU:2025-08022" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7304</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-46720-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-46720-7.3/" type="self" id="ROS-20260113-7304" title="ROS-20260113-7304" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46720" type="cve" id="CVE-2024-46720" title="CVE-2024-46720" />
			<reference href="https://bdu.fstec.ru/vul/2025-03692" type="self" id="BDU:2025-03692" title="BDU:2025-03692" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7305</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-46726-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-46726-7.3/" type="self" id="ROS-20260113-7305" title="ROS-20260113-7305" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46726" type="cve" id="CVE-2024-46726" title="CVE-2024-46726" />
			<reference href="https://bdu.fstec.ru/vul/2025-03691" type="self" id="BDU:2025-03691" title="BDU:2025-03691" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7306</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-46742-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-46742-7.3/" type="self" id="ROS-20260113-7306" title="ROS-20260113-7306" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46742" type="cve" id="CVE-2024-46742" title="CVE-2024-46742" />
			<reference href="https://bdu.fstec.ru/vul/2025-05914" type="self" id="BDU:2025-05914" title="BDU:2025-05914" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7307</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-46770-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-46770-7.3/" type="self" id="ROS-20260113-7307" title="ROS-20260113-7307" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46770" type="cve" id="CVE-2024-46770" title="CVE-2024-46770" />
			<reference href="https://bdu.fstec.ru/vul/2025-05921" type="self" id="BDU:2025-05921" title="BDU:2025-05921" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7308</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-46773-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-46773-7.3/" type="self" id="ROS-20260113-7308" title="ROS-20260113-7308" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46773" type="cve" id="CVE-2024-46773" title="CVE-2024-46773" />
			<reference href="https://bdu.fstec.ru/vul/2025-03686" type="self" id="BDU:2025-03686" title="BDU:2025-03686" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7309</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-46784-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-46784-7.3/" type="self" id="ROS-20260113-7309" title="ROS-20260113-7309" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46784" type="cve" id="CVE-2024-46784" title="CVE-2024-46784" />
			<reference href="https://bdu.fstec.ru/vul/2025-03585" type="self" id="BDU:2025-03585" title="BDU:2025-03585" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7310</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-46802-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-46802-7.3/" type="self" id="ROS-20260113-7310" title="ROS-20260113-7310" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46802" type="cve" id="CVE-2024-46802" title="CVE-2024-46802" />
			<reference href="https://bdu.fstec.ru/vul/2025-05930" type="self" id="BDU:2025-05930" title="BDU:2025-05930" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7311</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-46812-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-46812-7.3/" type="self" id="ROS-20260113-7311" title="ROS-20260113-7311" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46812" type="cve" id="CVE-2024-46812" title="CVE-2024-46812" />
			<reference href="https://bdu.fstec.ru/vul/2025-07001" type="self" id="BDU:2025-07001" title="BDU:2025-07001" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7312</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-46821-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-46821-7.3/" type="self" id="ROS-20260113-7312" title="ROS-20260113-7312" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46821" type="cve" id="CVE-2024-46821" title="CVE-2024-46821" />
			<reference href="https://bdu.fstec.ru/vul/2024-08530" type="self" id="BDU:2024-08530" title="BDU:2024-08530" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7313</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-46826-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-46826-7.3/" type="self" id="ROS-20260113-7313" title="ROS-20260113-7313" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46826" type="cve" id="CVE-2024-46826" title="CVE-2024-46826" />
			<reference href="https://bdu.fstec.ru/vul/2025-03256" type="self" id="BDU:2025-03256" title="BDU:2025-03256" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7314</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-46830-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-46830-7.3/" type="self" id="ROS-20260113-7314" title="ROS-20260113-7314" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46830" type="cve" id="CVE-2024-46830" title="CVE-2024-46830" />
			<reference href="https://bdu.fstec.ru/vul/2025-07002" type="self" id="BDU:2025-07002" title="BDU:2025-07002" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7315</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-46835-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-46835-7.3/" type="self" id="ROS-20260113-7315" title="ROS-20260113-7315" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46835" type="cve" id="CVE-2024-46835" title="CVE-2024-46835" />
			<reference href="https://bdu.fstec.ru/vul/2025-05976" type="self" id="BDU:2025-05976" title="BDU:2025-05976" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7316</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-46836-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-46836-7.3/" type="self" id="ROS-20260113-7316" title="ROS-20260113-7316" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46836" type="cve" id="CVE-2024-46836" title="CVE-2024-46836" />
			<reference href="https://bdu.fstec.ru/vul/2024-08520" type="self" id="BDU:2024-08520" title="BDU:2024-08520" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7317</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-46848-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-46848-7.3/" type="self" id="ROS-20260113-7317" title="ROS-20260113-7317" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46848" type="cve" id="CVE-2024-46848" title="CVE-2024-46848" />
			<reference href="https://bdu.fstec.ru/vul/2025-05879" type="self" id="BDU:2025-05879" title="BDU:2025-05879" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7318</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-46857-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-46857-7.3/" type="self" id="ROS-20260113-7318" title="ROS-20260113-7318" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46857" type="cve" id="CVE-2024-46857" title="CVE-2024-46857" />
			<reference href="https://bdu.fstec.ru/vul/2025-03254" type="self" id="BDU:2025-03254" title="BDU:2025-03254" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7319</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-47678-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-47678-7.3/" type="self" id="ROS-20260113-7319" title="ROS-20260113-7319" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47678" type="cve" id="CVE-2024-47678" title="CVE-2024-47678" />
			<reference href="https://bdu.fstec.ru/vul/2025-02969" type="self" id="BDU:2025-02969" title="BDU:2025-02969" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7320</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-47704-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-47704-7.3/" type="self" id="ROS-20260113-7320" title="ROS-20260113-7320" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47704" type="cve" id="CVE-2024-47704" title="CVE-2024-47704" />
			<reference href="https://bdu.fstec.ru/vul/2025-02959" type="self" id="BDU:2025-02959" title="BDU:2025-02959" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7321</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-47726-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-47726-7.3/" type="self" id="ROS-20260113-7321" title="ROS-20260113-7321" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47726" type="cve" id="CVE-2024-47726" title="CVE-2024-47726" />
			<reference href="https://bdu.fstec.ru/vul/2025-04528" type="self" id="BDU:2025-04528" title="BDU:2025-04528" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7322</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-47738-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-47738-7.3/" type="self" id="ROS-20260113-7322" title="ROS-20260113-7322" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47738" type="cve" id="CVE-2024-47738" title="CVE-2024-47738" />
			<reference href="https://bdu.fstec.ru/vul/2025-08019" type="self" id="BDU:2025-08019" title="BDU:2025-08019" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7323</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-47745-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-47745-7.3/" type="self" id="ROS-20260113-7323" title="ROS-20260113-7323" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47745" type="cve" id="CVE-2024-47745" title="CVE-2024-47745" />
			<reference href="https://bdu.fstec.ru/vul/2025-04689" type="self" id="BDU:2025-04689" title="BDU:2025-04689" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7324</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-47753-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-47753-7.3/" type="self" id="ROS-20260113-7324" title="ROS-20260113-7324" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47753" type="cve" id="CVE-2024-47753" title="CVE-2024-47753" />
			<reference href="https://bdu.fstec.ru/vul/2025-12231" type="self" id="BDU:2025-12231" title="BDU:2025-12231" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7325</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-47754-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-47754-7.3/" type="self" id="ROS-20260113-7325" title="ROS-20260113-7325" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47754" type="cve" id="CVE-2024-47754" title="CVE-2024-47754" />
			<reference href="https://bdu.fstec.ru/vul/2025-12232" type="self" id="BDU:2025-12232" title="BDU:2025-12232" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7326</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-47755-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-47755-7.3/" type="self" id="ROS-20260113-7326" title="ROS-20260113-7326" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47755" type="cve" id="CVE-2024-47755" title="CVE-2024-47755" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7327</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49859-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49859-7.3/" type="self" id="ROS-20260113-7327" title="ROS-20260113-7327" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49859" type="cve" id="CVE-2024-49859" title="CVE-2024-49859" />
			<reference href="https://bdu.fstec.ru/vul/2025-08000" type="self" id="BDU:2025-08000" title="BDU:2025-08000" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7328</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49861-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49861-7.3/" type="self" id="ROS-20260113-7328" title="ROS-20260113-7328" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49861" type="cve" id="CVE-2024-49861" title="CVE-2024-49861" />
			<reference href="https://bdu.fstec.ru/vul/2025-07000" type="self" id="BDU:2025-07000" title="BDU:2025-07000" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7329</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49891-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49891-7.3/" type="self" id="ROS-20260113-7329" title="ROS-20260113-7329" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49891" type="cve" id="CVE-2024-49891" title="CVE-2024-49891" />
			<reference href="https://bdu.fstec.ru/vul/2025-07997" type="self" id="BDU:2025-07997" title="BDU:2025-07997" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7330</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49897-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49897-7.3/" type="self" id="ROS-20260113-7330" title="ROS-20260113-7330" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49897" type="cve" id="CVE-2024-49897" title="CVE-2024-49897" />
			<reference href="https://bdu.fstec.ru/vul/2025-13770" type="self" id="BDU:2025-13770" title="BDU:2025-13770" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7331</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49898-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49898-7.3/" type="self" id="ROS-20260113-7331" title="ROS-20260113-7331" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49898" type="cve" id="CVE-2024-49898" title="CVE-2024-49898" />
			<reference href="https://bdu.fstec.ru/vul/2025-04164" type="self" id="BDU:2025-04164" title="BDU:2025-04164" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7332</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49899-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49899-7.3/" type="self" id="ROS-20260113-7332" title="ROS-20260113-7332" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49899" type="cve" id="CVE-2024-49899" title="CVE-2024-49899" />
			<reference href="https://bdu.fstec.ru/vul/2025-07996" type="self" id="BDU:2025-07996" title="BDU:2025-07996" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7333</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49905-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49905-7.3/" type="self" id="ROS-20260113-7333" title="ROS-20260113-7333" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49905" type="cve" id="CVE-2024-49905" title="CVE-2024-49905" />
			<reference href="https://bdu.fstec.ru/vul/2025-04163" type="self" id="BDU:2025-04163" title="BDU:2025-04163" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7334</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49909-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49909-7.3/" type="self" id="ROS-20260113-7334" title="ROS-20260113-7334" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49909" type="cve" id="CVE-2024-49909" title="CVE-2024-49909" />
			<reference href="https://bdu.fstec.ru/vul/2025-13864" type="self" id="BDU:2025-13864" title="BDU:2025-13864" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7335</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49911-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49911-7.3/" type="self" id="ROS-20260113-7335" title="ROS-20260113-7335" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49911" type="cve" id="CVE-2024-49911" title="CVE-2024-49911" />
			<reference href="https://bdu.fstec.ru/vul/2025-13867" type="self" id="BDU:2025-13867" title="BDU:2025-13867" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7336</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49912-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49912-7.3/" type="self" id="ROS-20260113-7336" title="ROS-20260113-7336" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49912" type="cve" id="CVE-2024-49912" title="CVE-2024-49912" />
			<reference href="https://bdu.fstec.ru/vul/2025-04162" type="self" id="BDU:2025-04162" title="BDU:2025-04162" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7337</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49915-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49915-7.3/" type="self" id="ROS-20260113-7337" title="ROS-20260113-7337" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49915" type="cve" id="CVE-2024-49915" title="CVE-2024-49915" />
			<reference href="https://bdu.fstec.ru/vul/2025-13868" type="self" id="BDU:2025-13868" title="BDU:2025-13868" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7338</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49917-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49917-7.3/" type="self" id="ROS-20260113-7338" title="ROS-20260113-7338" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49917" type="cve" id="CVE-2024-49917" title="CVE-2024-49917" />
			<reference href="https://bdu.fstec.ru/vul/2025-13774" type="self" id="BDU:2025-13774" title="BDU:2025-13774" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7339</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49925-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49925-7.3/" type="self" id="ROS-20260113-7339" title="ROS-20260113-7339" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49925" type="cve" id="CVE-2024-49925" title="CVE-2024-49925" />
			<reference href="https://bdu.fstec.ru/vul/2025-07995" type="self" id="BDU:2025-07995" title="BDU:2025-07995" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7340</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49926-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49926-7.3/" type="self" id="ROS-20260113-7340" title="ROS-20260113-7340" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49926" type="cve" id="CVE-2024-49926" title="CVE-2024-49926" />
			<reference href="https://bdu.fstec.ru/vul/2025-13775" type="self" id="BDU:2025-13775" title="BDU:2025-13775" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7341</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49929-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49929-7.3/" type="self" id="ROS-20260113-7341" title="ROS-20260113-7341" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49929" type="cve" id="CVE-2024-49929" title="CVE-2024-49929" />
			<reference href="https://bdu.fstec.ru/vul/2025-07994" type="self" id="BDU:2025-07994" title="BDU:2025-07994" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7342</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49934-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49934-7.3/" type="self" id="ROS-20260113-7342" title="ROS-20260113-7342" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49934" type="cve" id="CVE-2024-49934" title="CVE-2024-49934" />
			<reference href="https://bdu.fstec.ru/vul/2025-04161" type="self" id="BDU:2025-04161" title="BDU:2025-04161" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7343</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49937-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49937-7.3/" type="self" id="ROS-20260113-7343" title="ROS-20260113-7343" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49937" type="cve" id="CVE-2024-49937" title="CVE-2024-49937" />
			<reference href="https://bdu.fstec.ru/vul/2025-07993" type="self" id="BDU:2025-07993" title="BDU:2025-07993" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7344</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49939-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49939-7.3/" type="self" id="ROS-20260113-7344" title="ROS-20260113-7344" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49939" type="cve" id="CVE-2024-49939" title="CVE-2024-49939" />
			<reference href="https://bdu.fstec.ru/vul/2025-07992" type="self" id="BDU:2025-07992" title="BDU:2025-07992" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7345</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49960-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49960-7.3/" type="self" id="ROS-20260113-7345" title="ROS-20260113-7345" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49960" type="cve" id="CVE-2024-49960" title="CVE-2024-49960" />
			<reference href="https://bdu.fstec.ru/vul/2024-09005" type="self" id="BDU:2024-09005" title="BDU:2024-09005" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7346</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49978-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49978-7.3/" type="self" id="ROS-20260113-7346" title="ROS-20260113-7346" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49978" type="cve" id="CVE-2024-49978" title="CVE-2024-49978" />
			<reference href="https://bdu.fstec.ru/vul/2025-07989" type="self" id="BDU:2025-07989" title="BDU:2025-07989" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7347</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49989-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49989-7.3/" type="self" id="ROS-20260113-7347" title="ROS-20260113-7347" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49989" type="cve" id="CVE-2024-49989" title="CVE-2024-49989" />
			<reference href="https://bdu.fstec.ru/vul/2024-09008" type="self" id="BDU:2024-09008" title="BDU:2024-09008" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7348</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49991-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49991-7.3/" type="self" id="ROS-20260113-7348" title="ROS-20260113-7348" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49991" type="cve" id="CVE-2024-49991" title="CVE-2024-49991" />
			<reference href="https://bdu.fstec.ru/vul/2025-06995" type="self" id="BDU:2025-06995" title="BDU:2025-06995" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7349</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49992-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49992-7.3/" type="self" id="ROS-20260113-7349" title="ROS-20260113-7349" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49992" type="cve" id="CVE-2024-49992" title="CVE-2024-49992" />
			<reference href="https://bdu.fstec.ru/vul/2024-09009" type="self" id="BDU:2024-09009" title="BDU:2024-09009" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7350</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49994-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-49994-7.3/" type="self" id="ROS-20260113-7350" title="ROS-20260113-7350" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49994" type="cve" id="CVE-2024-49994" title="CVE-2024-49994" />
			<reference href="https://bdu.fstec.ru/vul/2025-11919" type="self" id="BDU:2025-11919" title="BDU:2025-11919" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7351</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50014-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50014-7.3/" type="self" id="ROS-20260113-7351" title="ROS-20260113-7351" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50014" type="cve" id="CVE-2024-50014" title="CVE-2024-50014" />
			<reference href="https://bdu.fstec.ru/vul/2025-12364" type="self" id="BDU:2025-12364" title="BDU:2025-12364" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7352</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50047-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50047-7.3/" type="self" id="ROS-20260113-7352" title="ROS-20260113-7352" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50047" type="cve" id="CVE-2024-50047" title="CVE-2024-50047" />
			<reference href="https://bdu.fstec.ru/vul/2024-09012" type="self" id="BDU:2024-09012" title="BDU:2024-09012" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7353</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50048-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50048-7.3/" type="self" id="ROS-20260113-7353" title="ROS-20260113-7353" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50048" type="cve" id="CVE-2024-50048" title="CVE-2024-50048" />
			<reference href="https://bdu.fstec.ru/vul/2025-07937" type="self" id="BDU:2025-07937" title="BDU:2025-07937" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7354</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50060-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50060-7.3/" type="self" id="ROS-20260113-7354" title="ROS-20260113-7354" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50060" type="cve" id="CVE-2024-50060" title="CVE-2024-50060" />
			<reference href="https://bdu.fstec.ru/vul/2025-07935" type="self" id="BDU:2025-07935" title="BDU:2025-07935" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7355</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50061-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50061-7.3/" type="self" id="ROS-20260113-7355" title="ROS-20260113-7355" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50061" type="cve" id="CVE-2024-50061" title="CVE-2024-50061" />
			<reference href="https://bdu.fstec.ru/vul/2024-08973" type="self" id="BDU:2024-08973" title="BDU:2024-08973" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7356</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50063-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50063-7.3/" type="self" id="ROS-20260113-7356" title="ROS-20260113-7356" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50063" type="cve" id="CVE-2024-50063" title="CVE-2024-50063" />
			<reference href="https://bdu.fstec.ru/vul/2025-04684" type="self" id="BDU:2025-04684" title="BDU:2025-04684" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7357</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50067-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50067-7.3/" type="self" id="ROS-20260113-7357" title="ROS-20260113-7357" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50067" type="cve" id="CVE-2024-50067" title="CVE-2024-50067" />
			<reference href="https://bdu.fstec.ru/vul/2025-04686" type="self" id="BDU:2025-04686" title="BDU:2025-04686" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7358</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50073-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50073-7.3/" type="self" id="ROS-20260113-7358" title="ROS-20260113-7358" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50073" type="cve" id="CVE-2024-50073" title="CVE-2024-50073" />
			<reference href="https://bdu.fstec.ru/vul/2024-09793" type="self" id="BDU:2024-09793" title="BDU:2024-09793" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7359</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50098-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50098-7.3/" type="self" id="ROS-20260113-7359" title="ROS-20260113-7359" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50098" type="cve" id="CVE-2024-50098" title="CVE-2024-50098" />
			<reference href="https://bdu.fstec.ru/vul/2025-07934" type="self" id="BDU:2025-07934" title="BDU:2025-07934" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7360</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50108-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50108-7.3/" type="self" id="ROS-20260113-7360" title="ROS-20260113-7360" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50108" type="cve" id="CVE-2024-50108" title="CVE-2024-50108" />
			<reference href="https://bdu.fstec.ru/vul/2025-07930" type="self" id="BDU:2025-07930" title="BDU:2025-07930" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7361</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50125-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50125-7.3/" type="self" id="ROS-20260113-7361" title="ROS-20260113-7361" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50125" type="cve" id="CVE-2024-50125" title="CVE-2024-50125" />
			<reference href="https://bdu.fstec.ru/vul/2024-10094" type="self" id="BDU:2024-10094" title="BDU:2024-10094" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7362</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50138-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50138-7.3/" type="self" id="ROS-20260113-7362" title="ROS-20260113-7362" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50138" type="cve" id="CVE-2024-50138" title="CVE-2024-50138" />
			<reference href="https://bdu.fstec.ru/vul/2025-07928" type="self" id="BDU:2025-07928" title="BDU:2025-07928" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7363</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50146-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50146-7.3/" type="self" id="ROS-20260113-7363" title="ROS-20260113-7363" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50146" type="cve" id="CVE-2024-50146" title="CVE-2024-50146" />
			<reference href="https://bdu.fstec.ru/vul/2025-07924" type="self" id="BDU:2025-07924" title="BDU:2025-07924" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7364</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50164-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50164-7.3/" type="self" id="ROS-20260113-7364" title="ROS-20260113-7364" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50164" type="cve" id="CVE-2024-50164" title="CVE-2024-50164" />
			<reference href="https://bdu.fstec.ru/vul/2025-07235" type="self" id="BDU:2025-07235" title="BDU:2025-07235" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7365</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50183-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50183-7.3/" type="self" id="ROS-20260113-7365" title="ROS-20260113-7365" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50183" type="cve" id="CVE-2024-50183" title="CVE-2024-50183" />
			<reference href="https://bdu.fstec.ru/vul/2025-07912" type="self" id="BDU:2025-07912" title="BDU:2025-07912" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7366</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50187-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50187-7.3/" type="self" id="ROS-20260113-7366" title="ROS-20260113-7366" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50187" type="cve" id="CVE-2024-50187" title="CVE-2024-50187" />
			<reference href="https://bdu.fstec.ru/vul/2025-07911" type="self" id="BDU:2025-07911" title="BDU:2025-07911" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7367</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50243-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50243-7.3/" type="self" id="ROS-20260113-7367" title="ROS-20260113-7367" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50243" type="cve" id="CVE-2024-50243" title="CVE-2024-50243" />
			<reference href="https://bdu.fstec.ru/vul/2025-04151" type="self" id="BDU:2025-04151" title="BDU:2025-04151" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7368</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50246-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50246-7.3/" type="self" id="ROS-20260113-7368" title="ROS-20260113-7368" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50246" type="cve" id="CVE-2024-50246" title="CVE-2024-50246" />
			<reference href="https://bdu.fstec.ru/vul/2025-07289" type="self" id="BDU:2025-07289" title="BDU:2025-07289" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7369</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50248-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50248-7.3/" type="self" id="ROS-20260113-7369" title="ROS-20260113-7369" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50248" type="cve" id="CVE-2024-50248" title="CVE-2024-50248" />
			<reference href="https://bdu.fstec.ru/vul/2025-07895" type="self" id="BDU:2025-07895" title="BDU:2025-07895" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7370</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50256-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50256-7.3/" type="self" id="ROS-20260113-7370" title="ROS-20260113-7370" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50256" type="cve" id="CVE-2024-50256" title="CVE-2024-50256" />
			<reference href="https://bdu.fstec.ru/vul/2025-07893" type="self" id="BDU:2025-07893" title="BDU:2025-07893" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7371</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50258-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50258-7.3/" type="self" id="ROS-20260113-7371" title="ROS-20260113-7371" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50258" type="cve" id="CVE-2024-50258" title="CVE-2024-50258" />
			<reference href="https://bdu.fstec.ru/vul/2025-07892" type="self" id="BDU:2025-07892" title="BDU:2025-07892" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7372</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-39180-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-39180-7.3/" type="self" id="ROS-20260113-7372" title="ROS-20260113-7372" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39180" type="cve" id="CVE-2023-39180" title="CVE-2023-39180" />
			<reference href="https://bdu.fstec.ru/vul/2025-15381" type="self" id="BDU:2025-15381" title="BDU:2025-15381" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.94" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.94-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7373</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-39179-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-39179-7.3/" type="self" id="ROS-20260113-7373" title="ROS-20260113-7373" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39179" type="cve" id="CVE-2023-39179" title="CVE-2023-39179" />
			<reference href="https://bdu.fstec.ru/vul/2025-15009" type="self" id="BDU:2025-15009" title="BDU:2025-15009" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.94" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.94-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7374</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-52921-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-52921-7.3/" type="self" id="ROS-20260113-7374" title="ROS-20260113-7374" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52921" type="cve" id="CVE-2023-52921" title="CVE-2023-52921" />
			<reference href="https://bdu.fstec.ru/vul/2025-00164" type="self" id="BDU:2025-00164" title="BDU:2025-00164" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>perf-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.52" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.52-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7375</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50271-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50271-7.3/" type="self" id="ROS-20260113-7375" title="ROS-20260113-7375" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50271" type="cve" id="CVE-2024-50271" title="CVE-2024-50271" />
			<reference href="https://bdu.fstec.ru/vul/2025-07889" type="self" id="BDU:2025-07889" title="BDU:2025-07889" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7376</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50272-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50272-7.3/" type="self" id="ROS-20260113-7376" title="ROS-20260113-7376" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50272" type="cve" id="CVE-2024-50272" title="CVE-2024-50272" />
			<reference href="https://bdu.fstec.ru/vul/2025-07888" type="self" id="BDU:2025-07888" title="BDU:2025-07888" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7377</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50280-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50280-7.3/" type="self" id="ROS-20260113-7377" title="ROS-20260113-7377" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50280" type="cve" id="CVE-2024-50280" title="CVE-2024-50280" />
			<reference href="https://bdu.fstec.ru/vul/2025-00065" type="self" id="BDU:2025-00065" title="BDU:2025-00065" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7378</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50284-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50284-7.3/" type="self" id="ROS-20260113-7378" title="ROS-20260113-7378" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50284" type="cve" id="CVE-2024-50284" title="CVE-2024-50284" />
			<reference href="https://bdu.fstec.ru/vul/2025-07887" type="self" id="BDU:2025-07887" title="BDU:2025-07887" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7379</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-53054-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-53054-7.3/" type="self" id="ROS-20260113-7379" title="ROS-20260113-7379" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53054" type="cve" id="CVE-2024-53054" title="CVE-2024-53054" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7380</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-53093-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-53093-7.3/" type="self" id="ROS-20260113-7380" title="ROS-20260113-7380" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53093" type="cve" id="CVE-2024-53093" title="CVE-2024-53093" />
			<reference href="https://bdu.fstec.ru/vul/2025-07876" type="self" id="BDU:2025-07876" title="BDU:2025-07876" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7381</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-53100-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-53100-7.3/" type="self" id="ROS-20260113-7381" title="ROS-20260113-7381" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53100" type="cve" id="CVE-2024-53100" title="CVE-2024-53100" />
			<reference href="https://bdu.fstec.ru/vul/2025-07875" type="self" id="BDU:2025-07875" title="BDU:2025-07875" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7382</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-53102-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-53102-7.3/" type="self" id="ROS-20260113-7382" title="ROS-20260113-7382" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53102" type="cve" id="CVE-2024-53102" title="CVE-2024-53102" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7383</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-53128-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-53128-7.3/" type="self" id="ROS-20260113-7383" title="ROS-20260113-7383" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53128" type="cve" id="CVE-2024-53128" title="CVE-2024-53128" />
			<reference href="https://bdu.fstec.ru/vul/2025-12018" type="self" id="BDU:2025-12018" title="BDU:2025-12018" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7384</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-53144-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-53144-7.3/" type="self" id="ROS-20260113-7384" title="ROS-20260113-7384" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53144" type="cve" id="CVE-2024-53144" title="CVE-2024-53144" />
			<reference href="https://bdu.fstec.ru/vul/2025-00151" type="self" id="BDU:2025-00151" title="BDU:2025-00151" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7385</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-56707-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-56707-7.3/" type="self" id="ROS-20260113-7385" title="ROS-20260113-7385" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56707" type="cve" id="CVE-2024-56707" title="CVE-2024-56707" />
			<reference href="https://bdu.fstec.ru/vul/2025-07850" type="self" id="BDU:2025-07850" title="BDU:2025-07850" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7386</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-56703-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-56703-7.3/" type="self" id="ROS-20260113-7386" title="ROS-20260113-7386" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56703" type="cve" id="CVE-2024-56703" title="CVE-2024-56703" />
			<reference href="https://bdu.fstec.ru/vul/2025-12354" type="self" id="BDU:2025-12354" title="BDU:2025-12354" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7387</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-53166-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-53166-7.3/" type="self" id="ROS-20260113-7387" title="ROS-20260113-7387" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53166" type="cve" id="CVE-2024-53166" title="CVE-2024-53166" />
			<reference href="https://bdu.fstec.ru/vul/2025-07222" type="self" id="BDU:2025-07222" title="BDU:2025-07222" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7388</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-53190-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-53190-7.3/" type="self" id="ROS-20260113-7388" title="ROS-20260113-7388" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53190" type="cve" id="CVE-2024-53190" title="CVE-2024-53190" />
			<reference href="https://bdu.fstec.ru/vul/2025-07871" type="self" id="BDU:2025-07871" title="BDU:2025-07871" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7389</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-53196-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-53196-7.3/" type="self" id="ROS-20260113-7389" title="ROS-20260113-7389" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53196" type="cve" id="CVE-2024-53196" title="CVE-2024-53196" />
			<reference href="https://bdu.fstec.ru/vul/2025-07870" type="self" id="BDU:2025-07870" title="BDU:2025-07870" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7390</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-53203-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-53203-7.3/" type="self" id="ROS-20260113-7390" title="ROS-20260113-7390" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53203" type="cve" id="CVE-2024-53203" title="CVE-2024-53203" />
			<reference href="https://bdu.fstec.ru/vul/2025-07219" type="self" id="BDU:2025-07219" title="BDU:2025-07219" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7391</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-53209-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-53209-7.3/" type="self" id="ROS-20260113-7391" title="ROS-20260113-7391" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53209" type="cve" id="CVE-2024-53209" title="CVE-2024-53209" />
			<reference href="https://bdu.fstec.ru/vul/2025-12226" type="self" id="BDU:2025-12226" title="BDU:2025-12226" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7392</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-53210-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-53210-7.3/" type="self" id="ROS-20260113-7392" title="ROS-20260113-7392" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53210" type="cve" id="CVE-2024-53210" title="CVE-2024-53210" />
			<reference href="https://bdu.fstec.ru/vul/2025-07732" type="self" id="BDU:2025-07732" title="BDU:2025-07732" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7393</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-53220-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-53220-7.3/" type="self" id="ROS-20260113-7393" title="ROS-20260113-7393" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53220" type="cve" id="CVE-2024-53220" title="CVE-2024-53220" />
			<reference href="https://bdu.fstec.ru/vul/2025-07733" type="self" id="BDU:2025-07733" title="BDU:2025-07733" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7394</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-53234-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-53234-7.3/" type="self" id="ROS-20260113-7394" title="ROS-20260113-7394" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53234" type="cve" id="CVE-2024-53234" title="CVE-2024-53234" />
			<reference href="https://bdu.fstec.ru/vul/2025-12022" type="self" id="BDU:2025-12022" title="BDU:2025-12022" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7395</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-56549-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-56549-7.3/" type="self" id="ROS-20260113-7395" title="ROS-20260113-7395" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56549" type="cve" id="CVE-2024-56549" title="CVE-2024-56549" />
			<reference href="https://bdu.fstec.ru/vul/2025-12224" type="self" id="BDU:2025-12224" title="BDU:2025-12224" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7396</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-56551-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-56551-7.3/" type="self" id="ROS-20260113-7396" title="ROS-20260113-7396" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56551" type="cve" id="CVE-2024-56551" title="CVE-2024-56551" />
			<reference href="https://bdu.fstec.ru/vul/2025-07225" type="self" id="BDU:2025-07225" title="BDU:2025-07225" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7397</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-56557-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-56557-7.3/" type="self" id="ROS-20260113-7397" title="ROS-20260113-7397" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56557" type="cve" id="CVE-2024-56557" title="CVE-2024-56557" />
			<reference href="https://bdu.fstec.ru/vul/2025-07798" type="self" id="BDU:2025-07798" title="BDU:2025-07798" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7398</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-56584-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-56584-7.3/" type="self" id="ROS-20260113-7398" title="ROS-20260113-7398" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56584" type="cve" id="CVE-2024-56584" title="CVE-2024-56584" />
			<reference href="https://bdu.fstec.ru/vul/2025-07801" type="self" id="BDU:2025-07801" title="BDU:2025-07801" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260113-7399</id>
		<issued date="2026-01-13" />
		<updated date="2026-01-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-56585-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-56585-7.3/" type="self" id="ROS-20260113-7399" title="ROS-20260113-7399" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56585" type="cve" id="CVE-2024-56585" title="CVE-2024-56585" />
			<reference href="https://bdu.fstec.ru/vul/2025-07802" type="self" id="BDU:2025-07802" title="BDU:2025-07802" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260114-7301</id>
		<issued date="2026-01-14" />
		<updated date="2026-01-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-56599-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-56599-7.3/" type="self" id="ROS-20260114-7301" title="ROS-20260114-7301" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56599" type="cve" id="CVE-2024-56599" title="CVE-2024-56599" />
			<reference href="https://bdu.fstec.ru/vul/2025-12223" type="self" id="BDU:2025-12223" title="BDU:2025-12223" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260114-7302</id>
		<issued date="2026-01-14" />
		<updated date="2026-01-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-56604-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-56604-7.3/" type="self" id="ROS-20260114-7302" title="ROS-20260114-7302" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56604" type="cve" id="CVE-2024-56604" title="CVE-2024-56604" />
			<reference href="https://bdu.fstec.ru/vul/2025-04671" type="self" id="BDU:2025-04671" title="BDU:2025-04671" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260114-7303</id>
		<issued date="2026-01-14" />
		<updated date="2026-01-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-56608-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-56608-7.3/" type="self" id="ROS-20260114-7303" title="ROS-20260114-7303" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56608" type="cve" id="CVE-2024-56608" title="CVE-2024-56608" />
			<reference href="https://bdu.fstec.ru/vul/2025-07231" type="self" id="BDU:2025-07231" title="BDU:2025-07231" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260114-7304</id>
		<issued date="2026-01-14" />
		<updated date="2026-01-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-56609-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-56609-7.3/" type="self" id="ROS-20260114-7304" title="ROS-20260114-7304" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56609" type="cve" id="CVE-2024-56609" title="CVE-2024-56609" />
			<reference href="https://bdu.fstec.ru/vul/2025-12324" type="self" id="BDU:2025-12324" title="BDU:2025-12324" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260114-7305</id>
		<issued date="2026-01-14" />
		<updated date="2026-01-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-56651-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-56651-7.3/" type="self" id="ROS-20260114-7305" title="ROS-20260114-7305" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56651" type="cve" id="CVE-2024-56651" title="CVE-2024-56651" />
			<reference href="https://bdu.fstec.ru/vul/2025-06984" type="self" id="BDU:2025-06984" title="BDU:2025-06984" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260114-7306</id>
		<issued date="2026-01-14" />
		<updated date="2026-01-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-56658-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-56658-7.3/" type="self" id="ROS-20260114-7306" title="ROS-20260114-7306" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56658" type="cve" id="CVE-2024-56658" title="CVE-2024-56658" />
			<reference href="https://bdu.fstec.ru/vul/2025-04676" type="self" id="BDU:2025-04676" title="BDU:2025-04676" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260114-7307</id>
		<issued date="2026-01-14" />
		<updated date="2026-01-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-56664-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-56664-7.3/" type="self" id="ROS-20260114-7307" title="ROS-20260114-7307" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56664" type="cve" id="CVE-2024-56664" title="CVE-2024-56664" />
			<reference href="https://bdu.fstec.ru/vul/2025-04674" type="self" id="BDU:2025-04674" title="BDU:2025-04674" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260114-7308</id>
		<issued date="2026-01-14" />
		<updated date="2026-01-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-56718-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-56718-7.3/" type="self" id="ROS-20260114-7308" title="ROS-20260114-7308" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56718" type="cve" id="CVE-2024-56718" title="CVE-2024-56718" />
			<reference href="https://bdu.fstec.ru/vul/2025-07848" type="self" id="BDU:2025-07848" title="BDU:2025-07848" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260114-7309</id>
		<issued date="2026-01-14" />
		<updated date="2026-01-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-56722-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-56722-7.3/" type="self" id="ROS-20260114-7309" title="ROS-20260114-7309" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56722" type="cve" id="CVE-2024-56722" title="CVE-2024-56722" />
			<reference href="https://bdu.fstec.ru/vul/2025-07847" type="self" id="BDU:2025-07847" title="BDU:2025-07847" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260114-7310</id>
		<issued date="2026-01-14" />
		<updated date="2026-01-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-56727-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-56727-7.3/" type="self" id="ROS-20260114-7310" title="ROS-20260114-7310" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56727" type="cve" id="CVE-2024-56727" title="CVE-2024-56727" />
			<reference href="https://bdu.fstec.ru/vul/2025-07845" type="self" id="BDU:2025-07845" title="BDU:2025-07845" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260114-7311</id>
		<issued date="2026-01-14" />
		<updated date="2026-01-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-56751-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-56751-7.3/" type="self" id="ROS-20260114-7311" title="ROS-20260114-7311" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56751" type="cve" id="CVE-2024-56751" title="CVE-2024-56751" />
			<reference href="https://bdu.fstec.ru/vul/2025-07843" type="self" id="BDU:2025-07843" title="BDU:2025-07843" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260114-7312</id>
		<issued date="2026-01-14" />
		<updated date="2026-01-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-56758-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-56758-7.3/" type="self" id="ROS-20260114-7312" title="ROS-20260114-7312" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56758" type="cve" id="CVE-2024-56758" title="CVE-2024-56758" />
			<reference href="https://bdu.fstec.ru/vul/2025-15218" type="self" id="BDU:2025-15218" title="BDU:2025-15218" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260114-7313</id>
		<issued date="2026-01-14" />
		<updated date="2026-01-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57876-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57876-7.3/" type="self" id="ROS-20260114-7313" title="ROS-20260114-7313" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57876" type="cve" id="CVE-2024-57876" title="CVE-2024-57876" />
			<reference href="https://bdu.fstec.ru/vul/2025-04125" type="self" id="BDU:2025-04125" title="BDU:2025-04125" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260114-7314</id>
		<issued date="2026-01-14" />
		<updated date="2026-01-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57798-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57798-7.3/" type="self" id="ROS-20260114-7314" title="ROS-20260114-7314" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57798" type="cve" id="CVE-2024-57798" title="CVE-2024-57798" />
			<reference href="https://bdu.fstec.ru/vul/2025-02795" type="self" id="BDU:2025-02795" title="BDU:2025-02795" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260114-7315</id>
		<issued date="2026-01-14" />
		<updated date="2026-01-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57883-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57883-7.3/" type="self" id="ROS-20260114-7315" title="ROS-20260114-7315" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57883" type="cve" id="CVE-2024-57883" title="CVE-2024-57883" />
			<reference href="https://bdu.fstec.ru/vul/2025-04477" type="self" id="BDU:2025-04477" title="BDU:2025-04477" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260114-7316</id>
		<issued date="2026-01-14" />
		<updated date="2026-01-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57887-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57887-7.3/" type="self" id="ROS-20260114-7316" title="ROS-20260114-7316" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57887" type="cve" id="CVE-2024-57887" title="CVE-2024-57887" />
			<reference href="https://bdu.fstec.ru/vul/2025-02843" type="self" id="BDU:2025-02843" title="BDU:2025-02843" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260114-7317</id>
		<issued date="2026-01-14" />
		<updated date="2026-01-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57945-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57945-7.3/" type="self" id="ROS-20260114-7317" title="ROS-20260114-7317" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57945" type="cve" id="CVE-2024-57945" title="CVE-2024-57945" />
			<reference href="https://bdu.fstec.ru/vul/2025-12253" type="self" id="BDU:2025-12253" title="BDU:2025-12253" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260114-7318</id>
		<issued date="2026-01-14" />
		<updated date="2026-01-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21667-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21667-7.3/" type="self" id="ROS-20260114-7318" title="ROS-20260114-7318" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21667" type="cve" id="CVE-2025-21667" title="CVE-2025-21667" />
			<reference href="https://bdu.fstec.ru/vul/2025-01391" type="self" id="BDU:2025-01391" title="BDU:2025-01391" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260114-7319</id>
		<issued date="2026-01-14" />
		<updated date="2026-01-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21684-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21684-7.3/" type="self" id="ROS-20260114-7319" title="ROS-20260114-7319" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21684" type="cve" id="CVE-2025-21684" title="CVE-2025-21684" />
			<reference href="https://bdu.fstec.ru/vul/2025-01441" type="self" id="BDU:2025-01441" title="BDU:2025-01441" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260114-7320</id>
		<issued date="2026-01-14" />
		<updated date="2026-01-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21700-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21700-7.3/" type="self" id="ROS-20260114-7320" title="ROS-20260114-7320" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21700" type="cve" id="CVE-2025-21700" title="CVE-2025-21700" />
			<reference href="https://bdu.fstec.ru/vul/2025-10244" type="self" id="BDU:2025-10244" title="BDU:2025-10244" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260114-7321</id>
		<issued date="2026-01-14" />
		<updated date="2026-01-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21701-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21701-7.3/" type="self" id="ROS-20260114-7321" title="ROS-20260114-7321" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21701" type="cve" id="CVE-2025-21701" title="CVE-2025-21701" />
			<reference href="https://bdu.fstec.ru/vul/2025-07711" type="self" id="BDU:2025-07711" title="BDU:2025-07711" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260114-7322</id>
		<issued date="2026-01-14" />
		<updated date="2026-01-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21702-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21702-7.3/" type="self" id="ROS-20260114-7322" title="ROS-20260114-7322" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21702" type="cve" id="CVE-2025-21702" title="CVE-2025-21702" />
			<reference href="https://bdu.fstec.ru/vul/2025-02167" type="self" id="BDU:2025-02167" title="BDU:2025-02167" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260114-7323</id>
		<issued date="2026-01-14" />
		<updated date="2026-01-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21703-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21703-7.3/" type="self" id="ROS-20260114-7323" title="ROS-20260114-7323" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21703" type="cve" id="CVE-2025-21703" title="CVE-2025-21703" />
			<reference href="https://bdu.fstec.ru/vul/2025-02204" type="self" id="BDU:2025-02204" title="BDU:2025-02204" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260114-7324</id>
		<issued date="2026-01-14" />
		<updated date="2026-01-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21704-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21704-7.3/" type="self" id="ROS-20260114-7324" title="ROS-20260114-7324" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21704" type="cve" id="CVE-2025-21704" title="CVE-2025-21704" />
			<reference href="https://bdu.fstec.ru/vul/2025-11899" type="self" id="BDU:2025-11899" title="BDU:2025-11899" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260114-7325</id>
		<issued date="2026-01-14" />
		<updated date="2026-01-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57893-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57893-7.3/" type="self" id="ROS-20260114-7325" title="ROS-20260114-7325" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57893" type="cve" id="CVE-2024-57893" title="CVE-2024-57893" />
			<reference href="https://bdu.fstec.ru/vul/2025-03500" type="self" id="BDU:2025-03500" title="BDU:2025-03500" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260114-7326</id>
		<issued date="2026-01-14" />
		<updated date="2026-01-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57894-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57894-7.3/" type="self" id="ROS-20260114-7326" title="ROS-20260114-7326" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57894" type="cve" id="CVE-2024-57894" title="CVE-2024-57894" />
			<reference href="https://bdu.fstec.ru/vul/2025-03497" type="self" id="BDU:2025-03497" title="BDU:2025-03497" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260114-7327</id>
		<issued date="2026-01-14" />
		<updated date="2026-01-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21645-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21645-7.3/" type="self" id="ROS-20260114-7327" title="ROS-20260114-7327" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21645" type="cve" id="CVE-2025-21645" title="CVE-2025-21645" />
			<reference href="https://bdu.fstec.ru/vul/2025-11952" type="self" id="BDU:2025-11952" title="BDU:2025-11952" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260114-7328</id>
		<issued date="2026-01-14" />
		<updated date="2026-01-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21647-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21647-7.3/" type="self" id="ROS-20260114-7328" title="ROS-20260114-7328" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21647" type="cve" id="CVE-2025-21647" title="CVE-2025-21647" />
			<reference href="https://bdu.fstec.ru/vul/2025-11882" type="self" id="BDU:2025-11882" title="BDU:2025-11882" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260114-7329</id>
		<issued date="2026-01-14" />
		<updated date="2026-01-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57924-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57924-7.3/" type="self" id="ROS-20260114-7329" title="ROS-20260114-7329" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57924" type="cve" id="CVE-2024-57924" title="CVE-2024-57924" />
			<reference href="https://bdu.fstec.ru/vul/2025-15230" type="self" id="BDU:2025-15230" title="BDU:2025-15230" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260114-7330</id>
		<issued date="2026-01-14" />
		<updated date="2026-01-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57937-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57937-7.3/" type="self" id="ROS-20260114-7330" title="ROS-20260114-7330" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57937" type="cve" id="CVE-2024-57937" title="CVE-2024-57937" />
			<reference href="https://bdu.fstec.ru/vul/2025-01774" type="self" id="BDU:2025-01774" title="BDU:2025-01774" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7301</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57973-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57973-7.3/" type="self" id="ROS-20260119-7301" title="ROS-20260119-7301" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57973" type="cve" id="CVE-2024-57973" title="CVE-2024-57973" />
			<reference href="https://bdu.fstec.ru/vul/2025-11917" type="self" id="BDU:2025-11917" title="BDU:2025-11917" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7302</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57977-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57977-7.3/" type="self" id="ROS-20260119-7302" title="ROS-20260119-7302" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57977" type="cve" id="CVE-2024-57977" title="CVE-2024-57977" />
			<reference href="https://bdu.fstec.ru/vul/2025-12270" type="self" id="BDU:2025-12270" title="BDU:2025-12270" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7303</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57978-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57978-7.3/" type="self" id="ROS-20260119-7303" title="ROS-20260119-7303" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57978" type="cve" id="CVE-2024-57978" title="CVE-2024-57978" />
			<reference href="https://bdu.fstec.ru/vul/2025-12221" type="self" id="BDU:2025-12221" title="BDU:2025-12221" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7304</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57979-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57979-7.3/" type="self" id="ROS-20260119-7304" title="ROS-20260119-7304" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57979" type="cve" id="CVE-2024-57979" title="CVE-2024-57979" />
			<reference href="https://bdu.fstec.ru/vul/2025-04379" type="self" id="BDU:2025-04379" title="BDU:2025-04379" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7305</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57980-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57980-7.3/" type="self" id="ROS-20260119-7305" title="ROS-20260119-7305" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57980" type="cve" id="CVE-2024-57980" title="CVE-2024-57980" />
			<reference href="https://bdu.fstec.ru/vul/2025-10241" type="self" id="BDU:2025-10241" title="BDU:2025-10241" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7306</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57981-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57981-7.3/" type="self" id="ROS-20260119-7306" title="ROS-20260119-7306" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57981" type="cve" id="CVE-2024-57981" title="CVE-2024-57981" />
			<reference href="https://bdu.fstec.ru/vul/2025-12220" type="self" id="BDU:2025-12220" title="BDU:2025-12220" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7307</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57986-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57986-7.3/" type="self" id="ROS-20260119-7307" title="ROS-20260119-7307" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57986" type="cve" id="CVE-2024-57986" title="CVE-2024-57986" />
			<reference href="https://bdu.fstec.ru/vul/2025-11955" type="self" id="BDU:2025-11955" title="BDU:2025-11955" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7308</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57993-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57993-7.3/" type="self" id="ROS-20260119-7308" title="ROS-20260119-7308" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57993" type="cve" id="CVE-2024-57993" title="CVE-2024-57993" />
			<reference href="https://bdu.fstec.ru/vul/2025-11954" type="self" id="BDU:2025-11954" title="BDU:2025-11954" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7309</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57996-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57996-7.3/" type="self" id="ROS-20260119-7309" title="ROS-20260119-7309" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57996" type="cve" id="CVE-2024-57996" title="CVE-2024-57996" />
			<reference href="https://bdu.fstec.ru/vul/2025-11898" type="self" id="BDU:2025-11898" title="BDU:2025-11898" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7310</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57997-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57997-7.3/" type="self" id="ROS-20260119-7310" title="ROS-20260119-7310" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57997" type="cve" id="CVE-2024-57997" title="CVE-2024-57997" />
			<reference href="https://bdu.fstec.ru/vul/2025-12363" type="self" id="BDU:2025-12363" title="BDU:2025-12363" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7311</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21705-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21705-7.3/" type="self" id="ROS-20260119-7311" title="ROS-20260119-7311" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21705" type="cve" id="CVE-2025-21705" title="CVE-2025-21705" />
			<reference href="https://bdu.fstec.ru/vul/2025-11951" type="self" id="BDU:2025-11951" title="BDU:2025-11951" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7312</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21706-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21706-7.3/" type="self" id="ROS-20260119-7312" title="ROS-20260119-7312" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21706" type="cve" id="CVE-2025-21706" title="CVE-2025-21706" />
			<reference href="https://bdu.fstec.ru/vul/2025-11950" type="self" id="BDU:2025-11950" title="BDU:2025-11950" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7313</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21707-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21707-7.3/" type="self" id="ROS-20260119-7313" title="ROS-20260119-7313" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21707" type="cve" id="CVE-2025-21707" title="CVE-2025-21707" />
			<reference href="https://bdu.fstec.ru/vul/2025-12362" type="self" id="BDU:2025-12362" title="BDU:2025-12362" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7314</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21708-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21708-7.3/" type="self" id="ROS-20260119-7314" title="ROS-20260119-7314" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21708" type="cve" id="CVE-2025-21708" title="CVE-2025-21708" />
			<reference href="https://bdu.fstec.ru/vul/2025-11949" type="self" id="BDU:2025-11949" title="BDU:2025-11949" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7315</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21711-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21711-7.3/" type="self" id="ROS-20260119-7315" title="ROS-20260119-7315" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21711" type="cve" id="CVE-2025-21711" title="CVE-2025-21711" />
			<reference href="https://bdu.fstec.ru/vul/2025-11914" type="self" id="BDU:2025-11914" title="BDU:2025-11914" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7316</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21712-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21712-7.3/" type="self" id="ROS-20260119-7316" title="ROS-20260119-7316" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21712" type="cve" id="CVE-2025-21712" title="CVE-2025-21712" />
			<reference href="https://bdu.fstec.ru/vul/2025-11948" type="self" id="BDU:2025-11948" title="BDU:2025-11948" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7317</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21715-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21715-7.3/" type="self" id="ROS-20260119-7317" title="ROS-20260119-7317" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21715" type="cve" id="CVE-2025-21715" title="CVE-2025-21715" />
			<reference href="https://bdu.fstec.ru/vul/2025-03897" type="self" id="BDU:2025-03897" title="BDU:2025-03897" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7318</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21716-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21716-7.3/" type="self" id="ROS-20260119-7318" title="ROS-20260119-7318" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21716" type="cve" id="CVE-2025-21716" title="CVE-2025-21716" />
			<reference href="https://bdu.fstec.ru/vul/2025-12361" type="self" id="BDU:2025-12361" title="BDU:2025-12361" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7319</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21718-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21718-7.3/" type="self" id="ROS-20260119-7319" title="ROS-20260119-7319" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21718" type="cve" id="CVE-2025-21718" title="CVE-2025-21718" />
			<reference href="https://bdu.fstec.ru/vul/2025-11995" type="self" id="BDU:2025-11995" title="BDU:2025-11995" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7320</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21719-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21719-7.3/" type="self" id="ROS-20260119-7320" title="ROS-20260119-7320" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21719" type="cve" id="CVE-2025-21719" title="CVE-2025-21719" />
			<reference href="https://bdu.fstec.ru/vul/2025-12017" type="self" id="BDU:2025-12017" title="BDU:2025-12017" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7321</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21721-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21721-7.3/" type="self" id="ROS-20260119-7321" title="ROS-20260119-7321" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21721" type="cve" id="CVE-2025-21721" title="CVE-2025-21721" />
			<reference href="https://bdu.fstec.ru/vul/2025-11844" type="self" id="BDU:2025-11844" title="BDU:2025-11844" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7322</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21722-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21722-7.3/" type="self" id="ROS-20260119-7322" title="ROS-20260119-7322" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21722" type="cve" id="CVE-2025-21722" title="CVE-2025-21722" />
			<reference href="https://bdu.fstec.ru/vul/2025-04375" type="self" id="BDU:2025-04375" title="BDU:2025-04375" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7323</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21724-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21724-7.3/" type="self" id="ROS-20260119-7323" title="ROS-20260119-7323" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21724" type="cve" id="CVE-2025-21724" title="CVE-2025-21724" />
			<reference href="https://bdu.fstec.ru/vul/2025-11881" type="self" id="BDU:2025-11881" title="BDU:2025-11881" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7324</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21725-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21725-7.3/" type="self" id="ROS-20260119-7324" title="ROS-20260119-7324" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21725" type="cve" id="CVE-2025-21725" title="CVE-2025-21725" />
			<reference href="https://bdu.fstec.ru/vul/2025-12006" type="self" id="BDU:2025-12006" title="BDU:2025-12006" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7325</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21726-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21726-7.3/" type="self" id="ROS-20260119-7325" title="ROS-20260119-7325" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21726" type="cve" id="CVE-2025-21726" title="CVE-2025-21726" />
			<reference href="https://bdu.fstec.ru/vul/2025-04372" type="self" id="BDU:2025-04372" title="BDU:2025-04372" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7326</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21727-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21727-7.3/" type="self" id="ROS-20260119-7326" title="ROS-20260119-7326" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21727" type="cve" id="CVE-2025-21727" title="CVE-2025-21727" />
			<reference href="https://bdu.fstec.ru/vul/2025-03898" type="self" id="BDU:2025-03898" title="BDU:2025-03898" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7327</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21728-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21728-7.3/" type="self" id="ROS-20260119-7327" title="ROS-20260119-7327" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21728" type="cve" id="CVE-2025-21728" title="CVE-2025-21728" />
			<reference href="https://bdu.fstec.ru/vul/2025-11947" type="self" id="BDU:2025-11947" title="BDU:2025-11947" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7328</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21731-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21731-7.3/" type="self" id="ROS-20260119-7328" title="ROS-20260119-7328" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21731" type="cve" id="CVE-2025-21731" title="CVE-2025-21731" />
			<reference href="https://bdu.fstec.ru/vul/2025-03899" type="self" id="BDU:2025-03899" title="BDU:2025-03899" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7329</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-54458-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-54458-7.3/" type="self" id="ROS-20260119-7329" title="ROS-20260119-7329" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54458" type="cve" id="CVE-2024-54458" title="CVE-2024-54458" />
			<reference href="https://bdu.fstec.ru/vul/2025-03894" type="self" id="BDU:2025-03894" title="BDU:2025-03894" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7330</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57834-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-57834-7.3/" type="self" id="ROS-20260119-7330" title="ROS-20260119-7330" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57834" type="cve" id="CVE-2024-57834" title="CVE-2024-57834" />
			<reference href="https://bdu.fstec.ru/vul/2025-12222" type="self" id="BDU:2025-12222" title="BDU:2025-12222" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7331</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58001-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58001-7.3/" type="self" id="ROS-20260119-7331" title="ROS-20260119-7331" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58001" type="cve" id="CVE-2024-58001" title="CVE-2024-58001" />
			<reference href="https://bdu.fstec.ru/vul/2025-12235" type="self" id="BDU:2025-12235" title="BDU:2025-12235" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7332</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58002-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58002-7.3/" type="self" id="ROS-20260119-7332" title="ROS-20260119-7332" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58002" type="cve" id="CVE-2024-58002" title="CVE-2024-58002" />
			<reference href="https://bdu.fstec.ru/vul/2025-10243" type="self" id="BDU:2025-10243" title="BDU:2025-10243" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7333</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58005-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58005-7.3/" type="self" id="ROS-20260119-7333" title="ROS-20260119-7333" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58005" type="cve" id="CVE-2024-58005" title="CVE-2024-58005" />
			<reference href="https://bdu.fstec.ru/vul/2025-12322" type="self" id="BDU:2025-12322" title="BDU:2025-12322" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7334</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58007-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58007-7.3/" type="self" id="ROS-20260119-7334" title="ROS-20260119-7334" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58007" type="cve" id="CVE-2024-58007" title="CVE-2024-58007" />
			<reference href="https://bdu.fstec.ru/vul/2025-11884" type="self" id="BDU:2025-11884" title="BDU:2025-11884" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7335</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58009-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58009-7.3/" type="self" id="ROS-20260119-7335" title="ROS-20260119-7335" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58009" type="cve" id="CVE-2024-58009" title="CVE-2024-58009" />
			<reference href="https://bdu.fstec.ru/vul/2025-12251" type="self" id="BDU:2025-12251" title="BDU:2025-12251" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7336</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58010-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58010-7.3/" type="self" id="ROS-20260119-7336" title="ROS-20260119-7336" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58010" type="cve" id="CVE-2024-58010" title="CVE-2024-58010" />
			<reference href="https://bdu.fstec.ru/vul/2025-11916" type="self" id="BDU:2025-11916" title="BDU:2025-11916" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7337</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58011-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58011-7.3/" type="self" id="ROS-20260119-7337" title="ROS-20260119-7337" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58011" type="cve" id="CVE-2024-58011" title="CVE-2024-58011" />
			<reference href="https://bdu.fstec.ru/vul/2025-12215" type="self" id="BDU:2025-12215" title="BDU:2025-12215" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7338</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58013-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58013-7.3/" type="self" id="ROS-20260119-7338" title="ROS-20260119-7338" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58013" type="cve" id="CVE-2024-58013" title="CVE-2024-58013" />
			<reference href="https://bdu.fstec.ru/vul/2025-12083" type="self" id="BDU:2025-12083" title="BDU:2025-12083" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7339</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58014-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58014-7.3/" type="self" id="ROS-20260119-7339" title="ROS-20260119-7339" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58014" type="cve" id="CVE-2024-58014" title="CVE-2024-58014" />
			<reference href="https://bdu.fstec.ru/vul/2025-11883" type="self" id="BDU:2025-11883" title="BDU:2025-11883" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7340</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58016-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58016-7.3/" type="self" id="ROS-20260119-7340" title="ROS-20260119-7340" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58016" type="cve" id="CVE-2024-58016" title="CVE-2024-58016" />
			<reference href="https://bdu.fstec.ru/vul/2025-11848" type="self" id="BDU:2025-11848" title="BDU:2025-11848" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7341</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58017-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58017-7.3/" type="self" id="ROS-20260119-7341" title="ROS-20260119-7341" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58017" type="cve" id="CVE-2024-58017" title="CVE-2024-58017" />
			<reference href="https://bdu.fstec.ru/vul/2025-11915" type="self" id="BDU:2025-11915" title="BDU:2025-11915" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7342</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58020-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58020-7.3/" type="self" id="ROS-20260119-7342" title="ROS-20260119-7342" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58020" type="cve" id="CVE-2024-58020" title="CVE-2024-58020" />
			<reference href="https://bdu.fstec.ru/vul/2025-12213" type="self" id="BDU:2025-12213" title="BDU:2025-12213" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7343</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21734-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21734-7.3/" type="self" id="ROS-20260119-7343" title="ROS-20260119-7343" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21734" type="cve" id="CVE-2025-21734" title="CVE-2025-21734" />
			<reference href="https://bdu.fstec.ru/vul/2025-11880" type="self" id="BDU:2025-11880" title="BDU:2025-11880" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7344</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21735-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21735-7.3/" type="self" id="ROS-20260119-7344" title="ROS-20260119-7344" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21735" type="cve" id="CVE-2025-21735" title="CVE-2025-21735" />
			<reference href="https://bdu.fstec.ru/vul/2025-10245" type="self" id="BDU:2025-10245" title="BDU:2025-10245" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7345</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21736-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21736-7.3/" type="self" id="ROS-20260119-7345" title="ROS-20260119-7345" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21736" type="cve" id="CVE-2025-21736" title="CVE-2025-21736" />
			<reference href="https://bdu.fstec.ru/vul/2025-11913" type="self" id="BDU:2025-11913" title="BDU:2025-11913" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7346</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21738-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21738-7.3/" type="self" id="ROS-20260119-7346" title="ROS-20260119-7346" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21738" type="cve" id="CVE-2025-21738" title="CVE-2025-21738" />
			<reference href="https://bdu.fstec.ru/vul/2025-11820" type="self" id="BDU:2025-11820" title="BDU:2025-11820" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7347</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21744-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21744-7.3/" type="self" id="ROS-20260119-7347" title="ROS-20260119-7347" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21744" type="cve" id="CVE-2025-21744" title="CVE-2025-21744" />
			<reference href="https://bdu.fstec.ru/vul/2025-12202" type="self" id="BDU:2025-12202" title="BDU:2025-12202" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7348</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21745-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21745-7.3/" type="self" id="ROS-20260119-7348" title="ROS-20260119-7348" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21745" type="cve" id="CVE-2025-21745" title="CVE-2025-21745" />
			<reference href="https://bdu.fstec.ru/vul/2025-12047" type="self" id="BDU:2025-12047" title="BDU:2025-12047" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7349</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21748-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21748-7.3/" type="self" id="ROS-20260119-7349" title="ROS-20260119-7349" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21748" type="cve" id="CVE-2025-21748" title="CVE-2025-21748" />
			<reference href="https://bdu.fstec.ru/vul/2025-11912" type="self" id="BDU:2025-11912" title="BDU:2025-11912" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7350</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21749-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21749-7.3/" type="self" id="ROS-20260119-7350" title="ROS-20260119-7350" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21749" type="cve" id="CVE-2025-21749" title="CVE-2025-21749" />
			<reference href="https://bdu.fstec.ru/vul/2025-12266" type="self" id="BDU:2025-12266" title="BDU:2025-12266" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7351</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21750-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21750-7.3/" type="self" id="ROS-20260119-7351" title="ROS-20260119-7351" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21750" type="cve" id="CVE-2025-21750" title="CVE-2025-21750" />
			<reference href="https://bdu.fstec.ru/vul/2025-11946" type="self" id="BDU:2025-11946" title="BDU:2025-11946" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7352</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21753-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21753-7.3/" type="self" id="ROS-20260119-7352" title="ROS-20260119-7352" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21753" type="cve" id="CVE-2025-21753" title="CVE-2025-21753" />
			<reference href="https://bdu.fstec.ru/vul/2025-03901" type="self" id="BDU:2025-03901" title="BDU:2025-03901" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7353</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21758-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21758-7.3/" type="self" id="ROS-20260119-7353" title="ROS-20260119-7353" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21758" type="cve" id="CVE-2025-21758" title="CVE-2025-21758" />
			<reference href="https://bdu.fstec.ru/vul/2025-12295" type="self" id="BDU:2025-12295" title="BDU:2025-12295" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7354</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21760-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21760-7.3/" type="self" id="ROS-20260119-7354" title="ROS-20260119-7354" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21760" type="cve" id="CVE-2025-21760" title="CVE-2025-21760" />
			<reference href="https://bdu.fstec.ru/vul/2025-04371" type="self" id="BDU:2025-04371" title="BDU:2025-04371" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7355</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21761-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21761-7.3/" type="self" id="ROS-20260119-7355" title="ROS-20260119-7355" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21761" type="cve" id="CVE-2025-21761" title="CVE-2025-21761" />
			<reference href="https://bdu.fstec.ru/vul/2025-04369" type="self" id="BDU:2025-04369" title="BDU:2025-04369" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7356</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21762-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21762-7.3/" type="self" id="ROS-20260119-7356" title="ROS-20260119-7356" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21762" type="cve" id="CVE-2025-21762" title="CVE-2025-21762" />
			<reference href="https://bdu.fstec.ru/vul/2025-04523" type="self" id="BDU:2025-04523" title="BDU:2025-04523" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7357</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21763-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21763-7.3/" type="self" id="ROS-20260119-7357" title="ROS-20260119-7357" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21763" type="cve" id="CVE-2025-21763" title="CVE-2025-21763" />
			<reference href="https://bdu.fstec.ru/vul/2025-04524" type="self" id="BDU:2025-04524" title="BDU:2025-04524" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7358</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21776-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21776-7.3/" type="self" id="ROS-20260119-7358" title="ROS-20260119-7358" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21776" type="cve" id="CVE-2025-21776" title="CVE-2025-21776" />
			<reference href="https://bdu.fstec.ru/vul/2025-12198" type="self" id="BDU:2025-12198" title="BDU:2025-12198" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7359</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21779-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21779-7.3/" type="self" id="ROS-20260119-7359" title="ROS-20260119-7359" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21779" type="cve" id="CVE-2025-21779" title="CVE-2025-21779" />
			<reference href="https://bdu.fstec.ru/vul/2025-12197" type="self" id="BDU:2025-12197" title="BDU:2025-12197" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7360</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21780-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21780-7.3/" type="self" id="ROS-20260119-7360" title="ROS-20260119-7360" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21780" type="cve" id="CVE-2025-21780" title="CVE-2025-21780" />
			<reference href="https://bdu.fstec.ru/vul/2025-11842" type="self" id="BDU:2025-11842" title="BDU:2025-11842" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7361</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21781-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21781-7.3/" type="self" id="ROS-20260119-7361" title="ROS-20260119-7361" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21781" type="cve" id="CVE-2025-21781" title="CVE-2025-21781" />
			<reference href="https://bdu.fstec.ru/vul/2025-12373" type="self" id="BDU:2025-12373" title="BDU:2025-12373" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7362</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21782-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21782-7.3/" type="self" id="ROS-20260119-7362" title="ROS-20260119-7362" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21782" type="cve" id="CVE-2025-21782" title="CVE-2025-21782" />
			<reference href="https://bdu.fstec.ru/vul/2025-11878" type="self" id="BDU:2025-11878" title="BDU:2025-11878" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7363</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21785-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21785-7.3/" type="self" id="ROS-20260119-7363" title="ROS-20260119-7363" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21785" type="cve" id="CVE-2025-21785" title="CVE-2025-21785" />
			<reference href="https://bdu.fstec.ru/vul/2025-06408" type="self" id="BDU:2025-06408" title="BDU:2025-06408" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7364</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21787-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21787-7.3/" type="self" id="ROS-20260119-7364" title="ROS-20260119-7364" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21787" type="cve" id="CVE-2025-21787" title="CVE-2025-21787" />
			<reference href="https://bdu.fstec.ru/vul/2025-12359" type="self" id="BDU:2025-12359" title="BDU:2025-12359" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7365</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21790-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21790-7.3/" type="self" id="ROS-20260119-7365" title="ROS-20260119-7365" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21790" type="cve" id="CVE-2025-21790" title="CVE-2025-21790" />
			<reference href="https://bdu.fstec.ru/vul/2025-12195" type="self" id="BDU:2025-12195" title="BDU:2025-12195" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7366</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21791-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21791-7.3/" type="self" id="ROS-20260119-7366" title="ROS-20260119-7366" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21791" type="cve" id="CVE-2025-21791" title="CVE-2025-21791" />
			<reference href="https://bdu.fstec.ru/vul/2025-04367" type="self" id="BDU:2025-04367" title="BDU:2025-04367" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7367</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21792-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21792-7.3/" type="self" id="ROS-20260119-7367" title="ROS-20260119-7367" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21792" type="cve" id="CVE-2025-21792" title="CVE-2025-21792" />
			<reference href="https://bdu.fstec.ru/vul/2025-12044" type="self" id="BDU:2025-12044" title="BDU:2025-12044" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7368</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21795-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21795-7.3/" type="self" id="ROS-20260119-7368" title="ROS-20260119-7368" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21795" type="cve" id="CVE-2025-21795" title="CVE-2025-21795" />
			<reference href="https://bdu.fstec.ru/vul/2025-12319" type="self" id="BDU:2025-12319" title="BDU:2025-12319" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7369</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21796-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21796-7.3/" type="self" id="ROS-20260119-7369" title="ROS-20260119-7369" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21796" type="cve" id="CVE-2025-21796" title="CVE-2025-21796" />
			<reference href="https://bdu.fstec.ru/vul/2025-04381" type="self" id="BDU:2025-04381" title="BDU:2025-04381" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7370</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58034-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58034-7.3/" type="self" id="ROS-20260119-7370" title="ROS-20260119-7370" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58034" type="cve" id="CVE-2024-58034" title="CVE-2024-58034" />
			<reference href="https://bdu.fstec.ru/vul/2025-12103" type="self" id="BDU:2025-12103" title="BDU:2025-12103" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7371</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21799-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21799-7.3/" type="self" id="ROS-20260119-7371" title="ROS-20260119-7371" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21799" type="cve" id="CVE-2025-21799" title="CVE-2025-21799" />
			<reference href="https://bdu.fstec.ru/vul/2025-11944" type="self" id="BDU:2025-11944" title="BDU:2025-11944" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7372</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21802-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21802-7.3/" type="self" id="ROS-20260119-7372" title="ROS-20260119-7372" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21802" type="cve" id="CVE-2025-21802" title="CVE-2025-21802" />
			<reference href="https://bdu.fstec.ru/vul/2025-12055" type="self" id="BDU:2025-12055" title="BDU:2025-12055" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7373</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21804-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21804-7.3/" type="self" id="ROS-20260119-7373" title="ROS-20260119-7373" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21804" type="cve" id="CVE-2025-21804" title="CVE-2025-21804" />
			<reference href="https://bdu.fstec.ru/vul/2025-11853" type="self" id="BDU:2025-11853" title="BDU:2025-11853" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7374</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21806-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21806-7.3/" type="self" id="ROS-20260119-7374" title="ROS-20260119-7374" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21806" type="cve" id="CVE-2025-21806" title="CVE-2025-21806" />
			<reference href="https://bdu.fstec.ru/vul/2025-11943" type="self" id="BDU:2025-11943" title="BDU:2025-11943" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7375</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21811-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21811-7.3/" type="self" id="ROS-20260119-7375" title="ROS-20260119-7375" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21811" type="cve" id="CVE-2025-21811" title="CVE-2025-21811" />
			<reference href="https://bdu.fstec.ru/vul/2025-12081" type="self" id="BDU:2025-12081" title="BDU:2025-12081" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7376</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21812-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21812-7.3/" type="self" id="ROS-20260119-7376" title="ROS-20260119-7376" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21812" type="cve" id="CVE-2025-21812" title="CVE-2025-21812" />
			<reference href="https://bdu.fstec.ru/vul/2025-12080" type="self" id="BDU:2025-12080" title="BDU:2025-12080" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7377</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21814-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21814-7.3/" type="self" id="ROS-20260119-7377" title="ROS-20260119-7377" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21814" type="cve" id="CVE-2025-21814" title="CVE-2025-21814" />
			<reference href="https://bdu.fstec.ru/vul/2025-12193" type="self" id="BDU:2025-12193" title="BDU:2025-12193" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7378</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21816-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21816-7.3/" type="self" id="ROS-20260119-7378" title="ROS-20260119-7378" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21816" type="cve" id="CVE-2025-21816" title="CVE-2025-21816" />
			<reference href="https://bdu.fstec.ru/vul/2025-15112" type="self" id="BDU:2025-15112" title="BDU:2025-15112" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7379</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21818-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21818-7.3/" type="self" id="ROS-20260119-7379" title="ROS-20260119-7379" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21818" type="cve" id="CVE-2025-21818" title="CVE-2025-21818" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7380</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21819-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21819-7.3/" type="self" id="ROS-20260119-7380" title="ROS-20260119-7380" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21819" type="cve" id="CVE-2025-21819" title="CVE-2025-21819" />
			<reference href="https://bdu.fstec.ru/vul/2025-12024" type="self" id="BDU:2025-12024" title="BDU:2025-12024" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7381</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21820-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21820-7.3/" type="self" id="ROS-20260119-7381" title="ROS-20260119-7381" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21820" type="cve" id="CVE-2025-21820" title="CVE-2025-21820" />
			<reference href="https://bdu.fstec.ru/vul/2025-12264" type="self" id="BDU:2025-12264" title="BDU:2025-12264" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7382</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21821-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21821-7.3/" type="self" id="ROS-20260119-7382" title="ROS-20260119-7382" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21821" type="cve" id="CVE-2025-21821" title="CVE-2025-21821" />
			<reference href="https://bdu.fstec.ru/vul/2025-11841" type="self" id="BDU:2025-11841" title="BDU:2025-11841" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7383</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21823-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21823-7.3/" type="self" id="ROS-20260119-7383" title="ROS-20260119-7383" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21823" type="cve" id="CVE-2025-21823" title="CVE-2025-21823" />
			<reference href="https://bdu.fstec.ru/vul/2025-12348" type="self" id="BDU:2025-12348" title="BDU:2025-12348" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7384</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58051-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58051-7.3/" type="self" id="ROS-20260119-7384" title="ROS-20260119-7384" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58051" type="cve" id="CVE-2024-58051" title="CVE-2024-58051" />
			<reference href="https://bdu.fstec.ru/vul/2025-02439" type="self" id="BDU:2025-02439" title="BDU:2025-02439" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7385</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58052-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58052-7.3/" type="self" id="ROS-20260119-7385" title="ROS-20260119-7385" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58052" type="cve" id="CVE-2024-58052" title="CVE-2024-58052" />
			<reference href="https://bdu.fstec.ru/vul/2025-02444" type="self" id="BDU:2025-02444" title="BDU:2025-02444" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7386</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58054-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58054-7.3/" type="self" id="ROS-20260119-7386" title="ROS-20260119-7386" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58054" type="cve" id="CVE-2024-58054" title="CVE-2024-58054" />
			<reference href="https://bdu.fstec.ru/vul/2025-02443" type="self" id="BDU:2025-02443" title="BDU:2025-02443" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7387</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58055-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58055-7.3/" type="self" id="ROS-20260119-7387" title="ROS-20260119-7387" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58055" type="cve" id="CVE-2024-58055" title="CVE-2024-58055" />
			<reference href="https://bdu.fstec.ru/vul/2025-02441" type="self" id="BDU:2025-02441" title="BDU:2025-02441" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7388</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58056-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58056-7.3/" type="self" id="ROS-20260119-7388" title="ROS-20260119-7388" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58056" type="cve" id="CVE-2024-58056" title="CVE-2024-58056" />
			<reference href="https://bdu.fstec.ru/vul/2025-02442" type="self" id="BDU:2025-02442" title="BDU:2025-02442" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7389</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58058-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58058-7.3/" type="self" id="ROS-20260119-7389" title="ROS-20260119-7389" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58058" type="cve" id="CVE-2024-58058" title="CVE-2024-58058" />
			<reference href="https://bdu.fstec.ru/vul/2025-02440" type="self" id="BDU:2025-02440" title="BDU:2025-02440" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7390</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58061-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58061-7.3/" type="self" id="ROS-20260119-7390" title="ROS-20260119-7390" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58061" type="cve" id="CVE-2024-58061" title="CVE-2024-58061" />
			<reference href="https://bdu.fstec.ru/vul/2025-02436" type="self" id="BDU:2025-02436" title="BDU:2025-02436" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7391</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58063-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58063-7.3/" type="self" id="ROS-20260119-7391" title="ROS-20260119-7391" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58063" type="cve" id="CVE-2024-58063" title="CVE-2024-58063" />
			<reference href="https://bdu.fstec.ru/vul/2025-02438" type="self" id="BDU:2025-02438" title="BDU:2025-02438" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7392</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58068-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58068-7.3/" type="self" id="ROS-20260119-7392" title="ROS-20260119-7392" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58068" type="cve" id="CVE-2024-58068" title="CVE-2024-58068" />
			<reference href="https://bdu.fstec.ru/vul/2025-12210" type="self" id="BDU:2025-12210" title="BDU:2025-12210" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7393</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58069-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58069-7.3/" type="self" id="ROS-20260119-7393" title="ROS-20260119-7393" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58069" type="cve" id="CVE-2024-58069" title="CVE-2024-58069" />
			<reference href="https://bdu.fstec.ru/vul/2025-12305" type="self" id="BDU:2025-12305" title="BDU:2025-12305" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7394</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58071-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58071-7.3/" type="self" id="ROS-20260119-7394" title="ROS-20260119-7394" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58071" type="cve" id="CVE-2024-58071" title="CVE-2024-58071" />
			<reference href="https://bdu.fstec.ru/vul/2025-12268" type="self" id="BDU:2025-12268" title="BDU:2025-12268" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7395</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58072-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58072-7.3/" type="self" id="ROS-20260119-7395" title="ROS-20260119-7395" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58072" type="cve" id="CVE-2024-58072" title="CVE-2024-58072" />
			<reference href="https://bdu.fstec.ru/vul/2025-12102" type="self" id="BDU:2025-12102" title="BDU:2025-12102" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7396</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21826-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21826-7.3/" type="self" id="ROS-20260119-7396" title="ROS-20260119-7396" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21826" type="cve" id="CVE-2025-21826" title="CVE-2025-21826" />
			<reference href="https://bdu.fstec.ru/vul/2025-12280" type="self" id="BDU:2025-12280" title="BDU:2025-12280" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7397</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58076-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58076-7.3/" type="self" id="ROS-20260119-7397" title="ROS-20260119-7397" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58076" type="cve" id="CVE-2024-58076" title="CVE-2024-58076" />
			<reference href="https://bdu.fstec.ru/vul/2025-12209" type="self" id="BDU:2025-12209" title="BDU:2025-12209" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7398</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58077-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58077-7.3/" type="self" id="ROS-20260119-7398" title="ROS-20260119-7398" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58077" type="cve" id="CVE-2024-58077" title="CVE-2024-58077" />
			<reference href="https://bdu.fstec.ru/vul/2025-12025" type="self" id="BDU:2025-12025" title="BDU:2025-12025" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260119-7399</id>
		<issued date="2026-01-19" />
		<updated date="2026-01-19" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58079-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58079-7.3/" type="self" id="ROS-20260119-7399" title="ROS-20260119-7399" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58079" type="cve" id="CVE-2024-58079" title="CVE-2024-58079" />
			<reference href="https://bdu.fstec.ru/vul/2025-11808" type="self" id="BDU:2025-11808" title="BDU:2025-11808" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7301</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21858-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21858-7.3/" type="self" id="ROS-20260120-7301" title="ROS-20260120-7301" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21858" type="cve" id="CVE-2025-21858" title="CVE-2025-21858" />
			<reference href="https://bdu.fstec.ru/vul/2025-12078" type="self" id="BDU:2025-12078" title="BDU:2025-12078" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7302</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21859-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21859-7.3/" type="self" id="ROS-20260120-7302" title="ROS-20260120-7302" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21859" type="cve" id="CVE-2025-21859" title="CVE-2025-21859" />
			<reference href="https://bdu.fstec.ru/vul/2025-12261" type="self" id="BDU:2025-12261" title="BDU:2025-12261" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7303</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21861-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21861-7.3/" type="self" id="ROS-20260120-7303" title="ROS-20260120-7303" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21861" type="cve" id="CVE-2025-21861" title="CVE-2025-21861" />
			<reference href="https://bdu.fstec.ru/vul/2026-02398" type="self" id="BDU:2026-02398" title="BDU:2026-02398" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7304</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21862-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21862-7.3/" type="self" id="ROS-20260120-7304" title="ROS-20260120-7304" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21862" type="cve" id="CVE-2025-21862" title="CVE-2025-21862" />
			<reference href="https://bdu.fstec.ru/vul/2025-06803" type="self" id="BDU:2025-06803" title="BDU:2025-06803" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7305</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21864-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21864-7.3/" type="self" id="ROS-20260120-7305" title="ROS-20260120-7305" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21864" type="cve" id="CVE-2025-21864" title="CVE-2025-21864" />
			<reference href="https://bdu.fstec.ru/vul/2025-12185" type="self" id="BDU:2025-12185" title="BDU:2025-12185" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7306</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21865-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21865-7.3/" type="self" id="ROS-20260120-7306" title="ROS-20260120-7306" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21865" type="cve" id="CVE-2025-21865" title="CVE-2025-21865" />
			<reference href="https://bdu.fstec.ru/vul/2025-12304" type="self" id="BDU:2025-12304" title="BDU:2025-12304" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7307</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21866-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21866-7.3/" type="self" id="ROS-20260120-7307" title="ROS-20260120-7307" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21866" type="cve" id="CVE-2025-21866" title="CVE-2025-21866" />
			<reference href="https://bdu.fstec.ru/vul/2025-12294" type="self" id="BDU:2025-12294" title="BDU:2025-12294" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7308</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-52927-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-52927-7.3/" type="self" id="ROS-20260120-7308" title="ROS-20260120-7308" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52927" type="cve" id="CVE-2023-52927" title="CVE-2023-52927" />
			<reference href="https://bdu.fstec.ru/vul/2025-11958" type="self" id="BDU:2025-11958" title="BDU:2025-11958" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7309</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21867-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21867-7.3/" type="self" id="ROS-20260120-7309" title="ROS-20260120-7309" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21867" type="cve" id="CVE-2025-21867" title="CVE-2025-21867" />
			<reference href="https://bdu.fstec.ru/vul/2025-03813" type="self" id="BDU:2025-03813" title="BDU:2025-03813" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7310</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21871-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21871-7.3/" type="self" id="ROS-20260120-7310" title="ROS-20260120-7310" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21871" type="cve" id="CVE-2025-21871" title="CVE-2025-21871" />
			<reference href="https://bdu.fstec.ru/vul/2025-03811" type="self" id="BDU:2025-03811" title="BDU:2025-03811" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7311</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58090-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58090-7.3/" type="self" id="ROS-20260120-7311" title="ROS-20260120-7311" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58090" type="cve" id="CVE-2024-58090" title="CVE-2024-58090" />
			<reference href="https://bdu.fstec.ru/vul/2025-03816" type="self" id="BDU:2025-03816" title="BDU:2025-03816" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7312</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21875-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21875-7.3/" type="self" id="ROS-20260120-7312" title="ROS-20260120-7312" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21875" type="cve" id="CVE-2025-21875" title="CVE-2025-21875" />
			<reference href="https://bdu.fstec.ru/vul/2025-03809" type="self" id="BDU:2025-03809" title="BDU:2025-03809" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7313</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21877-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21877-7.3/" type="self" id="ROS-20260120-7313" title="ROS-20260120-7313" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21877" type="cve" id="CVE-2025-21877" title="CVE-2025-21877" />
			<reference href="https://bdu.fstec.ru/vul/2025-03742" type="self" id="BDU:2025-03742" title="BDU:2025-03742" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7314</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21878-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21878-7.3/" type="self" id="ROS-20260120-7314" title="ROS-20260120-7314" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21878" type="cve" id="CVE-2025-21878" title="CVE-2025-21878" />
			<reference href="https://bdu.fstec.ru/vul/2025-03812" type="self" id="BDU:2025-03812" title="BDU:2025-03812" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7315</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21881-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21881-7.3/" type="self" id="ROS-20260120-7315" title="ROS-20260120-7315" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21881" type="cve" id="CVE-2025-21881" title="CVE-2025-21881" />
			<reference href="https://bdu.fstec.ru/vul/2025-03683" type="self" id="BDU:2025-03683" title="BDU:2025-03683" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7316</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21887-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21887-7.3/" type="self" id="ROS-20260120-7316" title="ROS-20260120-7316" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21887" type="cve" id="CVE-2025-21887" title="CVE-2025-21887" />
			<reference href="https://bdu.fstec.ru/vul/2025-03684" type="self" id="BDU:2025-03684" title="BDU:2025-03684" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7317</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21891-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21891-7.3/" type="self" id="ROS-20260120-7317" title="ROS-20260120-7317" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21891" type="cve" id="CVE-2025-21891" title="CVE-2025-21891" />
			<reference href="https://bdu.fstec.ru/vul/2025-12365" type="self" id="BDU:2025-12365" title="BDU:2025-12365" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7318</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53030-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53030-7.3/" type="self" id="ROS-20260120-7318" title="ROS-20260120-7318" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53030" type="cve" id="CVE-2023-53030" title="CVE-2023-53030" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7319</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53031-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53031-7.3/" type="self" id="ROS-20260120-7319" title="ROS-20260120-7319" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53031" type="cve" id="CVE-2023-53031" title="CVE-2023-53031" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7320</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53032-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53032-7.3/" type="self" id="ROS-20260120-7320" title="ROS-20260120-7320" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53032" type="cve" id="CVE-2023-53032" title="CVE-2023-53032" />
			<reference href="https://bdu.fstec.ru/vul/2026-03854" type="self" id="BDU:2026-03854" title="BDU:2026-03854" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7321</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21898-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21898-7.3/" type="self" id="ROS-20260120-7321" title="ROS-20260120-7321" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21898" type="cve" id="CVE-2025-21898" title="CVE-2025-21898" />
			<reference href="https://bdu.fstec.ru/vul/2025-04488" type="self" id="BDU:2025-04488" title="BDU:2025-04488" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7322</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21899-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21899-7.3/" type="self" id="ROS-20260120-7322" title="ROS-20260120-7322" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21899" type="cve" id="CVE-2025-21899" title="CVE-2025-21899" />
			<reference href="https://bdu.fstec.ru/vul/2025-04386" type="self" id="BDU:2025-04386" title="BDU:2025-04386" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7323</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21904-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21904-7.3/" type="self" id="ROS-20260120-7323" title="ROS-20260120-7323" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21904" type="cve" id="CVE-2025-21904" title="CVE-2025-21904" />
			<reference href="https://bdu.fstec.ru/vul/2025-04818" type="self" id="BDU:2025-04818" title="BDU:2025-04818" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7324</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21905-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21905-7.3/" type="self" id="ROS-20260120-7324" title="ROS-20260120-7324" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21905" type="cve" id="CVE-2025-21905" title="CVE-2025-21905" />
			<reference href="https://bdu.fstec.ru/vul/2025-04806" type="self" id="BDU:2025-04806" title="BDU:2025-04806" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7325</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21909-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21909-7.3/" type="self" id="ROS-20260120-7325" title="ROS-20260120-7325" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21909" type="cve" id="CVE-2025-21909" title="CVE-2025-21909" />
			<reference href="https://bdu.fstec.ru/vul/2025-04820" type="self" id="BDU:2025-04820" title="BDU:2025-04820" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7326</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21910-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21910-7.3/" type="self" id="ROS-20260120-7326" title="ROS-20260120-7326" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21910" type="cve" id="CVE-2025-21910" title="CVE-2025-21910" />
			<reference href="https://bdu.fstec.ru/vul/2025-04816" type="self" id="BDU:2025-04816" title="BDU:2025-04816" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7327</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21912-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21912-7.3/" type="self" id="ROS-20260120-7327" title="ROS-20260120-7327" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21912" type="cve" id="CVE-2025-21912" title="CVE-2025-21912" />
			<reference href="https://bdu.fstec.ru/vul/2025-04817" type="self" id="BDU:2025-04817" title="BDU:2025-04817" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7328</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21913-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21913-7.3/" type="self" id="ROS-20260120-7328" title="ROS-20260120-7328" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21913" type="cve" id="CVE-2025-21913" title="CVE-2025-21913" />
			<reference href="https://bdu.fstec.ru/vul/2025-03888" type="self" id="BDU:2025-03888" title="BDU:2025-03888" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7329</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21914-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21914-7.3/" type="self" id="ROS-20260120-7329" title="ROS-20260120-7329" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21914" type="cve" id="CVE-2025-21914" title="CVE-2025-21914" />
			<reference href="https://bdu.fstec.ru/vul/2025-04089" type="self" id="BDU:2025-04089" title="BDU:2025-04089" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7330</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21916-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21916-7.3/" type="self" id="ROS-20260120-7330" title="ROS-20260120-7330" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21916" type="cve" id="CVE-2025-21916" title="CVE-2025-21916" />
			<reference href="https://bdu.fstec.ru/vul/2025-03890" type="self" id="BDU:2025-03890" title="BDU:2025-03890" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7331</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21917-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21917-7.3/" type="self" id="ROS-20260120-7331" title="ROS-20260120-7331" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21917" type="cve" id="CVE-2025-21917" title="CVE-2025-21917" />
			<reference href="https://bdu.fstec.ru/vul/2025-04088" type="self" id="BDU:2025-04088" title="BDU:2025-04088" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7332</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21918-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21918-7.3/" type="self" id="ROS-20260120-7332" title="ROS-20260120-7332" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21918" type="cve" id="CVE-2025-21918" title="CVE-2025-21918" />
			<reference href="https://bdu.fstec.ru/vul/2025-04087" type="self" id="BDU:2025-04087" title="BDU:2025-04087" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7333</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21919-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21919-7.3/" type="self" id="ROS-20260120-7333" title="ROS-20260120-7333" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21919" type="cve" id="CVE-2025-21919" title="CVE-2025-21919" />
			<reference href="https://bdu.fstec.ru/vul/2025-04090" type="self" id="BDU:2025-04090" title="BDU:2025-04090" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7334</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21920-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21920-7.3/" type="self" id="ROS-20260120-7334" title="ROS-20260120-7334" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21920" type="cve" id="CVE-2025-21920" title="CVE-2025-21920" />
			<reference href="https://bdu.fstec.ru/vul/2025-03891" type="self" id="BDU:2025-03891" title="BDU:2025-03891" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7335</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21922-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21922-7.3/" type="self" id="ROS-20260120-7335" title="ROS-20260120-7335" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21922" type="cve" id="CVE-2025-21922" title="CVE-2025-21922" />
			<reference href="https://bdu.fstec.ru/vul/2025-04713" type="self" id="BDU:2025-04713" title="BDU:2025-04713" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7336</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21924-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21924-7.3/" type="self" id="ROS-20260120-7336" title="ROS-20260120-7336" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21924" type="cve" id="CVE-2025-21924" title="CVE-2025-21924" />
			<reference href="https://bdu.fstec.ru/vul/2025-04714" type="self" id="BDU:2025-04714" title="BDU:2025-04714" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7337</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21925-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21925-7.3/" type="self" id="ROS-20260120-7337" title="ROS-20260120-7337" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21925" type="cve" id="CVE-2025-21925" title="CVE-2025-21925" />
			<reference href="https://bdu.fstec.ru/vul/2025-11778" type="self" id="BDU:2025-11778" title="BDU:2025-11778" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7338</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21926-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21926-7.3/" type="self" id="ROS-20260120-7338" title="ROS-20260120-7338" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21926" type="cve" id="CVE-2025-21926" title="CVE-2025-21926" />
			<reference href="https://bdu.fstec.ru/vul/2025-11777" type="self" id="BDU:2025-11777" title="BDU:2025-11777" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7339</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21928-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21928-7.3/" type="self" id="ROS-20260120-7339" title="ROS-20260120-7339" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21928" type="cve" id="CVE-2025-21928" title="CVE-2025-21928" />
			<reference href="https://bdu.fstec.ru/vul/2025-11776" type="self" id="BDU:2025-11776" title="BDU:2025-11776" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7340</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21931-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21931-7.3/" type="self" id="ROS-20260120-7340" title="ROS-20260120-7340" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21931" type="cve" id="CVE-2025-21931" title="CVE-2025-21931" />
			<reference href="https://bdu.fstec.ru/vul/2025-11773" type="self" id="BDU:2025-11773" title="BDU:2025-11773" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7341</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21934-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21934-7.3/" type="self" id="ROS-20260120-7341" title="ROS-20260120-7341" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21934" type="cve" id="CVE-2025-21934" title="CVE-2025-21934" />
			<reference href="https://bdu.fstec.ru/vul/2025-11772" type="self" id="BDU:2025-11772" title="BDU:2025-11772" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7342</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21935-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21935-7.3/" type="self" id="ROS-20260120-7342" title="ROS-20260120-7342" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21935" type="cve" id="CVE-2025-21935" title="CVE-2025-21935" />
			<reference href="https://bdu.fstec.ru/vul/2025-04644" type="self" id="BDU:2025-04644" title="BDU:2025-04644" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7343</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21936-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21936-7.3/" type="self" id="ROS-20260120-7343" title="ROS-20260120-7343" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21936" type="cve" id="CVE-2025-21936" title="CVE-2025-21936" />
			<reference href="https://bdu.fstec.ru/vul/2025-04645" type="self" id="BDU:2025-04645" title="BDU:2025-04645" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7344</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21937-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21937-7.3/" type="self" id="ROS-20260120-7344" title="ROS-20260120-7344" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21937" type="cve" id="CVE-2025-21937" title="CVE-2025-21937" />
			<reference href="https://bdu.fstec.ru/vul/2025-04646" type="self" id="BDU:2025-04646" title="BDU:2025-04646" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7345</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21938-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21938-7.3/" type="self" id="ROS-20260120-7345" title="ROS-20260120-7345" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21938" type="cve" id="CVE-2025-21938" title="CVE-2025-21938" />
			<reference href="https://bdu.fstec.ru/vul/2025-04614" type="self" id="BDU:2025-04614" title="BDU:2025-04614" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7346</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21941-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21941-7.3/" type="self" id="ROS-20260120-7346" title="ROS-20260120-7346" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21941" type="cve" id="CVE-2025-21941" title="CVE-2025-21941" />
			<reference href="https://bdu.fstec.ru/vul/2025-04647" type="self" id="BDU:2025-04647" title="BDU:2025-04647" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-73-0001</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21943-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21943-7.3/" type="self" id="ROS-20260120-73-0001" title="ROS-20260120-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21943" type="cve" id="CVE-2025-21943" title="CVE-2025-21943" />
			<reference href="https://bdu.fstec.ru/vul/2025-04620" type="self" id="BDU:2025-04620" title="BDU:2025-04620" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-73-0002</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21944-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21944-7.3/" type="self" id="ROS-20260120-73-0002" title="ROS-20260120-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21944" type="cve" id="CVE-2025-21944" title="CVE-2025-21944" />
			<reference href="https://bdu.fstec.ru/vul/2025-04650" type="self" id="BDU:2025-04650" title="BDU:2025-04650" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-73-0003</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21945-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21945-7.3/" type="self" id="ROS-20260120-73-0003" title="ROS-20260120-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21945" type="cve" id="CVE-2025-21945" title="CVE-2025-21945" />
			<reference href="https://bdu.fstec.ru/vul/2025-04649" type="self" id="BDU:2025-04649" title="BDU:2025-04649" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-73-0004</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21947-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21947-7.3/" type="self" id="ROS-20260120-73-0004" title="ROS-20260120-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21947" type="cve" id="CVE-2025-21947" title="CVE-2025-21947" />
			<reference href="https://bdu.fstec.ru/vul/2025-04648" type="self" id="BDU:2025-04648" title="BDU:2025-04648" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-73-0005</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21948-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21948-7.3/" type="self" id="ROS-20260120-73-0005" title="ROS-20260120-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21948" type="cve" id="CVE-2025-21948" title="CVE-2025-21948" />
			<reference href="https://bdu.fstec.ru/vul/2025-04621" type="self" id="BDU:2025-04621" title="BDU:2025-04621" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-73-0006</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21950-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21950-7.3/" type="self" id="ROS-20260120-73-0006" title="ROS-20260120-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21950" type="cve" id="CVE-2025-21950" title="CVE-2025-21950" />
			<reference href="https://bdu.fstec.ru/vul/2025-12043" type="self" id="BDU:2025-12043" title="BDU:2025-12043" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-73-0007</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21951-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21951-7.3/" type="self" id="ROS-20260120-73-0007" title="ROS-20260120-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21951" type="cve" id="CVE-2025-21951" title="CVE-2025-21951" />
			<reference href="https://bdu.fstec.ru/vul/2025-12260" type="self" id="BDU:2025-12260" title="BDU:2025-12260" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-73-0008</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21956-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21956-7.3/" type="self" id="ROS-20260120-73-0008" title="ROS-20260120-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21956" type="cve" id="CVE-2025-21956" title="CVE-2025-21956" />
			<reference href="https://bdu.fstec.ru/vul/2025-11832" type="self" id="BDU:2025-11832" title="BDU:2025-11832" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7347</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21957-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21957-7.3/" type="self" id="ROS-20260120-7347" title="ROS-20260120-7347" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21957" type="cve" id="CVE-2025-21957" title="CVE-2025-21957" />
			<reference href="https://bdu.fstec.ru/vul/2025-12184" type="self" id="BDU:2025-12184" title="BDU:2025-12184" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7348</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21959-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21959-7.3/" type="self" id="ROS-20260120-7348" title="ROS-20260120-7348" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21959" type="cve" id="CVE-2025-21959" title="CVE-2025-21959" />
			<reference href="https://bdu.fstec.ru/vul/2025-12357" type="self" id="BDU:2025-12357" title="BDU:2025-12357" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7349</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21960-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21960-7.3/" type="self" id="ROS-20260120-7349" title="ROS-20260120-7349" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21960" type="cve" id="CVE-2025-21960" title="CVE-2025-21960" />
			<reference href="https://bdu.fstec.ru/vul/2025-11831" type="self" id="BDU:2025-11831" title="BDU:2025-11831" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7350</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21962-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21962-7.3/" type="self" id="ROS-20260120-7350" title="ROS-20260120-7350" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21962" type="cve" id="CVE-2025-21962" title="CVE-2025-21962" />
			<reference href="https://bdu.fstec.ru/vul/2025-11920" type="self" id="BDU:2025-11920" title="BDU:2025-11920" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7351</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21963-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21963-7.3/" type="self" id="ROS-20260120-7351" title="ROS-20260120-7351" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21963" type="cve" id="CVE-2025-21963" title="CVE-2025-21963" />
			<reference href="https://bdu.fstec.ru/vul/2025-11922" type="self" id="BDU:2025-11922" title="BDU:2025-11922" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7352</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21964-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21964-7.3/" type="self" id="ROS-20260120-7352" title="ROS-20260120-7352" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21964" type="cve" id="CVE-2025-21964" title="CVE-2025-21964" />
			<reference href="https://bdu.fstec.ru/vul/2025-11921" type="self" id="BDU:2025-11921" title="BDU:2025-11921" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7353</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21968-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21968-7.3/" type="self" id="ROS-20260120-7353" title="ROS-20260120-7353" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21968" type="cve" id="CVE-2025-21968" title="CVE-2025-21968" />
			<reference href="https://bdu.fstec.ru/vul/2025-12099" type="self" id="BDU:2025-12099" title="BDU:2025-12099" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7354</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21970-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21970-7.3/" type="self" id="ROS-20260120-7354" title="ROS-20260120-7354" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21970" type="cve" id="CVE-2025-21970" title="CVE-2025-21970" />
			<reference href="https://bdu.fstec.ru/vul/2025-12230" type="self" id="BDU:2025-12230" title="BDU:2025-12230" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7355</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21971-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21971-7.3/" type="self" id="ROS-20260120-7355" title="ROS-20260120-7355" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21971" type="cve" id="CVE-2025-21971" title="CVE-2025-21971" />
			<reference href="https://bdu.fstec.ru/vul/2025-12282" type="self" id="BDU:2025-12282" title="BDU:2025-12282" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7356</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21975-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21975-7.3/" type="self" id="ROS-20260120-7356" title="ROS-20260120-7356" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21975" type="cve" id="CVE-2025-21975" title="CVE-2025-21975" />
			<reference href="https://bdu.fstec.ru/vul/2025-12233" type="self" id="BDU:2025-12233" title="BDU:2025-12233" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7357</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21978-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21978-7.3/" type="self" id="ROS-20260120-7357" title="ROS-20260120-7357" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21978" type="cve" id="CVE-2025-21978" title="CVE-2025-21978" />
			<reference href="https://bdu.fstec.ru/vul/2025-12042" type="self" id="BDU:2025-12042" title="BDU:2025-12042" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7358</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21979-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21979-7.3/" type="self" id="ROS-20260120-7358" title="ROS-20260120-7358" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21979" type="cve" id="CVE-2025-21979" title="CVE-2025-21979" />
			<reference href="https://bdu.fstec.ru/vul/2025-12106" type="self" id="BDU:2025-12106" title="BDU:2025-12106" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7359</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21980-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21980-7.3/" type="self" id="ROS-20260120-7359" title="ROS-20260120-7359" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21980" type="cve" id="CVE-2025-21980" title="CVE-2025-21980" />
			<reference href="https://bdu.fstec.ru/vul/2025-12182" type="self" id="BDU:2025-12182" title="BDU:2025-12182" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7360</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21981-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21981-7.3/" type="self" id="ROS-20260120-7360" title="ROS-20260120-7360" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21981" type="cve" id="CVE-2025-21981" title="CVE-2025-21981" />
			<reference href="https://bdu.fstec.ru/vul/2025-12041" type="self" id="BDU:2025-12041" title="BDU:2025-12041" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7361</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21986-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21986-7.3/" type="self" id="ROS-20260120-7361" title="ROS-20260120-7361" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21986" type="cve" id="CVE-2025-21986" title="CVE-2025-21986" />
			<reference href="https://bdu.fstec.ru/vul/2025-12346" type="self" id="BDU:2025-12346" title="BDU:2025-12346" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7362</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21991-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21991-7.3/" type="self" id="ROS-20260120-7362" title="ROS-20260120-7362" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21991" type="cve" id="CVE-2025-21991" title="CVE-2025-21991" />
			<reference href="https://bdu.fstec.ru/vul/2025-05649" type="self" id="BDU:2025-05649" title="BDU:2025-05649" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7363</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21992-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21992-7.3/" type="self" id="ROS-20260120-7363" title="ROS-20260120-7363" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21992" type="cve" id="CVE-2025-21992" title="CVE-2025-21992" />
			<reference href="https://bdu.fstec.ru/vul/2025-05650" type="self" id="BDU:2025-05650" title="BDU:2025-05650" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7364</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21993-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21993-7.3/" type="self" id="ROS-20260120-7364" title="ROS-20260120-7364" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21993" type="cve" id="CVE-2025-21993" title="CVE-2025-21993" />
			<reference href="https://bdu.fstec.ru/vul/2025-05651" type="self" id="BDU:2025-05651" title="BDU:2025-05651" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7365</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21994-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21994-7.3/" type="self" id="ROS-20260120-7365" title="ROS-20260120-7365" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21994" type="cve" id="CVE-2025-21994" title="CVE-2025-21994" />
			<reference href="https://bdu.fstec.ru/vul/2025-12314" type="self" id="BDU:2025-12314" title="BDU:2025-12314" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7366</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21996-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21996-7.3/" type="self" id="ROS-20260120-7366" title="ROS-20260120-7366" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21996" type="cve" id="CVE-2025-21996" title="CVE-2025-21996" />
			<reference href="https://bdu.fstec.ru/vul/2025-06370" type="self" id="BDU:2025-06370" title="BDU:2025-06370" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7367</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21997-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21997-7.3/" type="self" id="ROS-20260120-7367" title="ROS-20260120-7367" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21997" type="cve" id="CVE-2025-21997" title="CVE-2025-21997" />
			<reference href="https://bdu.fstec.ru/vul/2025-11625" type="self" id="BDU:2025-11625" title="BDU:2025-11625" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7368</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21999-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21999-7.3/" type="self" id="ROS-20260120-7368" title="ROS-20260120-7368" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21999" type="cve" id="CVE-2025-21999" title="CVE-2025-21999" />
			<reference href="https://bdu.fstec.ru/vul/2025-10273" type="self" id="BDU:2025-10273" title="BDU:2025-10273" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-7369</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22004-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22004-7.3/" type="self" id="ROS-20260120-7369" title="ROS-20260120-7369" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22004" type="cve" id="CVE-2025-22004" title="CVE-2025-22004" />
			<reference href="https://bdu.fstec.ru/vul/2025-11629" type="self" id="BDU:2025-11629" title="BDU:2025-11629" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0001</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21764-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21764-7.3/" type="self" id="ROS-20260121-73-0001" title="ROS-20260121-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21764" type="cve" id="CVE-2025-21764" title="CVE-2025-21764" />
			<reference href="https://bdu.fstec.ru/vul/2025-04368" type="self" id="BDU:2025-04368" title="BDU:2025-04368" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0002</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21765-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21765-7.3/" type="self" id="ROS-20260121-73-0002" title="ROS-20260121-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21765" type="cve" id="CVE-2025-21765" title="CVE-2025-21765" />
			<reference href="https://bdu.fstec.ru/vul/2025-12057" type="self" id="BDU:2025-12057" title="BDU:2025-12057" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0003</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21766-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21766-7.3/" type="self" id="ROS-20260121-73-0003" title="ROS-20260121-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21766" type="cve" id="CVE-2025-21766" title="CVE-2025-21766" />
			<reference href="https://bdu.fstec.ru/vul/2025-12056" type="self" id="BDU:2025-12056" title="BDU:2025-12056" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0004</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21767-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21767-7.3/" type="self" id="ROS-20260121-73-0004" title="ROS-20260121-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21767" type="cve" id="CVE-2025-21767" title="CVE-2025-21767" />
			<reference href="https://bdu.fstec.ru/vul/2025-12240" type="self" id="BDU:2025-12240" title="BDU:2025-12240" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0005</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21772-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21772-7.3/" type="self" id="ROS-20260121-73-0005" title="ROS-20260121-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21772" type="cve" id="CVE-2025-21772" title="CVE-2025-21772" />
			<reference href="https://bdu.fstec.ru/vul/2025-11879" type="self" id="BDU:2025-11879" title="BDU:2025-11879" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0006</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21775-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21775-7.3/" type="self" id="ROS-20260121-73-0006" title="ROS-20260121-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21775" type="cve" id="CVE-2025-21775" title="CVE-2025-21775" />
			<reference href="https://bdu.fstec.ru/vul/2025-12199" type="self" id="BDU:2025-12199" title="BDU:2025-12199" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0007</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58080-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58080-7.3/" type="self" id="ROS-20260121-73-0007" title="ROS-20260121-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58080" type="cve" id="CVE-2024-58080" title="CVE-2024-58080" />
			<reference href="https://bdu.fstec.ru/vul/2025-12208" type="self" id="BDU:2025-12208" title="BDU:2025-12208" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0008</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58083-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58083-7.3/" type="self" id="ROS-20260121-73-0008" title="ROS-20260121-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58083" type="cve" id="CVE-2024-58083" title="CVE-2024-58083" />
			<reference href="https://bdu.fstec.ru/vul/2025-12082" type="self" id="BDU:2025-12082" title="BDU:2025-12082" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0009</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58085-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58085-7.3/" type="self" id="ROS-20260121-73-0009" title="ROS-20260121-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58085" type="cve" id="CVE-2024-58085" title="CVE-2024-58085" />
			<reference href="https://bdu.fstec.ru/vul/2025-12296" type="self" id="BDU:2025-12296" title="BDU:2025-12296" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0010</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21829-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21829-7.3/" type="self" id="ROS-20260121-73-0010" title="ROS-20260121-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21829" type="cve" id="CVE-2025-21829" title="CVE-2025-21829" />
			<reference href="https://bdu.fstec.ru/vul/2025-12318" type="self" id="BDU:2025-12318" title="BDU:2025-12318" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0011</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21830-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21830-7.3/" type="self" id="ROS-20260121-73-0011" title="ROS-20260121-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21830" type="cve" id="CVE-2025-21830" title="CVE-2025-21830" />
			<reference href="https://bdu.fstec.ru/vul/2025-11942" type="self" id="BDU:2025-11942" title="BDU:2025-11942" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0012</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21832-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21832-7.3/" type="self" id="ROS-20260121-73-0012" title="ROS-20260121-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21832" type="cve" id="CVE-2025-21832" title="CVE-2025-21832" />
			<reference href="https://bdu.fstec.ru/vul/2025-11975" type="self" id="BDU:2025-11975" title="BDU:2025-11975" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0013</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21835-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21835-7.3/" type="self" id="ROS-20260121-73-0013" title="ROS-20260121-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21835" type="cve" id="CVE-2025-21835" title="CVE-2025-21835" />
			<reference href="https://bdu.fstec.ru/vul/2025-12332" type="self" id="BDU:2025-12332" title="BDU:2025-12332" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0014</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21838-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21838-7.3/" type="self" id="ROS-20260121-73-0014" title="ROS-20260121-73-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21838" type="cve" id="CVE-2025-21838" title="CVE-2025-21838" />
			<reference href="https://bdu.fstec.ru/vul/2025-12101" type="self" id="BDU:2025-12101" title="BDU:2025-12101" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0015</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21839-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21839-7.3/" type="self" id="ROS-20260121-73-0015" title="ROS-20260121-73-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21839" type="cve" id="CVE-2025-21839" title="CVE-2025-21839" />
			<reference href="https://bdu.fstec.ru/vul/2025-12248" type="self" id="BDU:2025-12248" title="BDU:2025-12248" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0016</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21844-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21844-7.3/" type="self" id="ROS-20260121-73-0016" title="ROS-20260121-73-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21844" type="cve" id="CVE-2025-21844" title="CVE-2025-21844" />
			<reference href="https://bdu.fstec.ru/vul/2025-12192" type="self" id="BDU:2025-12192" title="BDU:2025-12192" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0017</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21846-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21846-7.3/" type="self" id="ROS-20260121-73-0017" title="ROS-20260121-73-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21846" type="cve" id="CVE-2025-21846" title="CVE-2025-21846" />
			<reference href="https://bdu.fstec.ru/vul/2025-12191" type="self" id="BDU:2025-12191" title="BDU:2025-12191" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0018</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21848-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21848-7.3/" type="self" id="ROS-20260121-73-0018" title="ROS-20260121-73-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21848" type="cve" id="CVE-2025-21848" title="CVE-2025-21848" />
			<reference href="https://bdu.fstec.ru/vul/2025-12189" type="self" id="BDU:2025-12189" title="BDU:2025-12189" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0019</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21853-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21853-7.3/" type="self" id="ROS-20260121-73-0019" title="ROS-20260121-73-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21853" type="cve" id="CVE-2025-21853" title="CVE-2025-21853" />
			<reference href="https://bdu.fstec.ru/vul/2025-12347" type="self" id="BDU:2025-12347" title="BDU:2025-12347" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0020</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21855-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-21855-7.3/" type="self" id="ROS-20260121-73-0020" title="ROS-20260121-73-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21855" type="cve" id="CVE-2025-21855" title="CVE-2025-21855" />
			<reference href="https://bdu.fstec.ru/vul/2025-12079" type="self" id="BDU:2025-12079" title="BDU:2025-12079" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0021</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22005-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22005-7.3/" type="self" id="ROS-20260121-73-0021" title="ROS-20260121-73-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22005" type="cve" id="CVE-2025-22005" title="CVE-2025-22005" />
			<reference href="https://bdu.fstec.ru/vul/2025-11630" type="self" id="BDU:2025-11630" title="BDU:2025-11630" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0022</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22007-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22007-7.3/" type="self" id="ROS-20260121-73-0022" title="ROS-20260121-73-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22007" type="cve" id="CVE-2025-22007" title="CVE-2025-22007" />
			<reference href="https://bdu.fstec.ru/vul/2025-11632" type="self" id="BDU:2025-11632" title="BDU:2025-11632" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0023</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22018-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22018-7.3/" type="self" id="ROS-20260121-73-0023" title="ROS-20260121-73-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22018" type="cve" id="CVE-2025-22018" title="CVE-2025-22018" />
			<reference href="https://bdu.fstec.ru/vul/2025-12180" type="self" id="BDU:2025-12180" title="BDU:2025-12180" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0024</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22020-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22020-7.3/" type="self" id="ROS-20260121-73-0024" title="ROS-20260121-73-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22020" type="cve" id="CVE-2025-22020" title="CVE-2025-22020" />
			<reference href="https://bdu.fstec.ru/vul/2025-12077" type="self" id="BDU:2025-12077" title="BDU:2025-12077" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0025</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22021-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22021-7.3/" type="self" id="ROS-20260121-73-0025" title="ROS-20260121-73-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22021" type="cve" id="CVE-2025-22021" title="CVE-2025-22021" />
			<reference href="https://bdu.fstec.ru/vul/2025-11940" type="self" id="BDU:2025-11940" title="BDU:2025-11940" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0026</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53034-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53034-7.3/" type="self" id="ROS-20260121-73-0026" title="ROS-20260121-73-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53034" type="cve" id="CVE-2023-53034" title="CVE-2023-53034" />
			<reference href="https://bdu.fstec.ru/vul/2025-11886" type="self" id="BDU:2025-11886" title="BDU:2025-11886" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0027</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58093-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58093-7.3/" type="self" id="ROS-20260121-73-0027" title="ROS-20260121-73-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58093" type="cve" id="CVE-2024-58093" title="CVE-2024-58093" />
			<reference href="https://bdu.fstec.ru/vul/2026-01017" type="self" id="BDU:2026-01017" title="BDU:2026-01017" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0028</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22025-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22025-7.3/" type="self" id="ROS-20260121-73-0028" title="ROS-20260121-73-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22025" type="cve" id="CVE-2025-22025" title="CVE-2025-22025" />
			<reference href="https://bdu.fstec.ru/vul/2025-12371" type="self" id="BDU:2025-12371" title="BDU:2025-12371" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0029</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22027-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22027-7.3/" type="self" id="ROS-20260121-73-0029" title="ROS-20260121-73-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22027" type="cve" id="CVE-2025-22027" title="CVE-2025-22027" />
			<reference href="https://bdu.fstec.ru/vul/2025-11991" type="self" id="BDU:2025-11991" title="BDU:2025-11991" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0030</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22033-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22033-7.3/" type="self" id="ROS-20260121-73-0030" title="ROS-20260121-73-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22033" type="cve" id="CVE-2025-22033" title="CVE-2025-22033" />
			<reference href="https://bdu.fstec.ru/vul/2025-12178" type="self" id="BDU:2025-12178" title="BDU:2025-12178" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0031</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22035-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22035-7.3/" type="self" id="ROS-20260121-73-0031" title="ROS-20260121-73-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22035" type="cve" id="CVE-2025-22035" title="CVE-2025-22035" />
			<reference href="https://bdu.fstec.ru/vul/2025-12076" type="self" id="BDU:2025-12076" title="BDU:2025-12076" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0032</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22038-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22038-7.3/" type="self" id="ROS-20260121-73-0032" title="ROS-20260121-73-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22038" type="cve" id="CVE-2025-22038" title="CVE-2025-22038" />
			<reference href="https://bdu.fstec.ru/vul/2025-11873" type="self" id="BDU:2025-11873" title="BDU:2025-11873" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0033</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22040-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22040-7.3/" type="self" id="ROS-20260121-73-0033" title="ROS-20260121-73-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22040" type="cve" id="CVE-2025-22040" title="CVE-2025-22040" />
			<reference href="https://bdu.fstec.ru/vul/2025-12075" type="self" id="BDU:2025-12075" title="BDU:2025-12075" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0034</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22041-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22041-7.3/" type="self" id="ROS-20260121-73-0034" title="ROS-20260121-73-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22041" type="cve" id="CVE-2025-22041" title="CVE-2025-22041" />
			<reference href="https://bdu.fstec.ru/vul/2025-12096" type="self" id="BDU:2025-12096" title="BDU:2025-12096" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0035</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22042-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22042-7.3/" type="self" id="ROS-20260121-73-0035" title="ROS-20260121-73-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22042" type="cve" id="CVE-2025-22042" title="CVE-2025-22042" />
			<reference href="https://bdu.fstec.ru/vul/2025-11826" type="self" id="BDU:2025-11826" title="BDU:2025-11826" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0036</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22044-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22044-7.3/" type="self" id="ROS-20260121-73-0036" title="ROS-20260121-73-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22044" type="cve" id="CVE-2025-22044" title="CVE-2025-22044" />
			<reference href="https://bdu.fstec.ru/vul/2025-12276" type="self" id="BDU:2025-12276" title="BDU:2025-12276" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0037</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22045-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22045-7.3/" type="self" id="ROS-20260121-73-0037" title="ROS-20260121-73-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22045" type="cve" id="CVE-2025-22045" title="CVE-2025-22045" />
			<reference href="https://bdu.fstec.ru/vul/2025-12281" type="self" id="BDU:2025-12281" title="BDU:2025-12281" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0038</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22049-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22049-7.3/" type="self" id="ROS-20260121-73-0038" title="ROS-20260121-73-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22049" type="cve" id="CVE-2025-22049" title="CVE-2025-22049" />
			<reference href="https://bdu.fstec.ru/vul/2025-12300" type="self" id="BDU:2025-12300" title="BDU:2025-12300" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0039</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22050-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22050-7.3/" type="self" id="ROS-20260121-73-0039" title="ROS-20260121-73-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22050" type="cve" id="CVE-2025-22050" title="CVE-2025-22050" />
			<reference href="https://bdu.fstec.ru/vul/2025-12177" type="self" id="BDU:2025-12177" title="BDU:2025-12177" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0040</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22054-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22054-7.3/" type="self" id="ROS-20260121-73-0040" title="ROS-20260121-73-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22054" type="cve" id="CVE-2025-22054" title="CVE-2025-22054" />
			<reference href="https://bdu.fstec.ru/vul/2025-12114" type="self" id="BDU:2025-12114" title="BDU:2025-12114" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0041</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22055-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22055-7.3/" type="self" id="ROS-20260121-73-0041" title="ROS-20260121-73-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22055" type="cve" id="CVE-2025-22055" title="CVE-2025-22055" />
			<reference href="https://bdu.fstec.ru/vul/2025-11892" type="self" id="BDU:2025-11892" title="BDU:2025-11892" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0042</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22056-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22056-7.3/" type="self" id="ROS-20260121-73-0042" title="ROS-20260121-73-0042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22056" type="cve" id="CVE-2025-22056" title="CVE-2025-22056" />
			<reference href="https://bdu.fstec.ru/vul/2025-08099" type="self" id="BDU:2025-08099" title="BDU:2025-08099" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0043</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22058-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22058-7.3/" type="self" id="ROS-20260121-73-0043" title="ROS-20260121-73-0043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22058" type="cve" id="CVE-2025-22058" title="CVE-2025-22058" />
			<reference href="https://bdu.fstec.ru/vul/2025-11911" type="self" id="BDU:2025-11911" title="BDU:2025-11911" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0044</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22060-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22060-7.3/" type="self" id="ROS-20260121-73-0044" title="ROS-20260121-73-0044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22060" type="cve" id="CVE-2025-22060" title="CVE-2025-22060" />
			<reference href="https://bdu.fstec.ru/vul/2025-11827" type="self" id="BDU:2025-11827" title="BDU:2025-11827" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0045</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22062-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22062-7.3/" type="self" id="ROS-20260121-73-0045" title="ROS-20260121-73-0045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22062" type="cve" id="CVE-2025-22062" title="CVE-2025-22062" />
			<reference href="https://bdu.fstec.ru/vul/2025-12176" type="self" id="BDU:2025-12176" title="BDU:2025-12176" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0046</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22063-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22063-7.3/" type="self" id="ROS-20260121-73-0046" title="ROS-20260121-73-0046" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22063" type="cve" id="CVE-2025-22063" title="CVE-2025-22063" />
			<reference href="https://bdu.fstec.ru/vul/2025-12175" type="self" id="BDU:2025-12175" title="BDU:2025-12175" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0047</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22066-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22066-7.3/" type="self" id="ROS-20260121-73-0047" title="ROS-20260121-73-0047" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22066" type="cve" id="CVE-2025-22066" title="CVE-2025-22066" />
			<reference href="https://bdu.fstec.ru/vul/2025-12173" type="self" id="BDU:2025-12173" title="BDU:2025-12173" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0048</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22071-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22071-7.3/" type="self" id="ROS-20260121-73-0048" title="ROS-20260121-73-0048" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22071" type="cve" id="CVE-2025-22071" title="CVE-2025-22071" />
			<reference href="https://bdu.fstec.ru/vul/2025-12040" type="self" id="BDU:2025-12040" title="BDU:2025-12040" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0049</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22072-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22072-7.3/" type="self" id="ROS-20260121-73-0049" title="ROS-20260121-73-0049" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22072" type="cve" id="CVE-2025-22072" title="CVE-2025-22072" />
			<reference href="https://bdu.fstec.ru/vul/2025-12039" type="self" id="BDU:2025-12039" title="BDU:2025-12039" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0050</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22073-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22073-7.3/" type="self" id="ROS-20260121-73-0050" title="ROS-20260121-73-0050" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22073" type="cve" id="CVE-2025-22073" title="CVE-2025-22073" />
			<reference href="https://bdu.fstec.ru/vul/2025-12038" type="self" id="BDU:2025-12038" title="BDU:2025-12038" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0051</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22074-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22074-7.3/" type="self" id="ROS-20260121-73-0051" title="ROS-20260121-73-0051" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22074" type="cve" id="CVE-2025-22074" title="CVE-2025-22074" />
			<reference href="https://bdu.fstec.ru/vul/2025-11801" type="self" id="BDU:2025-11801" title="BDU:2025-11801" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0052</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22075-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22075-7.3/" type="self" id="ROS-20260121-73-0052" title="ROS-20260121-73-0052" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22075" type="cve" id="CVE-2025-22075" title="CVE-2025-22075" />
			<reference href="https://bdu.fstec.ru/vul/2025-11901" type="self" id="BDU:2025-11901" title="BDU:2025-11901" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0053</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23136-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23136-7.3/" type="self" id="ROS-20260121-73-0053" title="ROS-20260121-73-0053" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23136" type="cve" id="CVE-2025-23136" title="CVE-2025-23136" />
			<reference href="https://bdu.fstec.ru/vul/2025-12167" type="self" id="BDU:2025-12167" title="BDU:2025-12167" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-73-0054</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22126-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22126-7.3/" type="self" id="ROS-20260121-73-0054" title="ROS-20260121-73-0054" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22126" type="cve" id="CVE-2025-22126" title="CVE-2025-22126" />
			<reference href="https://bdu.fstec.ru/vul/2025-12105" type="self" id="BDU:2025-12105" title="BDU:2025-12105" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-73-0001</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость python-sentry-sdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-sentry-sdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-sentry-sdk-cve-2024-40647-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-sentry-sdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-sentry-sdk-cve-2024-40647-7.3/" type="self" id="ROS-20260122-73-0001" title="ROS-20260122-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40647" type="cve" id="CVE-2024-40647" title="CVE-2024-40647" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-sentry-sdk" epoch="0" version="2.47.0" release="1.el7" arch="x86_64" src="python-sentry-sdk-2.47.0-1.el7.src.rpm">
					<filename>python3-sentry-sdk-0:2.47.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+aiohttp" epoch="0" version="2.47.0" release="1.el7" arch="x86_64" src="python-sentry-sdk-2.47.0-1.el7.src.rpm">
					<filename>python3-sentry-sdk+aiohttp-0:2.47.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+bottle" epoch="0" version="2.47.0" release="1.el7" arch="x86_64" src="python-sentry-sdk-2.47.0-1.el7.src.rpm">
					<filename>python3-sentry-sdk+bottle-0:2.47.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+celery" epoch="0" version="2.47.0" release="1.el7" arch="x86_64" src="python-sentry-sdk-2.47.0-1.el7.src.rpm">
					<filename>python3-sentry-sdk+celery-0:2.47.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+django" epoch="0" version="2.47.0" release="1.el7" arch="x86_64" src="python-sentry-sdk-2.47.0-1.el7.src.rpm">
					<filename>python3-sentry-sdk+django-0:2.47.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+fastapi" epoch="0" version="2.47.0" release="1.el7" arch="x86_64" src="python-sentry-sdk-2.47.0-1.el7.src.rpm">
					<filename>python3-sentry-sdk+fastapi-0:2.47.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+flask" epoch="0" version="2.47.0" release="1.el7" arch="x86_64" src="python-sentry-sdk-2.47.0-1.el7.src.rpm">
					<filename>python3-sentry-sdk+flask-0:2.47.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+httpx" epoch="0" version="2.47.0" release="1.el7" arch="x86_64" src="python-sentry-sdk-2.47.0-1.el7.src.rpm">
					<filename>python3-sentry-sdk+httpx-0:2.47.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+pymongo" epoch="0" version="2.47.0" release="1.el7" arch="x86_64" src="python-sentry-sdk-2.47.0-1.el7.src.rpm">
					<filename>python3-sentry-sdk+pymongo-0:2.47.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+sqlalchemy" epoch="0" version="2.47.0" release="1.el7" arch="x86_64" src="python-sentry-sdk-2.47.0-1.el7.src.rpm">
					<filename>python3-sentry-sdk+sqlalchemy-0:2.47.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+starlette" epoch="0" version="2.47.0" release="1.el7" arch="x86_64" src="python-sentry-sdk-2.47.0-1.el7.src.rpm">
					<filename>python3-sentry-sdk+starlette-0:2.47.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+tornado" epoch="0" version="2.47.0" release="1.el7" arch="x86_64" src="python-sentry-sdk-2.47.0-1.el7.src.rpm">
					<filename>python3-sentry-sdk+tornado-0:2.47.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-73-0002</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость openstack-ironic-python-agent </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openstack-ironic-python-agent</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openstack-ironic-python-agent-cve-2024-44082-7.3/</description>
               <solution>Установить обновление для пакета(ов) openstack-ironic-python-agent
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openstack-ironic-python-agent-cve-2024-44082-7.3/" type="self" id="ROS-20260122-73-0002" title="ROS-20260122-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44082" type="cve" id="CVE-2024-44082" title="CVE-2024-44082" />
			<reference href="https://bdu.fstec.ru/vul/2026-01022" type="self" id="BDU:2026-01022" title="BDU:2026-01022" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openstack-ironic-python-agent" epoch="0" version="9.14.0" release="1.el7" arch="noarch" src="openstack-ironic-python-agent-9.14.0-1.el7.src.rpm">
					<filename>openstack-ironic-python-agent-0:9.14.0-1.el7.noarch.rpm</filename>
				</package>
				<package name="python-ironic-python-agent-doc" epoch="0" version="9.14.0" release="1.el7" arch="noarch" src="openstack-ironic-python-agent-9.14.0-1.el7.src.rpm">
					<filename>python-ironic-python-agent-doc-0:9.14.0-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-ironic-python-agent" epoch="0" version="9.14.0" release="1.el7" arch="noarch" src="openstack-ironic-python-agent-9.14.0-1.el7.src.rpm">
					<filename>python3-ironic-python-agent-0:9.14.0-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-ironic-python-agent-tests" epoch="0" version="9.14.0" release="1.el7" arch="noarch" src="openstack-ironic-python-agent-9.14.0-1.el7.src.rpm">
					<filename>python3-ironic-python-agent-tests-0:9.14.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-73-0003</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость python-pint </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-pint</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pint-cve-2024-44082-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-pint
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pint-cve-2024-44082-7.3/" type="self" id="ROS-20260122-73-0003" title="ROS-20260122-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44082" type="cve" id="CVE-2024-44082" title="CVE-2024-44082" />
			<reference href="https://bdu.fstec.ru/vul/2026-01022" type="self" id="BDU:2026-01022" title="BDU:2026-01022" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-pint" epoch="0" version="0.16.1" release="1.el7" arch="noarch" src="python-pint-0.16.1-1.el7.src.rpm">
					<filename>python3-pint-0:0.16.1-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-pint-doc" epoch="0" version="0.16.1" release="1.el7" arch="noarch" src="python-pint-0.16.1-1.el7.src.rpm">
					<filename>python3-pint-doc-0:0.16.1-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-73-0004</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость python-sentry-sdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-sentry-sdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-sentry-sdk-cve-2024-53253-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-sentry-sdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-sentry-sdk-cve-2024-53253-7.3/" type="self" id="ROS-20260122-73-0004" title="ROS-20260122-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53253" type="cve" id="CVE-2024-53253" title="CVE-2024-53253" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-sentry-sdk" epoch="0" version="2.47.0" release="1.el7" arch="x86_64" src="python-sentry-sdk-2.47.0-1.el7.src.rpm">
					<filename>python3-sentry-sdk-0:2.47.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+aiohttp" epoch="0" version="2.47.0" release="1.el7" arch="x86_64" src="python-sentry-sdk-2.47.0-1.el7.src.rpm">
					<filename>python3-sentry-sdk+aiohttp-0:2.47.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+bottle" epoch="0" version="2.47.0" release="1.el7" arch="x86_64" src="python-sentry-sdk-2.47.0-1.el7.src.rpm">
					<filename>python3-sentry-sdk+bottle-0:2.47.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+celery" epoch="0" version="2.47.0" release="1.el7" arch="x86_64" src="python-sentry-sdk-2.47.0-1.el7.src.rpm">
					<filename>python3-sentry-sdk+celery-0:2.47.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+django" epoch="0" version="2.47.0" release="1.el7" arch="x86_64" src="python-sentry-sdk-2.47.0-1.el7.src.rpm">
					<filename>python3-sentry-sdk+django-0:2.47.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+fastapi" epoch="0" version="2.47.0" release="1.el7" arch="x86_64" src="python-sentry-sdk-2.47.0-1.el7.src.rpm">
					<filename>python3-sentry-sdk+fastapi-0:2.47.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+flask" epoch="0" version="2.47.0" release="1.el7" arch="x86_64" src="python-sentry-sdk-2.47.0-1.el7.src.rpm">
					<filename>python3-sentry-sdk+flask-0:2.47.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+httpx" epoch="0" version="2.47.0" release="1.el7" arch="x86_64" src="python-sentry-sdk-2.47.0-1.el7.src.rpm">
					<filename>python3-sentry-sdk+httpx-0:2.47.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+pymongo" epoch="0" version="2.47.0" release="1.el7" arch="x86_64" src="python-sentry-sdk-2.47.0-1.el7.src.rpm">
					<filename>python3-sentry-sdk+pymongo-0:2.47.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+sqlalchemy" epoch="0" version="2.47.0" release="1.el7" arch="x86_64" src="python-sentry-sdk-2.47.0-1.el7.src.rpm">
					<filename>python3-sentry-sdk+sqlalchemy-0:2.47.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+starlette" epoch="0" version="2.47.0" release="1.el7" arch="x86_64" src="python-sentry-sdk-2.47.0-1.el7.src.rpm">
					<filename>python3-sentry-sdk+starlette-0:2.47.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+tornado" epoch="0" version="2.47.0" release="1.el7" arch="x86_64" src="python-sentry-sdk-2.47.0-1.el7.src.rpm">
					<filename>python3-sentry-sdk+tornado-0:2.47.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-73-0005</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость atop </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в atop</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-atop-cve-2025-31160-7.3/</description>
               <solution>Установить обновление для пакета(ов) atop
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-atop-cve-2025-31160-7.3/" type="self" id="ROS-20260122-73-0005" title="ROS-20260122-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31160" type="cve" id="CVE-2025-31160" title="CVE-2025-31160" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="atop" epoch="0" version="2.12.1" release="1.el7" arch="x86_64" src="atop-2.12.1-1.el7.src.rpm">
					<filename>atop-0:2.12.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-73-0006</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость python-sentry-sdk </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в python-sentry-sdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-sentry-sdk-cve-2025-53099-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-sentry-sdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-sentry-sdk-cve-2025-53099-7.3/" type="self" id="ROS-20260122-73-0006" title="ROS-20260122-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53099" type="cve" id="CVE-2025-53099" title="CVE-2025-53099" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-sentry-sdk" epoch="0" version="2.47.0" release="1.el7" arch="x86_64" src="python-sentry-sdk-2.47.0-1.el7.src.rpm">
					<filename>python3-sentry-sdk-0:2.47.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+aiohttp" epoch="0" version="2.47.0" release="1.el7" arch="x86_64" src="python-sentry-sdk-2.47.0-1.el7.src.rpm">
					<filename>python3-sentry-sdk+aiohttp-0:2.47.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+bottle" epoch="0" version="2.47.0" release="1.el7" arch="x86_64" src="python-sentry-sdk-2.47.0-1.el7.src.rpm">
					<filename>python3-sentry-sdk+bottle-0:2.47.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+celery" epoch="0" version="2.47.0" release="1.el7" arch="x86_64" src="python-sentry-sdk-2.47.0-1.el7.src.rpm">
					<filename>python3-sentry-sdk+celery-0:2.47.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+django" epoch="0" version="2.47.0" release="1.el7" arch="x86_64" src="python-sentry-sdk-2.47.0-1.el7.src.rpm">
					<filename>python3-sentry-sdk+django-0:2.47.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+fastapi" epoch="0" version="2.47.0" release="1.el7" arch="x86_64" src="python-sentry-sdk-2.47.0-1.el7.src.rpm">
					<filename>python3-sentry-sdk+fastapi-0:2.47.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+flask" epoch="0" version="2.47.0" release="1.el7" arch="x86_64" src="python-sentry-sdk-2.47.0-1.el7.src.rpm">
					<filename>python3-sentry-sdk+flask-0:2.47.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+httpx" epoch="0" version="2.47.0" release="1.el7" arch="x86_64" src="python-sentry-sdk-2.47.0-1.el7.src.rpm">
					<filename>python3-sentry-sdk+httpx-0:2.47.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+pymongo" epoch="0" version="2.47.0" release="1.el7" arch="x86_64" src="python-sentry-sdk-2.47.0-1.el7.src.rpm">
					<filename>python3-sentry-sdk+pymongo-0:2.47.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+sqlalchemy" epoch="0" version="2.47.0" release="1.el7" arch="x86_64" src="python-sentry-sdk-2.47.0-1.el7.src.rpm">
					<filename>python3-sentry-sdk+sqlalchemy-0:2.47.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+starlette" epoch="0" version="2.47.0" release="1.el7" arch="x86_64" src="python-sentry-sdk-2.47.0-1.el7.src.rpm">
					<filename>python3-sentry-sdk+starlette-0:2.47.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+tornado" epoch="0" version="2.47.0" release="1.el7" arch="x86_64" src="python-sentry-sdk-2.47.0-1.el7.src.rpm">
					<filename>python3-sentry-sdk+tornado-0:2.47.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-73-0007</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость python-authlib </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-authlib</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-authlib-cve-2025-61920-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-authlib
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-authlib-cve-2025-61920-7.3/" type="self" id="ROS-20260122-73-0007" title="ROS-20260122-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61920" type="cve" id="CVE-2025-61920" title="CVE-2025-61920" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-authlib" epoch="0" version="1.3.2" release="2.el7" arch="noarch" src="python-authlib-1.3.2-2.el7.src.rpm">
					<filename>python3-authlib-0:1.3.2-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-73-0008</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость strongswan </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в strongswan</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-strongswan-cve-2025-62291-7.3/</description>
               <solution>Установить обновление для пакета(ов) strongswan
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-strongswan-cve-2025-62291-7.3/" type="self" id="ROS-20260122-73-0008" title="ROS-20260122-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62291" type="cve" id="CVE-2025-62291" title="CVE-2025-62291" />
			<reference href="https://bdu.fstec.ru/vul/2026-02400" type="self" id="BDU:2026-02400" title="BDU:2026-02400" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="strongswan" epoch="0" version="5.9.10" release="4.el7" arch="x86_64" src="strongswan-5.9.10-4.el7.src.rpm">
					<filename>strongswan-0:5.9.10-4.el7.x86_64.rpm</filename>
				</package>
				<package name="strongswan-charon-nm" epoch="0" version="5.9.10" release="4.el7" arch="x86_64" src="strongswan-5.9.10-4.el7.src.rpm">
					<filename>strongswan-charon-nm-0:5.9.10-4.el7.x86_64.rpm</filename>
				</package>
				<package name="strongswan-libipsec" epoch="0" version="5.9.10" release="4.el7" arch="x86_64" src="strongswan-5.9.10-4.el7.src.rpm">
					<filename>strongswan-libipsec-0:5.9.10-4.el7.x86_64.rpm</filename>
				</package>
				<package name="strongswan-sqlite" epoch="0" version="5.9.10" release="4.el7" arch="x86_64" src="strongswan-5.9.10-4.el7.src.rpm">
					<filename>strongswan-sqlite-0:5.9.10-4.el7.x86_64.rpm</filename>
				</package>
				<package name="strongswan-tnc-imcvs" epoch="0" version="5.9.10" release="4.el7" arch="x86_64" src="strongswan-5.9.10-4.el7.src.rpm">
					<filename>strongswan-tnc-imcvs-0:5.9.10-4.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-vici" epoch="0" version="5.9.10" release="4.el7" arch="noarch" src="strongswan-5.9.10-4.el7.src.rpm">
					<filename>perl-vici-0:5.9.10-4.el7.noarch.rpm</filename>
				</package>
				<package name="python3-vici" epoch="0" version="5.9.10" release="4.el7" arch="noarch" src="strongswan-5.9.10-4.el7.src.rpm">
					<filename>python3-vici-0:5.9.10-4.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-73-0009</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость ceph </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ceph</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ceph-cve-2024-47866-7.3/</description>
               <solution>Установить обновление для пакета(ов) ceph
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ceph-cve-2024-47866-7.3/" type="self" id="ROS-20260122-73-0009" title="ROS-20260122-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47866" type="cve" id="CVE-2024-47866" title="CVE-2024-47866" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ceph" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>ceph-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="ceph-base" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>ceph-base-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="ceph-common" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>ceph-common-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="ceph-exporter" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>ceph-exporter-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="ceph-fuse" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>ceph-fuse-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="ceph-immutable-object-cache" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>ceph-immutable-object-cache-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="ceph-mds" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>ceph-mds-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="ceph-mgr" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>ceph-mgr-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="ceph-mon" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>ceph-mon-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="ceph-osd" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>ceph-osd-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="ceph-radosgw" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>ceph-radosgw-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="ceph-selinux" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>ceph-selinux-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="ceph-test" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>ceph-test-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="cephfs-java" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>cephfs-java-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="cephfs-mirror" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>cephfs-mirror-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="cephfs-shell" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>cephfs-shell-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="libcephfs-devel" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>libcephfs-devel-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="libcephfs2" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>libcephfs2-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="libcephfs_jni-devel" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>libcephfs_jni-devel-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="libcephfs_jni1" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>libcephfs_jni1-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="libcephsqlite" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>libcephsqlite-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="libcephsqlite-devel" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>libcephsqlite-devel-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="librados-devel" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>librados-devel-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="librados2" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>librados2-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="libradospp-devel" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>libradospp-devel-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="libradosstriper-devel" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>libradosstriper-devel-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="libradosstriper1" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>libradosstriper1-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="librbd-devel" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>librbd-devel-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="librbd1" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>librbd1-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="librgw-devel" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>librgw-devel-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="librgw2" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>librgw2-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-ceph-argparse" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>python3-ceph-argparse-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-ceph-common" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>python3-ceph-common-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-cephfs" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>python3-cephfs-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-rados" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>python3-rados-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-rbd" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>python3-rbd-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-rgw" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>python3-rgw-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="rados-objclass-devel" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>rados-objclass-devel-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="rbd-fuse" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>rbd-fuse-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="rbd-mirror" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>rbd-mirror-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="rbd-nbd" epoch="2" version="17.2.7" release="4.el7.3" arch="x86_64" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>rbd-nbd-2:17.2.7-4.el7.3.x86_64.rpm</filename>
				</package>
				<package name="ceph-grafana-dashboards" epoch="2" version="17.2.7" release="4.el7.3" arch="noarch" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>ceph-grafana-dashboards-2:17.2.7-4.el7.3.noarch.rpm</filename>
				</package>
				<package name="ceph-mgr-cephadm" epoch="2" version="17.2.7" release="4.el7.3" arch="noarch" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>ceph-mgr-cephadm-2:17.2.7-4.el7.3.noarch.rpm</filename>
				</package>
				<package name="ceph-mgr-dashboard" epoch="2" version="17.2.7" release="4.el7.3" arch="noarch" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>ceph-mgr-dashboard-2:17.2.7-4.el7.3.noarch.rpm</filename>
				</package>
				<package name="ceph-mgr-diskprediction-local" epoch="2" version="17.2.7" release="4.el7.3" arch="noarch" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>ceph-mgr-diskprediction-local-2:17.2.7-4.el7.3.noarch.rpm</filename>
				</package>
				<package name="ceph-mgr-k8sevents" epoch="2" version="17.2.7" release="4.el7.3" arch="noarch" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>ceph-mgr-k8sevents-2:17.2.7-4.el7.3.noarch.rpm</filename>
				</package>
				<package name="ceph-mgr-modules-core" epoch="2" version="17.2.7" release="4.el7.3" arch="noarch" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>ceph-mgr-modules-core-2:17.2.7-4.el7.3.noarch.rpm</filename>
				</package>
				<package name="ceph-mgr-rook" epoch="2" version="17.2.7" release="4.el7.3" arch="noarch" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>ceph-mgr-rook-2:17.2.7-4.el7.3.noarch.rpm</filename>
				</package>
				<package name="ceph-prometheus-alerts" epoch="2" version="17.2.7" release="4.el7.3" arch="noarch" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>ceph-prometheus-alerts-2:17.2.7-4.el7.3.noarch.rpm</filename>
				</package>
				<package name="ceph-resource-agents" epoch="2" version="17.2.7" release="4.el7.3" arch="noarch" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>ceph-resource-agents-2:17.2.7-4.el7.3.noarch.rpm</filename>
				</package>
				<package name="ceph-volume" epoch="2" version="17.2.7" release="4.el7.3" arch="noarch" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>ceph-volume-2:17.2.7-4.el7.3.noarch.rpm</filename>
				</package>
				<package name="cephadm" epoch="2" version="17.2.7" release="4.el7.3" arch="noarch" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>cephadm-2:17.2.7-4.el7.3.noarch.rpm</filename>
				</package>
				<package name="cephfs-top" epoch="2" version="17.2.7" release="4.el7.3" arch="noarch" src="ceph-17.2.7-4.el7.3.src.rpm">
					<filename>cephfs-top-2:17.2.7-4.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-73-0010</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость python-django </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-django</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-django-cve-2025-64460-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-django
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-django-cve-2025-64460-7.3/" type="self" id="ROS-20260122-73-0010" title="ROS-20260122-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64460" type="cve" id="CVE-2025-64460" title="CVE-2025-64460" />
			<reference href="https://bdu.fstec.ru/vul/2026-01121" type="self" id="BDU:2026-01121" title="BDU:2026-01121" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python-django-bash-completion" epoch="0" version="4.2.27" release="1.el7" arch="noarch" src="python-django-4.2.27-1.el7.src.rpm">
					<filename>python-django-bash-completion-0:4.2.27-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-django" epoch="0" version="4.2.27" release="1.el7" arch="noarch" src="python-django-4.2.27-1.el7.src.rpm">
					<filename>python3-django-0:4.2.27-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-django-doc" epoch="0" version="4.2.27" release="1.el7" arch="noarch" src="python-django-4.2.27-1.el7.src.rpm">
					<filename>python3-django-doc-0:4.2.27-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-73-0011</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13630-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13630-7.3/" type="self" id="ROS-20260122-73-0011" title="ROS-20260122-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13630" type="cve" id="CVE-2025-13630" title="CVE-2025-13630" />
			<reference href="https://bdu.fstec.ru/vul/2025-15242" type="self" id="BDU:2025-15242" title="BDU:2025-15242" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-73-0012</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13631-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13631-7.3/" type="self" id="ROS-20260122-73-0012" title="ROS-20260122-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13631" type="cve" id="CVE-2025-13631" title="CVE-2025-13631" />
			<reference href="https://bdu.fstec.ru/vul/2025-15243" type="self" id="BDU:2025-15243" title="BDU:2025-15243" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-73-0013</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13632-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13632-7.3/" type="self" id="ROS-20260122-73-0013" title="ROS-20260122-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13632" type="cve" id="CVE-2025-13632" title="CVE-2025-13632" />
			<reference href="https://bdu.fstec.ru/vul/2025-15241" type="self" id="BDU:2025-15241" title="BDU:2025-15241" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-73-0014</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13633-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13633-7.3/" type="self" id="ROS-20260122-73-0014" title="ROS-20260122-73-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13633" type="cve" id="CVE-2025-13633" title="CVE-2025-13633" />
			<reference href="https://bdu.fstec.ru/vul/2025-15244" type="self" id="BDU:2025-15244" title="BDU:2025-15244" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-73-0015</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13634-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13634-7.3/" type="self" id="ROS-20260122-73-0015" title="ROS-20260122-73-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13634" type="cve" id="CVE-2025-13634" title="CVE-2025-13634" />
			<reference href="https://bdu.fstec.ru/vul/2025-15245" type="self" id="BDU:2025-15245" title="BDU:2025-15245" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-73-0016</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13635-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13635-7.3/" type="self" id="ROS-20260122-73-0016" title="ROS-20260122-73-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13635" type="cve" id="CVE-2025-13635" title="CVE-2025-13635" />
			<reference href="https://bdu.fstec.ru/vul/2025-15246" type="self" id="BDU:2025-15246" title="BDU:2025-15246" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-73-0017</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13636-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13636-7.3/" type="self" id="ROS-20260122-73-0017" title="ROS-20260122-73-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13636" type="cve" id="CVE-2025-13636" title="CVE-2025-13636" />
			<reference href="https://bdu.fstec.ru/vul/2025-15247" type="self" id="BDU:2025-15247" title="BDU:2025-15247" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-73-0018</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13637-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13637-7.3/" type="self" id="ROS-20260122-73-0018" title="ROS-20260122-73-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13637" type="cve" id="CVE-2025-13637" title="CVE-2025-13637" />
			<reference href="https://bdu.fstec.ru/vul/2025-15249" type="self" id="BDU:2025-15249" title="BDU:2025-15249" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-73-0019</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13638-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13638-7.3/" type="self" id="ROS-20260122-73-0019" title="ROS-20260122-73-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13638" type="cve" id="CVE-2025-13638" title="CVE-2025-13638" />
			<reference href="https://bdu.fstec.ru/vul/2025-15250" type="self" id="BDU:2025-15250" title="BDU:2025-15250" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-73-0020</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13639-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13639-7.3/" type="self" id="ROS-20260122-73-0020" title="ROS-20260122-73-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13639" type="cve" id="CVE-2025-13639" title="CVE-2025-13639" />
			<reference href="https://bdu.fstec.ru/vul/2025-15251" type="self" id="BDU:2025-15251" title="BDU:2025-15251" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-73-0021</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13720-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13720-7.3/" type="self" id="ROS-20260122-73-0021" title="ROS-20260122-73-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13720" type="cve" id="CVE-2025-13720" title="CVE-2025-13720" />
			<reference href="https://bdu.fstec.ru/vul/2025-15254" type="self" id="BDU:2025-15254" title="BDU:2025-15254" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-73-0022</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13721-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13721-7.3/" type="self" id="ROS-20260122-73-0022" title="ROS-20260122-73-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13721" type="cve" id="CVE-2025-13721" title="CVE-2025-13721" />
			<reference href="https://bdu.fstec.ru/vul/2025-15255" type="self" id="BDU:2025-15255" title="BDU:2025-15255" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-73-0023</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13640-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-13640-7.3/" type="self" id="ROS-20260122-73-0023" title="ROS-20260122-73-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13640" type="cve" id="CVE-2025-13640" title="CVE-2025-13640" />
			<reference href="https://bdu.fstec.ru/vul/2025-15253" type="self" id="BDU:2025-15253" title="BDU:2025-15253" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-73-0024</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость httpd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в httpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-httpd-cve-2025-55753-7.3/</description>
               <solution>Установить обновление для пакета(ов) httpd
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-httpd-cve-2025-55753-7.3/" type="self" id="ROS-20260122-73-0024" title="ROS-20260122-73-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55753" type="cve" id="CVE-2025-55753" title="CVE-2025-55753" />
			<reference href="https://bdu.fstec.ru/vul/2025-15636" type="self" id="BDU:2025-15636" title="BDU:2025-15636" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="httpd" epoch="0" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>httpd-0:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="httpd-core" epoch="0" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>httpd-core-0:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="httpd-devel" epoch="0" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>httpd-devel-0:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="httpd-tools" epoch="0" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>httpd-tools-0:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="mod_ldap" epoch="0" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>mod_ldap-0:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="mod_lua" epoch="0" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>mod_lua-0:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="mod_proxy_html" epoch="1" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>mod_proxy_html-1:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="mod_session" epoch="0" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>mod_session-0:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="mod_ssl" epoch="1" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>mod_ssl-1:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="httpd-filesystem" epoch="0" version="2.4.66" release="6.el7" arch="noarch" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>httpd-filesystem-0:2.4.66-6.el7.noarch.rpm</filename>
				</package>
				<package name="httpd-manual" epoch="0" version="2.4.66" release="6.el7" arch="noarch" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>httpd-manual-0:2.4.66-6.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-73-0025</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость httpd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в httpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-httpd-cve-2025-58098-7.3/</description>
               <solution>Установить обновление для пакета(ов) httpd
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-httpd-cve-2025-58098-7.3/" type="self" id="ROS-20260122-73-0025" title="ROS-20260122-73-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58098" type="cve" id="CVE-2025-58098" title="CVE-2025-58098" />
			<reference href="https://bdu.fstec.ru/vul/2025-15635" type="self" id="BDU:2025-15635" title="BDU:2025-15635" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="httpd" epoch="0" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>httpd-0:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="httpd-core" epoch="0" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>httpd-core-0:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="httpd-devel" epoch="0" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>httpd-devel-0:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="httpd-tools" epoch="0" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>httpd-tools-0:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="mod_ldap" epoch="0" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>mod_ldap-0:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="mod_lua" epoch="0" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>mod_lua-0:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="mod_proxy_html" epoch="1" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>mod_proxy_html-1:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="mod_session" epoch="0" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>mod_session-0:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="mod_ssl" epoch="1" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>mod_ssl-1:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="httpd-filesystem" epoch="0" version="2.4.66" release="6.el7" arch="noarch" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>httpd-filesystem-0:2.4.66-6.el7.noarch.rpm</filename>
				</package>
				<package name="httpd-manual" epoch="0" version="2.4.66" release="6.el7" arch="noarch" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>httpd-manual-0:2.4.66-6.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-73-0026</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость httpd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в httpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-httpd-cve-2025-59775-7.3/</description>
               <solution>Установить обновление для пакета(ов) httpd
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-httpd-cve-2025-59775-7.3/" type="self" id="ROS-20260122-73-0026" title="ROS-20260122-73-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59775" type="cve" id="CVE-2025-59775" title="CVE-2025-59775" />
			<reference href="https://bdu.fstec.ru/vul/2025-15293" type="self" id="BDU:2025-15293" title="BDU:2025-15293" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="httpd" epoch="0" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>httpd-0:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="httpd-core" epoch="0" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>httpd-core-0:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="httpd-devel" epoch="0" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>httpd-devel-0:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="httpd-tools" epoch="0" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>httpd-tools-0:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="mod_ldap" epoch="0" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>mod_ldap-0:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="mod_lua" epoch="0" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>mod_lua-0:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="mod_proxy_html" epoch="1" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>mod_proxy_html-1:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="mod_session" epoch="0" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>mod_session-0:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="mod_ssl" epoch="1" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>mod_ssl-1:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="httpd-filesystem" epoch="0" version="2.4.66" release="6.el7" arch="noarch" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>httpd-filesystem-0:2.4.66-6.el7.noarch.rpm</filename>
				</package>
				<package name="httpd-manual" epoch="0" version="2.4.66" release="6.el7" arch="noarch" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>httpd-manual-0:2.4.66-6.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-73-0027</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость httpd </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в httpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-httpd-cve-2025-65082-7.3/</description>
               <solution>Установить обновление для пакета(ов) httpd
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-httpd-cve-2025-65082-7.3/" type="self" id="ROS-20260122-73-0027" title="ROS-20260122-73-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65082" type="cve" id="CVE-2025-65082" title="CVE-2025-65082" />
			<reference href="https://bdu.fstec.ru/vul/2025-15637" type="self" id="BDU:2025-15637" title="BDU:2025-15637" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="httpd" epoch="0" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>httpd-0:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="httpd-core" epoch="0" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>httpd-core-0:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="httpd-devel" epoch="0" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>httpd-devel-0:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="httpd-tools" epoch="0" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>httpd-tools-0:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="mod_ldap" epoch="0" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>mod_ldap-0:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="mod_lua" epoch="0" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>mod_lua-0:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="mod_proxy_html" epoch="1" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>mod_proxy_html-1:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="mod_session" epoch="0" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>mod_session-0:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="mod_ssl" epoch="1" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>mod_ssl-1:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="httpd-filesystem" epoch="0" version="2.4.66" release="6.el7" arch="noarch" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>httpd-filesystem-0:2.4.66-6.el7.noarch.rpm</filename>
				</package>
				<package name="httpd-manual" epoch="0" version="2.4.66" release="6.el7" arch="noarch" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>httpd-manual-0:2.4.66-6.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-73-0028</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость httpd </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в httpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-httpd-cve-2025-66200-7.3/</description>
               <solution>Установить обновление для пакета(ов) httpd
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-httpd-cve-2025-66200-7.3/" type="self" id="ROS-20260122-73-0028" title="ROS-20260122-73-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66200" type="cve" id="CVE-2025-66200" title="CVE-2025-66200" />
			<reference href="https://bdu.fstec.ru/vul/2025-15638" type="self" id="BDU:2025-15638" title="BDU:2025-15638" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="httpd" epoch="0" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>httpd-0:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="httpd-core" epoch="0" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>httpd-core-0:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="httpd-devel" epoch="0" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>httpd-devel-0:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="httpd-tools" epoch="0" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>httpd-tools-0:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="mod_ldap" epoch="0" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>mod_ldap-0:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="mod_lua" epoch="0" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>mod_lua-0:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="mod_proxy_html" epoch="1" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>mod_proxy_html-1:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="mod_session" epoch="0" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>mod_session-0:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="mod_ssl" epoch="1" version="2.4.66" release="6.el7" arch="x86_64" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>mod_ssl-1:2.4.66-6.el7.x86_64.rpm</filename>
				</package>
				<package name="httpd-filesystem" epoch="0" version="2.4.66" release="6.el7" arch="noarch" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>httpd-filesystem-0:2.4.66-6.el7.noarch.rpm</filename>
				</package>
				<package name="httpd-manual" epoch="0" version="2.4.66" release="6.el7" arch="noarch" src="httpd-2.4.66-6.el7.src.rpm">
					<filename>httpd-manual-0:2.4.66-6.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-73-0029</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость brotli </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в brotli</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-brotli-cve-2025-66418-7.3/</description>
               <solution>Установить обновление для пакета(ов) brotli
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-brotli-cve-2025-66418-7.3/" type="self" id="ROS-20260122-73-0029" title="ROS-20260122-73-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66418" type="cve" id="CVE-2025-66418" title="CVE-2025-66418" />
			<reference href="https://bdu.fstec.ru/vul/2026-02927" type="self" id="BDU:2026-02927" title="BDU:2026-02927" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="brotli" epoch="0" version="1.2.0" release="1.el7" arch="x86_64" src="brotli-1.2.0-1.el7.src.rpm">
					<filename>brotli-0:1.2.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="brotli-devel" epoch="0" version="1.2.0" release="1.el7" arch="x86_64" src="brotli-1.2.0-1.el7.src.rpm">
					<filename>brotli-devel-0:1.2.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libbrotli" epoch="0" version="1.2.0" release="1.el7" arch="x86_64" src="brotli-1.2.0-1.el7.src.rpm">
					<filename>libbrotli-0:1.2.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-brotli" epoch="0" version="1.2.0" release="1.el7" arch="x86_64" src="brotli-1.2.0-1.el7.src.rpm">
					<filename>python3-brotli-0:1.2.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-73-0030</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость brotli </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в brotli</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-brotli-cve-2025-66471-7.3/</description>
               <solution>Установить обновление для пакета(ов) brotli
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-brotli-cve-2025-66471-7.3/" type="self" id="ROS-20260122-73-0030" title="ROS-20260122-73-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66471" type="cve" id="CVE-2025-66471" title="CVE-2025-66471" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="brotli" epoch="0" version="1.2.0" release="1.el7" arch="x86_64" src="brotli-1.2.0-1.el7.src.rpm">
					<filename>brotli-0:1.2.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="brotli-devel" epoch="0" version="1.2.0" release="1.el7" arch="x86_64" src="brotli-1.2.0-1.el7.src.rpm">
					<filename>brotli-devel-0:1.2.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libbrotli" epoch="0" version="1.2.0" release="1.el7" arch="x86_64" src="brotli-1.2.0-1.el7.src.rpm">
					<filename>libbrotli-0:1.2.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-brotli" epoch="0" version="1.2.0" release="1.el7" arch="x86_64" src="brotli-1.2.0-1.el7.src.rpm">
					<filename>python3-brotli-0:1.2.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-73-0031</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость ImageMagick </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ImageMagick</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick-cve-2025-66628-7.3/</description>
               <solution>Установить обновление для пакета(ов) ImageMagick
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick-cve-2025-66628-7.3/" type="self" id="ROS-20260122-73-0031" title="ROS-20260122-73-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66628" type="cve" id="CVE-2025-66628" title="CVE-2025-66628" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ImageMagick" epoch="1" version="6.9.13.35" release="1.el7" arch="x86_64" src="ImageMagick-6.9.13.35-1.el7.src.rpm">
					<filename>ImageMagick-1:6.9.13.35-1.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-c++" epoch="1" version="6.9.13.35" release="1.el7" arch="x86_64" src="ImageMagick-6.9.13.35-1.el7.src.rpm">
					<filename>ImageMagick-c++-1:6.9.13.35-1.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-c++-devel" epoch="1" version="6.9.13.35" release="1.el7" arch="x86_64" src="ImageMagick-6.9.13.35-1.el7.src.rpm">
					<filename>ImageMagick-c++-devel-1:6.9.13.35-1.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-devel" epoch="1" version="6.9.13.35" release="1.el7" arch="x86_64" src="ImageMagick-6.9.13.35-1.el7.src.rpm">
					<filename>ImageMagick-devel-1:6.9.13.35-1.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-djvu" epoch="1" version="6.9.13.35" release="1.el7" arch="x86_64" src="ImageMagick-6.9.13.35-1.el7.src.rpm">
					<filename>ImageMagick-djvu-1:6.9.13.35-1.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-doc" epoch="1" version="6.9.13.35" release="1.el7" arch="x86_64" src="ImageMagick-6.9.13.35-1.el7.src.rpm">
					<filename>ImageMagick-doc-1:6.9.13.35-1.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-heic" epoch="1" version="6.9.13.35" release="1.el7" arch="x86_64" src="ImageMagick-6.9.13.35-1.el7.src.rpm">
					<filename>ImageMagick-heic-1:6.9.13.35-1.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-libs" epoch="1" version="6.9.13.35" release="1.el7" arch="x86_64" src="ImageMagick-6.9.13.35-1.el7.src.rpm">
					<filename>ImageMagick-libs-1:6.9.13.35-1.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-perl" epoch="1" version="6.9.13.35" release="1.el7" arch="x86_64" src="ImageMagick-6.9.13.35-1.el7.src.rpm">
					<filename>ImageMagick-perl-1:6.9.13.35-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-73-0032</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость ImageMagick7 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ImageMagick7</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick7-cve-2025-66628-7.3/</description>
               <solution>Установить обновление для пакета(ов) ImageMagick7
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick7-cve-2025-66628-7.3/" type="self" id="ROS-20260122-73-0032" title="ROS-20260122-73-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66628" type="cve" id="CVE-2025-66628" title="CVE-2025-66628" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ImageMagick7" epoch="0" version="7.1.2.10" release="1.el7" arch="x86_64" src="ImageMagick7-7.1.2.10-1.el7.src.rpm">
					<filename>ImageMagick7-0:7.1.2.10-1.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick7-c++" epoch="0" version="7.1.2.10" release="1.el7" arch="x86_64" src="ImageMagick7-7.1.2.10-1.el7.src.rpm">
					<filename>ImageMagick7-c++-0:7.1.2.10-1.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick7-c++-devel" epoch="0" version="7.1.2.10" release="1.el7" arch="x86_64" src="ImageMagick7-7.1.2.10-1.el7.src.rpm">
					<filename>ImageMagick7-c++-devel-0:7.1.2.10-1.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick7-devel" epoch="0" version="7.1.2.10" release="1.el7" arch="x86_64" src="ImageMagick7-7.1.2.10-1.el7.src.rpm">
					<filename>ImageMagick7-devel-0:7.1.2.10-1.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick7-djvu" epoch="0" version="7.1.2.10" release="1.el7" arch="x86_64" src="ImageMagick7-7.1.2.10-1.el7.src.rpm">
					<filename>ImageMagick7-djvu-0:7.1.2.10-1.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick7-doc" epoch="0" version="7.1.2.10" release="1.el7" arch="x86_64" src="ImageMagick7-7.1.2.10-1.el7.src.rpm">
					<filename>ImageMagick7-doc-0:7.1.2.10-1.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick7-heic" epoch="0" version="7.1.2.10" release="1.el7" arch="x86_64" src="ImageMagick7-7.1.2.10-1.el7.src.rpm">
					<filename>ImageMagick7-heic-0:7.1.2.10-1.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick7-libs" epoch="0" version="7.1.2.10" release="1.el7" arch="x86_64" src="ImageMagick7-7.1.2.10-1.el7.src.rpm">
					<filename>ImageMagick7-libs-0:7.1.2.10-1.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick7-perl" epoch="0" version="7.1.2.10" release="1.el7" arch="x86_64" src="ImageMagick7-7.1.2.10-1.el7.src.rpm">
					<filename>ImageMagick7-perl-0:7.1.2.10-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-73-0033</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-14372-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-14372-7.3/" type="self" id="ROS-20260122-73-0033" title="ROS-20260122-73-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14372" type="cve" id="CVE-2025-14372" title="CVE-2025-14372" />
			<reference href="https://bdu.fstec.ru/vul/2025-15964" type="self" id="BDU:2025-15964" title="BDU:2025-15964" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.el7" arch="x86_64" src="chromium-143.0.7499.109-1.el7.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-73-0034</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость apache-kafka </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в apache-kafka</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-kafka-cve-2024-29371-7.3/</description>
               <solution>Установить обновление для пакета(ов) apache-kafka
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-kafka-cve-2024-29371-7.3/" type="self" id="ROS-20260122-73-0034" title="ROS-20260122-73-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29371" type="cve" id="CVE-2024-29371" title="CVE-2024-29371" />
			<reference href="https://bdu.fstec.ru/vul/2026-01020" type="self" id="BDU:2026-01020" title="BDU:2026-01020" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="apache-kafka" epoch="0" version="4.1.1" release="3.el7" arch="x86_64" src="apache-kafka-4.1.1-3.el7.src.rpm">
					<filename>apache-kafka-0:4.1.1-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0001</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22081-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22081-7.3/" type="self" id="ROS-20260126-73-0001" title="ROS-20260126-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22081" type="cve" id="CVE-2025-22081" title="CVE-2025-22081" />
			<reference href="https://bdu.fstec.ru/vul/2025-11908" type="self" id="BDU:2025-11908" title="BDU:2025-11908" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0002</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22086-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22086-7.3/" type="self" id="ROS-20260126-73-0002" title="ROS-20260126-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22086" type="cve" id="CVE-2025-22086" title="CVE-2025-22086" />
			<reference href="https://bdu.fstec.ru/vul/2025-12170" type="self" id="BDU:2025-12170" title="BDU:2025-12170" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0003</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22088-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22088-7.3/" type="self" id="ROS-20260126-73-0003" title="ROS-20260126-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22088" type="cve" id="CVE-2025-22088" title="CVE-2025-22088" />
			<reference href="https://bdu.fstec.ru/vul/2025-12093" type="self" id="BDU:2025-12093" title="BDU:2025-12093" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0004</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22089-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22089-7.3/" type="self" id="ROS-20260126-73-0004" title="ROS-20260126-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22089" type="cve" id="CVE-2025-22089" title="CVE-2025-22089" />
			<reference href="https://bdu.fstec.ru/vul/2025-12169" type="self" id="BDU:2025-12169" title="BDU:2025-12169" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0005</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22093-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22093-7.3/" type="self" id="ROS-20260126-73-0005" title="ROS-20260126-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22093" type="cve" id="CVE-2025-22093" title="CVE-2025-22093" />
			<reference href="https://bdu.fstec.ru/vul/2025-12168" type="self" id="BDU:2025-12168" title="BDU:2025-12168" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0006</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22095-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22095-7.3/" type="self" id="ROS-20260126-73-0006" title="ROS-20260126-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22095" type="cve" id="CVE-2025-22095" title="CVE-2025-22095" />
			<reference href="https://bdu.fstec.ru/vul/2025-11810" type="self" id="BDU:2025-11810" title="BDU:2025-11810" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0007</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22097-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22097-7.3/" type="self" id="ROS-20260126-73-0007" title="ROS-20260126-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22097" type="cve" id="CVE-2025-22097" title="CVE-2025-22097" />
			<reference href="https://bdu.fstec.ru/vul/2025-12092" type="self" id="BDU:2025-12092" title="BDU:2025-12092" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0008</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23138-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23138-7.3/" type="self" id="ROS-20260126-73-0008" title="ROS-20260126-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23138" type="cve" id="CVE-2025-23138" title="CVE-2025-23138" />
			<reference href="https://bdu.fstec.ru/vul/2025-11925" type="self" id="BDU:2025-11925" title="BDU:2025-11925" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0009</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37785-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37785-7.3/" type="self" id="ROS-20260126-73-0009" title="ROS-20260126-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37785" type="cve" id="CVE-2025-37785" title="CVE-2025-37785" />
			<reference href="https://bdu.fstec.ru/vul/2025-10257" type="self" id="BDU:2025-10257" title="BDU:2025-10257" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0010</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37893-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37893-7.3/" type="self" id="ROS-20260126-73-0010" title="ROS-20260126-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37893" type="cve" id="CVE-2025-37893" title="CVE-2025-37893" />
			<reference href="https://bdu.fstec.ru/vul/2026-03461" type="self" id="BDU:2026-03461" title="BDU:2026-03461" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0011</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37925-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37925-7.3/" type="self" id="ROS-20260126-73-0011" title="ROS-20260126-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37925" type="cve" id="CVE-2025-37925" title="CVE-2025-37925" />
			<reference href="https://bdu.fstec.ru/vul/2025-15556" type="self" id="BDU:2025-15556" title="BDU:2025-15556" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0012</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38152-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38152-7.3/" type="self" id="ROS-20260126-73-0012" title="ROS-20260126-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38152" type="cve" id="CVE-2025-38152" title="CVE-2025-38152" />
			<reference href="https://bdu.fstec.ru/vul/2025-12113" type="self" id="BDU:2025-12113" title="BDU:2025-12113" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0013</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38575-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38575-7.3/" type="self" id="ROS-20260126-73-0013" title="ROS-20260126-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38575" type="cve" id="CVE-2025-38575" title="CVE-2025-38575" />
			<reference href="https://bdu.fstec.ru/vul/2025-12063" type="self" id="BDU:2025-12063" title="BDU:2025-12063" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0014</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38637-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38637-7.3/" type="self" id="ROS-20260126-73-0014" title="ROS-20260126-73-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38637" type="cve" id="CVE-2025-38637" title="CVE-2025-38637" />
			<reference href="https://bdu.fstec.ru/vul/2025-12236" type="self" id="BDU:2025-12236" title="BDU:2025-12236" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0015</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23161-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23161-7.3/" type="self" id="ROS-20260126-73-0015" title="ROS-20260126-73-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23161" type="cve" id="CVE-2025-23161" title="CVE-2025-23161" />
			<reference href="https://bdu.fstec.ru/vul/2025-12257" type="self" id="BDU:2025-12257" title="BDU:2025-12257" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0016</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23160-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23160-7.3/" type="self" id="ROS-20260126-73-0016" title="ROS-20260126-73-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23160" type="cve" id="CVE-2025-23160" title="CVE-2025-23160" />
			<reference href="https://bdu.fstec.ru/vul/2026-02399" type="self" id="BDU:2026-02399" title="BDU:2026-02399" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0017</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23159-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23159-7.3/" type="self" id="ROS-20260126-73-0017" title="ROS-20260126-73-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23159" type="cve" id="CVE-2025-23159" title="CVE-2025-23159" />
			<reference href="https://bdu.fstec.ru/vul/2025-12307" type="self" id="BDU:2025-12307" title="BDU:2025-12307" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0018</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23158-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23158-7.3/" type="self" id="ROS-20260126-73-0018" title="ROS-20260126-73-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23158" type="cve" id="CVE-2025-23158" title="CVE-2025-23158" />
			<reference href="https://bdu.fstec.ru/vul/2025-12306" type="self" id="BDU:2025-12306" title="BDU:2025-12306" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0019</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23157-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23157-7.3/" type="self" id="ROS-20260126-73-0019" title="ROS-20260126-73-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23157" type="cve" id="CVE-2025-23157" title="CVE-2025-23157" />
			<reference href="https://bdu.fstec.ru/vul/2025-11893" type="self" id="BDU:2025-11893" title="BDU:2025-11893" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0020</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23156-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23156-7.3/" type="self" id="ROS-20260126-73-0020" title="ROS-20260126-73-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23156" type="cve" id="CVE-2025-23156" title="CVE-2025-23156" />
			<reference href="https://bdu.fstec.ru/vul/2025-11888" type="self" id="BDU:2025-11888" title="BDU:2025-11888" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0021</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23151-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23151-7.3/" type="self" id="ROS-20260126-73-0021" title="ROS-20260126-73-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23151" type="cve" id="CVE-2025-23151" title="CVE-2025-23151" />
			<reference href="https://bdu.fstec.ru/vul/2025-11997" type="self" id="BDU:2025-11997" title="BDU:2025-11997" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0022</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23150-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23150-7.3/" type="self" id="ROS-20260126-73-0022" title="ROS-20260126-73-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23150" type="cve" id="CVE-2025-23150" title="CVE-2025-23150" />
			<reference href="https://bdu.fstec.ru/vul/2025-12110" type="self" id="BDU:2025-12110" title="BDU:2025-12110" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0023</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23147-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23147-7.3/" type="self" id="ROS-20260126-73-0023" title="ROS-20260126-73-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23147" type="cve" id="CVE-2025-23147" title="CVE-2025-23147" />
			<reference href="https://bdu.fstec.ru/vul/2025-12164" type="self" id="BDU:2025-12164" title="BDU:2025-12164" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0024</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23146-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23146-7.3/" type="self" id="ROS-20260126-73-0024" title="ROS-20260126-73-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23146" type="cve" id="CVE-2025-23146" title="CVE-2025-23146" />
			<reference href="https://bdu.fstec.ru/vul/2025-12165" type="self" id="BDU:2025-12165" title="BDU:2025-12165" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0025</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23145-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23145-7.3/" type="self" id="ROS-20260126-73-0025" title="ROS-20260126-73-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23145" type="cve" id="CVE-2025-23145" title="CVE-2025-23145" />
			<reference href="https://bdu.fstec.ru/vul/2025-12166" type="self" id="BDU:2025-12166" title="BDU:2025-12166" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0026</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23144-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23144-7.3/" type="self" id="ROS-20260126-73-0026" title="ROS-20260126-73-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23144" type="cve" id="CVE-2025-23144" title="CVE-2025-23144" />
			<reference href="https://bdu.fstec.ru/vul/2025-12053" type="self" id="BDU:2025-12053" title="BDU:2025-12053" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0027</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23143-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23143-7.3/" type="self" id="ROS-20260126-73-0027" title="ROS-20260126-73-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23143" type="cve" id="CVE-2025-23143" title="CVE-2025-23143" />
			<reference href="https://bdu.fstec.ru/vul/2026-02294" type="self" id="BDU:2026-02294" title="BDU:2026-02294" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0028</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23142-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23142-7.3/" type="self" id="ROS-20260126-73-0028" title="ROS-20260126-73-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23142" type="cve" id="CVE-2025-23142" title="CVE-2025-23142" />
			<reference href="https://bdu.fstec.ru/vul/2025-12091" type="self" id="BDU:2025-12091" title="BDU:2025-12091" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0029</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23141-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23141-7.3/" type="self" id="ROS-20260126-73-0029" title="ROS-20260126-73-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23141" type="cve" id="CVE-2025-23141" title="CVE-2025-23141" />
			<reference href="https://bdu.fstec.ru/vul/2025-11982" type="self" id="BDU:2025-11982" title="BDU:2025-11982" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0030</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23140-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23140-7.3/" type="self" id="ROS-20260126-73-0030" title="ROS-20260126-73-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23140" type="cve" id="CVE-2025-23140" title="CVE-2025-23140" />
			<reference href="https://bdu.fstec.ru/vul/2025-11811" type="self" id="BDU:2025-11811" title="BDU:2025-11811" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0031</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37838-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37838-7.3/" type="self" id="ROS-20260126-73-0031" title="ROS-20260126-73-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37838" type="cve" id="CVE-2025-37838" title="CVE-2025-37838" />
			<reference href="https://bdu.fstec.ru/vul/2025-12074" type="self" id="BDU:2025-12074" title="BDU:2025-12074" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0032</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39735-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39735-7.3/" type="self" id="ROS-20260126-73-0032" title="ROS-20260126-73-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39735" type="cve" id="CVE-2025-39735" title="CVE-2025-39735" />
			<reference href="https://bdu.fstec.ru/vul/2025-11860" type="self" id="BDU:2025-11860" title="BDU:2025-11860" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0033</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39728-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39728-7.3/" type="self" id="ROS-20260126-73-0033" title="ROS-20260126-73-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39728" type="cve" id="CVE-2025-39728" title="CVE-2025-39728" />
			<reference href="https://bdu.fstec.ru/vul/2025-11895" type="self" id="BDU:2025-11895" title="BDU:2025-11895" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0034</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22079-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22079-7.3/" type="self" id="ROS-20260126-73-0034" title="ROS-20260126-73-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22079" type="cve" id="CVE-2025-22079" title="CVE-2025-22079" />
			<reference href="https://bdu.fstec.ru/vul/2025-11871" type="self" id="BDU:2025-11871" title="BDU:2025-11871" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0035</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37738-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37738-7.3/" type="self" id="ROS-20260126-73-0035" title="ROS-20260126-73-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37738" type="cve" id="CVE-2025-37738" title="CVE-2025-37738" />
			<reference href="https://bdu.fstec.ru/vul/2025-12089" type="self" id="BDU:2025-12089" title="BDU:2025-12089" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0036</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37739-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37739-7.3/" type="self" id="ROS-20260126-73-0036" title="ROS-20260126-73-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37739" type="cve" id="CVE-2025-37739" title="CVE-2025-37739" />
			<reference href="https://bdu.fstec.ru/vul/2025-11896" type="self" id="BDU:2025-11896" title="BDU:2025-11896" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0037</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37740-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37740-7.3/" type="self" id="ROS-20260126-73-0037" title="ROS-20260126-73-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37740" type="cve" id="CVE-2025-37740" title="CVE-2025-37740" />
			<reference href="https://bdu.fstec.ru/vul/2025-12004" type="self" id="BDU:2025-12004" title="BDU:2025-12004" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0038</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37741-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37741-7.3/" type="self" id="ROS-20260126-73-0038" title="ROS-20260126-73-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37741" type="cve" id="CVE-2025-37741" title="CVE-2025-37741" />
			<reference href="https://bdu.fstec.ru/vul/2025-12343" type="self" id="BDU:2025-12343" title="BDU:2025-12343" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0039</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37742-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37742-7.3/" type="self" id="ROS-20260126-73-0039" title="ROS-20260126-73-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37742" type="cve" id="CVE-2025-37742" title="CVE-2025-37742" />
			<reference href="https://bdu.fstec.ru/vul/2025-12330" type="self" id="BDU:2025-12330" title="BDU:2025-12330" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0040</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37748-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37748-7.3/" type="self" id="ROS-20260126-73-0040" title="ROS-20260126-73-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37748" type="cve" id="CVE-2025-37748" title="CVE-2025-37748" />
			<reference href="https://bdu.fstec.ru/vul/2025-12162" type="self" id="BDU:2025-12162" title="BDU:2025-12162" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0041</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37749-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37749-7.3/" type="self" id="ROS-20260126-73-0041" title="ROS-20260126-73-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37749" type="cve" id="CVE-2025-37749" title="CVE-2025-37749" />
			<reference href="https://bdu.fstec.ru/vul/2025-11870" type="self" id="BDU:2025-11870" title="BDU:2025-11870" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0042</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37756-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37756-7.3/" type="self" id="ROS-20260126-73-0042" title="ROS-20260126-73-0042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37756" type="cve" id="CVE-2025-37756" title="CVE-2025-37756" />
			<reference href="https://bdu.fstec.ru/vul/2025-11935" type="self" id="BDU:2025-11935" title="BDU:2025-11935" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0043</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37757-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37757-7.3/" type="self" id="ROS-20260126-73-0043" title="ROS-20260126-73-0043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37757" type="cve" id="CVE-2025-37757" title="CVE-2025-37757" />
			<reference href="https://bdu.fstec.ru/vul/2025-12036" type="self" id="BDU:2025-12036" title="BDU:2025-12036" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0044</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37758-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37758-7.3/" type="self" id="ROS-20260126-73-0044" title="ROS-20260126-73-0044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37758" type="cve" id="CVE-2025-37758" title="CVE-2025-37758" />
			<reference href="https://bdu.fstec.ru/vul/2025-12160" type="self" id="BDU:2025-12160" title="BDU:2025-12160" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0045</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37765-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37765-7.3/" type="self" id="ROS-20260126-73-0045" title="ROS-20260126-73-0045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37765" type="cve" id="CVE-2025-37765" title="CVE-2025-37765" />
			<reference href="https://bdu.fstec.ru/vul/2025-12370" type="self" id="BDU:2025-12370" title="BDU:2025-12370" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0046</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37766-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37766-7.3/" type="self" id="ROS-20260126-73-0046" title="ROS-20260126-73-0046" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37766" type="cve" id="CVE-2025-37766" title="CVE-2025-37766" />
			<reference href="https://bdu.fstec.ru/vul/2025-12008" type="self" id="BDU:2025-12008" title="BDU:2025-12008" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0047</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37767-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37767-7.3/" type="self" id="ROS-20260126-73-0047" title="ROS-20260126-73-0047" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37767" type="cve" id="CVE-2025-37767" title="CVE-2025-37767" />
			<reference href="https://bdu.fstec.ru/vul/2025-12012" type="self" id="BDU:2025-12012" title="BDU:2025-12012" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0048</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37768-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37768-7.3/" type="self" id="ROS-20260126-73-0048" title="ROS-20260126-73-0048" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37768" type="cve" id="CVE-2025-37768" title="CVE-2025-37768" />
			<reference href="https://bdu.fstec.ru/vul/2025-12011" type="self" id="BDU:2025-12011" title="BDU:2025-12011" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0049</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37769-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37769-7.3/" type="self" id="ROS-20260126-73-0049" title="ROS-20260126-73-0049" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37769" type="cve" id="CVE-2025-37769" title="CVE-2025-37769" />
			<reference href="https://bdu.fstec.ru/vul/2025-12003" type="self" id="BDU:2025-12003" title="BDU:2025-12003" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0050</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37770-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37770-7.3/" type="self" id="ROS-20260126-73-0050" title="ROS-20260126-73-0050" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37770" type="cve" id="CVE-2025-37770" title="CVE-2025-37770" />
			<reference href="https://bdu.fstec.ru/vul/2025-12010" type="self" id="BDU:2025-12010" title="BDU:2025-12010" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0051</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37771-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37771-7.3/" type="self" id="ROS-20260126-73-0051" title="ROS-20260126-73-0051" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37771" type="cve" id="CVE-2025-37771" title="CVE-2025-37771" />
			<reference href="https://bdu.fstec.ru/vul/2025-12009" type="self" id="BDU:2025-12009" title="BDU:2025-12009" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0052</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37772-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37772-7.3/" type="self" id="ROS-20260126-73-0052" title="ROS-20260126-73-0052" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37772" type="cve" id="CVE-2025-37772" title="CVE-2025-37772" />
			<reference href="https://bdu.fstec.ru/vul/2025-12158" type="self" id="BDU:2025-12158" title="BDU:2025-12158" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0053</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37773-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37773-7.3/" type="self" id="ROS-20260126-73-0053" title="ROS-20260126-73-0053" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37773" type="cve" id="CVE-2025-37773" title="CVE-2025-37773" />
			<reference href="https://bdu.fstec.ru/vul/2025-11978" type="self" id="BDU:2025-11978" title="BDU:2025-11978" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0054</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость pgadmin4 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в pgadmin4</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pgadmin4-cve-2025-12762-7.3/</description>
               <solution>Установить обновление для пакета(ов) pgadmin4
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pgadmin4-cve-2025-12762-7.3/" type="self" id="ROS-20260126-73-0054" title="ROS-20260126-73-0054" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12762" type="cve" id="CVE-2025-12762" title="CVE-2025-12762" />
			<reference href="https://bdu.fstec.ru/vul/2025-14360" type="self" id="BDU:2025-14360" title="BDU:2025-14360" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pgadmin4" epoch="0" version="8.14" release="1.el7" arch="x86_64" src="pgadmin4-8.14-1.el7.src.rpm">
					<filename>pgadmin4-0:8.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="pgadmin4-httpd" epoch="0" version="8.14" release="1.el7" arch="x86_64" src="pgadmin4-8.14-1.el7.src.rpm">
					<filename>pgadmin4-httpd-0:8.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="pgadmin4-qt" epoch="0" version="8.14" release="1.el7" arch="x86_64" src="pgadmin4-8.14-1.el7.src.rpm">
					<filename>pgadmin4-qt-0:8.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="pgadmin4-langpack-cs" epoch="0" version="8.14" release="1.el7" arch="noarch" src="pgadmin4-8.14-1.el7.src.rpm">
					<filename>pgadmin4-langpack-cs-0:8.14-1.el7.noarch.rpm</filename>
				</package>
				<package name="pgadmin4-langpack-de" epoch="0" version="8.14" release="1.el7" arch="noarch" src="pgadmin4-8.14-1.el7.src.rpm">
					<filename>pgadmin4-langpack-de-0:8.14-1.el7.noarch.rpm</filename>
				</package>
				<package name="pgadmin4-langpack-es" epoch="0" version="8.14" release="1.el7" arch="noarch" src="pgadmin4-8.14-1.el7.src.rpm">
					<filename>pgadmin4-langpack-es-0:8.14-1.el7.noarch.rpm</filename>
				</package>
				<package name="pgadmin4-langpack-fr" epoch="0" version="8.14" release="1.el7" arch="noarch" src="pgadmin4-8.14-1.el7.src.rpm">
					<filename>pgadmin4-langpack-fr-0:8.14-1.el7.noarch.rpm</filename>
				</package>
				<package name="pgadmin4-langpack-it" epoch="0" version="8.14" release="1.el7" arch="noarch" src="pgadmin4-8.14-1.el7.src.rpm">
					<filename>pgadmin4-langpack-it-0:8.14-1.el7.noarch.rpm</filename>
				</package>
				<package name="pgadmin4-langpack-ja" epoch="0" version="8.14" release="1.el7" arch="noarch" src="pgadmin4-8.14-1.el7.src.rpm">
					<filename>pgadmin4-langpack-ja-0:8.14-1.el7.noarch.rpm</filename>
				</package>
				<package name="pgadmin4-langpack-ko" epoch="0" version="8.14" release="1.el7" arch="noarch" src="pgadmin4-8.14-1.el7.src.rpm">
					<filename>pgadmin4-langpack-ko-0:8.14-1.el7.noarch.rpm</filename>
				</package>
				<package name="pgadmin4-langpack-pl" epoch="0" version="8.14" release="1.el7" arch="noarch" src="pgadmin4-8.14-1.el7.src.rpm">
					<filename>pgadmin4-langpack-pl-0:8.14-1.el7.noarch.rpm</filename>
				</package>
				<package name="pgadmin4-langpack-ru" epoch="0" version="8.14" release="1.el7" arch="noarch" src="pgadmin4-8.14-1.el7.src.rpm">
					<filename>pgadmin4-langpack-ru-0:8.14-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0055</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37775-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37775-7.3/" type="self" id="ROS-20260126-73-0055" title="ROS-20260126-73-0055" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37775" type="cve" id="CVE-2025-37775" title="CVE-2025-37775" />
			<reference href="https://bdu.fstec.ru/vul/2025-11960" type="self" id="BDU:2025-11960" title="BDU:2025-11960" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0056</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37778-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37778-7.3/" type="self" id="ROS-20260126-73-0056" title="ROS-20260126-73-0056" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37778" type="cve" id="CVE-2025-37778" title="CVE-2025-37778" />
			<reference href="https://bdu.fstec.ru/vul/2025-06312" type="self" id="BDU:2025-06312" title="BDU:2025-06312" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0057</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37780-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37780-7.3/" type="self" id="ROS-20260126-73-0057" title="ROS-20260126-73-0057" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37780" type="cve" id="CVE-2025-37780" title="CVE-2025-37780" />
			<reference href="https://bdu.fstec.ru/vul/2025-11868" type="self" id="BDU:2025-11868" title="BDU:2025-11868" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0058</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37781-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37781-7.3/" type="self" id="ROS-20260126-73-0058" title="ROS-20260126-73-0058" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37781" type="cve" id="CVE-2025-37781" title="CVE-2025-37781" />
			<reference href="https://bdu.fstec.ru/vul/2025-12156" type="self" id="BDU:2025-12156" title="BDU:2025-12156" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0059</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37782-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37782-7.3/" type="self" id="ROS-20260126-73-0059" title="ROS-20260126-73-0059" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37782" type="cve" id="CVE-2025-37782" title="CVE-2025-37782" />
			<reference href="https://bdu.fstec.ru/vul/2026-03406" type="self" id="BDU:2026-03406" title="BDU:2026-03406" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0060</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37787-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37787-7.3/" type="self" id="ROS-20260126-73-0060" title="ROS-20260126-73-0060" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37787" type="cve" id="CVE-2025-37787" title="CVE-2025-37787" />
			<reference href="https://bdu.fstec.ru/vul/2025-12154" type="self" id="BDU:2025-12154" title="BDU:2025-12154" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0061</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37788-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37788-7.3/" type="self" id="ROS-20260126-73-0061" title="ROS-20260126-73-0061" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37788" type="cve" id="CVE-2025-37788" title="CVE-2025-37788" />
			<reference href="https://bdu.fstec.ru/vul/2025-12034" type="self" id="BDU:2025-12034" title="BDU:2025-12034" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0062</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37789-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37789-7.3/" type="self" id="ROS-20260126-73-0062" title="ROS-20260126-73-0062" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37789" type="cve" id="CVE-2025-37789" title="CVE-2025-37789" />
			<reference href="https://bdu.fstec.ru/vul/2025-11934" type="self" id="BDU:2025-11934" title="BDU:2025-11934" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0063</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37790-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37790-7.3/" type="self" id="ROS-20260126-73-0063" title="ROS-20260126-73-0063" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37790" type="cve" id="CVE-2025-37790" title="CVE-2025-37790" />
			<reference href="https://bdu.fstec.ru/vul/2025-12109" type="self" id="BDU:2025-12109" title="BDU:2025-12109" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0064</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37792-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37792-7.3/" type="self" id="ROS-20260126-73-0064" title="ROS-20260126-73-0064" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37792" type="cve" id="CVE-2025-37792" title="CVE-2025-37792" />
			<reference href="https://bdu.fstec.ru/vul/2025-12153" type="self" id="BDU:2025-12153" title="BDU:2025-12153" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0065</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37794-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37794-7.3/" type="self" id="ROS-20260126-73-0065" title="ROS-20260126-73-0065" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37794" type="cve" id="CVE-2025-37794" title="CVE-2025-37794" />
			<reference href="https://bdu.fstec.ru/vul/2025-12151" type="self" id="BDU:2025-12151" title="BDU:2025-12151" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0066</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37795-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37795-7.3/" type="self" id="ROS-20260126-73-0066" title="ROS-20260126-73-0066" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37795" type="cve" id="CVE-2025-37795" title="CVE-2025-37795" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-73-0067</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37796-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37796-7.3/" type="self" id="ROS-20260126-73-0067" title="ROS-20260126-73-0067" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37796" type="cve" id="CVE-2025-37796" title="CVE-2025-37796" />
			<reference href="https://bdu.fstec.ru/vul/2025-12108" type="self" id="BDU:2025-12108" title="BDU:2025-12108" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260127-73-0001</id>
		<issued date="2026-01-27" />
		<updated date="2026-01-27" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23163-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23163-7.3/" type="self" id="ROS-20260127-73-0001" title="ROS-20260127-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23163" type="cve" id="CVE-2025-23163" title="CVE-2025-23163" />
			<reference href="https://bdu.fstec.ru/vul/2025-12344" type="self" id="BDU:2025-12344" title="BDU:2025-12344" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0001</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37797-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37797-7.3/" type="self" id="ROS-20260128-73-0001" title="ROS-20260128-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37797" type="cve" id="CVE-2025-37797" title="CVE-2025-37797" />
			<reference href="https://bdu.fstec.ru/vul/2025-12087" type="self" id="BDU:2025-12087" title="BDU:2025-12087" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0002</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37798-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37798-7.3/" type="self" id="ROS-20260128-73-0002" title="ROS-20260128-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37798" type="cve" id="CVE-2025-37798" title="CVE-2025-37798" />
			<reference href="https://bdu.fstec.ru/vul/2025-11933" type="self" id="BDU:2025-11933" title="BDU:2025-11933" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0003</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53035-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53035-7.3/" type="self" id="ROS-20260128-73-0003" title="ROS-20260128-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53035" type="cve" id="CVE-2023-53035" title="CVE-2023-53035" />
			<reference href="https://bdu.fstec.ru/vul/2025-05364" type="self" id="BDU:2025-05364" title="BDU:2025-05364" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0004</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53036-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53036-7.3/" type="self" id="ROS-20260128-73-0004" title="ROS-20260128-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53036" type="cve" id="CVE-2023-53036" title="CVE-2023-53036" />
			<reference href="https://bdu.fstec.ru/vul/2025-05362" type="self" id="BDU:2025-05362" title="BDU:2025-05362" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0005</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53037-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53037-7.3/" type="self" id="ROS-20260128-73-0005" title="ROS-20260128-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53037" type="cve" id="CVE-2023-53037" title="CVE-2023-53037" />
			<reference href="https://bdu.fstec.ru/vul/2025-05363" type="self" id="BDU:2025-05363" title="BDU:2025-05363" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0006</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53038-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53038-7.3/" type="self" id="ROS-20260128-73-0006" title="ROS-20260128-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53038" type="cve" id="CVE-2023-53038" title="CVE-2023-53038" />
			<reference href="https://bdu.fstec.ru/vul/2025-05361" type="self" id="BDU:2025-05361" title="BDU:2025-05361" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0007</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53039-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53039-7.3/" type="self" id="ROS-20260128-73-0007" title="ROS-20260128-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53039" type="cve" id="CVE-2023-53039" title="CVE-2023-53039" />
			<reference href="https://bdu.fstec.ru/vul/2025-05366" type="self" id="BDU:2025-05366" title="BDU:2025-05366" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0008</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53040-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53040-7.3/" type="self" id="ROS-20260128-73-0008" title="ROS-20260128-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53040" type="cve" id="CVE-2023-53040" title="CVE-2023-53040" />
			<reference href="https://bdu.fstec.ru/vul/2025-05360" type="self" id="BDU:2025-05360" title="BDU:2025-05360" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0009</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53041-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53041-7.3/" type="self" id="ROS-20260128-73-0009" title="ROS-20260128-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53041" type="cve" id="CVE-2023-53041" title="CVE-2023-53041" />
			<reference href="https://bdu.fstec.ru/vul/2025-05358" type="self" id="BDU:2025-05358" title="BDU:2025-05358" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0010</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53042-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53042-7.3/" type="self" id="ROS-20260128-73-0010" title="ROS-20260128-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53042" type="cve" id="CVE-2023-53042" title="CVE-2023-53042" />
			<reference href="https://bdu.fstec.ru/vul/2025-05359" type="self" id="BDU:2025-05359" title="BDU:2025-05359" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0011</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53043-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53043-7.3/" type="self" id="ROS-20260128-73-0011" title="ROS-20260128-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53043" type="cve" id="CVE-2023-53043" title="CVE-2023-53043" />
			<reference href="https://bdu.fstec.ru/vul/2025-14126" type="self" id="BDU:2025-14126" title="BDU:2025-14126" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0012</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53044-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53044-7.3/" type="self" id="ROS-20260128-73-0012" title="ROS-20260128-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53044" type="cve" id="CVE-2023-53044" title="CVE-2023-53044" />
			<reference href="https://bdu.fstec.ru/vul/2025-05365" type="self" id="BDU:2025-05365" title="BDU:2025-05365" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0013</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53045-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53045-7.3/" type="self" id="ROS-20260128-73-0013" title="ROS-20260128-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53045" type="cve" id="CVE-2023-53045" title="CVE-2023-53045" />
			<reference href="https://bdu.fstec.ru/vul/2025-06835" type="self" id="BDU:2025-06835" title="BDU:2025-06835" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0014</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53046-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53046-7.3/" type="self" id="ROS-20260128-73-0014" title="ROS-20260128-73-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53046" type="cve" id="CVE-2023-53046" title="CVE-2023-53046" />
			<reference href="https://bdu.fstec.ru/vul/2025-06788" type="self" id="BDU:2025-06788" title="BDU:2025-06788" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0015</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53047-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53047-7.3/" type="self" id="ROS-20260128-73-0015" title="ROS-20260128-73-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53047" type="cve" id="CVE-2023-53047" title="CVE-2023-53047" />
			<reference href="https://bdu.fstec.ru/vul/2025-06785" type="self" id="BDU:2025-06785" title="BDU:2025-06785" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0016</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53048-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53048-7.3/" type="self" id="ROS-20260128-73-0016" title="ROS-20260128-73-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53048" type="cve" id="CVE-2023-53048" title="CVE-2023-53048" />
			<reference href="https://bdu.fstec.ru/vul/2025-06836" type="self" id="BDU:2025-06836" title="BDU:2025-06836" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0017</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53049-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53049-7.3/" type="self" id="ROS-20260128-73-0017" title="ROS-20260128-73-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53049" type="cve" id="CVE-2023-53049" title="CVE-2023-53049" />
			<reference href="https://bdu.fstec.ru/vul/2025-06784" type="self" id="BDU:2025-06784" title="BDU:2025-06784" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0018</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53050-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53050-7.3/" type="self" id="ROS-20260128-73-0018" title="ROS-20260128-73-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53050" type="cve" id="CVE-2023-53050" title="CVE-2023-53050" />
			<reference href="https://bdu.fstec.ru/vul/2025-06769" type="self" id="BDU:2025-06769" title="BDU:2025-06769" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0019</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53051-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53051-7.3/" type="self" id="ROS-20260128-73-0019" title="ROS-20260128-73-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53051" type="cve" id="CVE-2023-53051" title="CVE-2023-53051" />
			<reference href="https://bdu.fstec.ru/vul/2025-06766" type="self" id="BDU:2025-06766" title="BDU:2025-06766" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0020</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53053-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53053-7.3/" type="self" id="ROS-20260128-73-0020" title="ROS-20260128-73-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53053" type="cve" id="CVE-2023-53053" title="CVE-2023-53053" />
			<reference href="https://bdu.fstec.ru/vul/2025-06767" type="self" id="BDU:2025-06767" title="BDU:2025-06767" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0021</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53054-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53054-7.3/" type="self" id="ROS-20260128-73-0021" title="ROS-20260128-73-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53054" type="cve" id="CVE-2023-53054" title="CVE-2023-53054" />
			<reference href="https://bdu.fstec.ru/vul/2025-06837" type="self" id="BDU:2025-06837" title="BDU:2025-06837" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0022</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53055-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53055-7.3/" type="self" id="ROS-20260128-73-0022" title="ROS-20260128-73-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53055" type="cve" id="CVE-2023-53055" title="CVE-2023-53055" />
			<reference href="https://bdu.fstec.ru/vul/2025-06838" type="self" id="BDU:2025-06838" title="BDU:2025-06838" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0023</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53056-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53056-7.3/" type="self" id="ROS-20260128-73-0023" title="ROS-20260128-73-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53056" type="cve" id="CVE-2023-53056" title="CVE-2023-53056" />
			<reference href="https://bdu.fstec.ru/vul/2025-06839" type="self" id="BDU:2025-06839" title="BDU:2025-06839" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0024</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53057-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53057-7.3/" type="self" id="ROS-20260128-73-0024" title="ROS-20260128-73-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53057" type="cve" id="CVE-2023-53057" title="CVE-2023-53057" />
			<reference href="https://bdu.fstec.ru/vul/2025-06840" type="self" id="BDU:2025-06840" title="BDU:2025-06840" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0025</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53058-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53058-7.3/" type="self" id="ROS-20260128-73-0025" title="ROS-20260128-73-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53058" type="cve" id="CVE-2023-53058" title="CVE-2023-53058" />
			<reference href="https://bdu.fstec.ru/vul/2025-14129" type="self" id="BDU:2025-14129" title="BDU:2025-14129" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0026</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53059-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53059-7.3/" type="self" id="ROS-20260128-73-0026" title="ROS-20260128-73-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53059" type="cve" id="CVE-2023-53059" title="CVE-2023-53059" />
			<reference href="https://bdu.fstec.ru/vul/2025-06020" type="self" id="BDU:2025-06020" title="BDU:2025-06020" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0027</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53060-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53060-7.3/" type="self" id="ROS-20260128-73-0027" title="ROS-20260128-73-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53060" type="cve" id="CVE-2023-53060" title="CVE-2023-53060" />
			<reference href="https://bdu.fstec.ru/vul/2025-14130" type="self" id="BDU:2025-14130" title="BDU:2025-14130" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0028</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53061-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53061-7.3/" type="self" id="ROS-20260128-73-0028" title="ROS-20260128-73-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53061" type="cve" id="CVE-2023-53061" title="CVE-2023-53061" />
			<reference href="https://bdu.fstec.ru/vul/2025-06765" type="self" id="BDU:2025-06765" title="BDU:2025-06765" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0029</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53062-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53062-7.3/" type="self" id="ROS-20260128-73-0029" title="ROS-20260128-73-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53062" type="cve" id="CVE-2023-53062" title="CVE-2023-53062" />
			<reference href="https://bdu.fstec.ru/vul/2025-12417" type="self" id="BDU:2025-12417" title="BDU:2025-12417" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0030</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53063-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53063-7.3/" type="self" id="ROS-20260128-73-0030" title="ROS-20260128-73-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53063" type="cve" id="CVE-2023-53063" title="CVE-2023-53063" />
			<reference href="https://bdu.fstec.ru/vul/2025-11669" type="self" id="BDU:2025-11669" title="BDU:2025-11669" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0031</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53064-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53064-7.3/" type="self" id="ROS-20260128-73-0031" title="ROS-20260128-73-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53064" type="cve" id="CVE-2023-53064" title="CVE-2023-53064" />
			<reference href="https://bdu.fstec.ru/vul/2025-14131" type="self" id="BDU:2025-14131" title="BDU:2025-14131" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0032</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53065-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53065-7.3/" type="self" id="ROS-20260128-73-0032" title="ROS-20260128-73-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53065" type="cve" id="CVE-2023-53065" title="CVE-2023-53065" />
			<reference href="https://bdu.fstec.ru/vul/2025-14127" type="self" id="BDU:2025-14127" title="BDU:2025-14127" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0033</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53066-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53066-7.3/" type="self" id="ROS-20260128-73-0033" title="ROS-20260128-73-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53066" type="cve" id="CVE-2023-53066" title="CVE-2023-53066" />
			<reference href="https://bdu.fstec.ru/vul/2026-05789" type="self" id="BDU:2026-05789" title="BDU:2026-05789" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0034</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53067-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53067-7.3/" type="self" id="ROS-20260128-73-0034" title="ROS-20260128-73-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53067" type="cve" id="CVE-2023-53067" title="CVE-2023-53067" />
			<reference href="https://bdu.fstec.ru/vul/2026-03561" type="self" id="BDU:2026-03561" title="BDU:2026-03561" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0035</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53068-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53068-7.3/" type="self" id="ROS-20260128-73-0035" title="ROS-20260128-73-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53068" type="cve" id="CVE-2023-53068" title="CVE-2023-53068" />
			<reference href="https://bdu.fstec.ru/vul/2025-14128" type="self" id="BDU:2025-14128" title="BDU:2025-14128" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0036</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53069-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53069-7.3/" type="self" id="ROS-20260128-73-0036" title="ROS-20260128-73-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53069" type="cve" id="CVE-2023-53069" title="CVE-2023-53069" />
			<reference href="https://bdu.fstec.ru/vul/2026-05864" type="self" id="BDU:2026-05864" title="BDU:2026-05864" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0037</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53070-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53070-7.3/" type="self" id="ROS-20260128-73-0037" title="ROS-20260128-73-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53070" type="cve" id="CVE-2023-53070" title="CVE-2023-53070" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0038</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53071-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53071-7.3/" type="self" id="ROS-20260128-73-0038" title="ROS-20260128-73-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53071" type="cve" id="CVE-2023-53071" title="CVE-2023-53071" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0039</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53072-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53072-7.3/" type="self" id="ROS-20260128-73-0039" title="ROS-20260128-73-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53072" type="cve" id="CVE-2023-53072" title="CVE-2023-53072" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0040</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53073-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53073-7.3/" type="self" id="ROS-20260128-73-0040" title="ROS-20260128-73-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53073" type="cve" id="CVE-2023-53073" title="CVE-2023-53073" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0041</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53074-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53074-7.3/" type="self" id="ROS-20260128-73-0041" title="ROS-20260128-73-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53074" type="cve" id="CVE-2023-53074" title="CVE-2023-53074" />
			<reference href="https://bdu.fstec.ru/vul/2026-05758" type="self" id="BDU:2026-05758" title="BDU:2026-05758" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0042</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53075-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53075-7.3/" type="self" id="ROS-20260128-73-0042" title="ROS-20260128-73-0042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53075" type="cve" id="CVE-2023-53075" title="CVE-2023-53075" />
			<reference href="https://bdu.fstec.ru/vul/2026-03739" type="self" id="BDU:2026-03739" title="BDU:2026-03739" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0043</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53076-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53076-7.3/" type="self" id="ROS-20260128-73-0043" title="ROS-20260128-73-0043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53076" type="cve" id="CVE-2023-53076" title="CVE-2023-53076" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0044</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53077-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53077-7.3/" type="self" id="ROS-20260128-73-0044" title="ROS-20260128-73-0044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53077" type="cve" id="CVE-2023-53077" title="CVE-2023-53077" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0045</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53078-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53078-7.3/" type="self" id="ROS-20260128-73-0045" title="ROS-20260128-73-0045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53078" type="cve" id="CVE-2023-53078" title="CVE-2023-53078" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0046</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53079-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53079-7.3/" type="self" id="ROS-20260128-73-0046" title="ROS-20260128-73-0046" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53079" type="cve" id="CVE-2023-53079" title="CVE-2023-53079" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0047</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53080-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53080-7.3/" type="self" id="ROS-20260128-73-0047" title="ROS-20260128-73-0047" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53080" type="cve" id="CVE-2023-53080" title="CVE-2023-53080" />
			<reference href="https://bdu.fstec.ru/vul/2026-05790" type="self" id="BDU:2026-05790" title="BDU:2026-05790" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0048</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53081-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53081-7.3/" type="self" id="ROS-20260128-73-0048" title="ROS-20260128-73-0048" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53081" type="cve" id="CVE-2023-53081" title="CVE-2023-53081" />
			<reference href="https://bdu.fstec.ru/vul/2026-03921" type="self" id="BDU:2026-03921" title="BDU:2026-03921" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0049</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53082-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53082-7.3/" type="self" id="ROS-20260128-73-0049" title="ROS-20260128-73-0049" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53082" type="cve" id="CVE-2023-53082" title="CVE-2023-53082" />
			<reference href="https://bdu.fstec.ru/vul/2026-03972" type="self" id="BDU:2026-03972" title="BDU:2026-03972" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0050</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53083-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53083-7.3/" type="self" id="ROS-20260128-73-0050" title="ROS-20260128-73-0050" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53083" type="cve" id="CVE-2023-53083" title="CVE-2023-53083" />
			<reference href="https://bdu.fstec.ru/vul/2026-01565" type="self" id="BDU:2026-01565" title="BDU:2026-01565" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0051</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53084-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53084-7.3/" type="self" id="ROS-20260128-73-0051" title="ROS-20260128-73-0051" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53084" type="cve" id="CVE-2023-53084" title="CVE-2023-53084" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0052</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53087-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53087-7.3/" type="self" id="ROS-20260128-73-0052" title="ROS-20260128-73-0052" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53087" type="cve" id="CVE-2023-53087" title="CVE-2023-53087" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0053</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53088-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53088-7.3/" type="self" id="ROS-20260128-73-0053" title="ROS-20260128-73-0053" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53088" type="cve" id="CVE-2023-53088" title="CVE-2023-53088" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0054</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53089-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53089-7.3/" type="self" id="ROS-20260128-73-0054" title="ROS-20260128-73-0054" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53089" type="cve" id="CVE-2023-53089" title="CVE-2023-53089" />
			<reference href="https://bdu.fstec.ru/vul/2026-04629" type="self" id="BDU:2026-04629" title="BDU:2026-04629" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0055</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53090-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53090-7.3/" type="self" id="ROS-20260128-73-0055" title="ROS-20260128-73-0055" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53090" type="cve" id="CVE-2023-53090" title="CVE-2023-53090" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0056</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53091-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53091-7.3/" type="self" id="ROS-20260128-73-0056" title="ROS-20260128-73-0056" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53091" type="cve" id="CVE-2023-53091" title="CVE-2023-53091" />
			<reference href="https://bdu.fstec.ru/vul/2026-03459" type="self" id="BDU:2026-03459" title="BDU:2026-03459" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0057</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53092-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53092-7.3/" type="self" id="ROS-20260128-73-0057" title="ROS-20260128-73-0057" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53092" type="cve" id="CVE-2023-53092" title="CVE-2023-53092" />
			<reference href="https://bdu.fstec.ru/vul/2026-03961" type="self" id="BDU:2026-03961" title="BDU:2026-03961" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0058</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53093-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53093-7.3/" type="self" id="ROS-20260128-73-0058" title="ROS-20260128-73-0058" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53093" type="cve" id="CVE-2023-53093" title="CVE-2023-53093" />
			<reference href="https://bdu.fstec.ru/vul/2026-05865" type="self" id="BDU:2026-05865" title="BDU:2026-05865" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0059</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53094-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53094-7.3/" type="self" id="ROS-20260128-73-0059" title="ROS-20260128-73-0059" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53094" type="cve" id="CVE-2023-53094" title="CVE-2023-53094" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0060</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53095-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53095-7.3/" type="self" id="ROS-20260128-73-0060" title="ROS-20260128-73-0060" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53095" type="cve" id="CVE-2023-53095" title="CVE-2023-53095" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0061</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53096-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53096-7.3/" type="self" id="ROS-20260128-73-0061" title="ROS-20260128-73-0061" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53096" type="cve" id="CVE-2023-53096" title="CVE-2023-53096" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0062</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53102-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53102-7.3/" type="self" id="ROS-20260128-73-0062" title="ROS-20260128-73-0062" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53102" type="cve" id="CVE-2023-53102" title="CVE-2023-53102" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-73-0063</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23148-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-23148-7.3/" type="self" id="ROS-20260128-73-0063" title="ROS-20260128-73-0063" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23148" type="cve" id="CVE-2025-23148" title="CVE-2025-23148" />
			<reference href="https://bdu.fstec.ru/vul/2025-12163" type="self" id="BDU:2025-12163" title="BDU:2025-12163" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0001</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость openstack-barbican </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openstack-barbican</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openstack-barbican-cve-2022-3100-7.3/</description>
               <solution>Установить обновление для пакета(ов) openstack-barbican
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openstack-barbican-cve-2022-3100-7.3/" type="self" id="ROS-20260129-73-0001" title="ROS-20260129-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3100" type="cve" id="CVE-2022-3100" title="CVE-2022-3100" />
			<reference href="https://bdu.fstec.ru/vul/2026-03458" type="self" id="BDU:2026-03458" title="BDU:2026-03458" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openstack-barbican" epoch="0" version="13.0.0" release="4.el7" arch="noarch" src="openstack-barbican-13.0.0-4.el7.src.rpm">
					<filename>openstack-barbican-0:13.0.0-4.el7.noarch.rpm</filename>
				</package>
				<package name="openstack-barbican-api" epoch="0" version="13.0.0" release="4.el7" arch="noarch" src="openstack-barbican-13.0.0-4.el7.src.rpm">
					<filename>openstack-barbican-api-0:13.0.0-4.el7.noarch.rpm</filename>
				</package>
				<package name="openstack-barbican-common" epoch="0" version="13.0.0" release="4.el7" arch="noarch" src="openstack-barbican-13.0.0-4.el7.src.rpm">
					<filename>openstack-barbican-common-0:13.0.0-4.el7.noarch.rpm</filename>
				</package>
				<package name="openstack-barbican-keystone-listener" epoch="0" version="13.0.0" release="4.el7" arch="noarch" src="openstack-barbican-13.0.0-4.el7.src.rpm">
					<filename>openstack-barbican-keystone-listener-0:13.0.0-4.el7.noarch.rpm</filename>
				</package>
				<package name="openstack-barbican-worker" epoch="0" version="13.0.0" release="4.el7" arch="noarch" src="openstack-barbican-13.0.0-4.el7.src.rpm">
					<filename>openstack-barbican-worker-0:13.0.0-4.el7.noarch.rpm</filename>
				</package>
				<package name="python3-barbican" epoch="0" version="13.0.0" release="4.el7" arch="noarch" src="openstack-barbican-13.0.0-4.el7.src.rpm">
					<filename>python3-barbican-0:13.0.0-4.el7.noarch.rpm</filename>
				</package>
				<package name="python3-barbican-tests" epoch="0" version="13.0.0" release="4.el7" arch="noarch" src="openstack-barbican-13.0.0-4.el7.src.rpm">
					<filename>python3-barbican-tests-0:13.0.0-4.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0002</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость openstack-barbican </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openstack-barbican</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openstack-barbican-cve-2023-1633-7.3/</description>
               <solution>Установить обновление для пакета(ов) openstack-barbican
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openstack-barbican-cve-2023-1633-7.3/" type="self" id="ROS-20260129-73-0002" title="ROS-20260129-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1633" type="cve" id="CVE-2023-1633" title="CVE-2023-1633" />
			<reference href="https://bdu.fstec.ru/vul/2026-03564" type="self" id="BDU:2026-03564" title="BDU:2026-03564" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openstack-barbican" epoch="0" version="13.0.0" release="4.el7" arch="noarch" src="openstack-barbican-13.0.0-4.el7.src.rpm">
					<filename>openstack-barbican-0:13.0.0-4.el7.noarch.rpm</filename>
				</package>
				<package name="openstack-barbican-api" epoch="0" version="13.0.0" release="4.el7" arch="noarch" src="openstack-barbican-13.0.0-4.el7.src.rpm">
					<filename>openstack-barbican-api-0:13.0.0-4.el7.noarch.rpm</filename>
				</package>
				<package name="openstack-barbican-common" epoch="0" version="13.0.0" release="4.el7" arch="noarch" src="openstack-barbican-13.0.0-4.el7.src.rpm">
					<filename>openstack-barbican-common-0:13.0.0-4.el7.noarch.rpm</filename>
				</package>
				<package name="openstack-barbican-keystone-listener" epoch="0" version="13.0.0" release="4.el7" arch="noarch" src="openstack-barbican-13.0.0-4.el7.src.rpm">
					<filename>openstack-barbican-keystone-listener-0:13.0.0-4.el7.noarch.rpm</filename>
				</package>
				<package name="openstack-barbican-worker" epoch="0" version="13.0.0" release="4.el7" arch="noarch" src="openstack-barbican-13.0.0-4.el7.src.rpm">
					<filename>openstack-barbican-worker-0:13.0.0-4.el7.noarch.rpm</filename>
				</package>
				<package name="python3-barbican" epoch="0" version="13.0.0" release="4.el7" arch="noarch" src="openstack-barbican-13.0.0-4.el7.src.rpm">
					<filename>python3-barbican-0:13.0.0-4.el7.noarch.rpm</filename>
				</package>
				<package name="python3-barbican-tests" epoch="0" version="13.0.0" release="4.el7" arch="noarch" src="openstack-barbican-13.0.0-4.el7.src.rpm">
					<filename>python3-barbican-tests-0:13.0.0-4.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0003</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость openstack-barbican </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openstack-barbican</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openstack-barbican-cve-2023-1636-7.3/</description>
               <solution>Установить обновление для пакета(ов) openstack-barbican
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openstack-barbican-cve-2023-1636-7.3/" type="self" id="ROS-20260129-73-0003" title="ROS-20260129-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1636" type="cve" id="CVE-2023-1636" title="CVE-2023-1636" />
			<reference href="https://bdu.fstec.ru/vul/2026-03563" type="self" id="BDU:2026-03563" title="BDU:2026-03563" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openstack-barbican" epoch="0" version="13.0.0" release="4.el7" arch="noarch" src="openstack-barbican-13.0.0-4.el7.src.rpm">
					<filename>openstack-barbican-0:13.0.0-4.el7.noarch.rpm</filename>
				</package>
				<package name="openstack-barbican-api" epoch="0" version="13.0.0" release="4.el7" arch="noarch" src="openstack-barbican-13.0.0-4.el7.src.rpm">
					<filename>openstack-barbican-api-0:13.0.0-4.el7.noarch.rpm</filename>
				</package>
				<package name="openstack-barbican-common" epoch="0" version="13.0.0" release="4.el7" arch="noarch" src="openstack-barbican-13.0.0-4.el7.src.rpm">
					<filename>openstack-barbican-common-0:13.0.0-4.el7.noarch.rpm</filename>
				</package>
				<package name="openstack-barbican-keystone-listener" epoch="0" version="13.0.0" release="4.el7" arch="noarch" src="openstack-barbican-13.0.0-4.el7.src.rpm">
					<filename>openstack-barbican-keystone-listener-0:13.0.0-4.el7.noarch.rpm</filename>
				</package>
				<package name="openstack-barbican-worker" epoch="0" version="13.0.0" release="4.el7" arch="noarch" src="openstack-barbican-13.0.0-4.el7.src.rpm">
					<filename>openstack-barbican-worker-0:13.0.0-4.el7.noarch.rpm</filename>
				</package>
				<package name="python3-barbican" epoch="0" version="13.0.0" release="4.el7" arch="noarch" src="openstack-barbican-13.0.0-4.el7.src.rpm">
					<filename>python3-barbican-0:13.0.0-4.el7.noarch.rpm</filename>
				</package>
				<package name="python3-barbican-tests" epoch="0" version="13.0.0" release="4.el7" arch="noarch" src="openstack-barbican-13.0.0-4.el7.src.rpm">
					<filename>python3-barbican-tests-0:13.0.0-4.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0004</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость samba </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в samba</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-samba-cve-2018-14628-7.3/</description>
               <solution>Установить обновление для пакета(ов) samba
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-samba-cve-2018-14628-7.3/" type="self" id="ROS-20260129-73-0004" title="ROS-20260129-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14628" type="cve" id="CVE-2018-14628" title="CVE-2018-14628" />
			<reference href="https://bdu.fstec.ru/vul/2025-03903" type="self" id="BDU:2025-03903" title="BDU:2025-03903" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ctdb" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>ctdb-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="ctdb-ceph-mutex" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>ctdb-ceph-mutex-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="ctdb-etcd-mutex" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>ctdb-etcd-mutex-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="ctdb-pcp-pmda" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>ctdb-pcp-pmda-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="libnetapi" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>libnetapi-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="libnetapi-devel" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>libnetapi-devel-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="libsmbclient" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>libsmbclient-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="libsmbclient-devel" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>libsmbclient-devel-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="libwbclient" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>libwbclient-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="libwbclient-devel" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>libwbclient-devel-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-samba" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>python3-samba-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-samba-dc" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>python3-samba-dc-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-samba-devel" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>python3-samba-devel-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-samba-test" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>python3-samba-test-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="samba" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>samba-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="samba-client" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>samba-client-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="samba-client-libs" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>samba-client-libs-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="samba-common-libs" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>samba-common-libs-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="samba-common-tools" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>samba-common-tools-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="samba-dc" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>samba-dc-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="samba-dc-bind-dlz" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>samba-dc-bind-dlz-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="samba-dc-libs" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>samba-dc-libs-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="samba-dcerpc" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>samba-dcerpc-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="samba-devel" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>samba-devel-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="samba-gpupdate" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>samba-gpupdate-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="samba-krb5-printing" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>samba-krb5-printing-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="samba-ldb-ldap-modules" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>samba-ldb-ldap-modules-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="samba-libs" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>samba-libs-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="samba-test" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>samba-test-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="samba-test-libs" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>samba-test-libs-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="samba-tools" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>samba-tools-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="samba-usershares" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>samba-usershares-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="samba-vfs-cephfs" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>samba-vfs-cephfs-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="samba-vfs-glusterfs" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>samba-vfs-glusterfs-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="samba-vfs-iouring" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>samba-vfs-iouring-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="samba-winbind" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>samba-winbind-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="samba-winbind-clients" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>samba-winbind-clients-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="samba-winbind-krb5-locator" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>samba-winbind-krb5-locator-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="samba-winbind-modules" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>samba-winbind-modules-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="samba-winexe" epoch="0" version="4.19.9" release="1m.el7" arch="x86_64" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>samba-winexe-0:4.19.9-1m.el7.x86_64.rpm</filename>
				</package>
				<package name="samba-common" epoch="0" version="4.19.9" release="1m.el7" arch="noarch" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>samba-common-0:4.19.9-1m.el7.noarch.rpm</filename>
				</package>
				<package name="samba-dc-provision" epoch="0" version="4.19.9" release="1m.el7" arch="noarch" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>samba-dc-provision-0:4.19.9-1m.el7.noarch.rpm</filename>
				</package>
				<package name="samba-pidl" epoch="0" version="4.19.9" release="1m.el7" arch="noarch" src="samba-4.19.9-1m.el7.src.rpm">
					<filename>samba-pidl-0:4.19.9-1m.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0005</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость gnome-shell </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gnome-shell</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gnome-shell-cve-2024-36472-7.3/</description>
               <solution>Установить обновление для пакета(ов) gnome-shell
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gnome-shell-cve-2024-36472-7.3/" type="self" id="ROS-20260129-73-0005" title="ROS-20260129-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36472" type="cve" id="CVE-2024-36472" title="CVE-2024-36472" />
			<reference href="https://bdu.fstec.ru/vul/2024-04675" type="self" id="BDU:2024-04675" title="BDU:2024-04675" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gnome-shell" epoch="0" version="3.38.1" release="20.el7" arch="x86_64" src="gnome-shell-3.38.1-20.el7.src.rpm">
					<filename>gnome-shell-0:3.38.1-20.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0006</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость gdb </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gdb</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gdb-cve-2023-39128-7.3/</description>
               <solution>Установить обновление для пакета(ов) gdb
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gdb-cve-2023-39128-7.3/" type="self" id="ROS-20260129-73-0006" title="ROS-20260129-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39128" type="cve" id="CVE-2023-39128" title="CVE-2023-39128" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gdb" epoch="0" version="11.2" release="5.el7" arch="x86_64" src="gdb-11.2-5.el7.src.rpm">
					<filename>gdb-0:11.2-5.el7.x86_64.rpm</filename>
				</package>
				<package name="gdb-gdbserver" epoch="0" version="11.2" release="5.el7" arch="x86_64" src="gdb-11.2-5.el7.src.rpm">
					<filename>gdb-gdbserver-0:11.2-5.el7.x86_64.rpm</filename>
				</package>
				<package name="gdb-headless" epoch="0" version="11.2" release="5.el7" arch="x86_64" src="gdb-11.2-5.el7.src.rpm">
					<filename>gdb-headless-0:11.2-5.el7.x86_64.rpm</filename>
				</package>
				<package name="gdb-minimal" epoch="0" version="11.2" release="5.el7" arch="x86_64" src="gdb-11.2-5.el7.src.rpm">
					<filename>gdb-minimal-0:11.2-5.el7.x86_64.rpm</filename>
				</package>
				<package name="gdb-doc" epoch="0" version="11.2" release="5.el7" arch="noarch" src="gdb-11.2-5.el7.src.rpm">
					<filename>gdb-doc-0:11.2-5.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0007</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость gdb </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gdb</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gdb-cve-2023-39130-7.3/</description>
               <solution>Установить обновление для пакета(ов) gdb
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gdb-cve-2023-39130-7.3/" type="self" id="ROS-20260129-73-0007" title="ROS-20260129-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39130" type="cve" id="CVE-2023-39130" title="CVE-2023-39130" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gdb" epoch="0" version="11.2" release="5.el7" arch="x86_64" src="gdb-11.2-5.el7.src.rpm">
					<filename>gdb-0:11.2-5.el7.x86_64.rpm</filename>
				</package>
				<package name="gdb-gdbserver" epoch="0" version="11.2" release="5.el7" arch="x86_64" src="gdb-11.2-5.el7.src.rpm">
					<filename>gdb-gdbserver-0:11.2-5.el7.x86_64.rpm</filename>
				</package>
				<package name="gdb-headless" epoch="0" version="11.2" release="5.el7" arch="x86_64" src="gdb-11.2-5.el7.src.rpm">
					<filename>gdb-headless-0:11.2-5.el7.x86_64.rpm</filename>
				</package>
				<package name="gdb-minimal" epoch="0" version="11.2" release="5.el7" arch="x86_64" src="gdb-11.2-5.el7.src.rpm">
					<filename>gdb-minimal-0:11.2-5.el7.x86_64.rpm</filename>
				</package>
				<package name="gdb-doc" epoch="0" version="11.2" release="5.el7" arch="noarch" src="gdb-11.2-5.el7.src.rpm">
					<filename>gdb-doc-0:11.2-5.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0008</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-45896-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-45896-7.3/" type="self" id="ROS-20260129-73-0008" title="ROS-20260129-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45896" type="cve" id="CVE-2023-45896" title="CVE-2023-45896" />
			<reference href="https://bdu.fstec.ru/vul/2025-07507" type="self" id="BDU:2025-07507" title="BDU:2025-07507" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.110" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.110-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.110" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.110-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.110-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0009</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость cockpit </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в cockpit</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cockpit-cve-2021-3698-7.3/</description>
               <solution>Установить обновление для пакета(ов) cockpit
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cockpit-cve-2021-3698-7.3/" type="self" id="ROS-20260129-73-0009" title="ROS-20260129-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3698" type="cve" id="CVE-2021-3698" title="CVE-2021-3698" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cockpit" epoch="0" version="331" release="1.el7" arch="x86_64" src="cockpit-331-1.el7.src.rpm">
					<filename>cockpit-0:331-1.el7.x86_64.rpm</filename>
				</package>
				<package name="cockpit-bridge" epoch="0" version="331" release="1.el7" arch="x86_64" src="cockpit-331-1.el7.src.rpm">
					<filename>cockpit-bridge-0:331-1.el7.x86_64.rpm</filename>
				</package>
				<package name="cockpit-ws" epoch="0" version="331" release="1.el7" arch="x86_64" src="cockpit-331-1.el7.src.rpm">
					<filename>cockpit-ws-0:331-1.el7.x86_64.rpm</filename>
				</package>
				<package name="cockpit-doc" epoch="0" version="331" release="1.el7" arch="noarch" src="cockpit-331-1.el7.src.rpm">
					<filename>cockpit-doc-0:331-1.el7.noarch.rpm</filename>
				</package>
				<package name="cockpit-kdump" epoch="0" version="331" release="1.el7" arch="noarch" src="cockpit-331-1.el7.src.rpm">
					<filename>cockpit-kdump-0:331-1.el7.noarch.rpm</filename>
				</package>
				<package name="cockpit-networkmanager" epoch="0" version="331" release="1.el7" arch="noarch" src="cockpit-331-1.el7.src.rpm">
					<filename>cockpit-networkmanager-0:331-1.el7.noarch.rpm</filename>
				</package>
				<package name="cockpit-packagekit" epoch="0" version="331" release="1.el7" arch="noarch" src="cockpit-331-1.el7.src.rpm">
					<filename>cockpit-packagekit-0:331-1.el7.noarch.rpm</filename>
				</package>
				<package name="cockpit-selinux" epoch="0" version="331" release="1.el7" arch="noarch" src="cockpit-331-1.el7.src.rpm">
					<filename>cockpit-selinux-0:331-1.el7.noarch.rpm</filename>
				</package>
				<package name="cockpit-sosreport" epoch="0" version="331" release="1.el7" arch="noarch" src="cockpit-331-1.el7.src.rpm">
					<filename>cockpit-sosreport-0:331-1.el7.noarch.rpm</filename>
				</package>
				<package name="cockpit-storaged" epoch="0" version="331" release="1.el7" arch="noarch" src="cockpit-331-1.el7.src.rpm">
					<filename>cockpit-storaged-0:331-1.el7.noarch.rpm</filename>
				</package>
				<package name="cockpit-system" epoch="0" version="331" release="1.el7" arch="noarch" src="cockpit-331-1.el7.src.rpm">
					<filename>cockpit-system-0:331-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0010</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость gimp </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2025-6035-7.3/</description>
               <solution>Установить обновление для пакета(ов) gimp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2025-6035-7.3/" type="self" id="ROS-20260129-73-0010" title="ROS-20260129-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6035" type="cve" id="CVE-2025-6035" title="CVE-2025-6035" />
			<reference href="https://bdu.fstec.ru/vul/2025-10732" type="self" id="BDU:2025-10732" title="BDU:2025-10732" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gimp" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-devel-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-devel-tools-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-libs-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0011</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость bluez </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в bluez</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-bluez-cve-2023-51589-7.3/</description>
               <solution>Установить обновление для пакета(ов) bluez
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-bluez-cve-2023-51589-7.3/" type="self" id="ROS-20260129-73-0011" title="ROS-20260129-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51589" type="cve" id="CVE-2023-51589" title="CVE-2023-51589" />
			<reference href="https://bdu.fstec.ru/vul/2025-16168" type="self" id="BDU:2025-16168" title="BDU:2025-16168" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="bluez" epoch="0" version="5.84" release="1.el7" arch="x86_64" src="bluez-5.84-1.el7.src.rpm">
					<filename>bluez-0:5.84-1.el7.x86_64.rpm</filename>
				</package>
				<package name="bluez-cups" epoch="0" version="5.84" release="1.el7" arch="x86_64" src="bluez-5.84-1.el7.src.rpm">
					<filename>bluez-cups-0:5.84-1.el7.x86_64.rpm</filename>
				</package>
				<package name="bluez-deprecated" epoch="0" version="5.84" release="1.el7" arch="x86_64" src="bluez-5.84-1.el7.src.rpm">
					<filename>bluez-deprecated-0:5.84-1.el7.x86_64.rpm</filename>
				</package>
				<package name="bluez-hid2hci" epoch="0" version="5.84" release="1.el7" arch="x86_64" src="bluez-5.84-1.el7.src.rpm">
					<filename>bluez-hid2hci-0:5.84-1.el7.x86_64.rpm</filename>
				</package>
				<package name="bluez-libs" epoch="0" version="5.84" release="1.el7" arch="x86_64" src="bluez-5.84-1.el7.src.rpm">
					<filename>bluez-libs-0:5.84-1.el7.x86_64.rpm</filename>
				</package>
				<package name="bluez-libs-devel" epoch="0" version="5.84" release="1.el7" arch="x86_64" src="bluez-5.84-1.el7.src.rpm">
					<filename>bluez-libs-devel-0:5.84-1.el7.x86_64.rpm</filename>
				</package>
				<package name="bluez-mesh" epoch="0" version="5.84" release="1.el7" arch="x86_64" src="bluez-5.84-1.el7.src.rpm">
					<filename>bluez-mesh-0:5.84-1.el7.x86_64.rpm</filename>
				</package>
				<package name="bluez-obexd" epoch="0" version="5.84" release="1.el7" arch="x86_64" src="bluez-5.84-1.el7.src.rpm">
					<filename>bluez-obexd-0:5.84-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0012</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость bluez </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в bluez</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-bluez-cve-2023-51592-7.3/</description>
               <solution>Установить обновление для пакета(ов) bluez
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-bluez-cve-2023-51592-7.3/" type="self" id="ROS-20260129-73-0012" title="ROS-20260129-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51592" type="cve" id="CVE-2023-51592" title="CVE-2023-51592" />
			<reference href="https://bdu.fstec.ru/vul/2025-16169" type="self" id="BDU:2025-16169" title="BDU:2025-16169" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="bluez" epoch="0" version="5.84" release="1.el7" arch="x86_64" src="bluez-5.84-1.el7.src.rpm">
					<filename>bluez-0:5.84-1.el7.x86_64.rpm</filename>
				</package>
				<package name="bluez-cups" epoch="0" version="5.84" release="1.el7" arch="x86_64" src="bluez-5.84-1.el7.src.rpm">
					<filename>bluez-cups-0:5.84-1.el7.x86_64.rpm</filename>
				</package>
				<package name="bluez-deprecated" epoch="0" version="5.84" release="1.el7" arch="x86_64" src="bluez-5.84-1.el7.src.rpm">
					<filename>bluez-deprecated-0:5.84-1.el7.x86_64.rpm</filename>
				</package>
				<package name="bluez-hid2hci" epoch="0" version="5.84" release="1.el7" arch="x86_64" src="bluez-5.84-1.el7.src.rpm">
					<filename>bluez-hid2hci-0:5.84-1.el7.x86_64.rpm</filename>
				</package>
				<package name="bluez-libs" epoch="0" version="5.84" release="1.el7" arch="x86_64" src="bluez-5.84-1.el7.src.rpm">
					<filename>bluez-libs-0:5.84-1.el7.x86_64.rpm</filename>
				</package>
				<package name="bluez-libs-devel" epoch="0" version="5.84" release="1.el7" arch="x86_64" src="bluez-5.84-1.el7.src.rpm">
					<filename>bluez-libs-devel-0:5.84-1.el7.x86_64.rpm</filename>
				</package>
				<package name="bluez-mesh" epoch="0" version="5.84" release="1.el7" arch="x86_64" src="bluez-5.84-1.el7.src.rpm">
					<filename>bluez-mesh-0:5.84-1.el7.x86_64.rpm</filename>
				</package>
				<package name="bluez-obexd" epoch="0" version="5.84" release="1.el7" arch="x86_64" src="bluez-5.84-1.el7.src.rpm">
					<filename>bluez-obexd-0:5.84-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0013</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость bluez </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в bluez</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-bluez-cve-2023-51594-7.3/</description>
               <solution>Установить обновление для пакета(ов) bluez
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-bluez-cve-2023-51594-7.3/" type="self" id="ROS-20260129-73-0013" title="ROS-20260129-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51594" type="cve" id="CVE-2023-51594" title="CVE-2023-51594" />
			<reference href="https://bdu.fstec.ru/vul/2025-16170" type="self" id="BDU:2025-16170" title="BDU:2025-16170" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="bluez" epoch="0" version="5.84" release="1.el7" arch="x86_64" src="bluez-5.84-1.el7.src.rpm">
					<filename>bluez-0:5.84-1.el7.x86_64.rpm</filename>
				</package>
				<package name="bluez-cups" epoch="0" version="5.84" release="1.el7" arch="x86_64" src="bluez-5.84-1.el7.src.rpm">
					<filename>bluez-cups-0:5.84-1.el7.x86_64.rpm</filename>
				</package>
				<package name="bluez-deprecated" epoch="0" version="5.84" release="1.el7" arch="x86_64" src="bluez-5.84-1.el7.src.rpm">
					<filename>bluez-deprecated-0:5.84-1.el7.x86_64.rpm</filename>
				</package>
				<package name="bluez-hid2hci" epoch="0" version="5.84" release="1.el7" arch="x86_64" src="bluez-5.84-1.el7.src.rpm">
					<filename>bluez-hid2hci-0:5.84-1.el7.x86_64.rpm</filename>
				</package>
				<package name="bluez-libs" epoch="0" version="5.84" release="1.el7" arch="x86_64" src="bluez-5.84-1.el7.src.rpm">
					<filename>bluez-libs-0:5.84-1.el7.x86_64.rpm</filename>
				</package>
				<package name="bluez-libs-devel" epoch="0" version="5.84" release="1.el7" arch="x86_64" src="bluez-5.84-1.el7.src.rpm">
					<filename>bluez-libs-devel-0:5.84-1.el7.x86_64.rpm</filename>
				</package>
				<package name="bluez-mesh" epoch="0" version="5.84" release="1.el7" arch="x86_64" src="bluez-5.84-1.el7.src.rpm">
					<filename>bluez-mesh-0:5.84-1.el7.x86_64.rpm</filename>
				</package>
				<package name="bluez-obexd" epoch="0" version="5.84" release="1.el7" arch="x86_64" src="bluez-5.84-1.el7.src.rpm">
					<filename>bluez-obexd-0:5.84-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0015</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость python3 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2025-6069-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2025-6069-7.3/" type="self" id="ROS-20260129-73-0015" title="ROS-20260129-73-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6069" type="cve" id="CVE-2025-6069" title="CVE-2025-6069" />
			<reference href="https://bdu.fstec.ru/vul/2025-11082" type="self" id="BDU:2025-11082" title="BDU:2025-11082" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3" epoch="0" version="3.8.20" release="7.el7" arch="x86_64" src="python3-3.8.20-7.el7.src.rpm">
					<filename>python3-0:3.8.20-7.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-debug" epoch="0" version="3.8.20" release="7.el7" arch="x86_64" src="python3-3.8.20-7.el7.src.rpm">
					<filename>python3-debug-0:3.8.20-7.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-devel" epoch="0" version="3.8.20" release="7.el7" arch="x86_64" src="python3-3.8.20-7.el7.src.rpm">
					<filename>python3-devel-0:3.8.20-7.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-idle" epoch="0" version="3.8.20" release="7.el7" arch="x86_64" src="python3-3.8.20-7.el7.src.rpm">
					<filename>python3-idle-0:3.8.20-7.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-libs" epoch="0" version="3.8.20" release="7.el7" arch="x86_64" src="python3-3.8.20-7.el7.src.rpm">
					<filename>python3-libs-0:3.8.20-7.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-test" epoch="0" version="3.8.20" release="7.el7" arch="x86_64" src="python3-3.8.20-7.el7.src.rpm">
					<filename>python3-test-0:3.8.20-7.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-tkinter" epoch="0" version="3.8.20" release="7.el7" arch="x86_64" src="python3-3.8.20-7.el7.src.rpm">
					<filename>python3-tkinter-0:3.8.20-7.el7.x86_64.rpm</filename>
				</package>
				<package name="python-unversioned-command" epoch="0" version="3.8.20" release="7.el7" arch="noarch" src="python3-3.8.20-7.el7.src.rpm">
					<filename>python-unversioned-command-0:3.8.20-7.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0016</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость python3 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2025-8194-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2025-8194-7.3/" type="self" id="ROS-20260129-73-0016" title="ROS-20260129-73-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8194" type="cve" id="CVE-2025-8194" title="CVE-2025-8194" />
			<reference href="https://bdu.fstec.ru/vul/2025-09687" type="self" id="BDU:2025-09687" title="BDU:2025-09687" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3" epoch="0" version="3.8.20" release="7.el7" arch="x86_64" src="python3-3.8.20-7.el7.src.rpm">
					<filename>python3-0:3.8.20-7.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-debug" epoch="0" version="3.8.20" release="7.el7" arch="x86_64" src="python3-3.8.20-7.el7.src.rpm">
					<filename>python3-debug-0:3.8.20-7.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-devel" epoch="0" version="3.8.20" release="7.el7" arch="x86_64" src="python3-3.8.20-7.el7.src.rpm">
					<filename>python3-devel-0:3.8.20-7.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-idle" epoch="0" version="3.8.20" release="7.el7" arch="x86_64" src="python3-3.8.20-7.el7.src.rpm">
					<filename>python3-idle-0:3.8.20-7.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-libs" epoch="0" version="3.8.20" release="7.el7" arch="x86_64" src="python3-3.8.20-7.el7.src.rpm">
					<filename>python3-libs-0:3.8.20-7.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-test" epoch="0" version="3.8.20" release="7.el7" arch="x86_64" src="python3-3.8.20-7.el7.src.rpm">
					<filename>python3-test-0:3.8.20-7.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-tkinter" epoch="0" version="3.8.20" release="7.el7" arch="x86_64" src="python3-3.8.20-7.el7.src.rpm">
					<filename>python3-tkinter-0:3.8.20-7.el7.x86_64.rpm</filename>
				</package>
				<package name="python-unversioned-command" epoch="0" version="3.8.20" release="7.el7" arch="noarch" src="python3-3.8.20-7.el7.src.rpm">
					<filename>python-unversioned-command-0:3.8.20-7.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0017</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость rust </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в rust</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rust-cve-2025-11233-7.3/</description>
               <solution>Установить обновление для пакета(ов) rust
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rust-cve-2025-11233-7.3/" type="self" id="ROS-20260129-73-0017" title="ROS-20260129-73-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11233" type="cve" id="CVE-2025-11233" title="CVE-2025-11233" />
			<reference href="https://bdu.fstec.ru/vul/2026-02958" type="self" id="BDU:2026-02958" title="BDU:2026-02958" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cargo" epoch="0" version="1.91.1" release="2.el7" arch="x86_64" src="rust-1.91.1-2.el7.src.rpm">
					<filename>cargo-0:1.91.1-2.el7.x86_64.rpm</filename>
				</package>
				<package name="clippy" epoch="0" version="1.91.1" release="2.el7" arch="x86_64" src="rust-1.91.1-2.el7.src.rpm">
					<filename>clippy-0:1.91.1-2.el7.x86_64.rpm</filename>
				</package>
				<package name="rust" epoch="0" version="1.91.1" release="2.el7" arch="x86_64" src="rust-1.91.1-2.el7.src.rpm">
					<filename>rust-0:1.91.1-2.el7.x86_64.rpm</filename>
				</package>
				<package name="rust-analyzer" epoch="0" version="1.91.1" release="2.el7" arch="x86_64" src="rust-1.91.1-2.el7.src.rpm">
					<filename>rust-analyzer-0:1.91.1-2.el7.x86_64.rpm</filename>
				</package>
				<package name="rust-doc" epoch="0" version="1.91.1" release="2.el7" arch="x86_64" src="rust-1.91.1-2.el7.src.rpm">
					<filename>rust-doc-0:1.91.1-2.el7.x86_64.rpm</filename>
				</package>
				<package name="rust-std-static" epoch="0" version="1.91.1" release="2.el7" arch="x86_64" src="rust-1.91.1-2.el7.src.rpm">
					<filename>rust-std-static-0:1.91.1-2.el7.x86_64.rpm</filename>
				</package>
				<package name="rust-std-static-x86_64-unknown-none" epoch="0" version="1.91.1" release="2.el7" arch="x86_64" src="rust-1.91.1-2.el7.src.rpm">
					<filename>rust-std-static-x86_64-unknown-none-0:1.91.1-2.el7.x86_64.rpm</filename>
				</package>
				<package name="rust-std-static-x86_64-unknown-uefi" epoch="0" version="1.91.1" release="2.el7" arch="x86_64" src="rust-1.91.1-2.el7.src.rpm">
					<filename>rust-std-static-x86_64-unknown-uefi-0:1.91.1-2.el7.x86_64.rpm</filename>
				</package>
				<package name="rustfmt" epoch="0" version="1.91.1" release="2.el7" arch="x86_64" src="rust-1.91.1-2.el7.src.rpm">
					<filename>rustfmt-0:1.91.1-2.el7.x86_64.rpm</filename>
				</package>
				<package name="rust-debugger-common" epoch="0" version="1.91.1" release="2.el7" arch="noarch" src="rust-1.91.1-2.el7.src.rpm">
					<filename>rust-debugger-common-0:1.91.1-2.el7.noarch.rpm</filename>
				</package>
				<package name="rust-gdb" epoch="0" version="1.91.1" release="2.el7" arch="noarch" src="rust-1.91.1-2.el7.src.rpm">
					<filename>rust-gdb-0:1.91.1-2.el7.noarch.rpm</filename>
				</package>
				<package name="rust-lldb" epoch="0" version="1.91.1" release="2.el7" arch="noarch" src="rust-1.91.1-2.el7.src.rpm">
					<filename>rust-lldb-0:1.91.1-2.el7.noarch.rpm</filename>
				</package>
				<package name="rust-src" epoch="0" version="1.91.1" release="2.el7" arch="noarch" src="rust-1.91.1-2.el7.src.rpm">
					<filename>rust-src-0:1.91.1-2.el7.noarch.rpm</filename>
				</package>
				<package name="rust-toolset" epoch="0" version="1.91.1" release="2.el7" arch="noarch" src="rust-1.91.1-2.el7.src.rpm">
					<filename>rust-toolset-0:1.91.1-2.el7.noarch.rpm</filename>
				</package>
				<package name="rust-toolset-srpm-macros" epoch="0" version="1.91.1" release="2.el7" arch="noarch" src="rust-1.91.1-2.el7.src.rpm">
					<filename>rust-toolset-srpm-macros-0:1.91.1-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0018</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость gimp </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2025-10921-7.3/</description>
               <solution>Установить обновление для пакета(ов) gimp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2025-10921-7.3/" type="self" id="ROS-20260129-73-0018" title="ROS-20260129-73-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10921" type="cve" id="CVE-2025-10921" title="CVE-2025-10921" />
			<reference href="https://bdu.fstec.ru/vul/2025-16065" type="self" id="BDU:2025-16065" title="BDU:2025-16065" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gimp" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-devel-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-devel-tools-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-libs-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0019</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость python-ldap </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-ldap</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-ldap-cve-2025-61911-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-ldap
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-ldap-cve-2025-61911-7.3/" type="self" id="ROS-20260129-73-0019" title="ROS-20260129-73-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61911" type="cve" id="CVE-2025-61911" title="CVE-2025-61911" />
			<reference href="https://bdu.fstec.ru/vul/2026-02913" type="self" id="BDU:2026-02913" title="BDU:2026-02913" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-ldap" epoch="0" version="3.4.5" release="1.el7" arch="x86_64" src="python-ldap-3.4.5-1.el7.src.rpm">
					<filename>python3-ldap-0:3.4.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python-ldap-doc" epoch="0" version="3.4.5" release="1.el7" arch="noarch" src="python-ldap-3.4.5-1.el7.src.rpm">
					<filename>python-ldap-doc-0:3.4.5-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0020</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость python-ldap </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-ldap</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-ldap-cve-2025-61912-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-ldap
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-ldap-cve-2025-61912-7.3/" type="self" id="ROS-20260129-73-0020" title="ROS-20260129-73-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61912" type="cve" id="CVE-2025-61912" title="CVE-2025-61912" />
			<reference href="https://bdu.fstec.ru/vul/2026-02915" type="self" id="BDU:2026-02915" title="BDU:2026-02915" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-ldap" epoch="0" version="3.4.5" release="1.el7" arch="x86_64" src="python-ldap-3.4.5-1.el7.src.rpm">
					<filename>python3-ldap-0:3.4.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python-ldap-doc" epoch="0" version="3.4.5" release="1.el7" arch="noarch" src="python-ldap-3.4.5-1.el7.src.rpm">
					<filename>python-ldap-doc-0:3.4.5-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0021</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость libxslt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в libxslt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libxslt-cve-2025-11731-7.3/</description>
               <solution>Установить обновление для пакета(ов) libxslt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libxslt-cve-2025-11731-7.3/" type="self" id="ROS-20260129-73-0021" title="ROS-20260129-73-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11731" type="cve" id="CVE-2025-11731" title="CVE-2025-11731" />
			<reference href="https://bdu.fstec.ru/vul/2026-02739" type="self" id="BDU:2026-02739" title="BDU:2026-02739" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libxslt" epoch="0" version="1.1.43" release="4.el7" arch="x86_64" src="libxslt-1.1.43-4.el7.src.rpm">
					<filename>libxslt-0:1.1.43-4.el7.x86_64.rpm</filename>
				</package>
				<package name="libxslt-devel" epoch="0" version="1.1.43" release="4.el7" arch="x86_64" src="libxslt-1.1.43-4.el7.src.rpm">
					<filename>libxslt-devel-0:1.1.43-4.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-libxslt" epoch="0" version="1.1.43" release="4.el7" arch="x86_64" src="libxslt-1.1.43-4.el7.src.rpm">
					<filename>python3-libxslt-0:1.1.43-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0022</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость ImageMagick </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в ImageMagick</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick-cve-2025-62594-7.3/</description>
               <solution>Установить обновление для пакета(ов) ImageMagick
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick-cve-2025-62594-7.3/" type="self" id="ROS-20260129-73-0022" title="ROS-20260129-73-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62594" type="cve" id="CVE-2025-62594" title="CVE-2025-62594" />
			<reference href="https://bdu.fstec.ru/vul/2026-03385" type="self" id="BDU:2026-03385" title="BDU:2026-03385" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ImageMagick" epoch="1" version="6.9.13.29" release="3.el7" arch="x86_64" src="ImageMagick-6.9.13.29-3.el7.src.rpm">
					<filename>ImageMagick-1:6.9.13.29-3.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-c++" epoch="1" version="6.9.13.29" release="3.el7" arch="x86_64" src="ImageMagick-6.9.13.29-3.el7.src.rpm">
					<filename>ImageMagick-c++-1:6.9.13.29-3.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-c++-devel" epoch="1" version="6.9.13.29" release="3.el7" arch="x86_64" src="ImageMagick-6.9.13.29-3.el7.src.rpm">
					<filename>ImageMagick-c++-devel-1:6.9.13.29-3.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-devel" epoch="1" version="6.9.13.29" release="3.el7" arch="x86_64" src="ImageMagick-6.9.13.29-3.el7.src.rpm">
					<filename>ImageMagick-devel-1:6.9.13.29-3.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-djvu" epoch="1" version="6.9.13.29" release="3.el7" arch="x86_64" src="ImageMagick-6.9.13.29-3.el7.src.rpm">
					<filename>ImageMagick-djvu-1:6.9.13.29-3.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-doc" epoch="1" version="6.9.13.29" release="3.el7" arch="x86_64" src="ImageMagick-6.9.13.29-3.el7.src.rpm">
					<filename>ImageMagick-doc-1:6.9.13.29-3.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-heic" epoch="1" version="6.9.13.29" release="3.el7" arch="x86_64" src="ImageMagick-6.9.13.29-3.el7.src.rpm">
					<filename>ImageMagick-heic-1:6.9.13.29-3.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-libs" epoch="1" version="6.9.13.29" release="3.el7" arch="x86_64" src="ImageMagick-6.9.13.29-3.el7.src.rpm">
					<filename>ImageMagick-libs-1:6.9.13.29-3.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-perl" epoch="1" version="6.9.13.29" release="3.el7" arch="x86_64" src="ImageMagick-6.9.13.29-3.el7.src.rpm">
					<filename>ImageMagick-perl-1:6.9.13.29-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0023</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость ImageMagick7 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в ImageMagick7</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick7-cve-2025-62594-7.3/</description>
               <solution>Установить обновление для пакета(ов) ImageMagick7
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-imagemagick7-cve-2025-62594-7.3/" type="self" id="ROS-20260129-73-0023" title="ROS-20260129-73-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62594" type="cve" id="CVE-2025-62594" title="CVE-2025-62594" />
			<reference href="https://bdu.fstec.ru/vul/2026-03385" type="self" id="BDU:2026-03385" title="BDU:2026-03385" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ImageMagick7" epoch="0" version="7.1.2.3" release="3.el7" arch="x86_64" src="ImageMagick7-7.1.2.3-3.el7.src.rpm">
					<filename>ImageMagick7-0:7.1.2.3-3.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick7-c++" epoch="0" version="7.1.2.3" release="3.el7" arch="x86_64" src="ImageMagick7-7.1.2.3-3.el7.src.rpm">
					<filename>ImageMagick7-c++-0:7.1.2.3-3.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick7-c++-devel" epoch="0" version="7.1.2.3" release="3.el7" arch="x86_64" src="ImageMagick7-7.1.2.3-3.el7.src.rpm">
					<filename>ImageMagick7-c++-devel-0:7.1.2.3-3.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick7-devel" epoch="0" version="7.1.2.3" release="3.el7" arch="x86_64" src="ImageMagick7-7.1.2.3-3.el7.src.rpm">
					<filename>ImageMagick7-devel-0:7.1.2.3-3.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick7-djvu" epoch="0" version="7.1.2.3" release="3.el7" arch="x86_64" src="ImageMagick7-7.1.2.3-3.el7.src.rpm">
					<filename>ImageMagick7-djvu-0:7.1.2.3-3.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick7-doc" epoch="0" version="7.1.2.3" release="3.el7" arch="x86_64" src="ImageMagick7-7.1.2.3-3.el7.src.rpm">
					<filename>ImageMagick7-doc-0:7.1.2.3-3.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick7-libs" epoch="0" version="7.1.2.3" release="3.el7" arch="x86_64" src="ImageMagick7-7.1.2.3-3.el7.src.rpm">
					<filename>ImageMagick7-libs-0:7.1.2.3-3.el7.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick7-perl" epoch="0" version="7.1.2.3" release="3.el7" arch="x86_64" src="ImageMagick7-7.1.2.3-3.el7.src.rpm">
					<filename>ImageMagick7-perl-0:7.1.2.3-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0024</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость gimp </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2025-10922-7.3/</description>
               <solution>Установить обновление для пакета(ов) gimp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2025-10922-7.3/" type="self" id="ROS-20260129-73-0024" title="ROS-20260129-73-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10922" type="cve" id="CVE-2025-10922" title="CVE-2025-10922" />
			<reference href="https://bdu.fstec.ru/vul/2025-16064" type="self" id="BDU:2025-16064" title="BDU:2025-16064" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gimp" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-devel-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-devel-tools-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-libs-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0025</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость haproxy </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в haproxy</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-haproxy-cve-2025-11230-7.3/</description>
               <solution>Установить обновление для пакета(ов) haproxy
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-haproxy-cve-2025-11230-7.3/" type="self" id="ROS-20260129-73-0025" title="ROS-20260129-73-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11230" type="cve" id="CVE-2025-11230" title="CVE-2025-11230" />
			<reference href="https://bdu.fstec.ru/vul/2025-13169" type="self" id="BDU:2025-13169" title="BDU:2025-13169" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="haproxy" epoch="0" version="3.2.7" release="1.el7" arch="x86_64" src="haproxy-3.2.7-1.el7.src.rpm">
					<filename>haproxy-0:3.2.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0026</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость python-kdcproxy </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-kdcproxy</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-kdcproxy-cve-2025-59089-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-kdcproxy
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-kdcproxy-cve-2025-59089-7.3/" type="self" id="ROS-20260129-73-0026" title="ROS-20260129-73-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59089" type="cve" id="CVE-2025-59089" title="CVE-2025-59089" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-kdcproxy" epoch="0" version="1.1.0" release="1.el7" arch="noarch" src="python-kdcproxy-1.1.0-1.el7.src.rpm">
					<filename>python3-kdcproxy-0:1.1.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0027</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость python-kdcproxy </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-kdcproxy</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-kdcproxy-cve-2025-59088-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-kdcproxy
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-kdcproxy-cve-2025-59088-7.3/" type="self" id="ROS-20260129-73-0027" title="ROS-20260129-73-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59088" type="cve" id="CVE-2025-59088" title="CVE-2025-59088" />
			<reference href="https://bdu.fstec.ru/vul/2026-03011" type="self" id="BDU:2026-03011" title="BDU:2026-03011" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-kdcproxy" epoch="0" version="1.1.0" release="1.el7" arch="noarch" src="python-kdcproxy-1.1.0-1.el7.src.rpm">
					<filename>python3-kdcproxy-0:1.1.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0028</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость postgresql15 </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в postgresql15</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql15-cve-2025-12817-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql15
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql15-cve-2025-12817-7.3/" type="self" id="ROS-20260129-73-0028" title="ROS-20260129-73-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12817" type="cve" id="CVE-2025-12817" title="CVE-2025-12817" />
			<reference href="https://bdu.fstec.ru/vul/2025-14083" type="self" id="BDU:2025-14083" title="BDU:2025-14083" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql15" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-15.15-1.el7.src.rpm">
					<filename>postgresql15-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-contrib" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-15.15-1.el7.src.rpm">
					<filename>postgresql15-contrib-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-devel" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-15.15-1.el7.src.rpm">
					<filename>postgresql15-devel-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-docs" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-15.15-1.el7.src.rpm">
					<filename>postgresql15-docs-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-libs" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-15.15-1.el7.src.rpm">
					<filename>postgresql15-libs-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-llvmjit" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-15.15-1.el7.src.rpm">
					<filename>postgresql15-llvmjit-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-plperl" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-15.15-1.el7.src.rpm">
					<filename>postgresql15-plperl-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-plpython3" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-15.15-1.el7.src.rpm">
					<filename>postgresql15-plpython3-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-pltcl" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-15.15-1.el7.src.rpm">
					<filename>postgresql15-pltcl-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-server" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-15.15-1.el7.src.rpm">
					<filename>postgresql15-server-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-test" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-15.15-1.el7.src.rpm">
					<filename>postgresql15-test-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0029</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость postgresql15-1c </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в postgresql15-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql15-1c-cve-2025-12817-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql15-1c
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql15-1c-cve-2025-12817-7.3/" type="self" id="ROS-20260129-73-0029" title="ROS-20260129-73-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12817" type="cve" id="CVE-2025-12817" title="CVE-2025-12817" />
			<reference href="https://bdu.fstec.ru/vul/2025-14083" type="self" id="BDU:2025-14083" title="BDU:2025-14083" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql15-1c" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-1c-15.15-1.el7.src.rpm">
					<filename>postgresql15-1c-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-contrib" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-1c-15.15-1.el7.src.rpm">
					<filename>postgresql15-1c-contrib-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-devel" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-1c-15.15-1.el7.src.rpm">
					<filename>postgresql15-1c-devel-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-docs" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-1c-15.15-1.el7.src.rpm">
					<filename>postgresql15-1c-docs-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-libs" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-1c-15.15-1.el7.src.rpm">
					<filename>postgresql15-1c-libs-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-llvmjit" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-1c-15.15-1.el7.src.rpm">
					<filename>postgresql15-1c-llvmjit-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-plperl" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-1c-15.15-1.el7.src.rpm">
					<filename>postgresql15-1c-plperl-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-plpython3" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-1c-15.15-1.el7.src.rpm">
					<filename>postgresql15-1c-plpython3-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-pltcl" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-1c-15.15-1.el7.src.rpm">
					<filename>postgresql15-1c-pltcl-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-server" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-1c-15.15-1.el7.src.rpm">
					<filename>postgresql15-1c-server-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-test" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-1c-15.15-1.el7.src.rpm">
					<filename>postgresql15-1c-test-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0030</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость postgresql13 </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в postgresql13</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql13-cve-2025-12817-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql13
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql13-cve-2025-12817-7.3/" type="self" id="ROS-20260129-73-0030" title="ROS-20260129-73-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12817" type="cve" id="CVE-2025-12817" title="CVE-2025-12817" />
			<reference href="https://bdu.fstec.ru/vul/2025-14083" type="self" id="BDU:2025-14083" title="BDU:2025-14083" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql13" epoch="0" version="13.23" release="1.el7" arch="x86_64" src="postgresql13-13.23-1.el7.src.rpm">
					<filename>postgresql13-0:13.23-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql13-contrib" epoch="0" version="13.23" release="1.el7" arch="x86_64" src="postgresql13-13.23-1.el7.src.rpm">
					<filename>postgresql13-contrib-0:13.23-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql13-devel" epoch="0" version="13.23" release="1.el7" arch="x86_64" src="postgresql13-13.23-1.el7.src.rpm">
					<filename>postgresql13-devel-0:13.23-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql13-docs" epoch="0" version="13.23" release="1.el7" arch="x86_64" src="postgresql13-13.23-1.el7.src.rpm">
					<filename>postgresql13-docs-0:13.23-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql13-libs" epoch="0" version="13.23" release="1.el7" arch="x86_64" src="postgresql13-13.23-1.el7.src.rpm">
					<filename>postgresql13-libs-0:13.23-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql13-llvmjit" epoch="0" version="13.23" release="1.el7" arch="x86_64" src="postgresql13-13.23-1.el7.src.rpm">
					<filename>postgresql13-llvmjit-0:13.23-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql13-plperl" epoch="0" version="13.23" release="1.el7" arch="x86_64" src="postgresql13-13.23-1.el7.src.rpm">
					<filename>postgresql13-plperl-0:13.23-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql13-plpython3" epoch="0" version="13.23" release="1.el7" arch="x86_64" src="postgresql13-13.23-1.el7.src.rpm">
					<filename>postgresql13-plpython3-0:13.23-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql13-pltcl" epoch="0" version="13.23" release="1.el7" arch="x86_64" src="postgresql13-13.23-1.el7.src.rpm">
					<filename>postgresql13-pltcl-0:13.23-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql13-server" epoch="0" version="13.23" release="1.el7" arch="x86_64" src="postgresql13-13.23-1.el7.src.rpm">
					<filename>postgresql13-server-0:13.23-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0031</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость postgresql-1c </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в postgresql-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-1c-cve-2025-12817-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql-1c
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-1c-cve-2025-12817-7.3/" type="self" id="ROS-20260129-73-0031" title="ROS-20260129-73-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12817" type="cve" id="CVE-2025-12817" title="CVE-2025-12817" />
			<reference href="https://bdu.fstec.ru/vul/2025-14083" type="self" id="BDU:2025-14083" title="BDU:2025-14083" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql-1c" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql-1c-14.20-1.el7.src.rpm">
					<filename>postgresql-1c-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-contrib" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql-1c-14.20-1.el7.src.rpm">
					<filename>postgresql-1c-contrib-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-devel" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql-1c-14.20-1.el7.src.rpm">
					<filename>postgresql-1c-devel-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-docs" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql-1c-14.20-1.el7.src.rpm">
					<filename>postgresql-1c-docs-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-libs" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql-1c-14.20-1.el7.src.rpm">
					<filename>postgresql-1c-libs-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-llvmjit" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql-1c-14.20-1.el7.src.rpm">
					<filename>postgresql-1c-llvmjit-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-plperl" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql-1c-14.20-1.el7.src.rpm">
					<filename>postgresql-1c-plperl-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-plpython3" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql-1c-14.20-1.el7.src.rpm">
					<filename>postgresql-1c-plpython3-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-pltcl" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql-1c-14.20-1.el7.src.rpm">
					<filename>postgresql-1c-pltcl-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-server" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql-1c-14.20-1.el7.src.rpm">
					<filename>postgresql-1c-server-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-test" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql-1c-14.20-1.el7.src.rpm">
					<filename>postgresql-1c-test-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0032</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость postgresql14 </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в postgresql14</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql14-cve-2025-12817-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql14
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql14-cve-2025-12817-7.3/" type="self" id="ROS-20260129-73-0032" title="ROS-20260129-73-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12817" type="cve" id="CVE-2025-12817" title="CVE-2025-12817" />
			<reference href="https://bdu.fstec.ru/vul/2025-14083" type="self" id="BDU:2025-14083" title="BDU:2025-14083" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql14" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql14-14.20-1.el7.src.rpm">
					<filename>postgresql14-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-contrib" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql14-14.20-1.el7.src.rpm">
					<filename>postgresql14-contrib-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-devel" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql14-14.20-1.el7.src.rpm">
					<filename>postgresql14-devel-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-docs" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql14-14.20-1.el7.src.rpm">
					<filename>postgresql14-docs-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-libs" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql14-14.20-1.el7.src.rpm">
					<filename>postgresql14-libs-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-llvmjit" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql14-14.20-1.el7.src.rpm">
					<filename>postgresql14-llvmjit-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-plperl" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql14-14.20-1.el7.src.rpm">
					<filename>postgresql14-plperl-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-plpython3" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql14-14.20-1.el7.src.rpm">
					<filename>postgresql14-plpython3-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-pltcl" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql14-14.20-1.el7.src.rpm">
					<filename>postgresql14-pltcl-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-server" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql14-14.20-1.el7.src.rpm">
					<filename>postgresql14-server-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-test" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql14-14.20-1.el7.src.rpm">
					<filename>postgresql14-test-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0033</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость postgresql16 </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в postgresql16</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql16-cve-2025-12817-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql16
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql16-cve-2025-12817-7.3/" type="self" id="ROS-20260129-73-0033" title="ROS-20260129-73-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12817" type="cve" id="CVE-2025-12817" title="CVE-2025-12817" />
			<reference href="https://bdu.fstec.ru/vul/2025-14083" type="self" id="BDU:2025-14083" title="BDU:2025-14083" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql16" epoch="0" version="16.11" release="1.el7" arch="x86_64" src="postgresql16-16.11-1.el7.src.rpm">
					<filename>postgresql16-0:16.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-contrib" epoch="0" version="16.11" release="1.el7" arch="x86_64" src="postgresql16-16.11-1.el7.src.rpm">
					<filename>postgresql16-contrib-0:16.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-devel" epoch="0" version="16.11" release="1.el7" arch="x86_64" src="postgresql16-16.11-1.el7.src.rpm">
					<filename>postgresql16-devel-0:16.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-docs" epoch="0" version="16.11" release="1.el7" arch="x86_64" src="postgresql16-16.11-1.el7.src.rpm">
					<filename>postgresql16-docs-0:16.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-libs" epoch="0" version="16.11" release="1.el7" arch="x86_64" src="postgresql16-16.11-1.el7.src.rpm">
					<filename>postgresql16-libs-0:16.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-llvmjit" epoch="0" version="16.11" release="1.el7" arch="x86_64" src="postgresql16-16.11-1.el7.src.rpm">
					<filename>postgresql16-llvmjit-0:16.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-plperl" epoch="0" version="16.11" release="1.el7" arch="x86_64" src="postgresql16-16.11-1.el7.src.rpm">
					<filename>postgresql16-plperl-0:16.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-plpython3" epoch="0" version="16.11" release="1.el7" arch="x86_64" src="postgresql16-16.11-1.el7.src.rpm">
					<filename>postgresql16-plpython3-0:16.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-pltcl" epoch="0" version="16.11" release="1.el7" arch="x86_64" src="postgresql16-16.11-1.el7.src.rpm">
					<filename>postgresql16-pltcl-0:16.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-server" epoch="0" version="16.11" release="1.el7" arch="x86_64" src="postgresql16-16.11-1.el7.src.rpm">
					<filename>postgresql16-server-0:16.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-test" epoch="0" version="16.11" release="1.el7" arch="x86_64" src="postgresql16-16.11-1.el7.src.rpm">
					<filename>postgresql16-test-0:16.11-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0034</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость postgresql17 </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в postgresql17</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql17-cve-2025-12817-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql17
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql17-cve-2025-12817-7.3/" type="self" id="ROS-20260129-73-0034" title="ROS-20260129-73-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12817" type="cve" id="CVE-2025-12817" title="CVE-2025-12817" />
			<reference href="https://bdu.fstec.ru/vul/2025-14083" type="self" id="BDU:2025-14083" title="BDU:2025-14083" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql17" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-17.7-1.el7.src.rpm">
					<filename>postgresql17-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-contrib" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-17.7-1.el7.src.rpm">
					<filename>postgresql17-contrib-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-devel" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-17.7-1.el7.src.rpm">
					<filename>postgresql17-devel-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-docs" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-17.7-1.el7.src.rpm">
					<filename>postgresql17-docs-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-libs" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-17.7-1.el7.src.rpm">
					<filename>postgresql17-libs-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-llvmjit" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-17.7-1.el7.src.rpm">
					<filename>postgresql17-llvmjit-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-plperl" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-17.7-1.el7.src.rpm">
					<filename>postgresql17-plperl-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-plpython3" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-17.7-1.el7.src.rpm">
					<filename>postgresql17-plpython3-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-pltcl" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-17.7-1.el7.src.rpm">
					<filename>postgresql17-pltcl-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-server" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-17.7-1.el7.src.rpm">
					<filename>postgresql17-server-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-test" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-17.7-1.el7.src.rpm">
					<filename>postgresql17-test-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0035</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость postgresql17-1c </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в postgresql17-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql17-1c-cve-2025-12817-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql17-1c
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql17-1c-cve-2025-12817-7.3/" type="self" id="ROS-20260129-73-0035" title="ROS-20260129-73-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12817" type="cve" id="CVE-2025-12817" title="CVE-2025-12817" />
			<reference href="https://bdu.fstec.ru/vul/2025-14083" type="self" id="BDU:2025-14083" title="BDU:2025-14083" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql17-1c" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-1c-17.7-1.el7.src.rpm">
					<filename>postgresql17-1c-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-contrib" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-1c-17.7-1.el7.src.rpm">
					<filename>postgresql17-1c-contrib-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-devel" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-1c-17.7-1.el7.src.rpm">
					<filename>postgresql17-1c-devel-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-docs" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-1c-17.7-1.el7.src.rpm">
					<filename>postgresql17-1c-docs-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-libs" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-1c-17.7-1.el7.src.rpm">
					<filename>postgresql17-1c-libs-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-llvmjit" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-1c-17.7-1.el7.src.rpm">
					<filename>postgresql17-1c-llvmjit-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-plperl" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-1c-17.7-1.el7.src.rpm">
					<filename>postgresql17-1c-plperl-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-plpython3" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-1c-17.7-1.el7.src.rpm">
					<filename>postgresql17-1c-plpython3-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-pltcl" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-1c-17.7-1.el7.src.rpm">
					<filename>postgresql17-1c-pltcl-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-server" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-1c-17.7-1.el7.src.rpm">
					<filename>postgresql17-1c-server-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-test" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-1c-17.7-1.el7.src.rpm">
					<filename>postgresql17-1c-test-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0036</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость postgresql15 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в postgresql15</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql15-cve-2025-12818-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql15
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql15-cve-2025-12818-7.3/" type="self" id="ROS-20260129-73-0036" title="ROS-20260129-73-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12818" type="cve" id="CVE-2025-12818" title="CVE-2025-12818" />
			<reference href="https://bdu.fstec.ru/vul/2025-13962" type="self" id="BDU:2025-13962" title="BDU:2025-13962" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql15" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-15.15-1.el7.src.rpm">
					<filename>postgresql15-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-contrib" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-15.15-1.el7.src.rpm">
					<filename>postgresql15-contrib-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-devel" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-15.15-1.el7.src.rpm">
					<filename>postgresql15-devel-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-docs" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-15.15-1.el7.src.rpm">
					<filename>postgresql15-docs-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-libs" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-15.15-1.el7.src.rpm">
					<filename>postgresql15-libs-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-llvmjit" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-15.15-1.el7.src.rpm">
					<filename>postgresql15-llvmjit-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-plperl" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-15.15-1.el7.src.rpm">
					<filename>postgresql15-plperl-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-plpython3" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-15.15-1.el7.src.rpm">
					<filename>postgresql15-plpython3-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-pltcl" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-15.15-1.el7.src.rpm">
					<filename>postgresql15-pltcl-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-server" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-15.15-1.el7.src.rpm">
					<filename>postgresql15-server-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-test" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-15.15-1.el7.src.rpm">
					<filename>postgresql15-test-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0037</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость postgresql13 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в postgresql13</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql13-cve-2025-12818-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql13
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql13-cve-2025-12818-7.3/" type="self" id="ROS-20260129-73-0037" title="ROS-20260129-73-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12818" type="cve" id="CVE-2025-12818" title="CVE-2025-12818" />
			<reference href="https://bdu.fstec.ru/vul/2025-13962" type="self" id="BDU:2025-13962" title="BDU:2025-13962" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql13" epoch="0" version="13.23" release="1.el7" arch="x86_64" src="postgresql13-13.23-1.el7.src.rpm">
					<filename>postgresql13-0:13.23-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql13-contrib" epoch="0" version="13.23" release="1.el7" arch="x86_64" src="postgresql13-13.23-1.el7.src.rpm">
					<filename>postgresql13-contrib-0:13.23-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql13-devel" epoch="0" version="13.23" release="1.el7" arch="x86_64" src="postgresql13-13.23-1.el7.src.rpm">
					<filename>postgresql13-devel-0:13.23-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql13-docs" epoch="0" version="13.23" release="1.el7" arch="x86_64" src="postgresql13-13.23-1.el7.src.rpm">
					<filename>postgresql13-docs-0:13.23-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql13-libs" epoch="0" version="13.23" release="1.el7" arch="x86_64" src="postgresql13-13.23-1.el7.src.rpm">
					<filename>postgresql13-libs-0:13.23-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql13-llvmjit" epoch="0" version="13.23" release="1.el7" arch="x86_64" src="postgresql13-13.23-1.el7.src.rpm">
					<filename>postgresql13-llvmjit-0:13.23-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql13-plperl" epoch="0" version="13.23" release="1.el7" arch="x86_64" src="postgresql13-13.23-1.el7.src.rpm">
					<filename>postgresql13-plperl-0:13.23-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql13-plpython3" epoch="0" version="13.23" release="1.el7" arch="x86_64" src="postgresql13-13.23-1.el7.src.rpm">
					<filename>postgresql13-plpython3-0:13.23-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql13-pltcl" epoch="0" version="13.23" release="1.el7" arch="x86_64" src="postgresql13-13.23-1.el7.src.rpm">
					<filename>postgresql13-pltcl-0:13.23-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql13-server" epoch="0" version="13.23" release="1.el7" arch="x86_64" src="postgresql13-13.23-1.el7.src.rpm">
					<filename>postgresql13-server-0:13.23-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0038</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость postgresql15-1c </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в postgresql15-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql15-1c-cve-2025-12818-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql15-1c
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql15-1c-cve-2025-12818-7.3/" type="self" id="ROS-20260129-73-0038" title="ROS-20260129-73-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12818" type="cve" id="CVE-2025-12818" title="CVE-2025-12818" />
			<reference href="https://bdu.fstec.ru/vul/2025-13962" type="self" id="BDU:2025-13962" title="BDU:2025-13962" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql15-1c" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-1c-15.15-1.el7.src.rpm">
					<filename>postgresql15-1c-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-contrib" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-1c-15.15-1.el7.src.rpm">
					<filename>postgresql15-1c-contrib-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-devel" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-1c-15.15-1.el7.src.rpm">
					<filename>postgresql15-1c-devel-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-docs" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-1c-15.15-1.el7.src.rpm">
					<filename>postgresql15-1c-docs-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-libs" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-1c-15.15-1.el7.src.rpm">
					<filename>postgresql15-1c-libs-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-llvmjit" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-1c-15.15-1.el7.src.rpm">
					<filename>postgresql15-1c-llvmjit-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-plperl" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-1c-15.15-1.el7.src.rpm">
					<filename>postgresql15-1c-plperl-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-plpython3" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-1c-15.15-1.el7.src.rpm">
					<filename>postgresql15-1c-plpython3-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-pltcl" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-1c-15.15-1.el7.src.rpm">
					<filename>postgresql15-1c-pltcl-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-server" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-1c-15.15-1.el7.src.rpm">
					<filename>postgresql15-1c-server-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-test" epoch="0" version="15.15" release="1.el7" arch="x86_64" src="postgresql15-1c-15.15-1.el7.src.rpm">
					<filename>postgresql15-1c-test-0:15.15-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0039</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость postgresql-1c </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в postgresql-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-1c-cve-2025-12818-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql-1c
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-1c-cve-2025-12818-7.3/" type="self" id="ROS-20260129-73-0039" title="ROS-20260129-73-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12818" type="cve" id="CVE-2025-12818" title="CVE-2025-12818" />
			<reference href="https://bdu.fstec.ru/vul/2025-13962" type="self" id="BDU:2025-13962" title="BDU:2025-13962" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql-1c" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql-1c-14.20-1.el7.src.rpm">
					<filename>postgresql-1c-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-contrib" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql-1c-14.20-1.el7.src.rpm">
					<filename>postgresql-1c-contrib-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-devel" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql-1c-14.20-1.el7.src.rpm">
					<filename>postgresql-1c-devel-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-docs" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql-1c-14.20-1.el7.src.rpm">
					<filename>postgresql-1c-docs-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-libs" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql-1c-14.20-1.el7.src.rpm">
					<filename>postgresql-1c-libs-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-llvmjit" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql-1c-14.20-1.el7.src.rpm">
					<filename>postgresql-1c-llvmjit-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-plperl" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql-1c-14.20-1.el7.src.rpm">
					<filename>postgresql-1c-plperl-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-plpython3" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql-1c-14.20-1.el7.src.rpm">
					<filename>postgresql-1c-plpython3-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-pltcl" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql-1c-14.20-1.el7.src.rpm">
					<filename>postgresql-1c-pltcl-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-server" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql-1c-14.20-1.el7.src.rpm">
					<filename>postgresql-1c-server-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-test" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql-1c-14.20-1.el7.src.rpm">
					<filename>postgresql-1c-test-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0040</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость postgresql14 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в postgresql14</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql14-cve-2025-12818-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql14
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql14-cve-2025-12818-7.3/" type="self" id="ROS-20260129-73-0040" title="ROS-20260129-73-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12818" type="cve" id="CVE-2025-12818" title="CVE-2025-12818" />
			<reference href="https://bdu.fstec.ru/vul/2025-13962" type="self" id="BDU:2025-13962" title="BDU:2025-13962" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql14" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql14-14.20-1.el7.src.rpm">
					<filename>postgresql14-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-contrib" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql14-14.20-1.el7.src.rpm">
					<filename>postgresql14-contrib-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-devel" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql14-14.20-1.el7.src.rpm">
					<filename>postgresql14-devel-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-docs" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql14-14.20-1.el7.src.rpm">
					<filename>postgresql14-docs-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-libs" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql14-14.20-1.el7.src.rpm">
					<filename>postgresql14-libs-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-llvmjit" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql14-14.20-1.el7.src.rpm">
					<filename>postgresql14-llvmjit-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-plperl" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql14-14.20-1.el7.src.rpm">
					<filename>postgresql14-plperl-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-plpython3" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql14-14.20-1.el7.src.rpm">
					<filename>postgresql14-plpython3-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-pltcl" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql14-14.20-1.el7.src.rpm">
					<filename>postgresql14-pltcl-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-server" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql14-14.20-1.el7.src.rpm">
					<filename>postgresql14-server-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-test" epoch="0" version="14.20" release="1.el7" arch="x86_64" src="postgresql14-14.20-1.el7.src.rpm">
					<filename>postgresql14-test-0:14.20-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0041</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость postgresql16 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в postgresql16</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql16-cve-2025-12818-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql16
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql16-cve-2025-12818-7.3/" type="self" id="ROS-20260129-73-0041" title="ROS-20260129-73-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12818" type="cve" id="CVE-2025-12818" title="CVE-2025-12818" />
			<reference href="https://bdu.fstec.ru/vul/2025-13962" type="self" id="BDU:2025-13962" title="BDU:2025-13962" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql16" epoch="0" version="16.11" release="1.el7" arch="x86_64" src="postgresql16-16.11-1.el7.src.rpm">
					<filename>postgresql16-0:16.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-contrib" epoch="0" version="16.11" release="1.el7" arch="x86_64" src="postgresql16-16.11-1.el7.src.rpm">
					<filename>postgresql16-contrib-0:16.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-devel" epoch="0" version="16.11" release="1.el7" arch="x86_64" src="postgresql16-16.11-1.el7.src.rpm">
					<filename>postgresql16-devel-0:16.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-docs" epoch="0" version="16.11" release="1.el7" arch="x86_64" src="postgresql16-16.11-1.el7.src.rpm">
					<filename>postgresql16-docs-0:16.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-libs" epoch="0" version="16.11" release="1.el7" arch="x86_64" src="postgresql16-16.11-1.el7.src.rpm">
					<filename>postgresql16-libs-0:16.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-llvmjit" epoch="0" version="16.11" release="1.el7" arch="x86_64" src="postgresql16-16.11-1.el7.src.rpm">
					<filename>postgresql16-llvmjit-0:16.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-plperl" epoch="0" version="16.11" release="1.el7" arch="x86_64" src="postgresql16-16.11-1.el7.src.rpm">
					<filename>postgresql16-plperl-0:16.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-plpython3" epoch="0" version="16.11" release="1.el7" arch="x86_64" src="postgresql16-16.11-1.el7.src.rpm">
					<filename>postgresql16-plpython3-0:16.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-pltcl" epoch="0" version="16.11" release="1.el7" arch="x86_64" src="postgresql16-16.11-1.el7.src.rpm">
					<filename>postgresql16-pltcl-0:16.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-server" epoch="0" version="16.11" release="1.el7" arch="x86_64" src="postgresql16-16.11-1.el7.src.rpm">
					<filename>postgresql16-server-0:16.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-test" epoch="0" version="16.11" release="1.el7" arch="x86_64" src="postgresql16-16.11-1.el7.src.rpm">
					<filename>postgresql16-test-0:16.11-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0042</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость postgresql17 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в postgresql17</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql17-cve-2025-12818-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql17
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql17-cve-2025-12818-7.3/" type="self" id="ROS-20260129-73-0042" title="ROS-20260129-73-0042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12818" type="cve" id="CVE-2025-12818" title="CVE-2025-12818" />
			<reference href="https://bdu.fstec.ru/vul/2025-13962" type="self" id="BDU:2025-13962" title="BDU:2025-13962" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql17" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-17.7-1.el7.src.rpm">
					<filename>postgresql17-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-contrib" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-17.7-1.el7.src.rpm">
					<filename>postgresql17-contrib-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-devel" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-17.7-1.el7.src.rpm">
					<filename>postgresql17-devel-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-docs" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-17.7-1.el7.src.rpm">
					<filename>postgresql17-docs-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-libs" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-17.7-1.el7.src.rpm">
					<filename>postgresql17-libs-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-llvmjit" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-17.7-1.el7.src.rpm">
					<filename>postgresql17-llvmjit-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-plperl" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-17.7-1.el7.src.rpm">
					<filename>postgresql17-plperl-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-plpython3" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-17.7-1.el7.src.rpm">
					<filename>postgresql17-plpython3-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-pltcl" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-17.7-1.el7.src.rpm">
					<filename>postgresql17-pltcl-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-server" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-17.7-1.el7.src.rpm">
					<filename>postgresql17-server-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-test" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-17.7-1.el7.src.rpm">
					<filename>postgresql17-test-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0043</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость postgresql17-1c </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в postgresql17-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql17-1c-cve-2025-12818-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql17-1c
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql17-1c-cve-2025-12818-7.3/" type="self" id="ROS-20260129-73-0043" title="ROS-20260129-73-0043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12818" type="cve" id="CVE-2025-12818" title="CVE-2025-12818" />
			<reference href="https://bdu.fstec.ru/vul/2025-13962" type="self" id="BDU:2025-13962" title="BDU:2025-13962" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql17-1c" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-1c-17.7-1.el7.src.rpm">
					<filename>postgresql17-1c-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-contrib" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-1c-17.7-1.el7.src.rpm">
					<filename>postgresql17-1c-contrib-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-devel" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-1c-17.7-1.el7.src.rpm">
					<filename>postgresql17-1c-devel-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-docs" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-1c-17.7-1.el7.src.rpm">
					<filename>postgresql17-1c-docs-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-libs" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-1c-17.7-1.el7.src.rpm">
					<filename>postgresql17-1c-libs-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-llvmjit" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-1c-17.7-1.el7.src.rpm">
					<filename>postgresql17-1c-llvmjit-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-plperl" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-1c-17.7-1.el7.src.rpm">
					<filename>postgresql17-1c-plperl-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-plpython3" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-1c-17.7-1.el7.src.rpm">
					<filename>postgresql17-1c-plpython3-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-pltcl" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-1c-17.7-1.el7.src.rpm">
					<filename>postgresql17-1c-pltcl-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-server" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-1c-17.7-1.el7.src.rpm">
					<filename>postgresql17-1c-server-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-test" epoch="0" version="17.7" release="1.el7" arch="x86_64" src="postgresql17-1c-17.7-1.el7.src.rpm">
					<filename>postgresql17-1c-test-0:17.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0044</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость python-django </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-django</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-django-cve-2025-13372-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-django
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-django-cve-2025-13372-7.3/" type="self" id="ROS-20260129-73-0044" title="ROS-20260129-73-0044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13372" type="cve" id="CVE-2025-13372" title="CVE-2025-13372" />
			<reference href="https://bdu.fstec.ru/vul/2026-02956" type="self" id="BDU:2026-02956" title="BDU:2026-02956" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python-django-bash-completion" epoch="0" version="4.2.27" release="1.el7" arch="noarch" src="python-django-4.2.27-1.el7.src.rpm">
					<filename>python-django-bash-completion-0:4.2.27-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-django" epoch="0" version="4.2.27" release="1.el7" arch="noarch" src="python-django-4.2.27-1.el7.src.rpm">
					<filename>python3-django-0:4.2.27-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-django-doc" epoch="0" version="4.2.27" release="1.el7" arch="noarch" src="python-django-4.2.27-1.el7.src.rpm">
					<filename>python3-django-doc-0:4.2.27-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0045</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость nextcloud </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nextcloud</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nextcloud-cve-2025-66552-7.3/</description>
               <solution>Установить обновление для пакета(ов) nextcloud
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nextcloud-cve-2025-66552-7.3/" type="self" id="ROS-20260129-73-0045" title="ROS-20260129-73-0045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66552" type="cve" id="CVE-2025-66552" title="CVE-2025-66552" />
			<reference href="https://bdu.fstec.ru/vul/2026-03380" type="self" id="BDU:2026-03380" title="BDU:2026-03380" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nextcloud" epoch="0" version="32.0.3" release="1.el7" arch="noarch" src="nextcloud-32.0.3-1.el7.src.rpm">
					<filename>nextcloud-0:32.0.3-1.el7.noarch.rpm</filename>
				</package>
				<package name="nextcloud-httpd" epoch="0" version="32.0.3" release="1.el7" arch="noarch" src="nextcloud-32.0.3-1.el7.src.rpm">
					<filename>nextcloud-httpd-0:32.0.3-1.el7.noarch.rpm</filename>
				</package>
				<package name="nextcloud-mysql" epoch="0" version="32.0.3" release="1.el7" arch="noarch" src="nextcloud-32.0.3-1.el7.src.rpm">
					<filename>nextcloud-mysql-0:32.0.3-1.el7.noarch.rpm</filename>
				</package>
				<package name="nextcloud-nginx" epoch="0" version="32.0.3" release="1.el7" arch="noarch" src="nextcloud-32.0.3-1.el7.src.rpm">
					<filename>nextcloud-nginx-0:32.0.3-1.el7.noarch.rpm</filename>
				</package>
				<package name="nextcloud-postgresql" epoch="0" version="32.0.3" release="1.el7" arch="noarch" src="nextcloud-32.0.3-1.el7.src.rpm">
					<filename>nextcloud-postgresql-0:32.0.3-1.el7.noarch.rpm</filename>
				</package>
				<package name="nextcloud-sqlite" epoch="0" version="32.0.3" release="1.el7" arch="noarch" src="nextcloud-32.0.3-1.el7.src.rpm">
					<filename>nextcloud-sqlite-0:32.0.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0046</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость nextcloud </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nextcloud</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nextcloud-cve-2025-66510-7.3/</description>
               <solution>Установить обновление для пакета(ов) nextcloud
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nextcloud-cve-2025-66510-7.3/" type="self" id="ROS-20260129-73-0046" title="ROS-20260129-73-0046" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66510" type="cve" id="CVE-2025-66510" title="CVE-2025-66510" />
			<reference href="https://bdu.fstec.ru/vul/2026-03384" type="self" id="BDU:2026-03384" title="BDU:2026-03384" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nextcloud" epoch="0" version="32.0.3" release="1.el7" arch="noarch" src="nextcloud-32.0.3-1.el7.src.rpm">
					<filename>nextcloud-0:32.0.3-1.el7.noarch.rpm</filename>
				</package>
				<package name="nextcloud-httpd" epoch="0" version="32.0.3" release="1.el7" arch="noarch" src="nextcloud-32.0.3-1.el7.src.rpm">
					<filename>nextcloud-httpd-0:32.0.3-1.el7.noarch.rpm</filename>
				</package>
				<package name="nextcloud-mysql" epoch="0" version="32.0.3" release="1.el7" arch="noarch" src="nextcloud-32.0.3-1.el7.src.rpm">
					<filename>nextcloud-mysql-0:32.0.3-1.el7.noarch.rpm</filename>
				</package>
				<package name="nextcloud-nginx" epoch="0" version="32.0.3" release="1.el7" arch="noarch" src="nextcloud-32.0.3-1.el7.src.rpm">
					<filename>nextcloud-nginx-0:32.0.3-1.el7.noarch.rpm</filename>
				</package>
				<package name="nextcloud-postgresql" epoch="0" version="32.0.3" release="1.el7" arch="noarch" src="nextcloud-32.0.3-1.el7.src.rpm">
					<filename>nextcloud-postgresql-0:32.0.3-1.el7.noarch.rpm</filename>
				</package>
				<package name="nextcloud-sqlite" epoch="0" version="32.0.3" release="1.el7" arch="noarch" src="nextcloud-32.0.3-1.el7.src.rpm">
					<filename>nextcloud-sqlite-0:32.0.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0047</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость nextcloud </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nextcloud</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nextcloud-cve-2025-66547-7.3/</description>
               <solution>Установить обновление для пакета(ов) nextcloud
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nextcloud-cve-2025-66547-7.3/" type="self" id="ROS-20260129-73-0047" title="ROS-20260129-73-0047" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66547" type="cve" id="CVE-2025-66547" title="CVE-2025-66547" />
			<reference href="https://bdu.fstec.ru/vul/2026-03382" type="self" id="BDU:2026-03382" title="BDU:2026-03382" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nextcloud" epoch="0" version="32.0.3" release="1.el7" arch="noarch" src="nextcloud-32.0.3-1.el7.src.rpm">
					<filename>nextcloud-0:32.0.3-1.el7.noarch.rpm</filename>
				</package>
				<package name="nextcloud-httpd" epoch="0" version="32.0.3" release="1.el7" arch="noarch" src="nextcloud-32.0.3-1.el7.src.rpm">
					<filename>nextcloud-httpd-0:32.0.3-1.el7.noarch.rpm</filename>
				</package>
				<package name="nextcloud-mysql" epoch="0" version="32.0.3" release="1.el7" arch="noarch" src="nextcloud-32.0.3-1.el7.src.rpm">
					<filename>nextcloud-mysql-0:32.0.3-1.el7.noarch.rpm</filename>
				</package>
				<package name="nextcloud-nginx" epoch="0" version="32.0.3" release="1.el7" arch="noarch" src="nextcloud-32.0.3-1.el7.src.rpm">
					<filename>nextcloud-nginx-0:32.0.3-1.el7.noarch.rpm</filename>
				</package>
				<package name="nextcloud-postgresql" epoch="0" version="32.0.3" release="1.el7" arch="noarch" src="nextcloud-32.0.3-1.el7.src.rpm">
					<filename>nextcloud-postgresql-0:32.0.3-1.el7.noarch.rpm</filename>
				</package>
				<package name="nextcloud-sqlite" epoch="0" version="32.0.3" release="1.el7" arch="noarch" src="nextcloud-32.0.3-1.el7.src.rpm">
					<filename>nextcloud-sqlite-0:32.0.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0048</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость nextcloud-app-calendar </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nextcloud-app-calendar</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nextcloud-app-calendar-cve-2025-66550-7.3/</description>
               <solution>Установить обновление для пакета(ов) nextcloud-app-calendar
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nextcloud-app-calendar-cve-2025-66550-7.3/" type="self" id="ROS-20260129-73-0048" title="ROS-20260129-73-0048" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66550" type="cve" id="CVE-2025-66550" title="CVE-2025-66550" />
			<reference href="https://bdu.fstec.ru/vul/2026-03381" type="self" id="BDU:2026-03381" title="BDU:2026-03381" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nextcloud-app-calendar" epoch="0" version="6.1.2" release="1.el7" arch="noarch" src="nextcloud-app-calendar-6.1.2-1.el7.src.rpm">
					<filename>nextcloud-app-calendar-0:6.1.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0049</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость nextcloud-app-calendar </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nextcloud-app-calendar</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nextcloud-app-calendar-cve-2025-66511-7.3/</description>
               <solution>Установить обновление для пакета(ов) nextcloud-app-calendar
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nextcloud-app-calendar-cve-2025-66511-7.3/" type="self" id="ROS-20260129-73-0049" title="ROS-20260129-73-0049" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66511" type="cve" id="CVE-2025-66511" title="CVE-2025-66511" />
			<reference href="https://bdu.fstec.ru/vul/2026-03383" type="self" id="BDU:2026-03383" title="BDU:2026-03383" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nextcloud-app-calendar" epoch="0" version="6.1.2" release="1.el7" arch="noarch" src="nextcloud-app-calendar-6.1.2-1.el7.src.rpm">
					<filename>nextcloud-app-calendar-0:6.1.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0050</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость nextcloud-app-contacts </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nextcloud-app-contacts</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nextcloud-app-contacts-cve-2025-66554-7.3/</description>
               <solution>Установить обновление для пакета(ов) nextcloud-app-contacts
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nextcloud-app-contacts-cve-2025-66554-7.3/" type="self" id="ROS-20260129-73-0050" title="ROS-20260129-73-0050" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66554" type="cve" id="CVE-2025-66554" title="CVE-2025-66554" />
			<reference href="https://bdu.fstec.ru/vul/2026-03379" type="self" id="BDU:2026-03379" title="BDU:2026-03379" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nextcloud-app-contacts" epoch="0" version="7.3.9" release="1.el7" arch="noarch" src="nextcloud-app-contacts-7.3.9-1.el7.src.rpm">
					<filename>nextcloud-app-contacts-0:7.3.9-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0051</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2025-14331-7.3/</description>
               <solution>Установить обновление для пакета(ов) firefox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2025-14331-7.3/" type="self" id="ROS-20260129-73-0051" title="ROS-20260129-73-0051" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14331" type="cve" id="CVE-2025-14331" title="CVE-2025-14331" />
			<reference href="https://bdu.fstec.ru/vul/2025-16360" type="self" id="BDU:2025-16360" title="BDU:2025-16360" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.31.0" release="1.el7" arch="x86_64" src="firefox-115.31.0-1.el7.src.rpm">
					<filename>firefox-0:115.31.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0052</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2025-14322-7.3/</description>
               <solution>Установить обновление для пакета(ов) firefox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2025-14322-7.3/" type="self" id="ROS-20260129-73-0052" title="ROS-20260129-73-0052" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14322" type="cve" id="CVE-2025-14322" title="CVE-2025-14322" />
			<reference href="https://bdu.fstec.ru/vul/2025-15639" type="self" id="BDU:2025-15639" title="BDU:2025-15639" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.31.0" release="1.el7" arch="x86_64" src="firefox-115.31.0-1.el7.src.rpm">
					<filename>firefox-0:115.31.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0053</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2025-14323-7.3/</description>
               <solution>Установить обновление для пакета(ов) firefox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2025-14323-7.3/" type="self" id="ROS-20260129-73-0053" title="ROS-20260129-73-0053" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14323" type="cve" id="CVE-2025-14323" title="CVE-2025-14323" />
			<reference href="https://bdu.fstec.ru/vul/2025-15641" type="self" id="BDU:2025-15641" title="BDU:2025-15641" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.31.0" release="1.el7" arch="x86_64" src="firefox-115.31.0-1.el7.src.rpm">
					<filename>firefox-0:115.31.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0054</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2025-14324-7.3/</description>
               <solution>Установить обновление для пакета(ов) firefox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2025-14324-7.3/" type="self" id="ROS-20260129-73-0054" title="ROS-20260129-73-0054" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14324" type="cve" id="CVE-2025-14324" title="CVE-2025-14324" />
			<reference href="https://bdu.fstec.ru/vul/2025-15640" type="self" id="BDU:2025-15640" title="BDU:2025-15640" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.31.0" release="1.el7" arch="x86_64" src="firefox-115.31.0-1.el7.src.rpm">
					<filename>firefox-0:115.31.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0055</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость mariadb </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в mariadb</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mariadb-cve-2025-13699-7.3/</description>
               <solution>Установить обновление для пакета(ов) mariadb
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mariadb-cve-2025-13699-7.3/" type="self" id="ROS-20260129-73-0055" title="ROS-20260129-73-0055" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13699" type="cve" id="CVE-2025-13699" title="CVE-2025-13699" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mariadb" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-backup" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-backup-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-common" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-common-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-connect-engine" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-connect-engine-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-cracklib-password-check" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-cracklib-password-check-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-devel" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-devel-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-embedded" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-embedded-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-embedded-devel" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-embedded-devel-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-errmsg" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-errmsg-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-gssapi-server" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-gssapi-server-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-oqgraph-engine" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-oqgraph-engine-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-rocksdb-engine" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-rocksdb-engine-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-s3-engine" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-s3-engine-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-server" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-server-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-server-galera" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-server-galera-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-server-utils" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-server-utils-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-sphinx-engine" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-sphinx-engine-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-test" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-test-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0056</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость mariadb10.6 </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в mariadb10.6</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mariadb10-6-cve-2025-13699-7.3/</description>
               <solution>Установить обновление для пакета(ов) mariadb10.6
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mariadb10-6-cve-2025-13699-7.3/" type="self" id="ROS-20260129-73-0056" title="ROS-20260129-73-0056" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13699" type="cve" id="CVE-2025-13699" title="CVE-2025-13699" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mariadb10.6" epoch="3" version="10.6.24" release="1.el7" arch="x86_64" src="mariadb10.6-10.6.24-1.el7.src.rpm">
					<filename>mariadb10.6-3:10.6.24-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb10.6-backup" epoch="3" version="10.6.24" release="1.el7" arch="x86_64" src="mariadb10.6-10.6.24-1.el7.src.rpm">
					<filename>mariadb10.6-backup-3:10.6.24-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb10.6-common" epoch="3" version="10.6.24" release="1.el7" arch="x86_64" src="mariadb10.6-10.6.24-1.el7.src.rpm">
					<filename>mariadb10.6-common-3:10.6.24-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb10.6-connect-engine" epoch="3" version="10.6.24" release="1.el7" arch="x86_64" src="mariadb10.6-10.6.24-1.el7.src.rpm">
					<filename>mariadb10.6-connect-engine-3:10.6.24-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb10.6-cracklib-password-check" epoch="3" version="10.6.24" release="1.el7" arch="x86_64" src="mariadb10.6-10.6.24-1.el7.src.rpm">
					<filename>mariadb10.6-cracklib-password-check-3:10.6.24-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb10.6-devel" epoch="3" version="10.6.24" release="1.el7" arch="x86_64" src="mariadb10.6-10.6.24-1.el7.src.rpm">
					<filename>mariadb10.6-devel-3:10.6.24-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb10.6-embedded" epoch="3" version="10.6.24" release="1.el7" arch="x86_64" src="mariadb10.6-10.6.24-1.el7.src.rpm">
					<filename>mariadb10.6-embedded-3:10.6.24-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb10.6-embedded-devel" epoch="3" version="10.6.24" release="1.el7" arch="x86_64" src="mariadb10.6-10.6.24-1.el7.src.rpm">
					<filename>mariadb10.6-embedded-devel-3:10.6.24-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb10.6-errmsg" epoch="3" version="10.6.24" release="1.el7" arch="x86_64" src="mariadb10.6-10.6.24-1.el7.src.rpm">
					<filename>mariadb10.6-errmsg-3:10.6.24-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb10.6-gssapi-server" epoch="3" version="10.6.24" release="1.el7" arch="x86_64" src="mariadb10.6-10.6.24-1.el7.src.rpm">
					<filename>mariadb10.6-gssapi-server-3:10.6.24-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb10.6-oqgraph-engine" epoch="3" version="10.6.24" release="1.el7" arch="x86_64" src="mariadb10.6-10.6.24-1.el7.src.rpm">
					<filename>mariadb10.6-oqgraph-engine-3:10.6.24-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb10.6-rocksdb-engine" epoch="3" version="10.6.24" release="1.el7" arch="x86_64" src="mariadb10.6-10.6.24-1.el7.src.rpm">
					<filename>mariadb10.6-rocksdb-engine-3:10.6.24-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb10.6-s3-engine" epoch="3" version="10.6.24" release="1.el7" arch="x86_64" src="mariadb10.6-10.6.24-1.el7.src.rpm">
					<filename>mariadb10.6-s3-engine-3:10.6.24-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb10.6-server" epoch="3" version="10.6.24" release="1.el7" arch="x86_64" src="mariadb10.6-10.6.24-1.el7.src.rpm">
					<filename>mariadb10.6-server-3:10.6.24-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb10.6-server-galera" epoch="3" version="10.6.24" release="1.el7" arch="x86_64" src="mariadb10.6-10.6.24-1.el7.src.rpm">
					<filename>mariadb10.6-server-galera-3:10.6.24-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb10.6-server-utils" epoch="3" version="10.6.24" release="1.el7" arch="x86_64" src="mariadb10.6-10.6.24-1.el7.src.rpm">
					<filename>mariadb10.6-server-utils-3:10.6.24-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb10.6-sphinx-engine" epoch="3" version="10.6.24" release="1.el7" arch="x86_64" src="mariadb10.6-10.6.24-1.el7.src.rpm">
					<filename>mariadb10.6-sphinx-engine-3:10.6.24-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb10.6-test" epoch="3" version="10.6.24" release="1.el7" arch="x86_64" src="mariadb10.6-10.6.24-1.el7.src.rpm">
					<filename>mariadb10.6-test-3:10.6.24-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0057</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость mariadb11.4 </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в mariadb11.4</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mariadb11-4-cve-2025-13699-7.3/</description>
               <solution>Установить обновление для пакета(ов) mariadb11.4
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mariadb11-4-cve-2025-13699-7.3/" type="self" id="ROS-20260129-73-0057" title="ROS-20260129-73-0057" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13699" type="cve" id="CVE-2025-13699" title="CVE-2025-13699" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mariadb11.4" epoch="3" version="11.4.9" release="1.el7" arch="x86_64" src="mariadb11.4-11.4.9-1.el7.src.rpm">
					<filename>mariadb11.4-3:11.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.4-backup" epoch="3" version="11.4.9" release="1.el7" arch="x86_64" src="mariadb11.4-11.4.9-1.el7.src.rpm">
					<filename>mariadb11.4-backup-3:11.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.4-common" epoch="3" version="11.4.9" release="1.el7" arch="x86_64" src="mariadb11.4-11.4.9-1.el7.src.rpm">
					<filename>mariadb11.4-common-3:11.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.4-connect-engine" epoch="3" version="11.4.9" release="1.el7" arch="x86_64" src="mariadb11.4-11.4.9-1.el7.src.rpm">
					<filename>mariadb11.4-connect-engine-3:11.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.4-cracklib-password-check" epoch="3" version="11.4.9" release="1.el7" arch="x86_64" src="mariadb11.4-11.4.9-1.el7.src.rpm">
					<filename>mariadb11.4-cracklib-password-check-3:11.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.4-devel" epoch="3" version="11.4.9" release="1.el7" arch="x86_64" src="mariadb11.4-11.4.9-1.el7.src.rpm">
					<filename>mariadb11.4-devel-3:11.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.4-embedded" epoch="3" version="11.4.9" release="1.el7" arch="x86_64" src="mariadb11.4-11.4.9-1.el7.src.rpm">
					<filename>mariadb11.4-embedded-3:11.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.4-embedded-devel" epoch="3" version="11.4.9" release="1.el7" arch="x86_64" src="mariadb11.4-11.4.9-1.el7.src.rpm">
					<filename>mariadb11.4-embedded-devel-3:11.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.4-errmsg" epoch="3" version="11.4.9" release="1.el7" arch="x86_64" src="mariadb11.4-11.4.9-1.el7.src.rpm">
					<filename>mariadb11.4-errmsg-3:11.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.4-gssapi-server" epoch="3" version="11.4.9" release="1.el7" arch="x86_64" src="mariadb11.4-11.4.9-1.el7.src.rpm">
					<filename>mariadb11.4-gssapi-server-3:11.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.4-oqgraph-engine" epoch="3" version="11.4.9" release="1.el7" arch="x86_64" src="mariadb11.4-11.4.9-1.el7.src.rpm">
					<filename>mariadb11.4-oqgraph-engine-3:11.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.4-rocksdb-engine" epoch="3" version="11.4.9" release="1.el7" arch="x86_64" src="mariadb11.4-11.4.9-1.el7.src.rpm">
					<filename>mariadb11.4-rocksdb-engine-3:11.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.4-s3-engine" epoch="3" version="11.4.9" release="1.el7" arch="x86_64" src="mariadb11.4-11.4.9-1.el7.src.rpm">
					<filename>mariadb11.4-s3-engine-3:11.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.4-server" epoch="3" version="11.4.9" release="1.el7" arch="x86_64" src="mariadb11.4-11.4.9-1.el7.src.rpm">
					<filename>mariadb11.4-server-3:11.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.4-server-galera" epoch="3" version="11.4.9" release="1.el7" arch="x86_64" src="mariadb11.4-11.4.9-1.el7.src.rpm">
					<filename>mariadb11.4-server-galera-3:11.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.4-server-utils" epoch="3" version="11.4.9" release="1.el7" arch="x86_64" src="mariadb11.4-11.4.9-1.el7.src.rpm">
					<filename>mariadb11.4-server-utils-3:11.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.4-sphinx-engine" epoch="3" version="11.4.9" release="1.el7" arch="x86_64" src="mariadb11.4-11.4.9-1.el7.src.rpm">
					<filename>mariadb11.4-sphinx-engine-3:11.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.4-test" epoch="3" version="11.4.9" release="1.el7" arch="x86_64" src="mariadb11.4-11.4.9-1.el7.src.rpm">
					<filename>mariadb11.4-test-3:11.4.9-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0058</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость mariadb11.8 </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в mariadb11.8</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mariadb11-8-cve-2025-13699-7.3/</description>
               <solution>Установить обновление для пакета(ов) mariadb11.8
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mariadb11-8-cve-2025-13699-7.3/" type="self" id="ROS-20260129-73-0058" title="ROS-20260129-73-0058" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13699" type="cve" id="CVE-2025-13699" title="CVE-2025-13699" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mariadb11.8" epoch="3" version="11.8.5" release="1.el7" arch="x86_64" src="mariadb11.8-11.8.5-1.el7.src.rpm">
					<filename>mariadb11.8-3:11.8.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.8-backup" epoch="3" version="11.8.5" release="1.el7" arch="x86_64" src="mariadb11.8-11.8.5-1.el7.src.rpm">
					<filename>mariadb11.8-backup-3:11.8.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.8-common" epoch="3" version="11.8.5" release="1.el7" arch="x86_64" src="mariadb11.8-11.8.5-1.el7.src.rpm">
					<filename>mariadb11.8-common-3:11.8.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.8-connect-engine" epoch="3" version="11.8.5" release="1.el7" arch="x86_64" src="mariadb11.8-11.8.5-1.el7.src.rpm">
					<filename>mariadb11.8-connect-engine-3:11.8.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.8-cracklib-password-check" epoch="3" version="11.8.5" release="1.el7" arch="x86_64" src="mariadb11.8-11.8.5-1.el7.src.rpm">
					<filename>mariadb11.8-cracklib-password-check-3:11.8.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.8-devel" epoch="3" version="11.8.5" release="1.el7" arch="x86_64" src="mariadb11.8-11.8.5-1.el7.src.rpm">
					<filename>mariadb11.8-devel-3:11.8.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.8-embedded" epoch="3" version="11.8.5" release="1.el7" arch="x86_64" src="mariadb11.8-11.8.5-1.el7.src.rpm">
					<filename>mariadb11.8-embedded-3:11.8.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.8-embedded-devel" epoch="3" version="11.8.5" release="1.el7" arch="x86_64" src="mariadb11.8-11.8.5-1.el7.src.rpm">
					<filename>mariadb11.8-embedded-devel-3:11.8.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.8-errmsg" epoch="3" version="11.8.5" release="1.el7" arch="x86_64" src="mariadb11.8-11.8.5-1.el7.src.rpm">
					<filename>mariadb11.8-errmsg-3:11.8.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.8-gssapi-server" epoch="3" version="11.8.5" release="1.el7" arch="x86_64" src="mariadb11.8-11.8.5-1.el7.src.rpm">
					<filename>mariadb11.8-gssapi-server-3:11.8.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.8-oqgraph-engine" epoch="3" version="11.8.5" release="1.el7" arch="x86_64" src="mariadb11.8-11.8.5-1.el7.src.rpm">
					<filename>mariadb11.8-oqgraph-engine-3:11.8.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.8-rocksdb-engine" epoch="3" version="11.8.5" release="1.el7" arch="x86_64" src="mariadb11.8-11.8.5-1.el7.src.rpm">
					<filename>mariadb11.8-rocksdb-engine-3:11.8.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.8-s3-engine" epoch="3" version="11.8.5" release="1.el7" arch="x86_64" src="mariadb11.8-11.8.5-1.el7.src.rpm">
					<filename>mariadb11.8-s3-engine-3:11.8.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.8-server" epoch="3" version="11.8.5" release="1.el7" arch="x86_64" src="mariadb11.8-11.8.5-1.el7.src.rpm">
					<filename>mariadb11.8-server-3:11.8.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.8-server-galera" epoch="3" version="11.8.5" release="1.el7" arch="x86_64" src="mariadb11.8-11.8.5-1.el7.src.rpm">
					<filename>mariadb11.8-server-galera-3:11.8.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.8-server-utils" epoch="3" version="11.8.5" release="1.el7" arch="x86_64" src="mariadb11.8-11.8.5-1.el7.src.rpm">
					<filename>mariadb11.8-server-utils-3:11.8.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.8-sphinx-engine" epoch="3" version="11.8.5" release="1.el7" arch="x86_64" src="mariadb11.8-11.8.5-1.el7.src.rpm">
					<filename>mariadb11.8-sphinx-engine-3:11.8.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.8-test" epoch="3" version="11.8.5" release="1.el7" arch="x86_64" src="mariadb11.8-11.8.5-1.el7.src.rpm">
					<filename>mariadb11.8-test-3:11.8.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0059</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-0628-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-0628-7.3/" type="self" id="ROS-20260129-73-0059" title="ROS-20260129-73-0059" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0628" type="cve" id="CVE-2026-0628" title="CVE-2026-0628" />
			<reference href="https://bdu.fstec.ru/vul/2026-00887" type="self" id="BDU:2026-00887" title="BDU:2026-00887" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.192" release="1.el7" arch="x86_64" src="chromium-143.0.7499.192-1.el7.src.rpm">
					<filename>chromedriver-0:143.0.7499.192-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.192" release="1.el7" arch="x86_64" src="chromium-143.0.7499.192-1.el7.src.rpm">
					<filename>chromium-0:143.0.7499.192-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.192" release="1.el7" arch="x86_64" src="chromium-143.0.7499.192-1.el7.src.rpm">
					<filename>chromium-common-0:143.0.7499.192-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0060</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-14765-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-14765-7.3/" type="self" id="ROS-20260129-73-0060" title="ROS-20260129-73-0060" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14765" type="cve" id="CVE-2025-14765" title="CVE-2025-14765" />
			<reference href="https://bdu.fstec.ru/vul/2025-16319" type="self" id="BDU:2025-16319" title="BDU:2025-16319" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.192" release="1.el7" arch="x86_64" src="chromium-143.0.7499.192-1.el7.src.rpm">
					<filename>chromedriver-0:143.0.7499.192-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.192" release="1.el7" arch="x86_64" src="chromium-143.0.7499.192-1.el7.src.rpm">
					<filename>chromium-0:143.0.7499.192-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.192" release="1.el7" arch="x86_64" src="chromium-143.0.7499.192-1.el7.src.rpm">
					<filename>chromium-common-0:143.0.7499.192-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0061</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-14766-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2025-14766-7.3/" type="self" id="ROS-20260129-73-0061" title="ROS-20260129-73-0061" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14766" type="cve" id="CVE-2025-14766" title="CVE-2025-14766" />
			<reference href="https://bdu.fstec.ru/vul/2025-16320" type="self" id="BDU:2025-16320" title="BDU:2025-16320" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.192" release="1.el7" arch="x86_64" src="chromium-143.0.7499.192-1.el7.src.rpm">
					<filename>chromedriver-0:143.0.7499.192-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.192" release="1.el7" arch="x86_64" src="chromium-143.0.7499.192-1.el7.src.rpm">
					<filename>chromium-0:143.0.7499.192-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.192" release="1.el7" arch="x86_64" src="chromium-143.0.7499.192-1.el7.src.rpm">
					<filename>chromium-common-0:143.0.7499.192-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0062</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость portainer-ce </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в portainer-ce</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-portainer-ce-cve-2025-47914-7.3/</description>
               <solution>Установить обновление для пакета(ов) portainer-ce
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-portainer-ce-cve-2025-47914-7.3/" type="self" id="ROS-20260129-73-0062" title="ROS-20260129-73-0062" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47914" type="cve" id="CVE-2025-47914" title="CVE-2025-47914" />
			<reference href="https://bdu.fstec.ru/vul/2025-14682" type="self" id="BDU:2025-14682" title="BDU:2025-14682" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="portainer-ce" epoch="0" version="2.33.6" release="1.el7" arch="x86_64" src="portainer-ce-2.33.6-1.el7.src.rpm">
					<filename>portainer-ce-0:2.33.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="portainer-ce-agent" epoch="0" version="2.33.6" release="1.el7" arch="x86_64" src="portainer-ce-2.33.6-1.el7.src.rpm">
					<filename>portainer-ce-agent-0:2.33.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0063</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость portainer-ce </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в portainer-ce</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-portainer-ce-cve-2025-61727-7.3/</description>
               <solution>Установить обновление для пакета(ов) portainer-ce
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-portainer-ce-cve-2025-61727-7.3/" type="self" id="ROS-20260129-73-0063" title="ROS-20260129-73-0063" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61727" type="cve" id="CVE-2025-61727" title="CVE-2025-61727" />
			<reference href="https://bdu.fstec.ru/vul/2026-00268" type="self" id="BDU:2026-00268" title="BDU:2026-00268" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="portainer-ce" epoch="0" version="2.33.6" release="1.el7" arch="x86_64" src="portainer-ce-2.33.6-1.el7.src.rpm">
					<filename>portainer-ce-0:2.33.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="portainer-ce-agent" epoch="0" version="2.33.6" release="1.el7" arch="x86_64" src="portainer-ce-2.33.6-1.el7.src.rpm">
					<filename>portainer-ce-agent-0:2.33.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0064</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость portainer-ce </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в portainer-ce</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-portainer-ce-cve-2025-61729-7.3/</description>
               <solution>Установить обновление для пакета(ов) portainer-ce
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-portainer-ce-cve-2025-61729-7.3/" type="self" id="ROS-20260129-73-0064" title="ROS-20260129-73-0064" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61729" type="cve" id="CVE-2025-61729" title="CVE-2025-61729" />
			<reference href="https://bdu.fstec.ru/vul/2025-16242" type="self" id="BDU:2025-16242" title="BDU:2025-16242" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="portainer-ce" epoch="0" version="2.33.6" release="1.el7" arch="x86_64" src="portainer-ce-2.33.6-1.el7.src.rpm">
					<filename>portainer-ce-0:2.33.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="portainer-ce-agent" epoch="0" version="2.33.6" release="1.el7" arch="x86_64" src="portainer-ce-2.33.6-1.el7.src.rpm">
					<filename>portainer-ce-agent-0:2.33.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0065</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость curl </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2025-15224-7.3/</description>
               <solution>Установить обновление для пакета(ов) curl
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2025-15224-7.3/" type="self" id="ROS-20260129-73-0065" title="ROS-20260129-73-0065" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15224" type="cve" id="CVE-2025-15224" title="CVE-2025-15224" />
			<reference href="https://bdu.fstec.ru/vul/2026-03387" type="self" id="BDU:2026-03387" title="BDU:2026-03387" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="curl" epoch="0" version="7.86.0" release="8.el7" arch="x86_64" src="curl-7.86.0-8.el7.src.rpm">
					<filename>curl-0:7.86.0-8.el7.x86_64.rpm</filename>
				</package>
				<package name="libcurl" epoch="0" version="7.86.0" release="8.el7" arch="x86_64" src="curl-7.86.0-8.el7.src.rpm">
					<filename>libcurl-0:7.86.0-8.el7.x86_64.rpm</filename>
				</package>
				<package name="libcurl-devel" epoch="0" version="7.86.0" release="8.el7" arch="x86_64" src="curl-7.86.0-8.el7.src.rpm">
					<filename>libcurl-devel-0:7.86.0-8.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0066</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость curl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2025-14524-7.3/</description>
               <solution>Установить обновление для пакета(ов) curl
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2025-14524-7.3/" type="self" id="ROS-20260129-73-0066" title="ROS-20260129-73-0066" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14524" type="cve" id="CVE-2025-14524" title="CVE-2025-14524" />
			<reference href="https://bdu.fstec.ru/vul/2026-02955" type="self" id="BDU:2026-02955" title="BDU:2026-02955" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="curl" epoch="0" version="7.86.0" release="8.el7" arch="x86_64" src="curl-7.86.0-8.el7.src.rpm">
					<filename>curl-0:7.86.0-8.el7.x86_64.rpm</filename>
				</package>
				<package name="libcurl" epoch="0" version="7.86.0" release="8.el7" arch="x86_64" src="curl-7.86.0-8.el7.src.rpm">
					<filename>libcurl-0:7.86.0-8.el7.x86_64.rpm</filename>
				</package>
				<package name="libcurl-devel" epoch="0" version="7.86.0" release="8.el7" arch="x86_64" src="curl-7.86.0-8.el7.src.rpm">
					<filename>libcurl-devel-0:7.86.0-8.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0067</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость curl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2025-15079-7.3/</description>
               <solution>Установить обновление для пакета(ов) curl
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2025-15079-7.3/" type="self" id="ROS-20260129-73-0067" title="ROS-20260129-73-0067" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15079" type="cve" id="CVE-2025-15079" title="CVE-2025-15079" />
			<reference href="https://bdu.fstec.ru/vul/2026-03453" type="self" id="BDU:2026-03453" title="BDU:2026-03453" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="curl" epoch="0" version="7.86.0" release="8.el7" arch="x86_64" src="curl-7.86.0-8.el7.src.rpm">
					<filename>curl-0:7.86.0-8.el7.x86_64.rpm</filename>
				</package>
				<package name="libcurl" epoch="0" version="7.86.0" release="8.el7" arch="x86_64" src="curl-7.86.0-8.el7.src.rpm">
					<filename>libcurl-0:7.86.0-8.el7.x86_64.rpm</filename>
				</package>
				<package name="libcurl-devel" epoch="0" version="7.86.0" release="8.el7" arch="x86_64" src="curl-7.86.0-8.el7.src.rpm">
					<filename>libcurl-devel-0:7.86.0-8.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0068</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2026-0877-7.3/</description>
               <solution>Установить обновление для пакета(ов) firefox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2026-0877-7.3/" type="self" id="ROS-20260129-73-0068" title="ROS-20260129-73-0068" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0877" type="cve" id="CVE-2026-0877" title="CVE-2026-0877" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.32.0" release="1.el7" arch="x86_64" src="firefox-115.32.0-1.el7.src.rpm">
					<filename>firefox-0:115.32.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0069</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2026-0879-7.3/</description>
               <solution>Установить обновление для пакета(ов) firefox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2026-0879-7.3/" type="self" id="ROS-20260129-73-0069" title="ROS-20260129-73-0069" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0879" type="cve" id="CVE-2026-0879" title="CVE-2026-0879" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.32.0" release="1.el7" arch="x86_64" src="firefox-115.32.0-1.el7.src.rpm">
					<filename>firefox-0:115.32.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0070</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2026-0880-7.3/</description>
               <solution>Установить обновление для пакета(ов) firefox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2026-0880-7.3/" type="self" id="ROS-20260129-73-0070" title="ROS-20260129-73-0070" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0880" type="cve" id="CVE-2026-0880" title="CVE-2026-0880" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.32.0" release="1.el7" arch="x86_64" src="firefox-115.32.0-1.el7.src.rpm">
					<filename>firefox-0:115.32.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0071</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2026-0882-7.3/</description>
               <solution>Установить обновление для пакета(ов) firefox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2026-0882-7.3/" type="self" id="ROS-20260129-73-0071" title="ROS-20260129-73-0071" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0882" type="cve" id="CVE-2026-0882" title="CVE-2026-0882" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.32.0" release="1.el7" arch="x86_64" src="firefox-115.32.0-1.el7.src.rpm">
					<filename>firefox-0:115.32.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0072</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2026-0886-7.3/</description>
               <solution>Установить обновление для пакета(ов) firefox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2026-0886-7.3/" type="self" id="ROS-20260129-73-0072" title="ROS-20260129-73-0072" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0886" type="cve" id="CVE-2026-0886" title="CVE-2026-0886" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="115.32.0" release="1.el7" arch="x86_64" src="firefox-115.32.0-1.el7.src.rpm">
					<filename>firefox-0:115.32.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0073</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость dotnet6.0 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dotnet6.0</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet6-0-cve-2023-44487-7.3/</description>
               <solution>Установить обновление для пакета(ов) dotnet6.0
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet6-0-cve-2023-44487-7.3/" type="self" id="ROS-20260129-73-0073" title="ROS-20260129-73-0073" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487" type="cve" id="CVE-2023-44487" title="CVE-2023-44487" />
			<reference href="https://bdu.fstec.ru/vul/2023-06559" type="self" id="BDU:2023-06559" title="BDU:2023-06559" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="aspnetcore-runtime-6.0" epoch="0" version="6.0.25" release="3.el7" arch="x86_64" src="dotnet6.0-6.0.125-3.el7.src.rpm">
					<filename>aspnetcore-runtime-6.0-0:6.0.25-3.el7.x86_64.rpm</filename>
				</package>
				<package name="aspnetcore-targeting-pack-6.0" epoch="0" version="6.0.25" release="3.el7" arch="x86_64" src="dotnet6.0-6.0.125-3.el7.src.rpm">
					<filename>aspnetcore-targeting-pack-6.0-0:6.0.25-3.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet" epoch="0" version="6.0.125" release="3.el7" arch="x86_64" src="dotnet6.0-6.0.125-3.el7.src.rpm">
					<filename>dotnet-0:6.0.125-3.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-apphost-pack-6.0" epoch="0" version="6.0.25" release="3.el7" arch="x86_64" src="dotnet6.0-6.0.125-3.el7.src.rpm">
					<filename>dotnet-apphost-pack-6.0-0:6.0.25-3.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-host" epoch="0" version="6.0.25" release="3.el7" arch="x86_64" src="dotnet6.0-6.0.125-3.el7.src.rpm">
					<filename>dotnet-host-0:6.0.25-3.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-hostfxr-6.0" epoch="0" version="6.0.25" release="3.el7" arch="x86_64" src="dotnet6.0-6.0.125-3.el7.src.rpm">
					<filename>dotnet-hostfxr-6.0-0:6.0.25-3.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-runtime-6.0" epoch="0" version="6.0.25" release="3.el7" arch="x86_64" src="dotnet6.0-6.0.125-3.el7.src.rpm">
					<filename>dotnet-runtime-6.0-0:6.0.25-3.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-sdk-6.0" epoch="0" version="6.0.125" release="3.el7" arch="x86_64" src="dotnet6.0-6.0.125-3.el7.src.rpm">
					<filename>dotnet-sdk-6.0-0:6.0.125-3.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-targeting-pack-6.0" epoch="0" version="6.0.25" release="3.el7" arch="x86_64" src="dotnet6.0-6.0.125-3.el7.src.rpm">
					<filename>dotnet-targeting-pack-6.0-0:6.0.25-3.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-templates-6.0" epoch="0" version="6.0.125" release="3.el7" arch="x86_64" src="dotnet6.0-6.0.125-3.el7.src.rpm">
					<filename>dotnet-templates-6.0-0:6.0.125-3.el7.x86_64.rpm</filename>
				</package>
				<package name="netstandard-targeting-pack-2.1" epoch="0" version="6.0.125" release="3.el7" arch="x86_64" src="dotnet6.0-6.0.125-3.el7.src.rpm">
					<filename>netstandard-targeting-pack-2.1-0:6.0.125-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0074</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость dotnet8.0 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dotnet8.0</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet8-0-cve-2023-44487-7.3/</description>
               <solution>Установить обновление для пакета(ов) dotnet8.0
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet8-0-cve-2023-44487-7.3/" type="self" id="ROS-20260129-73-0074" title="ROS-20260129-73-0074" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487" type="cve" id="CVE-2023-44487" title="CVE-2023-44487" />
			<reference href="https://bdu.fstec.ru/vul/2023-06559" type="self" id="BDU:2023-06559" title="BDU:2023-06559" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="aspnetcore-runtime-8.0" epoch="0" version="8.0.0" release="3.el7" arch="x86_64" src="dotnet8.0-8.0.100-3.el7.src.rpm">
					<filename>aspnetcore-runtime-8.0-0:8.0.0-3.el7.x86_64.rpm</filename>
				</package>
				<package name="aspnetcore-targeting-pack-8.0" epoch="0" version="8.0.0" release="3.el7" arch="x86_64" src="dotnet8.0-8.0.100-3.el7.src.rpm">
					<filename>aspnetcore-targeting-pack-8.0-0:8.0.0-3.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet" epoch="0" version="8.0.100" release="3.el7" arch="x86_64" src="dotnet8.0-8.0.100-3.el7.src.rpm">
					<filename>dotnet-0:8.0.100-3.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-apphost-pack-8.0" epoch="0" version="8.0.0" release="3.el7" arch="x86_64" src="dotnet8.0-8.0.100-3.el7.src.rpm">
					<filename>dotnet-apphost-pack-8.0-0:8.0.0-3.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-host" epoch="0" version="8.0.0" release="3.el7" arch="x86_64" src="dotnet8.0-8.0.100-3.el7.src.rpm">
					<filename>dotnet-host-0:8.0.0-3.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-hostfxr-8.0" epoch="0" version="8.0.0" release="3.el7" arch="x86_64" src="dotnet8.0-8.0.100-3.el7.src.rpm">
					<filename>dotnet-hostfxr-8.0-0:8.0.0-3.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-runtime-8.0" epoch="0" version="8.0.0" release="3.el7" arch="x86_64" src="dotnet8.0-8.0.100-3.el7.src.rpm">
					<filename>dotnet-runtime-8.0-0:8.0.0-3.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-sdk-8.0" epoch="0" version="8.0.100" release="3.el7" arch="x86_64" src="dotnet8.0-8.0.100-3.el7.src.rpm">
					<filename>dotnet-sdk-8.0-0:8.0.100-3.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-targeting-pack-8.0" epoch="0" version="8.0.0" release="3.el7" arch="x86_64" src="dotnet8.0-8.0.100-3.el7.src.rpm">
					<filename>dotnet-targeting-pack-8.0-0:8.0.0-3.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-templates-8.0" epoch="0" version="8.0.100" release="3.el7" arch="x86_64" src="dotnet8.0-8.0.100-3.el7.src.rpm">
					<filename>dotnet-templates-8.0-0:8.0.100-3.el7.x86_64.rpm</filename>
				</package>
				<package name="netstandard-targeting-pack-2.1" epoch="0" version="8.0.100" release="3.el7" arch="x86_64" src="dotnet8.0-8.0.100-3.el7.src.rpm">
					<filename>netstandard-targeting-pack-2.1-0:8.0.100-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0075</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость etcd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в etcd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-etcd-cve-2023-44487-7.3/</description>
               <solution>Установить обновление для пакета(ов) etcd
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-etcd-cve-2023-44487-7.3/" type="self" id="ROS-20260129-73-0075" title="ROS-20260129-73-0075" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487" type="cve" id="CVE-2023-44487" title="CVE-2023-44487" />
			<reference href="https://bdu.fstec.ru/vul/2023-06559" type="self" id="BDU:2023-06559" title="BDU:2023-06559" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="etcd" epoch="0" version="3.5.15" release="2.el7" arch="x86_64" src="etcd-3.5.15-2.el7.src.rpm">
					<filename>etcd-0:3.5.15-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0076</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость rclone </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в rclone</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rclone-cve-2025-61729-7.3/</description>
               <solution>Установить обновление для пакета(ов) rclone
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rclone-cve-2025-61729-7.3/" type="self" id="ROS-20260129-73-0076" title="ROS-20260129-73-0076" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61729" type="cve" id="CVE-2025-61729" title="CVE-2025-61729" />
			<reference href="https://bdu.fstec.ru/vul/2025-16242" type="self" id="BDU:2025-16242" title="BDU:2025-16242" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rclone" epoch="0" version="1.72.1" release="1.el7" arch="x86_64" src="rclone-1.72.1-1.el7.src.rpm">
					<filename>rclone-0:1.72.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0077</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость rclone </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в rclone</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rclone-cve-2025-58181-7.3/</description>
               <solution>Установить обновление для пакета(ов) rclone
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rclone-cve-2025-58181-7.3/" type="self" id="ROS-20260129-73-0077" title="ROS-20260129-73-0077" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58181" type="cve" id="CVE-2025-58181" title="CVE-2025-58181" />
			<reference href="https://bdu.fstec.ru/vul/2025-14688" type="self" id="BDU:2025-14688" title="BDU:2025-14688" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rclone" epoch="0" version="1.72.1" release="1.el7" arch="x86_64" src="rclone-1.72.1-1.el7.src.rpm">
					<filename>rclone-0:1.72.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0078</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость mongodb-org </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2025-12657-7.3/</description>
               <solution>Установить обновление для пакета(ов) mongodb-org
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2025-12657-7.3/" type="self" id="ROS-20260129-73-0078" title="ROS-20260129-73-0078" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12657" type="cve" id="CVE-2025-12657" title="CVE-2025-12657" />
			<reference href="https://bdu.fstec.ru/vul/2026-02957" type="self" id="BDU:2026-02957" title="BDU:2026-02957" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mongodb-org" epoch="0" version="7.0.24" release="1.el7" arch="x86_64" src="mongodb-org-7.0.24-1.el7.src.rpm">
					<filename>mongodb-org-0:7.0.24-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-mongos" epoch="0" version="7.0.24" release="1.el7" arch="x86_64" src="mongodb-org-7.0.24-1.el7.src.rpm">
					<filename>mongodb-org-mongos-0:7.0.24-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-server" epoch="0" version="7.0.24" release="1.el7" arch="x86_64" src="mongodb-org-7.0.24-1.el7.src.rpm">
					<filename>mongodb-org-server-0:7.0.24-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-shell" epoch="0" version="7.0.24" release="1.el7" arch="x86_64" src="mongodb-org-7.0.24-1.el7.src.rpm">
					<filename>mongodb-org-shell-0:7.0.24-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0079</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость golang-x-crypto </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang-x-crypto</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-x-crypto-cve-2025-58181-7.3/</description>
               <solution>Установить обновление для пакета(ов) golang-x-crypto
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-x-crypto-cve-2025-58181-7.3/" type="self" id="ROS-20260129-73-0079" title="ROS-20260129-73-0079" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58181" type="cve" id="CVE-2025-58181" title="CVE-2025-58181" />
			<reference href="https://bdu.fstec.ru/vul/2025-14688" type="self" id="BDU:2025-14688" title="BDU:2025-14688" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang-x-crypto-devel" epoch="0" version="0.45.0" release="1.el7" arch="noarch" src="golang-x-crypto-0.45.0-1.el7.src.rpm">
					<filename>golang-x-crypto-devel-0:0.45.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0080</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость gitea </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gitea</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gitea-cve-2025-68938-7.3/</description>
               <solution>Установить обновление для пакета(ов) gitea
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gitea-cve-2025-68938-7.3/" type="self" id="ROS-20260129-73-0080" title="ROS-20260129-73-0080" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68938" type="cve" id="CVE-2025-68938" title="CVE-2025-68938" />
			<reference href="https://bdu.fstec.ru/vul/2026-03395" type="self" id="BDU:2026-03395" title="BDU:2026-03395" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gitea" epoch="0" version="1.25.3" release="1.el7" arch="x86_64" src="gitea-1.25.3-1.el7.src.rpm">
					<filename>gitea-0:1.25.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="gitea-docs" epoch="0" version="1.25.3" release="1.el7" arch="noarch" src="gitea-1.25.3-1.el7.src.rpm">
					<filename>gitea-docs-0:1.25.3-1.el7.noarch.rpm</filename>
				</package>
				<package name="gitea-fish-completion" epoch="0" version="1.25.3" release="1.el7" arch="noarch" src="gitea-1.25.3-1.el7.src.rpm">
					<filename>gitea-fish-completion-0:1.25.3-1.el7.noarch.rpm</filename>
				</package>
				<package name="gitea-zsh-completion" epoch="0" version="1.25.3" release="1.el7" arch="noarch" src="gitea-1.25.3-1.el7.src.rpm">
					<filename>gitea-zsh-completion-0:1.25.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-73-0081</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость gitea </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gitea</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gitea-cve-2025-69413-7.3/</description>
               <solution>Установить обновление для пакета(ов) gitea
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gitea-cve-2025-69413-7.3/" type="self" id="ROS-20260129-73-0081" title="ROS-20260129-73-0081" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69413" type="cve" id="CVE-2025-69413" title="CVE-2025-69413" />
			<reference href="https://bdu.fstec.ru/vul/2026-03394" type="self" id="BDU:2026-03394" title="BDU:2026-03394" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gitea" epoch="0" version="1.25.3" release="1.el7" arch="x86_64" src="gitea-1.25.3-1.el7.src.rpm">
					<filename>gitea-0:1.25.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="gitea-docs" epoch="0" version="1.25.3" release="1.el7" arch="noarch" src="gitea-1.25.3-1.el7.src.rpm">
					<filename>gitea-docs-0:1.25.3-1.el7.noarch.rpm</filename>
				</package>
				<package name="gitea-fish-completion" epoch="0" version="1.25.3" release="1.el7" arch="noarch" src="gitea-1.25.3-1.el7.src.rpm">
					<filename>gitea-fish-completion-0:1.25.3-1.el7.noarch.rpm</filename>
				</package>
				<package name="gitea-zsh-completion" epoch="0" version="1.25.3" release="1.el7" arch="noarch" src="gitea-1.25.3-1.el7.src.rpm">
					<filename>gitea-zsh-completion-0:1.25.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0001</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53105-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53105-7.3/" type="self" id="ROS-20260202-73-0001" title="ROS-20260202-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53105" type="cve" id="CVE-2023-53105" title="CVE-2023-53105" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0002</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53106-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53106-7.3/" type="self" id="ROS-20260202-73-0002" title="ROS-20260202-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53106" type="cve" id="CVE-2023-53106" title="CVE-2023-53106" />
			<reference href="https://bdu.fstec.ru/vul/2026-03856" type="self" id="BDU:2026-03856" title="BDU:2026-03856" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0003</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53107-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53107-7.3/" type="self" id="ROS-20260202-73-0003" title="ROS-20260202-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53107" type="cve" id="CVE-2023-53107" title="CVE-2023-53107" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0004</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53108-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53108-7.3/" type="self" id="ROS-20260202-73-0004" title="ROS-20260202-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53108" type="cve" id="CVE-2023-53108" title="CVE-2023-53108" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0005</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53109-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53109-7.3/" type="self" id="ROS-20260202-73-0005" title="ROS-20260202-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53109" type="cve" id="CVE-2023-53109" title="CVE-2023-53109" />
			<reference href="https://bdu.fstec.ru/vul/2026-05793" type="self" id="BDU:2026-05793" title="BDU:2026-05793" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0006</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53110-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53110-7.3/" type="self" id="ROS-20260202-73-0006" title="ROS-20260202-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53110" type="cve" id="CVE-2023-53110" title="CVE-2023-53110" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0007</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53111-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53111-7.3/" type="self" id="ROS-20260202-73-0007" title="ROS-20260202-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53111" type="cve" id="CVE-2023-53111" title="CVE-2023-53111" />
			<reference href="https://bdu.fstec.ru/vul/2026-03745" type="self" id="BDU:2026-03745" title="BDU:2026-03745" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0008</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53112-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53112-7.3/" type="self" id="ROS-20260202-73-0008" title="ROS-20260202-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53112" type="cve" id="CVE-2023-53112" title="CVE-2023-53112" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0009</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53113-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53113-7.3/" type="self" id="ROS-20260202-73-0009" title="ROS-20260202-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53113" type="cve" id="CVE-2023-53113" title="CVE-2023-53113" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0010</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53114-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53114-7.3/" type="self" id="ROS-20260202-73-0010" title="ROS-20260202-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53114" type="cve" id="CVE-2023-53114" title="CVE-2023-53114" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0011</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53115-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53115-7.3/" type="self" id="ROS-20260202-73-0011" title="ROS-20260202-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53115" type="cve" id="CVE-2023-53115" title="CVE-2023-53115" />
			<reference href="https://bdu.fstec.ru/vul/2026-06046" type="self" id="BDU:2026-06046" title="BDU:2026-06046" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0012</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53116-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53116-7.3/" type="self" id="ROS-20260202-73-0012" title="ROS-20260202-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53116" type="cve" id="CVE-2023-53116" title="CVE-2023-53116" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0013</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53119-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53119-7.3/" type="self" id="ROS-20260202-73-0013" title="ROS-20260202-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53119" type="cve" id="CVE-2023-53119" title="CVE-2023-53119" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0014</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53120-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53120-7.3/" type="self" id="ROS-20260202-73-0014" title="ROS-20260202-73-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53120" type="cve" id="CVE-2023-53120" title="CVE-2023-53120" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0015</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53121-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53121-7.3/" type="self" id="ROS-20260202-73-0015" title="ROS-20260202-73-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53121" type="cve" id="CVE-2023-53121" title="CVE-2023-53121" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0016</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53123-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53123-7.3/" type="self" id="ROS-20260202-73-0016" title="ROS-20260202-73-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53123" type="cve" id="CVE-2023-53123" title="CVE-2023-53123" />
			<reference href="https://bdu.fstec.ru/vul/2026-05794" type="self" id="BDU:2026-05794" title="BDU:2026-05794" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0017</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53124-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53124-7.3/" type="self" id="ROS-20260202-73-0017" title="ROS-20260202-73-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53124" type="cve" id="CVE-2023-53124" title="CVE-2023-53124" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0018</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53125-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53125-7.3/" type="self" id="ROS-20260202-73-0018" title="ROS-20260202-73-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53125" type="cve" id="CVE-2023-53125" title="CVE-2023-53125" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0019</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53126-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53126-7.3/" type="self" id="ROS-20260202-73-0019" title="ROS-20260202-73-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53126" type="cve" id="CVE-2023-53126" title="CVE-2023-53126" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0020</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53127-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53127-7.3/" type="self" id="ROS-20260202-73-0020" title="ROS-20260202-73-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53127" type="cve" id="CVE-2023-53127" title="CVE-2023-53127" />
			<reference href="https://bdu.fstec.ru/vul/2026-06044" type="self" id="BDU:2026-06044" title="BDU:2026-06044" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0021</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53128-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53128-7.3/" type="self" id="ROS-20260202-73-0021" title="ROS-20260202-73-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53128" type="cve" id="CVE-2023-53128" title="CVE-2023-53128" />
			<reference href="https://bdu.fstec.ru/vul/2026-06043" type="self" id="BDU:2026-06043" title="BDU:2026-06043" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0022</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53132-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53132-7.3/" type="self" id="ROS-20260202-73-0022" title="ROS-20260202-73-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53132" type="cve" id="CVE-2023-53132" title="CVE-2023-53132" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0023</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37801-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37801-7.3/" type="self" id="ROS-20260202-73-0023" title="ROS-20260202-73-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37801" type="cve" id="CVE-2025-37801" title="CVE-2025-37801" />
			<reference href="https://bdu.fstec.ru/vul/2025-09837" type="self" id="BDU:2025-09837" title="BDU:2025-09837" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0024</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37805-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37805-7.3/" type="self" id="ROS-20260202-73-0024" title="ROS-20260202-73-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37805" type="cve" id="CVE-2025-37805" title="CVE-2025-37805" />
			<reference href="https://bdu.fstec.ru/vul/2025-10603" type="self" id="BDU:2025-10603" title="BDU:2025-10603" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0025</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37808-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37808-7.3/" type="self" id="ROS-20260202-73-0025" title="ROS-20260202-73-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37808" type="cve" id="CVE-2025-37808" title="CVE-2025-37808" />
			<reference href="https://bdu.fstec.ru/vul/2025-10758" type="self" id="BDU:2025-10758" title="BDU:2025-10758" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0026</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37810-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37810-7.3/" type="self" id="ROS-20260202-73-0026" title="ROS-20260202-73-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37810" type="cve" id="CVE-2025-37810" title="CVE-2025-37810" />
			<reference href="https://bdu.fstec.ru/vul/2025-10599" type="self" id="BDU:2025-10599" title="BDU:2025-10599" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0027</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37812-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37812-7.3/" type="self" id="ROS-20260202-73-0027" title="ROS-20260202-73-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37812" type="cve" id="CVE-2025-37812" title="CVE-2025-37812" />
			<reference href="https://bdu.fstec.ru/vul/2025-10608" type="self" id="BDU:2025-10608" title="BDU:2025-10608" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0028</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37815-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37815-7.3/" type="self" id="ROS-20260202-73-0028" title="ROS-20260202-73-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37815" type="cve" id="CVE-2025-37815" title="CVE-2025-37815" />
			<reference href="https://bdu.fstec.ru/vul/2025-11798" type="self" id="BDU:2025-11798" title="BDU:2025-11798" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0029</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37817-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37817-7.3/" type="self" id="ROS-20260202-73-0029" title="ROS-20260202-73-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37817" type="cve" id="CVE-2025-37817" title="CVE-2025-37817" />
			<reference href="https://bdu.fstec.ru/vul/2025-12062" type="self" id="BDU:2025-12062" title="BDU:2025-12062" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0030</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37818-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37818-7.3/" type="self" id="ROS-20260202-73-0030" title="ROS-20260202-73-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37818" type="cve" id="CVE-2025-37818" title="CVE-2025-37818" />
			<reference href="https://bdu.fstec.ru/vul/2025-12023" type="self" id="BDU:2025-12023" title="BDU:2025-12023" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0031</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37819-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37819-7.3/" type="self" id="ROS-20260202-73-0031" title="ROS-20260202-73-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37819" type="cve" id="CVE-2025-37819" title="CVE-2025-37819" />
			<reference href="https://bdu.fstec.ru/vul/2025-12086" type="self" id="BDU:2025-12086" title="BDU:2025-12086" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0032</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37823-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37823-7.3/" type="self" id="ROS-20260202-73-0032" title="ROS-20260202-73-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37823" type="cve" id="CVE-2025-37823" title="CVE-2025-37823" />
			<reference href="https://bdu.fstec.ru/vul/2025-12085" type="self" id="BDU:2025-12085" title="BDU:2025-12085" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0033</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37824-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37824-7.3/" type="self" id="ROS-20260202-73-0033" title="ROS-20260202-73-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37824" type="cve" id="CVE-2025-37824" title="CVE-2025-37824" />
			<reference href="https://bdu.fstec.ru/vul/2025-12149" type="self" id="BDU:2025-12149" title="BDU:2025-12149" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0034</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37829-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37829-7.3/" type="self" id="ROS-20260202-73-0034" title="ROS-20260202-73-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37829" type="cve" id="CVE-2025-37829" title="CVE-2025-37829" />
			<reference href="https://bdu.fstec.ru/vul/2025-12145" type="self" id="BDU:2025-12145" title="BDU:2025-12145" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0035</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37830-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37830-7.3/" type="self" id="ROS-20260202-73-0035" title="ROS-20260202-73-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37830" type="cve" id="CVE-2025-37830" title="CVE-2025-37830" />
			<reference href="https://bdu.fstec.ru/vul/2025-12144" type="self" id="BDU:2025-12144" title="BDU:2025-12144" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0036</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37836-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37836-7.3/" type="self" id="ROS-20260202-73-0036" title="ROS-20260202-73-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37836" type="cve" id="CVE-2025-37836" title="CVE-2025-37836" />
			<reference href="https://bdu.fstec.ru/vul/2025-12061" type="self" id="BDU:2025-12061" title="BDU:2025-12061" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0037</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37839-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37839-7.3/" type="self" id="ROS-20260202-73-0037" title="ROS-20260202-73-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37839" type="cve" id="CVE-2025-37839" title="CVE-2025-37839" />
			<reference href="https://bdu.fstec.ru/vul/2025-12278" type="self" id="BDU:2025-12278" title="BDU:2025-12278" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0038</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37840-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37840-7.3/" type="self" id="ROS-20260202-73-0038" title="ROS-20260202-73-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37840" type="cve" id="CVE-2025-37840" title="CVE-2025-37840" />
			<reference href="https://bdu.fstec.ru/vul/2025-12329" type="self" id="BDU:2025-12329" title="BDU:2025-12329" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0039</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37841-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37841-7.3/" type="self" id="ROS-20260202-73-0039" title="ROS-20260202-73-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37841" type="cve" id="CVE-2025-37841" title="CVE-2025-37841" />
			<reference href="https://bdu.fstec.ru/vul/2025-12142" type="self" id="BDU:2025-12142" title="BDU:2025-12142" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0040</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37844-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37844-7.3/" type="self" id="ROS-20260202-73-0040" title="ROS-20260202-73-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37844" type="cve" id="CVE-2025-37844" title="CVE-2025-37844" />
			<reference href="https://bdu.fstec.ru/vul/2025-12141" type="self" id="BDU:2025-12141" title="BDU:2025-12141" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0041</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37849-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37849-7.3/" type="self" id="ROS-20260202-73-0041" title="ROS-20260202-73-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37849" type="cve" id="CVE-2025-37849" title="CVE-2025-37849" />
			<reference href="https://bdu.fstec.ru/vul/2025-12072" type="self" id="BDU:2025-12072" title="BDU:2025-12072" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0042</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37850-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37850-7.3/" type="self" id="ROS-20260202-73-0042" title="ROS-20260202-73-0042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37850" type="cve" id="CVE-2025-37850" title="CVE-2025-37850" />
			<reference href="https://bdu.fstec.ru/vul/2025-12002" type="self" id="BDU:2025-12002" title="BDU:2025-12002" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0043</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37851-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37851-7.3/" type="self" id="ROS-20260202-73-0043" title="ROS-20260202-73-0043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37851" type="cve" id="CVE-2025-37851" title="CVE-2025-37851" />
			<reference href="https://bdu.fstec.ru/vul/2025-12246" type="self" id="BDU:2025-12246" title="BDU:2025-12246" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0044</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37852-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37852-7.3/" type="self" id="ROS-20260202-73-0044" title="ROS-20260202-73-0044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37852" type="cve" id="CVE-2025-37852" title="CVE-2025-37852" />
			<reference href="https://bdu.fstec.ru/vul/2025-12140" type="self" id="BDU:2025-12140" title="BDU:2025-12140" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0045</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37854-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37854-7.3/" type="self" id="ROS-20260202-73-0045" title="ROS-20260202-73-0045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37854" type="cve" id="CVE-2025-37854" title="CVE-2025-37854" />
			<reference href="https://bdu.fstec.ru/vul/2025-12071" type="self" id="BDU:2025-12071" title="BDU:2025-12071" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0046</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37857-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37857-7.3/" type="self" id="ROS-20260202-73-0046" title="ROS-20260202-73-0046" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37857" type="cve" id="CVE-2025-37857" title="CVE-2025-37857" />
			<reference href="https://bdu.fstec.ru/vul/2025-11867" type="self" id="BDU:2025-11867" title="BDU:2025-11867" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0047</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37858-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37858-7.3/" type="self" id="ROS-20260202-73-0047" title="ROS-20260202-73-0047" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37858" type="cve" id="CVE-2025-37858" title="CVE-2025-37858" />
			<reference href="https://bdu.fstec.ru/vul/2025-11932" type="self" id="BDU:2025-11932" title="BDU:2025-11932" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0048</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37859-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37859-7.3/" type="self" id="ROS-20260202-73-0048" title="ROS-20260202-73-0048" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37859" type="cve" id="CVE-2025-37859" title="CVE-2025-37859" />
			<reference href="https://bdu.fstec.ru/vul/2025-12353" type="self" id="BDU:2025-12353" title="BDU:2025-12353" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0049</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37862-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37862-7.3/" type="self" id="ROS-20260202-73-0049" title="ROS-20260202-73-0049" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37862" type="cve" id="CVE-2025-37862" title="CVE-2025-37862" />
			<reference href="https://bdu.fstec.ru/vul/2025-12139" type="self" id="BDU:2025-12139" title="BDU:2025-12139" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0050</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37865-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37865-7.3/" type="self" id="ROS-20260202-73-0050" title="ROS-20260202-73-0050" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37865" type="cve" id="CVE-2025-37865" title="CVE-2025-37865" />
			<reference href="https://bdu.fstec.ru/vul/2025-12275" type="self" id="BDU:2025-12275" title="BDU:2025-12275" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0051</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37867-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37867-7.3/" type="self" id="ROS-20260202-73-0051" title="ROS-20260202-73-0051" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37867" type="cve" id="CVE-2025-37867" title="CVE-2025-37867" />
			<reference href="https://bdu.fstec.ru/vul/2025-12285" type="self" id="BDU:2025-12285" title="BDU:2025-12285" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0052</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37875-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37875-7.3/" type="self" id="ROS-20260202-73-0052" title="ROS-20260202-73-0052" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37875" type="cve" id="CVE-2025-37875" title="CVE-2025-37875" />
			<reference href="https://bdu.fstec.ru/vul/2025-12138" type="self" id="BDU:2025-12138" title="BDU:2025-12138" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0053</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37879-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37879-7.3/" type="self" id="ROS-20260202-73-0053" title="ROS-20260202-73-0053" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37879" type="cve" id="CVE-2025-37879" title="CVE-2025-37879" />
			<reference href="https://bdu.fstec.ru/vul/2025-12137" type="self" id="BDU:2025-12137" title="BDU:2025-12137" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0054</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37881-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37881-7.3/" type="self" id="ROS-20260202-73-0054" title="ROS-20260202-73-0054" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37881" type="cve" id="CVE-2025-37881" title="CVE-2025-37881" />
			<reference href="https://bdu.fstec.ru/vul/2025-12136" type="self" id="BDU:2025-12136" title="BDU:2025-12136" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0055</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37883-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37883-7.3/" type="self" id="ROS-20260202-73-0055" title="ROS-20260202-73-0055" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37883" type="cve" id="CVE-2025-37883" title="CVE-2025-37883" />
			<reference href="https://bdu.fstec.ru/vul/2025-11906" type="self" id="BDU:2025-11906" title="BDU:2025-11906" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0056</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37884-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37884-7.3/" type="self" id="ROS-20260202-73-0056" title="ROS-20260202-73-0056" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37884" type="cve" id="CVE-2025-37884" title="CVE-2025-37884" />
			<reference href="https://bdu.fstec.ru/vul/2025-12338" type="self" id="BDU:2025-12338" title="BDU:2025-12338" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-73-0057</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37885-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37885-7.3/" type="self" id="ROS-20260202-73-0057" title="ROS-20260202-73-0057" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37885" type="cve" id="CVE-2025-37885" title="CVE-2025-37885" />
			<reference href="https://bdu.fstec.ru/vul/2025-12069" type="self" id="BDU:2025-12069" title="BDU:2025-12069" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0001</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50012-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-50012-7.3/" type="self" id="ROS-20260203-73-0001" title="ROS-20260203-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50012" type="cve" id="CVE-2024-50012" title="CVE-2024-50012" />
			<reference href="https://bdu.fstec.ru/vul/2025-07979" type="self" id="BDU:2025-07979" title="BDU:2025-07979" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.128" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.128-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.128" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.128-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.128-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0002</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53103-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53103-7.3/" type="self" id="ROS-20260203-73-0002" title="ROS-20260203-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53103" type="cve" id="CVE-2023-53103" title="CVE-2023-53103" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0003</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53118-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53118-7.3/" type="self" id="ROS-20260203-73-0003" title="ROS-20260203-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53118" type="cve" id="CVE-2023-53118" title="CVE-2023-53118" />
			<reference href="https://bdu.fstec.ru/vul/2026-06045" type="self" id="BDU:2026-06045" title="BDU:2026-06045" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0004</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37820-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37820-7.3/" type="self" id="ROS-20260203-73-0004" title="ROS-20260203-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37820" type="cve" id="CVE-2025-37820" title="CVE-2025-37820" />
			<reference href="https://bdu.fstec.ru/vul/2025-12150" type="self" id="BDU:2025-12150" title="BDU:2025-12150" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0005</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53146-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53146-7.3/" type="self" id="ROS-20260203-73-0005" title="ROS-20260203-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53146" type="cve" id="CVE-2023-53146" title="CVE-2023-53146" />
			<reference href="https://bdu.fstec.ru/vul/2026-04625" type="self" id="BDU:2026-04625" title="BDU:2026-04625" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.94" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.94-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0006</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37924-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37924-7.3/" type="self" id="ROS-20260203-73-0006" title="ROS-20260203-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37924" type="cve" id="CVE-2025-37924" title="CVE-2025-37924" />
			<reference href="https://bdu.fstec.ru/vul/2025-12068" type="self" id="BDU:2025-12068" title="BDU:2025-12068" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0007</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37923-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37923-7.3/" type="self" id="ROS-20260203-73-0007" title="ROS-20260203-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37923" type="cve" id="CVE-2025-37923" title="CVE-2025-37923" />
			<reference href="https://bdu.fstec.ru/vul/2025-11866" type="self" id="BDU:2025-11866" title="BDU:2025-11866" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0008</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37921-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37921-7.3/" type="self" id="ROS-20260203-73-0008" title="ROS-20260203-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37921" type="cve" id="CVE-2025-37921" title="CVE-2025-37921" />
			<reference href="https://bdu.fstec.ru/vul/2025-11830" type="self" id="BDU:2025-11830" title="BDU:2025-11830" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0009</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37917-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37917-7.3/" type="self" id="ROS-20260203-73-0009" title="ROS-20260203-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37917" type="cve" id="CVE-2025-37917" title="CVE-2025-37917" />
			<reference href="https://bdu.fstec.ru/vul/2025-12273" type="self" id="BDU:2025-12273" title="BDU:2025-12273" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0010</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37915-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37915-7.3/" type="self" id="ROS-20260203-73-0010" title="ROS-20260203-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37915" type="cve" id="CVE-2025-37915" title="CVE-2025-37915" />
			<reference href="https://bdu.fstec.ru/vul/2025-11998" type="self" id="BDU:2025-11998" title="BDU:2025-11998" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0011</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37914-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37914-7.3/" type="self" id="ROS-20260203-73-0011" title="ROS-20260203-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37914" type="cve" id="CVE-2025-37914" title="CVE-2025-37914" />
			<reference href="https://bdu.fstec.ru/vul/2025-11857" type="self" id="BDU:2025-11857" title="BDU:2025-11857" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0012</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37913-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37913-7.3/" type="self" id="ROS-20260203-73-0012" title="ROS-20260203-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37913" type="cve" id="CVE-2025-37913" title="CVE-2025-37913" />
			<reference href="https://bdu.fstec.ru/vul/2025-11999" type="self" id="BDU:2025-11999" title="BDU:2025-11999" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0013</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37912-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37912-7.3/" type="self" id="ROS-20260203-73-0013" title="ROS-20260203-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37912" type="cve" id="CVE-2025-37912" title="CVE-2025-37912" />
			<reference href="https://bdu.fstec.ru/vul/2025-12134" type="self" id="BDU:2025-12134" title="BDU:2025-12134" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0014</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37911-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37911-7.3/" type="self" id="ROS-20260203-73-0014" title="ROS-20260203-73-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37911" type="cve" id="CVE-2025-37911" title="CVE-2025-37911" />
			<reference href="https://bdu.fstec.ru/vul/2025-11815" type="self" id="BDU:2025-11815" title="BDU:2025-11815" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0015</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37909-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37909-7.3/" type="self" id="ROS-20260203-73-0015" title="ROS-20260203-73-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37909" type="cve" id="CVE-2025-37909" title="CVE-2025-37909" />
			<reference href="https://bdu.fstec.ru/vul/2025-12033" type="self" id="BDU:2025-12033" title="BDU:2025-12033" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0016</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37905-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37905-7.3/" type="self" id="ROS-20260203-73-0016" title="ROS-20260203-73-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37905" type="cve" id="CVE-2025-37905" title="CVE-2025-37905" />
			<reference href="https://bdu.fstec.ru/vul/2025-12367" type="self" id="BDU:2025-12367" title="BDU:2025-12367" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0017</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37903-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37903-7.3/" type="self" id="ROS-20260203-73-0017" title="ROS-20260203-73-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37903" type="cve" id="CVE-2025-37903" title="CVE-2025-37903" />
			<reference href="https://bdu.fstec.ru/vul/2025-12368" type="self" id="BDU:2025-12368" title="BDU:2025-12368" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0018</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37927-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37927-7.3/" type="self" id="ROS-20260203-73-0018" title="ROS-20260203-73-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37927" type="cve" id="CVE-2025-37927" title="CVE-2025-37927" />
			<reference href="https://bdu.fstec.ru/vul/2025-11924" type="self" id="BDU:2025-11924" title="BDU:2025-11924" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0019</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37928-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37928-7.3/" type="self" id="ROS-20260203-73-0019" title="ROS-20260203-73-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37928" type="cve" id="CVE-2025-37928" title="CVE-2025-37928" />
			<reference href="https://bdu.fstec.ru/vul/2025-11838" type="self" id="BDU:2025-11838" title="BDU:2025-11838" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0020</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37930-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37930-7.3/" type="self" id="ROS-20260203-73-0020" title="ROS-20260203-73-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37930" type="cve" id="CVE-2025-37930" title="CVE-2025-37930" />
			<reference href="https://bdu.fstec.ru/vul/2025-11829" type="self" id="BDU:2025-11829" title="BDU:2025-11829" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0021</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37931-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37931-7.3/" type="self" id="ROS-20260203-73-0021" title="ROS-20260203-73-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37931" type="cve" id="CVE-2025-37931" title="CVE-2025-37931" />
			<reference href="https://bdu.fstec.ru/vul/2025-15159" type="self" id="BDU:2025-15159" title="BDU:2025-15159" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0022</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37936-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37936-7.3/" type="self" id="ROS-20260203-73-0022" title="ROS-20260203-73-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37936" type="cve" id="CVE-2025-37936" title="CVE-2025-37936" />
			<reference href="https://bdu.fstec.ru/vul/2025-12130" type="self" id="BDU:2025-12130" title="BDU:2025-12130" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0023</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37937-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37937-7.3/" type="self" id="ROS-20260203-73-0023" title="ROS-20260203-73-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37937" type="cve" id="CVE-2025-37937" title="CVE-2025-37937" />
			<reference href="https://bdu.fstec.ru/vul/2025-12001" type="self" id="BDU:2025-12001" title="BDU:2025-12001" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0024</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37938-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37938-7.3/" type="self" id="ROS-20260203-73-0024" title="ROS-20260203-73-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37938" type="cve" id="CVE-2025-37938" title="CVE-2025-37938" />
			<reference href="https://bdu.fstec.ru/vul/2025-12129" type="self" id="BDU:2025-12129" title="BDU:2025-12129" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0025</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37940-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37940-7.3/" type="self" id="ROS-20260203-73-0025" title="ROS-20260203-73-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37940" type="cve" id="CVE-2025-37940" title="CVE-2025-37940" />
			<reference href="https://bdu.fstec.ru/vul/2025-12352" type="self" id="BDU:2025-12352" title="BDU:2025-12352" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0026</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37948-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37948-7.3/" type="self" id="ROS-20260203-73-0026" title="ROS-20260203-73-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37948" type="cve" id="CVE-2025-37948" title="CVE-2025-37948" />
			<reference href="https://bdu.fstec.ru/vul/2025-11929" type="self" id="BDU:2025-11929" title="BDU:2025-11929" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0027</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37949-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37949-7.3/" type="self" id="ROS-20260203-73-0027" title="ROS-20260203-73-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37949" type="cve" id="CVE-2025-37949" title="CVE-2025-37949" />
			<reference href="https://bdu.fstec.ru/vul/2025-12256" type="self" id="BDU:2025-12256" title="BDU:2025-12256" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0028</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37951-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37951-7.3/" type="self" id="ROS-20260203-73-0028" title="ROS-20260203-73-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37951" type="cve" id="CVE-2025-37951" title="CVE-2025-37951" />
			<reference href="https://bdu.fstec.ru/vul/2025-12032" type="self" id="BDU:2025-12032" title="BDU:2025-12032" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0029</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37958-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37958-7.3/" type="self" id="ROS-20260203-73-0029" title="ROS-20260203-73-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37958" type="cve" id="CVE-2025-37958" title="CVE-2025-37958" />
			<reference href="https://bdu.fstec.ru/vul/2025-14979" type="self" id="BDU:2025-14979" title="BDU:2025-14979" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0030</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37959-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37959-7.3/" type="self" id="ROS-20260203-73-0030" title="ROS-20260203-73-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37959" type="cve" id="CVE-2025-37959" title="CVE-2025-37959" />
			<reference href="https://bdu.fstec.ru/vul/2025-12272" type="self" id="BDU:2025-12272" title="BDU:2025-12272" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0031</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37961-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37961-7.3/" type="self" id="ROS-20260203-73-0031" title="ROS-20260203-73-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37961" type="cve" id="CVE-2025-37961" title="CVE-2025-37961" />
			<reference href="https://bdu.fstec.ru/vul/2025-11793" type="self" id="BDU:2025-11793" title="BDU:2025-11793" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0032</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37963-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37963-7.3/" type="self" id="ROS-20260203-73-0032" title="ROS-20260203-73-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37963" type="cve" id="CVE-2025-37963" title="CVE-2025-37963" />
			<reference href="https://bdu.fstec.ru/vul/2025-11928" type="self" id="BDU:2025-11928" title="BDU:2025-11928" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0033</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37967-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37967-7.3/" type="self" id="ROS-20260203-73-0033" title="ROS-20260203-73-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37967" type="cve" id="CVE-2025-37967" title="CVE-2025-37967" />
			<reference href="https://bdu.fstec.ru/vul/2025-12336" type="self" id="BDU:2025-12336" title="BDU:2025-12336" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0034</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37968-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37968-7.3/" type="self" id="ROS-20260203-73-0034" title="ROS-20260203-73-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37968" type="cve" id="CVE-2025-37968" title="CVE-2025-37968" />
			<reference href="https://bdu.fstec.ru/vul/2026-02397" type="self" id="BDU:2026-02397" title="BDU:2026-02397" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0035</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37969-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37969-7.3/" type="self" id="ROS-20260203-73-0035" title="ROS-20260203-73-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37969" type="cve" id="CVE-2025-37969" title="CVE-2025-37969" />
			<reference href="https://bdu.fstec.ru/vul/2025-12351" type="self" id="BDU:2025-12351" title="BDU:2025-12351" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0036</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37970-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37970-7.3/" type="self" id="ROS-20260203-73-0036" title="ROS-20260203-73-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37970" type="cve" id="CVE-2025-37970" title="CVE-2025-37970" />
			<reference href="https://bdu.fstec.ru/vul/2025-12350" type="self" id="BDU:2025-12350" title="BDU:2025-12350" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0037</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37972-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37972-7.3/" type="self" id="ROS-20260203-73-0037" title="ROS-20260203-73-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37972" type="cve" id="CVE-2025-37972" title="CVE-2025-37972" />
			<reference href="https://bdu.fstec.ru/vul/2025-12126" type="self" id="BDU:2025-12126" title="BDU:2025-12126" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0038</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37979-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37979-7.3/" type="self" id="ROS-20260203-73-0038" title="ROS-20260203-73-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37979" type="cve" id="CVE-2025-37979" title="CVE-2025-37979" />
			<reference href="https://bdu.fstec.ru/vul/2025-11836" type="self" id="BDU:2025-11836" title="BDU:2025-11836" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0039</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37982-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37982-7.3/" type="self" id="ROS-20260203-73-0039" title="ROS-20260203-73-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37982" type="cve" id="CVE-2025-37982" title="CVE-2025-37982" />
			<reference href="https://bdu.fstec.ru/vul/2025-12029" type="self" id="BDU:2025-12029" title="BDU:2025-12029" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0040</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37983-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37983-7.3/" type="self" id="ROS-20260203-73-0040" title="ROS-20260203-73-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37983" type="cve" id="CVE-2025-37983" title="CVE-2025-37983" />
			<reference href="https://bdu.fstec.ru/vul/2025-12290" type="self" id="BDU:2025-12290" title="BDU:2025-12290" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0041</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37985-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37985-7.3/" type="self" id="ROS-20260203-73-0041" title="ROS-20260203-73-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37985" type="cve" id="CVE-2025-37985" title="CVE-2025-37985" />
			<reference href="https://bdu.fstec.ru/vul/2025-12335" type="self" id="BDU:2025-12335" title="BDU:2025-12335" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0042</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37989-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37989-7.3/" type="self" id="ROS-20260203-73-0042" title="ROS-20260203-73-0042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37989" type="cve" id="CVE-2025-37989" title="CVE-2025-37989" />
			<reference href="https://bdu.fstec.ru/vul/2025-12028" type="self" id="BDU:2025-12028" title="BDU:2025-12028" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0043</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37990-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37990-7.3/" type="self" id="ROS-20260203-73-0043" title="ROS-20260203-73-0043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37990" type="cve" id="CVE-2025-37990" title="CVE-2025-37990" />
			<reference href="https://bdu.fstec.ru/vul/2025-12333" type="self" id="BDU:2025-12333" title="BDU:2025-12333" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0044</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37991-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37991-7.3/" type="self" id="ROS-20260203-73-0044" title="ROS-20260203-73-0044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37991" type="cve" id="CVE-2025-37991" title="CVE-2025-37991" />
			<reference href="https://bdu.fstec.ru/vul/2025-11790" type="self" id="BDU:2025-11790" title="BDU:2025-11790" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0045</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37992-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37992-7.3/" type="self" id="ROS-20260203-73-0045" title="ROS-20260203-73-0045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37992" type="cve" id="CVE-2025-37992" title="CVE-2025-37992" />
			<reference href="https://bdu.fstec.ru/vul/2025-12124" type="self" id="BDU:2025-12124" title="BDU:2025-12124" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0046</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37994-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37994-7.3/" type="self" id="ROS-20260203-73-0046" title="ROS-20260203-73-0046" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37994" type="cve" id="CVE-2025-37994" title="CVE-2025-37994" />
			<reference href="https://bdu.fstec.ru/vul/2025-12123" type="self" id="BDU:2025-12123" title="BDU:2025-12123" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0047</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37995-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37995-7.3/" type="self" id="ROS-20260203-73-0047" title="ROS-20260203-73-0047" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37995" type="cve" id="CVE-2025-37995" title="CVE-2025-37995" />
			<reference href="https://bdu.fstec.ru/vul/2025-12334" type="self" id="BDU:2025-12334" title="BDU:2025-12334" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-73-0048</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37997-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37997-7.3/" type="self" id="ROS-20260203-73-0048" title="ROS-20260203-73-0048" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37997" type="cve" id="CVE-2025-37997" title="CVE-2025-37997" />
			<reference href="https://bdu.fstec.ru/vul/2025-11988" type="self" id="BDU:2025-11988" title="BDU:2025-11988" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-73-0001</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38004-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38004-7.3/" type="self" id="ROS-20260205-73-0001" title="ROS-20260205-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38004" type="cve" id="CVE-2025-38004" title="CVE-2025-38004" />
			<reference href="https://bdu.fstec.ru/vul/2025-11862" type="self" id="BDU:2025-11862" title="BDU:2025-11862" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-73-0002</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38005-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38005-7.3/" type="self" id="ROS-20260205-73-0002" title="ROS-20260205-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38005" type="cve" id="CVE-2025-38005" title="CVE-2025-38005" />
			<reference href="https://bdu.fstec.ru/vul/2025-12014" type="self" id="BDU:2025-12014" title="BDU:2025-12014" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-73-0003</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38007-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38007-7.3/" type="self" id="ROS-20260205-73-0003" title="ROS-20260205-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38007" type="cve" id="CVE-2025-38007" title="CVE-2025-38007" />
			<reference href="https://bdu.fstec.ru/vul/2025-09038" type="self" id="BDU:2025-09038" title="BDU:2025-09038" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-73-0004</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38009-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38009-7.3/" type="self" id="ROS-20260205-73-0004" title="ROS-20260205-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38009" type="cve" id="CVE-2025-38009" title="CVE-2025-38009" />
			<reference href="https://bdu.fstec.ru/vul/2025-09039" type="self" id="BDU:2025-09039" title="BDU:2025-09039" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-73-0005</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38015-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38015-7.3/" type="self" id="ROS-20260205-73-0005" title="ROS-20260205-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38015" type="cve" id="CVE-2025-38015" title="CVE-2025-38015" />
			<reference href="https://bdu.fstec.ru/vul/2025-09037" type="self" id="BDU:2025-09037" title="BDU:2025-09037" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-73-0006</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38018-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38018-7.3/" type="self" id="ROS-20260205-73-0006" title="ROS-20260205-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38018" type="cve" id="CVE-2025-38018" title="CVE-2025-38018" />
			<reference href="https://bdu.fstec.ru/vul/2025-10609" type="self" id="BDU:2025-10609" title="BDU:2025-10609" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-73-0007</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38020-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38020-7.3/" type="self" id="ROS-20260205-73-0007" title="ROS-20260205-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38020" type="cve" id="CVE-2025-38020" title="CVE-2025-38020" />
			<reference href="https://bdu.fstec.ru/vul/2025-10610" type="self" id="BDU:2025-10610" title="BDU:2025-10610" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-73-0008</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38023-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38023-7.3/" type="self" id="ROS-20260205-73-0008" title="ROS-20260205-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38023" type="cve" id="CVE-2025-38023" title="CVE-2025-38023" />
			<reference href="https://bdu.fstec.ru/vul/2025-10614" type="self" id="BDU:2025-10614" title="BDU:2025-10614" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-73-0009</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38024-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38024-7.3/" type="self" id="ROS-20260205-73-0009" title="ROS-20260205-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38024" type="cve" id="CVE-2025-38024" title="CVE-2025-38024" />
			<reference href="https://bdu.fstec.ru/vul/2025-10613" type="self" id="BDU:2025-10613" title="BDU:2025-10613" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-73-0010</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38027-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38027-7.3/" type="self" id="ROS-20260205-73-0010" title="ROS-20260205-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38027" type="cve" id="CVE-2025-38027" title="CVE-2025-38027" />
			<reference href="https://bdu.fstec.ru/vul/2025-11764" type="self" id="BDU:2025-11764" title="BDU:2025-11764" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-73-0011</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38034-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38034-7.3/" type="self" id="ROS-20260205-73-0011" title="ROS-20260205-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38034" type="cve" id="CVE-2025-38034" title="CVE-2025-38034" />
			<reference href="https://bdu.fstec.ru/vul/2025-08788" type="self" id="BDU:2025-08788" title="BDU:2025-08788" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-73-0012</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38035-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38035-7.3/" type="self" id="ROS-20260205-73-0012" title="ROS-20260205-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38035" type="cve" id="CVE-2025-38035" title="CVE-2025-38035" />
			<reference href="https://bdu.fstec.ru/vul/2025-10762" type="self" id="BDU:2025-10762" title="BDU:2025-10762" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-73-0013</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38037-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38037-7.3/" type="self" id="ROS-20260205-73-0013" title="ROS-20260205-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38037" type="cve" id="CVE-2025-38037" title="CVE-2025-38037" />
			<reference href="https://bdu.fstec.ru/vul/2025-08789" type="self" id="BDU:2025-08789" title="BDU:2025-08789" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-73-0014</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38040-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38040-7.3/" type="self" id="ROS-20260205-73-0014" title="ROS-20260205-73-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38040" type="cve" id="CVE-2025-38040" title="CVE-2025-38040" />
			<reference href="https://bdu.fstec.ru/vul/2025-08793" type="self" id="BDU:2025-08793" title="BDU:2025-08793" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-73-0015</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38043-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38043-7.3/" type="self" id="ROS-20260205-73-0015" title="ROS-20260205-73-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38043" type="cve" id="CVE-2025-38043" title="CVE-2025-38043" />
			<reference href="https://bdu.fstec.ru/vul/2025-08917" type="self" id="BDU:2025-08917" title="BDU:2025-08917" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-73-0016</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38044-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38044-7.3/" type="self" id="ROS-20260205-73-0016" title="ROS-20260205-73-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38044" type="cve" id="CVE-2025-38044" title="CVE-2025-38044" />
			<reference href="https://bdu.fstec.ru/vul/2025-08916" type="self" id="BDU:2025-08916" title="BDU:2025-08916" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-73-0017</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38046-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38046-7.3/" type="self" id="ROS-20260205-73-0017" title="ROS-20260205-73-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38046" type="cve" id="CVE-2025-38046" title="CVE-2025-38046" />
			<reference href="https://bdu.fstec.ru/vul/2026-03412" type="self" id="BDU:2026-03412" title="BDU:2026-03412" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-73-0018</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38048-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38048-7.3/" type="self" id="ROS-20260205-73-0018" title="ROS-20260205-73-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38048" type="cve" id="CVE-2025-38048" title="CVE-2025-38048" />
			<reference href="https://bdu.fstec.ru/vul/2025-08792" type="self" id="BDU:2025-08792" title="BDU:2025-08792" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-73-0019</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38051-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38051-7.3/" type="self" id="ROS-20260205-73-0019" title="ROS-20260205-73-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38051" type="cve" id="CVE-2025-38051" title="CVE-2025-38051" />
			<reference href="https://bdu.fstec.ru/vul/2025-12107" type="self" id="BDU:2025-12107" title="BDU:2025-12107" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-73-0020</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38052-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38052-7.3/" type="self" id="ROS-20260205-73-0020" title="ROS-20260205-73-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38052" type="cve" id="CVE-2025-38052" title="CVE-2025-38052" />
			<reference href="https://bdu.fstec.ru/vul/2025-08915" type="self" id="BDU:2025-08915" title="BDU:2025-08915" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-73-0021</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38058-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38058-7.3/" type="self" id="ROS-20260205-73-0021" title="ROS-20260205-73-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38058" type="cve" id="CVE-2025-38058" title="CVE-2025-38058" />
			<reference href="https://bdu.fstec.ru/vul/2025-12277" type="self" id="BDU:2025-12277" title="BDU:2025-12277" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-73-0022</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38061-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38061-7.3/" type="self" id="ROS-20260205-73-0022" title="ROS-20260205-73-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38061" type="cve" id="CVE-2025-38061" title="CVE-2025-38061" />
			<reference href="https://bdu.fstec.ru/vul/2025-11835" type="self" id="BDU:2025-11835" title="BDU:2025-11835" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-73-0023</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38062-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38062-7.3/" type="self" id="ROS-20260205-73-0023" title="ROS-20260205-73-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38062" type="cve" id="CVE-2025-38062" title="CVE-2025-38062" />
			<reference href="https://bdu.fstec.ru/vul/2025-12288" type="self" id="BDU:2025-12288" title="BDU:2025-12288" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-73-0024</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38063-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38063-7.3/" type="self" id="ROS-20260205-73-0024" title="ROS-20260205-73-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38063" type="cve" id="CVE-2025-38063" title="CVE-2025-38063" />
			<reference href="https://bdu.fstec.ru/vul/2025-12309" type="self" id="BDU:2025-12309" title="BDU:2025-12309" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-73-0025</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38065-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38065-7.3/" type="self" id="ROS-20260205-73-0025" title="ROS-20260205-73-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38065" type="cve" id="CVE-2025-38065" title="CVE-2025-38065" />
			<reference href="https://bdu.fstec.ru/vul/2025-11927" type="self" id="BDU:2025-11927" title="BDU:2025-11927" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-73-0026</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38066-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38066-7.3/" type="self" id="ROS-20260205-73-0026" title="ROS-20260205-73-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38066" type="cve" id="CVE-2025-38066" title="CVE-2025-38066" />
			<reference href="https://bdu.fstec.ru/vul/2025-12241" type="self" id="BDU:2025-12241" title="BDU:2025-12241" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-73-0027</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38067-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38067-7.3/" type="self" id="ROS-20260205-73-0027" title="ROS-20260205-73-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38067" type="cve" id="CVE-2025-38067" title="CVE-2025-38067" />
			<reference href="https://bdu.fstec.ru/vul/2025-14933" type="self" id="BDU:2025-14933" title="BDU:2025-14933" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-73-0028</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38068-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38068-7.3/" type="self" id="ROS-20260205-73-0028" title="ROS-20260205-73-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38068" type="cve" id="CVE-2025-38068" title="CVE-2025-38068" />
			<reference href="https://bdu.fstec.ru/vul/2025-11834" type="self" id="BDU:2025-11834" title="BDU:2025-11834" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-73-0029</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38071-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38071-7.3/" type="self" id="ROS-20260205-73-0029" title="ROS-20260205-73-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38071" type="cve" id="CVE-2025-38071" title="CVE-2025-38071" />
			<reference href="https://bdu.fstec.ru/vul/2025-11972" type="self" id="BDU:2025-11972" title="BDU:2025-11972" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-73-0030</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38072-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38072-7.3/" type="self" id="ROS-20260205-73-0030" title="ROS-20260205-73-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38072" type="cve" id="CVE-2025-38072" title="CVE-2025-38072" />
			<reference href="https://bdu.fstec.ru/vul/2025-12000" type="self" id="BDU:2025-12000" title="BDU:2025-12000" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-73-0031</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38074-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38074-7.3/" type="self" id="ROS-20260205-73-0031" title="ROS-20260205-73-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38074" type="cve" id="CVE-2025-38074" title="CVE-2025-38074" />
			<reference href="https://bdu.fstec.ru/vul/2025-14971" type="self" id="BDU:2025-14971" title="BDU:2025-14971" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-73-0032</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38075-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38075-7.3/" type="self" id="ROS-20260205-73-0032" title="ROS-20260205-73-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38075" type="cve" id="CVE-2025-38075" title="CVE-2025-38075" />
			<reference href="https://bdu.fstec.ru/vul/2025-12119" type="self" id="BDU:2025-12119" title="BDU:2025-12119" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-73-0033</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38077-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38077-7.3/" type="self" id="ROS-20260205-73-0033" title="ROS-20260205-73-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38077" type="cve" id="CVE-2025-38077" title="CVE-2025-38077" />
			<reference href="https://bdu.fstec.ru/vul/2025-11833" type="self" id="BDU:2025-11833" title="BDU:2025-11833" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-73-0034</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38078-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38078-7.3/" type="self" id="ROS-20260205-73-0034" title="ROS-20260205-73-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38078" type="cve" id="CVE-2025-38078" title="CVE-2025-38078" />
			<reference href="https://bdu.fstec.ru/vul/2025-12254" type="self" id="BDU:2025-12254" title="BDU:2025-12254" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-73-0035</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38079-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38079-7.3/" type="self" id="ROS-20260205-73-0035" title="ROS-20260205-73-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38079" type="cve" id="CVE-2025-38079" title="CVE-2025-38079" />
			<reference href="https://bdu.fstec.ru/vul/2025-12058" type="self" id="BDU:2025-12058" title="BDU:2025-12058" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0001</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость avahi </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в avahi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-avahi-cve-2024-52615-7.3/</description>
               <solution>Установить обновление для пакета(ов) avahi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-avahi-cve-2024-52615-7.3/" type="self" id="ROS-20260209-73-0001" title="ROS-20260209-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52615" type="cve" id="CVE-2024-52615" title="CVE-2024-52615" />
			<reference href="https://bdu.fstec.ru/vul/2025-16178" type="self" id="BDU:2025-16178" title="BDU:2025-16178" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="avahi" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-autoipd" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-autoipd-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-howl" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-compat-howl-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-howl-devel" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-compat-howl-devel-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-compat-libdns_sd-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd-devel" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-compat-libdns_sd-devel-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-devel" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-devel-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-dnsconfd" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-dnsconfd-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-glib" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-glib-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-glib-devel" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-glib-devel-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-gobject" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-gobject-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-gobject-devel" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-gobject-devel-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-libs" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-libs-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt3" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-qt3-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt3-devel" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-qt3-devel-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt4" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-qt4-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt4-devel" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-qt4-devel-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt5" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-qt5-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt5-devel" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-qt5-devel-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-sharp" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-sharp-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-tools" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-tools-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-ui-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-devel" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-ui-devel-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-gtk3" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-ui-gtk3-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-ui-sharp-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp-devel" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-ui-sharp-devel-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-tools" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-ui-tools-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-avahi" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>python3-avahi-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0002</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость avahi </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в avahi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-avahi-cve-2024-52616-7.3/</description>
               <solution>Установить обновление для пакета(ов) avahi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-avahi-cve-2024-52616-7.3/" type="self" id="ROS-20260209-73-0002" title="ROS-20260209-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52616" type="cve" id="CVE-2024-52616" title="CVE-2024-52616" />
			<reference href="https://bdu.fstec.ru/vul/2026-03600" type="self" id="BDU:2026-03600" title="BDU:2026-03600" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="avahi" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-autoipd" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-autoipd-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-howl" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-compat-howl-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-howl-devel" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-compat-howl-devel-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-compat-libdns_sd-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd-devel" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-compat-libdns_sd-devel-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-devel" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-devel-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-dnsconfd" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-dnsconfd-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-glib" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-glib-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-glib-devel" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-glib-devel-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-gobject" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-gobject-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-gobject-devel" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-gobject-devel-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-libs" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-libs-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt3" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-qt3-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt3-devel" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-qt3-devel-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt4" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-qt4-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt4-devel" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-qt4-devel-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt5" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-qt5-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt5-devel" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-qt5-devel-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-sharp" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-sharp-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-tools" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-tools-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-ui-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-devel" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-ui-devel-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-gtk3" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-ui-gtk3-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-ui-sharp-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp-devel" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-ui-sharp-devel-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-tools" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>avahi-ui-tools-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-avahi" epoch="0" version="0.8" release="20.el7" arch="x86_64" src="avahi-0.8-20.el7.src.rpm">
					<filename>python3-avahi-0:0.8-20.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0003</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость lynx </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в lynx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-lynx-cve-2021-38165-7.3/</description>
               <solution>Установить обновление для пакета(ов) lynx
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-lynx-cve-2021-38165-7.3/" type="self" id="ROS-20260209-73-0003" title="ROS-20260209-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38165" type="cve" id="CVE-2021-38165" title="CVE-2021-38165" />
			<reference href="https://bdu.fstec.ru/vul/2022-00255" type="self" id="BDU:2022-00255" title="BDU:2022-00255" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="lynx" epoch="0" version="2.8.9" release="12.el7" arch="x86_64" src="lynx-2.8.9-12.el7.src.rpm">
					<filename>lynx-0:2.8.9-12.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0004</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость libsoup </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libsoup</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libsoup-cve-2025-32908-7.3/</description>
               <solution>Установить обновление для пакета(ов) libsoup
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libsoup-cve-2025-32908-7.3/" type="self" id="ROS-20260209-73-0004" title="ROS-20260209-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32908" type="cve" id="CVE-2025-32908" title="CVE-2025-32908" />
			<reference href="https://bdu.fstec.ru/vul/2025-04545" type="self" id="BDU:2025-04545" title="BDU:2025-04545" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libsoup" epoch="0" version="2.74.3" release="4.el7" arch="x86_64" src="libsoup-2.74.3-4.el7.src.rpm">
					<filename>libsoup-0:2.74.3-4.el7.x86_64.rpm</filename>
				</package>
				<package name="libsoup-devel" epoch="0" version="2.74.3" release="4.el7" arch="x86_64" src="libsoup-2.74.3-4.el7.src.rpm">
					<filename>libsoup-devel-0:2.74.3-4.el7.x86_64.rpm</filename>
				</package>
				<package name="libsoup-doc" epoch="0" version="2.74.3" release="4.el7" arch="noarch" src="libsoup-2.74.3-4.el7.src.rpm">
					<filename>libsoup-doc-0:2.74.3-4.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0005</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость python3.10 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.10</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-10-cve-2025-4516-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.10
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-10-cve-2025-4516-7.3/" type="self" id="ROS-20260209-73-0005" title="ROS-20260209-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4516" type="cve" id="CVE-2025-4516" title="CVE-2025-4516" />
			<reference href="https://bdu.fstec.ru/vul/2025-10930" type="self" id="BDU:2025-10930" title="BDU:2025-10930" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.10" epoch="0" version="3.10.18" release="2.el7" arch="x86_64" src="python3.10-3.10.18-2.el7.src.rpm">
					<filename>python3.10-0:3.10.18-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0006</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость python3.11 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2025-4516-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.11
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2025-4516-7.3/" type="self" id="ROS-20260209-73-0006" title="ROS-20260209-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4516" type="cve" id="CVE-2025-4516" title="CVE-2025-4516" />
			<reference href="https://bdu.fstec.ru/vul/2025-10930" type="self" id="BDU:2025-10930" title="BDU:2025-10930" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.11" epoch="0" version="3.11.13" release="2.el7" arch="x86_64" src="python3.11-3.11.13-2.el7.src.rpm">
					<filename>python3.11-0:3.11.13-2.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-debug" epoch="0" version="3.11.13" release="2.el7" arch="x86_64" src="python3.11-3.11.13-2.el7.src.rpm">
					<filename>python3.11-debug-0:3.11.13-2.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-devel" epoch="0" version="3.11.13" release="2.el7" arch="x86_64" src="python3.11-3.11.13-2.el7.src.rpm">
					<filename>python3.11-devel-0:3.11.13-2.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-idle" epoch="0" version="3.11.13" release="2.el7" arch="x86_64" src="python3.11-3.11.13-2.el7.src.rpm">
					<filename>python3.11-idle-0:3.11.13-2.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-libs" epoch="0" version="3.11.13" release="2.el7" arch="x86_64" src="python3.11-3.11.13-2.el7.src.rpm">
					<filename>python3.11-libs-0:3.11.13-2.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-test" epoch="0" version="3.11.13" release="2.el7" arch="x86_64" src="python3.11-3.11.13-2.el7.src.rpm">
					<filename>python3.11-test-0:3.11.13-2.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-tkinter" epoch="0" version="3.11.13" release="2.el7" arch="x86_64" src="python3.11-3.11.13-2.el7.src.rpm">
					<filename>python3.11-tkinter-0:3.11.13-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0007</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость python3.12 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-12-cve-2025-4516-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.12
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-12-cve-2025-4516-7.3/" type="self" id="ROS-20260209-73-0007" title="ROS-20260209-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4516" type="cve" id="CVE-2025-4516" title="CVE-2025-4516" />
			<reference href="https://bdu.fstec.ru/vul/2025-10930" type="self" id="BDU:2025-10930" title="BDU:2025-10930" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.12" epoch="0" version="3.12.11" release="2.el7" arch="x86_64" src="python3.12-3.12.11-2.el7.src.rpm">
					<filename>python3.12-0:3.12.11-2.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-debug" epoch="0" version="3.12.11" release="2.el7" arch="x86_64" src="python3.12-3.12.11-2.el7.src.rpm">
					<filename>python3.12-debug-0:3.12.11-2.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-devel" epoch="0" version="3.12.11" release="2.el7" arch="x86_64" src="python3.12-3.12.11-2.el7.src.rpm">
					<filename>python3.12-devel-0:3.12.11-2.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-idle" epoch="0" version="3.12.11" release="2.el7" arch="x86_64" src="python3.12-3.12.11-2.el7.src.rpm">
					<filename>python3.12-idle-0:3.12.11-2.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-libs" epoch="0" version="3.12.11" release="2.el7" arch="x86_64" src="python3.12-3.12.11-2.el7.src.rpm">
					<filename>python3.12-libs-0:3.12.11-2.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-test" epoch="0" version="3.12.11" release="2.el7" arch="x86_64" src="python3.12-3.12.11-2.el7.src.rpm">
					<filename>python3.12-test-0:3.12.11-2.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-tkinter" epoch="0" version="3.12.11" release="2.el7" arch="x86_64" src="python3.12-3.12.11-2.el7.src.rpm">
					<filename>python3.12-tkinter-0:3.12.11-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0008</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость python3.13 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.13</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-13-cve-2025-4516-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.13
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-13-cve-2025-4516-7.3/" type="self" id="ROS-20260209-73-0008" title="ROS-20260209-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4516" type="cve" id="CVE-2025-4516" title="CVE-2025-4516" />
			<reference href="https://bdu.fstec.ru/vul/2025-10930" type="self" id="BDU:2025-10930" title="BDU:2025-10930" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.13" epoch="0" version="3.13.5" release="1.el7" arch="x86_64" src="python3.13-3.13.5-1.el7.src.rpm">
					<filename>python3.13-0:3.13.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-debug" epoch="0" version="3.13.5" release="1.el7" arch="x86_64" src="python3.13-3.13.5-1.el7.src.rpm">
					<filename>python3.13-debug-0:3.13.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-devel" epoch="0" version="3.13.5" release="1.el7" arch="x86_64" src="python3.13-3.13.5-1.el7.src.rpm">
					<filename>python3.13-devel-0:3.13.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading" epoch="0" version="3.13.5" release="1.el7" arch="x86_64" src="python3.13-3.13.5-1.el7.src.rpm">
					<filename>python3.13-freethreading-0:3.13.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading-debug" epoch="0" version="3.13.5" release="1.el7" arch="x86_64" src="python3.13-3.13.5-1.el7.src.rpm">
					<filename>python3.13-freethreading-debug-0:3.13.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-idle" epoch="0" version="3.13.5" release="1.el7" arch="x86_64" src="python3.13-3.13.5-1.el7.src.rpm">
					<filename>python3.13-idle-0:3.13.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-libs" epoch="0" version="3.13.5" release="1.el7" arch="x86_64" src="python3.13-3.13.5-1.el7.src.rpm">
					<filename>python3.13-libs-0:3.13.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-test" epoch="0" version="3.13.5" release="1.el7" arch="x86_64" src="python3.13-3.13.5-1.el7.src.rpm">
					<filename>python3.13-test-0:3.13.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-tkinter" epoch="0" version="3.13.5" release="1.el7" arch="x86_64" src="python3.13-3.13.5-1.el7.src.rpm">
					<filename>python3.13-tkinter-0:3.13.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0009</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость binutils </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в binutils</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-binutils-cve-2025-7545-7.3/</description>
               <solution>Установить обновление для пакета(ов) binutils
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-binutils-cve-2025-7545-7.3/" type="self" id="ROS-20260209-73-0009" title="ROS-20260209-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7545" type="cve" id="CVE-2025-7545" title="CVE-2025-7545" />
			<reference href="https://bdu.fstec.ru/vul/2025-11462" type="self" id="BDU:2025-11462" title="BDU:2025-11462" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="binutils" epoch="0" version="2.40" release="16.el7" arch="x86_64" src="binutils-2.40-16.el7.src.rpm">
					<filename>binutils-0:2.40-16.el7.x86_64.rpm</filename>
				</package>
				<package name="binutils-devel" epoch="0" version="2.40" release="16.el7" arch="x86_64" src="binutils-2.40-16.el7.src.rpm">
					<filename>binutils-devel-0:2.40-16.el7.x86_64.rpm</filename>
				</package>
				<package name="binutils-gold" epoch="0" version="2.40" release="16.el7" arch="x86_64" src="binutils-2.40-16.el7.src.rpm">
					<filename>binutils-gold-0:2.40-16.el7.x86_64.rpm</filename>
				</package>
				<package name="binutils-gprofng" epoch="0" version="2.40" release="16.el7" arch="x86_64" src="binutils-2.40-16.el7.src.rpm">
					<filename>binutils-gprofng-0:2.40-16.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0010</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость python-xmltodict </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-xmltodict</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-xmltodict-cve-2025-9375-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-xmltodict
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-xmltodict-cve-2025-9375-7.3/" type="self" id="ROS-20260209-73-0010" title="ROS-20260209-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9375" type="cve" id="CVE-2025-9375" title="CVE-2025-9375" />
			<reference href="https://bdu.fstec.ru/vul/2026-03621" type="self" id="BDU:2026-03621" title="BDU:2026-03621" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-xmltodict" epoch="0" version="0.15.1" release="1.el7" arch="noarch" src="python-xmltodict-0.15.1-1.el7.src.rpm">
					<filename>python3-xmltodict-0:0.15.1-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0011</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость openssl3 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в openssl3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2025-9230-7.3/</description>
               <solution>Установить обновление для пакета(ов) openssl3
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2025-9230-7.3/" type="self" id="ROS-20260209-73-0011" title="ROS-20260209-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9230" type="cve" id="CVE-2025-9230" title="CVE-2025-9230" />
			<reference href="https://bdu.fstec.ru/vul/2025-12885" type="self" id="BDU:2025-12885" title="BDU:2025-12885" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl3" epoch="1" version="3.5.4" release="1.el7" arch="x86_64" src="openssl3-3.5.4-1.el7.src.rpm">
					<filename>openssl3-1:3.5.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl3-devel" epoch="1" version="3.5.4" release="1.el7" arch="x86_64" src="openssl3-3.5.4-1.el7.src.rpm">
					<filename>openssl3-devel-1:3.5.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl3-libs" epoch="1" version="3.5.4" release="1.el7" arch="x86_64" src="openssl3-3.5.4-1.el7.src.rpm">
					<filename>openssl3-libs-1:3.5.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0012</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость openssl3 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openssl3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2025-9232-7.3/</description>
               <solution>Установить обновление для пакета(ов) openssl3
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2025-9232-7.3/" type="self" id="ROS-20260209-73-0012" title="ROS-20260209-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9232" type="cve" id="CVE-2025-9232" title="CVE-2025-9232" />
			<reference href="https://bdu.fstec.ru/vul/2025-12887" type="self" id="BDU:2025-12887" title="BDU:2025-12887" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl3" epoch="1" version="3.5.4" release="1.el7" arch="x86_64" src="openssl3-3.5.4-1.el7.src.rpm">
					<filename>openssl3-1:3.5.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl3-devel" epoch="1" version="3.5.4" release="1.el7" arch="x86_64" src="openssl3-3.5.4-1.el7.src.rpm">
					<filename>openssl3-devel-1:3.5.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl3-libs" epoch="1" version="3.5.4" release="1.el7" arch="x86_64" src="openssl3-3.5.4-1.el7.src.rpm">
					<filename>openssl3-libs-1:3.5.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0013</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость wireshark </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в wireshark</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-wireshark-cve-2025-11626-7.3/</description>
               <solution>Установить обновление для пакета(ов) wireshark
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-wireshark-cve-2025-11626-7.3/" type="self" id="ROS-20260209-73-0013" title="ROS-20260209-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11626" type="cve" id="CVE-2025-11626" title="CVE-2025-11626" />
			<reference href="https://bdu.fstec.ru/vul/2025-13330" type="self" id="BDU:2025-13330" title="BDU:2025-13330" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="wireshark" epoch="1" version="4.6.1" release="1.el7" arch="x86_64" src="wireshark-4.6.1-1.el7.src.rpm">
					<filename>wireshark-1:4.6.1-1.el7.x86_64.rpm</filename>
				</package>
				<package name="wireshark-cli" epoch="1" version="4.6.1" release="1.el7" arch="x86_64" src="wireshark-4.6.1-1.el7.src.rpm">
					<filename>wireshark-cli-1:4.6.1-1.el7.x86_64.rpm</filename>
				</package>
				<package name="wireshark-devel" epoch="1" version="4.6.1" release="1.el7" arch="x86_64" src="wireshark-4.6.1-1.el7.src.rpm">
					<filename>wireshark-devel-1:4.6.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0014</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость binutils </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в binutils</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-binutils-cve-2025-11840-7.3/</description>
               <solution>Установить обновление для пакета(ов) binutils
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-binutils-cve-2025-11840-7.3/" type="self" id="ROS-20260209-73-0014" title="ROS-20260209-73-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11840" type="cve" id="CVE-2025-11840" title="CVE-2025-11840" />
			<reference href="https://bdu.fstec.ru/vul/2026-02741" type="self" id="BDU:2026-02741" title="BDU:2026-02741" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="binutils" epoch="0" version="2.40" release="16.el7" arch="x86_64" src="binutils-2.40-16.el7.src.rpm">
					<filename>binutils-0:2.40-16.el7.x86_64.rpm</filename>
				</package>
				<package name="binutils-devel" epoch="0" version="2.40" release="16.el7" arch="x86_64" src="binutils-2.40-16.el7.src.rpm">
					<filename>binutils-devel-0:2.40-16.el7.x86_64.rpm</filename>
				</package>
				<package name="binutils-gold" epoch="0" version="2.40" release="16.el7" arch="x86_64" src="binutils-2.40-16.el7.src.rpm">
					<filename>binutils-gold-0:2.40-16.el7.x86_64.rpm</filename>
				</package>
				<package name="binutils-gprofng" epoch="0" version="2.40" release="16.el7" arch="x86_64" src="binutils-2.40-16.el7.src.rpm">
					<filename>binutils-gprofng-0:2.40-16.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0015</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость sssd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в sssd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sssd-cve-2025-11561-7.3/</description>
               <solution>Установить обновление для пакета(ов) sssd
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sssd-cve-2025-11561-7.3/" type="self" id="ROS-20260209-73-0015" title="ROS-20260209-73-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11561" type="cve" id="CVE-2025-11561" title="CVE-2025-11561" />
			<reference href="https://bdu.fstec.ru/vul/2026-02738" type="self" id="BDU:2026-02738" title="BDU:2026-02738" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libipa_hbac" epoch="0" version="2.9.7" release="2.el7" arch="x86_64" src="sssd-2.9.7-2.el7.src.rpm">
					<filename>libipa_hbac-0:2.9.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libipa_hbac-devel" epoch="0" version="2.9.7" release="2.el7" arch="x86_64" src="sssd-2.9.7-2.el7.src.rpm">
					<filename>libipa_hbac-devel-0:2.9.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libsss_autofs" epoch="0" version="2.9.7" release="2.el7" arch="x86_64" src="sssd-2.9.7-2.el7.src.rpm">
					<filename>libsss_autofs-0:2.9.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libsss_certmap" epoch="0" version="2.9.7" release="2.el7" arch="x86_64" src="sssd-2.9.7-2.el7.src.rpm">
					<filename>libsss_certmap-0:2.9.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libsss_certmap-devel" epoch="0" version="2.9.7" release="2.el7" arch="x86_64" src="sssd-2.9.7-2.el7.src.rpm">
					<filename>libsss_certmap-devel-0:2.9.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libsss_idmap" epoch="0" version="2.9.7" release="2.el7" arch="x86_64" src="sssd-2.9.7-2.el7.src.rpm">
					<filename>libsss_idmap-0:2.9.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libsss_idmap-devel" epoch="0" version="2.9.7" release="2.el7" arch="x86_64" src="sssd-2.9.7-2.el7.src.rpm">
					<filename>libsss_idmap-devel-0:2.9.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libsss_nss_idmap" epoch="0" version="2.9.7" release="2.el7" arch="x86_64" src="sssd-2.9.7-2.el7.src.rpm">
					<filename>libsss_nss_idmap-0:2.9.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libsss_nss_idmap-devel" epoch="0" version="2.9.7" release="2.el7" arch="x86_64" src="sssd-2.9.7-2.el7.src.rpm">
					<filename>libsss_nss_idmap-devel-0:2.9.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libsss_simpleifp" epoch="0" version="2.9.7" release="2.el7" arch="x86_64" src="sssd-2.9.7-2.el7.src.rpm">
					<filename>libsss_simpleifp-0:2.9.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libsss_simpleifp-devel" epoch="0" version="2.9.7" release="2.el7" arch="x86_64" src="sssd-2.9.7-2.el7.src.rpm">
					<filename>libsss_simpleifp-devel-0:2.9.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libsss_sudo" epoch="0" version="2.9.7" release="2.el7" arch="x86_64" src="sssd-2.9.7-2.el7.src.rpm">
					<filename>libsss_sudo-0:2.9.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-libipa_hbac" epoch="0" version="2.9.7" release="2.el7" arch="x86_64" src="sssd-2.9.7-2.el7.src.rpm">
					<filename>python3-libipa_hbac-0:2.9.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-libsss_nss_idmap" epoch="0" version="2.9.7" release="2.el7" arch="x86_64" src="sssd-2.9.7-2.el7.src.rpm">
					<filename>python3-libsss_nss_idmap-0:2.9.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-sss" epoch="0" version="2.9.7" release="2.el7" arch="x86_64" src="sssd-2.9.7-2.el7.src.rpm">
					<filename>python3-sss-0:2.9.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-sss-murmur" epoch="0" version="2.9.7" release="2.el7" arch="x86_64" src="sssd-2.9.7-2.el7.src.rpm">
					<filename>python3-sss-murmur-0:2.9.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="sssd" epoch="0" version="2.9.7" release="2.el7" arch="x86_64" src="sssd-2.9.7-2.el7.src.rpm">
					<filename>sssd-0:2.9.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="sssd-ad" epoch="0" version="2.9.7" release="2.el7" arch="x86_64" src="sssd-2.9.7-2.el7.src.rpm">
					<filename>sssd-ad-0:2.9.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="sssd-client" epoch="0" version="2.9.7" release="2.el7" arch="x86_64" src="sssd-2.9.7-2.el7.src.rpm">
					<filename>sssd-client-0:2.9.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="sssd-common" epoch="0" version="2.9.7" release="2.el7" arch="x86_64" src="sssd-2.9.7-2.el7.src.rpm">
					<filename>sssd-common-0:2.9.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="sssd-common-pac" epoch="0" version="2.9.7" release="2.el7" arch="x86_64" src="sssd-2.9.7-2.el7.src.rpm">
					<filename>sssd-common-pac-0:2.9.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="sssd-dbus" epoch="0" version="2.9.7" release="2.el7" arch="x86_64" src="sssd-2.9.7-2.el7.src.rpm">
					<filename>sssd-dbus-0:2.9.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="sssd-idp" epoch="0" version="2.9.7" release="2.el7" arch="x86_64" src="sssd-2.9.7-2.el7.src.rpm">
					<filename>sssd-idp-0:2.9.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="sssd-ipa" epoch="0" version="2.9.7" release="2.el7" arch="x86_64" src="sssd-2.9.7-2.el7.src.rpm">
					<filename>sssd-ipa-0:2.9.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="sssd-kcm" epoch="0" version="2.9.7" release="2.el7" arch="x86_64" src="sssd-2.9.7-2.el7.src.rpm">
					<filename>sssd-kcm-0:2.9.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="sssd-krb5" epoch="0" version="2.9.7" release="2.el7" arch="x86_64" src="sssd-2.9.7-2.el7.src.rpm">
					<filename>sssd-krb5-0:2.9.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="sssd-krb5-common" epoch="0" version="2.9.7" release="2.el7" arch="x86_64" src="sssd-2.9.7-2.el7.src.rpm">
					<filename>sssd-krb5-common-0:2.9.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="sssd-ldap" epoch="0" version="2.9.7" release="2.el7" arch="x86_64" src="sssd-2.9.7-2.el7.src.rpm">
					<filename>sssd-ldap-0:2.9.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="sssd-nfs-idmap" epoch="0" version="2.9.7" release="2.el7" arch="x86_64" src="sssd-2.9.7-2.el7.src.rpm">
					<filename>sssd-nfs-idmap-0:2.9.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="sssd-passkey" epoch="0" version="2.9.7" release="2.el7" arch="x86_64" src="sssd-2.9.7-2.el7.src.rpm">
					<filename>sssd-passkey-0:2.9.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="sssd-polkit-rules" epoch="0" version="2.9.7" release="2.el7" arch="x86_64" src="sssd-2.9.7-2.el7.src.rpm">
					<filename>sssd-polkit-rules-0:2.9.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="sssd-proxy" epoch="0" version="2.9.7" release="2.el7" arch="x86_64" src="sssd-2.9.7-2.el7.src.rpm">
					<filename>sssd-proxy-0:2.9.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="sssd-tools" epoch="0" version="2.9.7" release="2.el7" arch="x86_64" src="sssd-2.9.7-2.el7.src.rpm">
					<filename>sssd-tools-0:2.9.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="sssd-winbind-idmap" epoch="0" version="2.9.7" release="2.el7" arch="x86_64" src="sssd-2.9.7-2.el7.src.rpm">
					<filename>sssd-winbind-idmap-0:2.9.7-2.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-sssdconfig" epoch="0" version="2.9.7" release="2.el7" arch="noarch" src="sssd-2.9.7-2.el7.src.rpm">
					<filename>python3-sssdconfig-0:2.9.7-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0016</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость binutils </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в binutils</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-binutils-cve-2025-11839-7.3/</description>
               <solution>Установить обновление для пакета(ов) binutils
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-binutils-cve-2025-11839-7.3/" type="self" id="ROS-20260209-73-0016" title="ROS-20260209-73-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11839" type="cve" id="CVE-2025-11839" title="CVE-2025-11839" />
			<reference href="https://bdu.fstec.ru/vul/2026-02740" type="self" id="BDU:2026-02740" title="BDU:2026-02740" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="binutils" epoch="0" version="2.40" release="16.el7" arch="x86_64" src="binutils-2.40-16.el7.src.rpm">
					<filename>binutils-0:2.40-16.el7.x86_64.rpm</filename>
				</package>
				<package name="binutils-devel" epoch="0" version="2.40" release="16.el7" arch="x86_64" src="binutils-2.40-16.el7.src.rpm">
					<filename>binutils-devel-0:2.40-16.el7.x86_64.rpm</filename>
				</package>
				<package name="binutils-gold" epoch="0" version="2.40" release="16.el7" arch="x86_64" src="binutils-2.40-16.el7.src.rpm">
					<filename>binutils-gold-0:2.40-16.el7.x86_64.rpm</filename>
				</package>
				<package name="binutils-gprofng" epoch="0" version="2.40" release="16.el7" arch="x86_64" src="binutils-2.40-16.el7.src.rpm">
					<filename>binutils-gprofng-0:2.40-16.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0017</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость pdns </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в pdns</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pdns-cve-2025-59023-7.3/</description>
               <solution>Установить обновление для пакета(ов) pdns
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pdns-cve-2025-59023-7.3/" type="self" id="ROS-20260209-73-0017" title="ROS-20260209-73-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59023" type="cve" id="CVE-2025-59023" title="CVE-2025-59023" />
			<reference href="https://bdu.fstec.ru/vul/2026-00247" type="self" id="BDU:2026-00247" title="BDU:2026-00247" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pdns" epoch="0" version="4.9.11" release="1.el7" arch="x86_64" src="pdns-4.9.11-1.el7.src.rpm">
					<filename>pdns-0:4.9.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="pdns-backend-ldap" epoch="0" version="4.9.11" release="1.el7" arch="x86_64" src="pdns-4.9.11-1.el7.src.rpm">
					<filename>pdns-backend-ldap-0:4.9.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="pdns-backend-lua2" epoch="0" version="4.9.11" release="1.el7" arch="x86_64" src="pdns-4.9.11-1.el7.src.rpm">
					<filename>pdns-backend-lua2-0:4.9.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="pdns-backend-mysql" epoch="0" version="4.9.11" release="1.el7" arch="x86_64" src="pdns-4.9.11-1.el7.src.rpm">
					<filename>pdns-backend-mysql-0:4.9.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="pdns-backend-pipe" epoch="0" version="4.9.11" release="1.el7" arch="x86_64" src="pdns-4.9.11-1.el7.src.rpm">
					<filename>pdns-backend-pipe-0:4.9.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="pdns-backend-postgresql" epoch="0" version="4.9.11" release="1.el7" arch="x86_64" src="pdns-4.9.11-1.el7.src.rpm">
					<filename>pdns-backend-postgresql-0:4.9.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="pdns-backend-remote" epoch="0" version="4.9.11" release="1.el7" arch="x86_64" src="pdns-4.9.11-1.el7.src.rpm">
					<filename>pdns-backend-remote-0:4.9.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="pdns-backend-sqlite" epoch="0" version="4.9.11" release="1.el7" arch="x86_64" src="pdns-4.9.11-1.el7.src.rpm">
					<filename>pdns-backend-sqlite-0:4.9.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="pdns-backend-tinydns" epoch="0" version="4.9.11" release="1.el7" arch="x86_64" src="pdns-4.9.11-1.el7.src.rpm">
					<filename>pdns-backend-tinydns-0:4.9.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="pdns-ixfrdist" epoch="0" version="4.9.11" release="1.el7" arch="x86_64" src="pdns-4.9.11-1.el7.src.rpm">
					<filename>pdns-ixfrdist-0:4.9.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="pdns-tools" epoch="0" version="4.9.11" release="1.el7" arch="x86_64" src="pdns-4.9.11-1.el7.src.rpm">
					<filename>pdns-tools-0:4.9.11-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0018</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость pdns-recursor </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в pdns-recursor</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pdns-recursor-cve-2025-59023-7.3/</description>
               <solution>Установить обновление для пакета(ов) pdns-recursor
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pdns-recursor-cve-2025-59023-7.3/" type="self" id="ROS-20260209-73-0018" title="ROS-20260209-73-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59023" type="cve" id="CVE-2025-59023" title="CVE-2025-59023" />
			<reference href="https://bdu.fstec.ru/vul/2026-00247" type="self" id="BDU:2026-00247" title="BDU:2026-00247" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pdns-recursor" epoch="0" version="5.2.6" release="1.el7" arch="x86_64" src="pdns-recursor-5.2.6-1.el7.src.rpm">
					<filename>pdns-recursor-0:5.2.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0019</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость pdns </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в pdns</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pdns-cve-2025-59024-7.3/</description>
               <solution>Установить обновление для пакета(ов) pdns
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pdns-cve-2025-59024-7.3/" type="self" id="ROS-20260209-73-0019" title="ROS-20260209-73-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59024" type="cve" id="CVE-2025-59024" title="CVE-2025-59024" />
			<reference href="https://bdu.fstec.ru/vul/2026-00248" type="self" id="BDU:2026-00248" title="BDU:2026-00248" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pdns" epoch="0" version="4.9.11" release="1.el7" arch="x86_64" src="pdns-4.9.11-1.el7.src.rpm">
					<filename>pdns-0:4.9.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="pdns-backend-ldap" epoch="0" version="4.9.11" release="1.el7" arch="x86_64" src="pdns-4.9.11-1.el7.src.rpm">
					<filename>pdns-backend-ldap-0:4.9.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="pdns-backend-lua2" epoch="0" version="4.9.11" release="1.el7" arch="x86_64" src="pdns-4.9.11-1.el7.src.rpm">
					<filename>pdns-backend-lua2-0:4.9.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="pdns-backend-mysql" epoch="0" version="4.9.11" release="1.el7" arch="x86_64" src="pdns-4.9.11-1.el7.src.rpm">
					<filename>pdns-backend-mysql-0:4.9.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="pdns-backend-pipe" epoch="0" version="4.9.11" release="1.el7" arch="x86_64" src="pdns-4.9.11-1.el7.src.rpm">
					<filename>pdns-backend-pipe-0:4.9.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="pdns-backend-postgresql" epoch="0" version="4.9.11" release="1.el7" arch="x86_64" src="pdns-4.9.11-1.el7.src.rpm">
					<filename>pdns-backend-postgresql-0:4.9.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="pdns-backend-remote" epoch="0" version="4.9.11" release="1.el7" arch="x86_64" src="pdns-4.9.11-1.el7.src.rpm">
					<filename>pdns-backend-remote-0:4.9.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="pdns-backend-sqlite" epoch="0" version="4.9.11" release="1.el7" arch="x86_64" src="pdns-4.9.11-1.el7.src.rpm">
					<filename>pdns-backend-sqlite-0:4.9.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="pdns-backend-tinydns" epoch="0" version="4.9.11" release="1.el7" arch="x86_64" src="pdns-4.9.11-1.el7.src.rpm">
					<filename>pdns-backend-tinydns-0:4.9.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="pdns-ixfrdist" epoch="0" version="4.9.11" release="1.el7" arch="x86_64" src="pdns-4.9.11-1.el7.src.rpm">
					<filename>pdns-ixfrdist-0:4.9.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="pdns-tools" epoch="0" version="4.9.11" release="1.el7" arch="x86_64" src="pdns-4.9.11-1.el7.src.rpm">
					<filename>pdns-tools-0:4.9.11-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0020</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость pdns-recursor </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в pdns-recursor</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pdns-recursor-cve-2025-59024-7.3/</description>
               <solution>Установить обновление для пакета(ов) pdns-recursor
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pdns-recursor-cve-2025-59024-7.3/" type="self" id="ROS-20260209-73-0020" title="ROS-20260209-73-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59024" type="cve" id="CVE-2025-59024" title="CVE-2025-59024" />
			<reference href="https://bdu.fstec.ru/vul/2026-00248" type="self" id="BDU:2026-00248" title="BDU:2026-00248" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pdns-recursor" epoch="0" version="5.2.6" release="1.el7" arch="x86_64" src="pdns-recursor-5.2.6-1.el7.src.rpm">
					<filename>pdns-recursor-0:5.2.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0021</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость nextcloud-app-mail </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nextcloud-app-mail</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nextcloud-app-mail-cve-2025-66514-7.3/</description>
               <solution>Установить обновление для пакета(ов) nextcloud-app-mail
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nextcloud-app-mail-cve-2025-66514-7.3/" type="self" id="ROS-20260209-73-0021" title="ROS-20260209-73-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66514" type="cve" id="CVE-2025-66514" title="CVE-2025-66514" />
			<reference href="https://bdu.fstec.ru/vul/2026-03581" type="self" id="BDU:2026-03581" title="BDU:2026-03581" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nextcloud-app-mail" epoch="0" version="5.6.5" release="1.el7" arch="x86_64" src="nextcloud-app-mail-5.6.5-1.el7.src.rpm">
					<filename>nextcloud-app-mail-0:5.6.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0022</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость nextcloud-app-calendar </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в nextcloud-app-calendar</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nextcloud-app-calendar-cve-2025-66546-7.3/</description>
               <solution>Установить обновление для пакета(ов) nextcloud-app-calendar
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nextcloud-app-calendar-cve-2025-66546-7.3/" type="self" id="ROS-20260209-73-0022" title="ROS-20260209-73-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66546" type="cve" id="CVE-2025-66546" title="CVE-2025-66546" />
			<reference href="https://bdu.fstec.ru/vul/2026-03580" type="self" id="BDU:2026-03580" title="BDU:2026-03580" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nextcloud-app-calendar" epoch="0" version="6.1.2" release="1.el7" arch="noarch" src="nextcloud-app-calendar-6.1.2-1.el7.src.rpm">
					<filename>nextcloud-app-calendar-0:6.1.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0023</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость mongodb-org </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2025-14847-7.3/</description>
               <solution>Установить обновление для пакета(ов) mongodb-org
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2025-14847-7.3/" type="self" id="ROS-20260209-73-0023" title="ROS-20260209-73-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14847" type="cve" id="CVE-2025-14847" title="CVE-2025-14847" />
			<reference href="https://bdu.fstec.ru/vul/2025-16225" type="self" id="BDU:2025-16225" title="BDU:2025-16225" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mongodb-org" epoch="0" version="7.0.28" release="1.el7" arch="x86_64" src="mongodb-org-7.0.28-1.el7.src.rpm">
					<filename>mongodb-org-0:7.0.28-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-mongos" epoch="0" version="7.0.28" release="1.el7" arch="x86_64" src="mongodb-org-7.0.28-1.el7.src.rpm">
					<filename>mongodb-org-mongos-0:7.0.28-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-server" epoch="0" version="7.0.28" release="1.el7" arch="x86_64" src="mongodb-org-7.0.28-1.el7.src.rpm">
					<filename>mongodb-org-server-0:7.0.28-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-shell" epoch="0" version="7.0.28" release="1.el7" arch="x86_64" src="mongodb-org-7.0.28-1.el7.src.rpm">
					<filename>mongodb-org-shell-0:7.0.28-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0024</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость composer </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в composer</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-composer-cve-2025-67746-7.3/</description>
               <solution>Установить обновление для пакета(ов) composer
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-composer-cve-2025-67746-7.3/" type="self" id="ROS-20260209-73-0024" title="ROS-20260209-73-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67746" type="cve" id="CVE-2025-67746" title="CVE-2025-67746" />
			<reference href="https://bdu.fstec.ru/vul/2026-03590" type="self" id="BDU:2026-03590" title="BDU:2026-03590" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="composer" epoch="0" version="2.9.3" release="1.el7" arch="noarch" src="composer-2.9.3-1.el7.src.rpm">
					<filename>composer-0:2.9.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0025</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость python-urllib3 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-urllib3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-urllib3-cve-2026-21441-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-urllib3
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-urllib3-cve-2026-21441-7.3/" type="self" id="ROS-20260209-73-0025" title="ROS-20260209-73-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21441" type="cve" id="CVE-2026-21441" title="CVE-2026-21441" />
			<reference href="https://bdu.fstec.ru/vul/2026-03625" type="self" id="BDU:2026-03625" title="BDU:2026-03625" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-urllib3" epoch="0" version="1.26.20" release="4.el7" arch="noarch" src="python-urllib3-1.26.20-4.el7.src.rpm">
					<filename>python3-urllib3-0:1.26.20-4.el7.noarch.rpm</filename>
				</package>
				<package name="python3-urllib3+brotli" epoch="0" version="1.26.20" release="4.el7" arch="noarch" src="python-urllib3-1.26.20-4.el7.src.rpm">
					<filename>python3-urllib3+brotli-0:1.26.20-4.el7.noarch.rpm</filename>
				</package>
				<package name="python3-urllib3+socks" epoch="0" version="1.26.20" release="4.el7" arch="noarch" src="python-urllib3-1.26.20-4.el7.src.rpm">
					<filename>python3-urllib3+socks-0:1.26.20-4.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0026</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость net-snmp </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в net-snmp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-net-snmp-cve-2025-68615-7.3/</description>
               <solution>Установить обновление для пакета(ов) net-snmp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-net-snmp-cve-2025-68615-7.3/" type="self" id="ROS-20260209-73-0026" title="ROS-20260209-73-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68615" type="cve" id="CVE-2025-68615" title="CVE-2025-68615" />
			<reference href="https://bdu.fstec.ru/vul/2025-16314" type="self" id="BDU:2025-16314" title="BDU:2025-16314" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="net-snmp" epoch="1" version="5.9.4" release="4.el7" arch="x86_64" src="net-snmp-5.9.4-4.el7.src.rpm">
					<filename>net-snmp-1:5.9.4-4.el7.x86_64.rpm</filename>
				</package>
				<package name="net-snmp-agent-libs" epoch="1" version="5.9.4" release="4.el7" arch="x86_64" src="net-snmp-5.9.4-4.el7.src.rpm">
					<filename>net-snmp-agent-libs-1:5.9.4-4.el7.x86_64.rpm</filename>
				</package>
				<package name="net-snmp-devel" epoch="1" version="5.9.4" release="4.el7" arch="x86_64" src="net-snmp-5.9.4-4.el7.src.rpm">
					<filename>net-snmp-devel-1:5.9.4-4.el7.x86_64.rpm</filename>
				</package>
				<package name="net-snmp-gui" epoch="1" version="5.9.4" release="4.el7" arch="x86_64" src="net-snmp-5.9.4-4.el7.src.rpm">
					<filename>net-snmp-gui-1:5.9.4-4.el7.x86_64.rpm</filename>
				</package>
				<package name="net-snmp-libs" epoch="1" version="5.9.4" release="4.el7" arch="x86_64" src="net-snmp-5.9.4-4.el7.src.rpm">
					<filename>net-snmp-libs-1:5.9.4-4.el7.x86_64.rpm</filename>
				</package>
				<package name="net-snmp-perl" epoch="1" version="5.9.4" release="4.el7" arch="x86_64" src="net-snmp-5.9.4-4.el7.src.rpm">
					<filename>net-snmp-perl-1:5.9.4-4.el7.x86_64.rpm</filename>
				</package>
				<package name="net-snmp-perl-module" epoch="1" version="5.9.4" release="4.el7" arch="x86_64" src="net-snmp-5.9.4-4.el7.src.rpm">
					<filename>net-snmp-perl-module-1:5.9.4-4.el7.x86_64.rpm</filename>
				</package>
				<package name="net-snmp-utils" epoch="1" version="5.9.4" release="4.el7" arch="x86_64" src="net-snmp-5.9.4-4.el7.src.rpm">
					<filename>net-snmp-utils-1:5.9.4-4.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-net-snmp" epoch="1" version="5.9.4" release="4.el7" arch="x86_64" src="net-snmp-5.9.4-4.el7.src.rpm">
					<filename>python3-net-snmp-1:5.9.4-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0027</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость opentofu </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в opentofu</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opentofu-cve-2025-58185-7.3/</description>
               <solution>Установить обновление для пакета(ов) opentofu
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opentofu-cve-2025-58185-7.3/" type="self" id="ROS-20260209-73-0027" title="ROS-20260209-73-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58185" type="cve" id="CVE-2025-58185" title="CVE-2025-58185" />
			<reference href="https://bdu.fstec.ru/vul/2025-14530" type="self" id="BDU:2025-14530" title="BDU:2025-14530" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="opentofu" epoch="0" version="1.11.2" release="1.el7" arch="x86_64" src="opentofu-1.11.2-1.el7.src.rpm">
					<filename>opentofu-0:1.11.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0028</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость opentofu </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в opentofu</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opentofu-cve-2025-58187-7.3/</description>
               <solution>Установить обновление для пакета(ов) opentofu
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opentofu-cve-2025-58187-7.3/" type="self" id="ROS-20260209-73-0028" title="ROS-20260209-73-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58187" type="cve" id="CVE-2025-58187" title="CVE-2025-58187" />
			<reference href="https://bdu.fstec.ru/vul/2025-13562" type="self" id="BDU:2025-13562" title="BDU:2025-13562" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="opentofu" epoch="0" version="1.11.2" release="1.el7" arch="x86_64" src="opentofu-1.11.2-1.el7.src.rpm">
					<filename>opentofu-0:1.11.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0029</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость opentofu </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в opentofu</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opentofu-cve-2025-58188-7.3/</description>
               <solution>Установить обновление для пакета(ов) opentofu
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opentofu-cve-2025-58188-7.3/" type="self" id="ROS-20260209-73-0029" title="ROS-20260209-73-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58188" type="cve" id="CVE-2025-58188" title="CVE-2025-58188" />
			<reference href="https://bdu.fstec.ru/vul/2025-14525" type="self" id="BDU:2025-14525" title="BDU:2025-14525" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="opentofu" epoch="0" version="1.11.2" release="1.el7" arch="x86_64" src="opentofu-1.11.2-1.el7.src.rpm">
					<filename>opentofu-0:1.11.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0030</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость opentofu </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в opentofu</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opentofu-cve-2025-58183-7.3/</description>
               <solution>Установить обновление для пакета(ов) opentofu
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opentofu-cve-2025-58183-7.3/" type="self" id="ROS-20260209-73-0030" title="ROS-20260209-73-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58183" type="cve" id="CVE-2025-58183" title="CVE-2025-58183" />
			<reference href="https://bdu.fstec.ru/vul/2025-14528" type="self" id="BDU:2025-14528" title="BDU:2025-14528" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="opentofu" epoch="0" version="1.11.2" release="1.el7" arch="x86_64" src="opentofu-1.11.2-1.el7.src.rpm">
					<filename>opentofu-0:1.11.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0031</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость openbao </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в openbao</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openbao-cve-2025-59043-7.3/</description>
               <solution>Установить обновление для пакета(ов) openbao
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openbao-cve-2025-59043-7.3/" type="self" id="ROS-20260209-73-0031" title="ROS-20260209-73-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59043" type="cve" id="CVE-2025-59043" title="CVE-2025-59043" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openbao" epoch="0" version="2.4.3" release="1.el7" arch="x86_64" src="openbao-2.4.3-1.el7.src.rpm">
					<filename>openbao-0:2.4.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openbao-cassandra-database-plugin" epoch="0" version="2.4.3" release="1.el7" arch="x86_64" src="openbao-2.4.3-1.el7.src.rpm">
					<filename>openbao-cassandra-database-plugin-0:2.4.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openbao-influxdb-database-plugin" epoch="0" version="2.4.3" release="1.el7" arch="x86_64" src="openbao-2.4.3-1.el7.src.rpm">
					<filename>openbao-influxdb-database-plugin-0:2.4.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openbao-mysql-database-plugin" epoch="0" version="2.4.3" release="1.el7" arch="x86_64" src="openbao-2.4.3-1.el7.src.rpm">
					<filename>openbao-mysql-database-plugin-0:2.4.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openbao-mysql-legacy-database-plugin" epoch="0" version="2.4.3" release="1.el7" arch="x86_64" src="openbao-2.4.3-1.el7.src.rpm">
					<filename>openbao-mysql-legacy-database-plugin-0:2.4.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openbao-postgresql-database-plugin" epoch="0" version="2.4.3" release="1.el7" arch="x86_64" src="openbao-2.4.3-1.el7.src.rpm">
					<filename>openbao-postgresql-database-plugin-0:2.4.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openbao-agent" epoch="0" version="2.4.3" release="1.el7" arch="noarch" src="openbao-2.4.3-1.el7.src.rpm">
					<filename>openbao-agent-0:2.4.3-1.el7.noarch.rpm</filename>
				</package>
				<package name="openbao-server" epoch="0" version="2.4.3" release="1.el7" arch="noarch" src="openbao-2.4.3-1.el7.src.rpm">
					<filename>openbao-server-0:2.4.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0032</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость containerd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в containerd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-containerd-cve-2024-25621-7.3/</description>
               <solution>Установить обновление для пакета(ов) containerd
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-containerd-cve-2024-25621-7.3/" type="self" id="ROS-20260209-73-0032" title="ROS-20260209-73-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25621" type="cve" id="CVE-2024-25621" title="CVE-2024-25621" />
			<reference href="https://bdu.fstec.ru/vul/2026-02731" type="self" id="BDU:2026-02731" title="BDU:2026-02731" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="containerd" epoch="0" version="1.7.29" release="1.el7" arch="x86_64" src="containerd-1.7.29-1.el7.src.rpm">
					<filename>containerd-0:1.7.29-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0033</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость golang-github-jose </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang-github-jose</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-github-jose-cve-2024-28180-7.3/</description>
               <solution>Установить обновление для пакета(ов) golang-github-jose
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-github-jose-cve-2024-28180-7.3/" type="self" id="ROS-20260209-73-0033" title="ROS-20260209-73-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28180" type="cve" id="CVE-2024-28180" title="CVE-2024-28180" />
			<reference href="https://bdu.fstec.ru/vul/2024-01928" type="self" id="BDU:2024-01928" title="BDU:2024-01928" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang-github-jose" epoch="0" version="3.0.4" release="1.el7" arch="x86_64" src="golang-github-jose-3.0.4-1.el7.src.rpm">
					<filename>golang-github-jose-0:3.0.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="compat-golang-github-jose-3-devel" epoch="0" version="3.0.4" release="1.el7" arch="noarch" src="golang-github-jose-3.0.4-1.el7.src.rpm">
					<filename>compat-golang-github-jose-3-devel-0:3.0.4-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-github-jose-devel" epoch="0" version="3.0.4" release="1.el7" arch="noarch" src="golang-github-jose-3.0.4-1.el7.src.rpm">
					<filename>golang-github-jose-devel-0:3.0.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0034</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость python-jose </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-jose</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-jose-cve-2024-29370-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-jose
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-jose-cve-2024-29370-7.3/" type="self" id="ROS-20260209-73-0034" title="ROS-20260209-73-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29370" type="cve" id="CVE-2024-29370" title="CVE-2024-29370" />
			<reference href="https://bdu.fstec.ru/vul/2025-16345" type="self" id="BDU:2025-16345" title="BDU:2025-16345" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python-jose-doc" epoch="0" version="3.3.0" release="1.el7" arch="noarch" src="python-jose-3.3.0-1.el7.src.rpm">
					<filename>python-jose-doc-0:3.3.0-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-jose" epoch="0" version="3.3.0" release="1.el7" arch="noarch" src="python-jose-3.3.0-1.el7.src.rpm">
					<filename>python3-jose-0:3.3.0-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-jose+cryptography" epoch="0" version="3.3.0" release="1.el7" arch="noarch" src="python-jose-3.3.0-1.el7.src.rpm">
					<filename>python3-jose+cryptography-0:3.3.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0035</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость mongo-c-driver </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mongo-c-driver</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongo-c-driver-cve-2025-12119-7.3/</description>
               <solution>Установить обновление для пакета(ов) mongo-c-driver
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongo-c-driver-cve-2025-12119-7.3/" type="self" id="ROS-20260209-73-0035" title="ROS-20260209-73-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12119" type="cve" id="CVE-2025-12119" title="CVE-2025-12119" />
			<reference href="https://bdu.fstec.ru/vul/2026-03622" type="self" id="BDU:2026-03622" title="BDU:2026-03622" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libbson" epoch="0" version="1.30.6" release="1.el7" arch="x86_64" src="mongo-c-driver-1.30.6-1.el7.src.rpm">
					<filename>libbson-0:1.30.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libbson-devel" epoch="0" version="1.30.6" release="1.el7" arch="x86_64" src="mongo-c-driver-1.30.6-1.el7.src.rpm">
					<filename>libbson-devel-0:1.30.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongo-c-driver" epoch="0" version="1.30.6" release="1.el7" arch="x86_64" src="mongo-c-driver-1.30.6-1.el7.src.rpm">
					<filename>mongo-c-driver-0:1.30.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongo-c-driver-devel" epoch="0" version="1.30.6" release="1.el7" arch="x86_64" src="mongo-c-driver-1.30.6-1.el7.src.rpm">
					<filename>mongo-c-driver-devel-0:1.30.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongo-c-driver-doc" epoch="0" version="1.30.6" release="1.el7" arch="x86_64" src="mongo-c-driver-1.30.6-1.el7.src.rpm">
					<filename>mongo-c-driver-doc-0:1.30.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongo-c-driver-libs" epoch="0" version="1.30.6" release="1.el7" arch="x86_64" src="mongo-c-driver-1.30.6-1.el7.src.rpm">
					<filename>mongo-c-driver-libs-0:1.30.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0036</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость pgbouncer </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в pgbouncer</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pgbouncer-cve-2025-12819-7.3/</description>
               <solution>Установить обновление для пакета(ов) pgbouncer
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pgbouncer-cve-2025-12819-7.3/" type="self" id="ROS-20260209-73-0036" title="ROS-20260209-73-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12819" type="cve" id="CVE-2025-12819" title="CVE-2025-12819" />
			<reference href="https://bdu.fstec.ru/vul/2025-15208" type="self" id="BDU:2025-15208" title="BDU:2025-15208" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pgbouncer" epoch="0" version="1.25.1" release="1.el7" arch="x86_64" src="pgbouncer-1.25.1-1.el7.src.rpm">
					<filename>pgbouncer-0:1.25.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0037</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2025-68121-7.3/</description>
               <solution>Установить обновление для пакета(ов) golang
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2025-68121-7.3/" type="self" id="ROS-20260209-73-0037" title="ROS-20260209-73-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68121" type="cve" id="CVE-2025-68121" title="CVE-2025-68121" />
			<reference href="https://bdu.fstec.ru/vul/2026-03408" type="self" id="BDU:2026-03408" title="BDU:2026-03408" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.25.6" release="1.el7" arch="x86_64" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-0:1.25.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.25.6" release="1.el7" arch="x86_64" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-bin-0:1.25.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.25.6" release="1.el7" arch="x86_64" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-shared-0:1.25.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-docs" epoch="0" version="1.25.6" release="1.el7" arch="noarch" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-docs-0:1.25.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-misc" epoch="0" version="1.25.6" release="1.el7" arch="noarch" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-misc-0:1.25.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-src" epoch="0" version="1.25.6" release="1.el7" arch="noarch" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-src-0:1.25.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-tests" epoch="0" version="1.25.6" release="1.el7" arch="noarch" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-tests-0:1.25.6-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0038</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость moodle </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-moodle-cve-2021-47857-7.3/</description>
               <solution>Установить обновление для пакета(ов) moodle
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-moodle-cve-2021-47857-7.3/" type="self" id="ROS-20260209-73-0038" title="ROS-20260209-73-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47857" type="cve" id="CVE-2021-47857" title="CVE-2021-47857" />
			<reference href="https://bdu.fstec.ru/vul/2026-00978" type="self" id="BDU:2026-00978" title="BDU:2026-00978" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="moodle" epoch="0" version="4.2.8" release="1.el7" arch="noarch" src="moodle-4.2.8-1.el7.src.rpm">
					<filename>moodle-0:4.2.8-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0039</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость zabbix-lts </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в zabbix-lts</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix-lts-cve-2025-49642-7.3/</description>
               <solution>Установить обновление для пакета(ов) zabbix-lts
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix-lts-cve-2025-49642-7.3/" type="self" id="ROS-20260209-73-0039" title="ROS-20260209-73-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49642" type="cve" id="CVE-2025-49642" title="CVE-2025-49642" />
			<reference href="https://bdu.fstec.ru/vul/2025-15875" type="self" id="BDU:2025-15875" title="BDU:2025-15875" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix-lts-agent" epoch="1" version="6.0.40" release="2.el7" arch="x86_64" src="zabbix-lts-6.0.40-2.el7.src.rpm">
					<filename>zabbix-lts-agent-1:6.0.40-2.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-agent2" epoch="1" version="6.0.40" release="2.el7" arch="x86_64" src="zabbix-lts-6.0.40-2.el7.src.rpm">
					<filename>zabbix-lts-agent2-1:6.0.40-2.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-get" epoch="1" version="6.0.40" release="2.el7" arch="x86_64" src="zabbix-lts-6.0.40-2.el7.src.rpm">
					<filename>zabbix-lts-get-1:6.0.40-2.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway" epoch="1" version="6.0.40" release="2.el7" arch="x86_64" src="zabbix-lts-6.0.40-2.el7.src.rpm">
					<filename>zabbix-lts-java-gateway-1:6.0.40-2.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway-openjdk11" epoch="1" version="6.0.40" release="2.el7" arch="x86_64" src="zabbix-lts-6.0.40-2.el7.src.rpm">
					<filename>zabbix-lts-java-gateway-openjdk11-1:6.0.40-2.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway-openjdk17" epoch="1" version="6.0.40" release="2.el7" arch="x86_64" src="zabbix-lts-6.0.40-2.el7.src.rpm">
					<filename>zabbix-lts-java-gateway-openjdk17-1:6.0.40-2.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway-openjdk21" epoch="1" version="6.0.40" release="2.el7" arch="x86_64" src="zabbix-lts-6.0.40-2.el7.src.rpm">
					<filename>zabbix-lts-java-gateway-openjdk21-1:6.0.40-2.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-js" epoch="1" version="6.0.40" release="2.el7" arch="x86_64" src="zabbix-lts-6.0.40-2.el7.src.rpm">
					<filename>zabbix-lts-js-1:6.0.40-2.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-proxy-mysql" epoch="1" version="6.0.40" release="2.el7" arch="x86_64" src="zabbix-lts-6.0.40-2.el7.src.rpm">
					<filename>zabbix-lts-proxy-mysql-1:6.0.40-2.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-proxy-pgsql" epoch="1" version="6.0.40" release="2.el7" arch="x86_64" src="zabbix-lts-6.0.40-2.el7.src.rpm">
					<filename>zabbix-lts-proxy-pgsql-1:6.0.40-2.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-proxy-sqlite3" epoch="1" version="6.0.40" release="2.el7" arch="x86_64" src="zabbix-lts-6.0.40-2.el7.src.rpm">
					<filename>zabbix-lts-proxy-sqlite3-1:6.0.40-2.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-sender" epoch="1" version="6.0.40" release="2.el7" arch="x86_64" src="zabbix-lts-6.0.40-2.el7.src.rpm">
					<filename>zabbix-lts-sender-1:6.0.40-2.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-server-mysql" epoch="1" version="6.0.40" release="2.el7" arch="x86_64" src="zabbix-lts-6.0.40-2.el7.src.rpm">
					<filename>zabbix-lts-server-mysql-1:6.0.40-2.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-server-pgsql" epoch="1" version="6.0.40" release="2.el7" arch="x86_64" src="zabbix-lts-6.0.40-2.el7.src.rpm">
					<filename>zabbix-lts-server-pgsql-1:6.0.40-2.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-web-service" epoch="1" version="6.0.40" release="2.el7" arch="x86_64" src="zabbix-lts-6.0.40-2.el7.src.rpm">
					<filename>zabbix-lts-web-service-1:6.0.40-2.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-apache-conf" epoch="1" version="6.0.40" release="2.el7" arch="noarch" src="zabbix-lts-6.0.40-2.el7.src.rpm">
					<filename>zabbix-lts-apache-conf-1:6.0.40-2.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-nginx-conf" epoch="1" version="6.0.40" release="2.el7" arch="noarch" src="zabbix-lts-6.0.40-2.el7.src.rpm">
					<filename>zabbix-lts-nginx-conf-1:6.0.40-2.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-selinux-policy" epoch="1" version="6.0.40" release="2.el7" arch="noarch" src="zabbix-lts-6.0.40-2.el7.src.rpm">
					<filename>zabbix-lts-selinux-policy-1:6.0.40-2.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-sql-scripts" epoch="1" version="6.0.40" release="2.el7" arch="noarch" src="zabbix-lts-6.0.40-2.el7.src.rpm">
					<filename>zabbix-lts-sql-scripts-1:6.0.40-2.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-web" epoch="1" version="6.0.40" release="2.el7" arch="noarch" src="zabbix-lts-6.0.40-2.el7.src.rpm">
					<filename>zabbix-lts-web-1:6.0.40-2.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-web-deps" epoch="1" version="6.0.40" release="2.el7" arch="noarch" src="zabbix-lts-6.0.40-2.el7.src.rpm">
					<filename>zabbix-lts-web-deps-1:6.0.40-2.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-web-mysql" epoch="1" version="6.0.40" release="2.el7" arch="noarch" src="zabbix-lts-6.0.40-2.el7.src.rpm">
					<filename>zabbix-lts-web-mysql-1:6.0.40-2.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-web-pgsql" epoch="1" version="6.0.40" release="2.el7" arch="noarch" src="zabbix-lts-6.0.40-2.el7.src.rpm">
					<filename>zabbix-lts-web-pgsql-1:6.0.40-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0040</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость zabbix7-lts </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в zabbix7-lts</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-lts-cve-2025-49642-7.3/</description>
               <solution>Установить обновление для пакета(ов) zabbix7-lts
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-lts-cve-2025-49642-7.3/" type="self" id="ROS-20260209-73-0040" title="ROS-20260209-73-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49642" type="cve" id="CVE-2025-49642" title="CVE-2025-49642" />
			<reference href="https://bdu.fstec.ru/vul/2025-15875" type="self" id="BDU:2025-15875" title="BDU:2025-15875" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix7-lts-agent" epoch="1" version="7.0.9" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.9-1.el7.src.rpm">
					<filename>zabbix7-lts-agent-1:7.0.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-agent2" epoch="1" version="7.0.9" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.9-1.el7.src.rpm">
					<filename>zabbix7-lts-agent2-1:7.0.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-get" epoch="1" version="7.0.9" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.9-1.el7.src.rpm">
					<filename>zabbix7-lts-get-1:7.0.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-java-gateway" epoch="1" version="7.0.9" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.9-1.el7.src.rpm">
					<filename>zabbix7-lts-java-gateway-1:7.0.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-js" epoch="1" version="7.0.9" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.9-1.el7.src.rpm">
					<filename>zabbix7-lts-js-1:7.0.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-proxy-mysql" epoch="1" version="7.0.9" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.9-1.el7.src.rpm">
					<filename>zabbix7-lts-proxy-mysql-1:7.0.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-proxy-pgsql" epoch="1" version="7.0.9" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.9-1.el7.src.rpm">
					<filename>zabbix7-lts-proxy-pgsql-1:7.0.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-proxy-sqlite3" epoch="1" version="7.0.9" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.9-1.el7.src.rpm">
					<filename>zabbix7-lts-proxy-sqlite3-1:7.0.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-sender" epoch="1" version="7.0.9" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.9-1.el7.src.rpm">
					<filename>zabbix7-lts-sender-1:7.0.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-server-mysql" epoch="1" version="7.0.9" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.9-1.el7.src.rpm">
					<filename>zabbix7-lts-server-mysql-1:7.0.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-server-pgsql" epoch="1" version="7.0.9" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.9-1.el7.src.rpm">
					<filename>zabbix7-lts-server-pgsql-1:7.0.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-web-service" epoch="1" version="7.0.9" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.9-1.el7.src.rpm">
					<filename>zabbix7-lts-web-service-1:7.0.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-apache-conf" epoch="1" version="7.0.9" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.9-1.el7.src.rpm">
					<filename>zabbix7-lts-apache-conf-1:7.0.9-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-nginx-conf" epoch="1" version="7.0.9" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.9-1.el7.src.rpm">
					<filename>zabbix7-lts-nginx-conf-1:7.0.9-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-selinux-policy" epoch="1" version="7.0.9" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.9-1.el7.src.rpm">
					<filename>zabbix7-lts-selinux-policy-1:7.0.9-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-sql-scripts" epoch="1" version="7.0.9" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.9-1.el7.src.rpm">
					<filename>zabbix7-lts-sql-scripts-1:7.0.9-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-web" epoch="1" version="7.0.9" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.9-1.el7.src.rpm">
					<filename>zabbix7-lts-web-1:7.0.9-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-web-deps" epoch="1" version="7.0.9" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.9-1.el7.src.rpm">
					<filename>zabbix7-lts-web-deps-1:7.0.9-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-web-mysql" epoch="1" version="7.0.9" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.9-1.el7.src.rpm">
					<filename>zabbix7-lts-web-mysql-1:7.0.9-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-web-pgsql" epoch="1" version="7.0.9" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.9-1.el7.src.rpm">
					<filename>zabbix7-lts-web-pgsql-1:7.0.9-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0041</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость zabbix7.2 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в zabbix7.2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-2-cve-2025-49642-7.3/</description>
               <solution>Установить обновление для пакета(ов) zabbix7.2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-2-cve-2025-49642-7.3/" type="self" id="ROS-20260209-73-0041" title="ROS-20260209-73-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49642" type="cve" id="CVE-2025-49642" title="CVE-2025-49642" />
			<reference href="https://bdu.fstec.ru/vul/2025-15875" type="self" id="BDU:2025-15875" title="BDU:2025-15875" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix7.2-agent" epoch="1" version="7.2.12" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.12-1.el7.src.rpm">
					<filename>zabbix7.2-agent-1:7.2.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-agent2" epoch="1" version="7.2.12" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.12-1.el7.src.rpm">
					<filename>zabbix7.2-agent2-1:7.2.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-get" epoch="1" version="7.2.12" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.12-1.el7.src.rpm">
					<filename>zabbix7.2-get-1:7.2.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway" epoch="1" version="7.2.12" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.12-1.el7.src.rpm">
					<filename>zabbix7.2-java-gateway-1:7.2.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway-openjdk11" epoch="1" version="7.2.12" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.12-1.el7.src.rpm">
					<filename>zabbix7.2-java-gateway-openjdk11-1:7.2.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway-openjdk17" epoch="1" version="7.2.12" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.12-1.el7.src.rpm">
					<filename>zabbix7.2-java-gateway-openjdk17-1:7.2.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway-openjdk21" epoch="1" version="7.2.12" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.12-1.el7.src.rpm">
					<filename>zabbix7.2-java-gateway-openjdk21-1:7.2.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-js" epoch="1" version="7.2.12" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.12-1.el7.src.rpm">
					<filename>zabbix7.2-js-1:7.2.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-proxy-mysql" epoch="1" version="7.2.12" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.12-1.el7.src.rpm">
					<filename>zabbix7.2-proxy-mysql-1:7.2.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-proxy-pgsql" epoch="1" version="7.2.12" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.12-1.el7.src.rpm">
					<filename>zabbix7.2-proxy-pgsql-1:7.2.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-proxy-sqlite3" epoch="1" version="7.2.12" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.12-1.el7.src.rpm">
					<filename>zabbix7.2-proxy-sqlite3-1:7.2.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-sender" epoch="1" version="7.2.12" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.12-1.el7.src.rpm">
					<filename>zabbix7.2-sender-1:7.2.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-server-mysql" epoch="1" version="7.2.12" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.12-1.el7.src.rpm">
					<filename>zabbix7.2-server-mysql-1:7.2.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-server-pgsql" epoch="1" version="7.2.12" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.12-1.el7.src.rpm">
					<filename>zabbix7.2-server-pgsql-1:7.2.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-web-service" epoch="1" version="7.2.12" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.12-1.el7.src.rpm">
					<filename>zabbix7.2-web-service-1:7.2.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-apache-conf" epoch="1" version="7.2.12" release="1.el7" arch="noarch" src="zabbix7.2-7.2.12-1.el7.src.rpm">
					<filename>zabbix7.2-apache-conf-1:7.2.12-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-nginx-conf" epoch="1" version="7.2.12" release="1.el7" arch="noarch" src="zabbix7.2-7.2.12-1.el7.src.rpm">
					<filename>zabbix7.2-nginx-conf-1:7.2.12-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-selinux-policy" epoch="1" version="7.2.12" release="1.el7" arch="noarch" src="zabbix7.2-7.2.12-1.el7.src.rpm">
					<filename>zabbix7.2-selinux-policy-1:7.2.12-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-sql-scripts" epoch="1" version="7.2.12" release="1.el7" arch="noarch" src="zabbix7.2-7.2.12-1.el7.src.rpm">
					<filename>zabbix7.2-sql-scripts-1:7.2.12-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-web" epoch="1" version="7.2.12" release="1.el7" arch="noarch" src="zabbix7.2-7.2.12-1.el7.src.rpm">
					<filename>zabbix7.2-web-1:7.2.12-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-web-deps" epoch="1" version="7.2.12" release="1.el7" arch="noarch" src="zabbix7.2-7.2.12-1.el7.src.rpm">
					<filename>zabbix7.2-web-deps-1:7.2.12-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-web-mysql" epoch="1" version="7.2.12" release="1.el7" arch="noarch" src="zabbix7.2-7.2.12-1.el7.src.rpm">
					<filename>zabbix7.2-web-mysql-1:7.2.12-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-web-pgsql" epoch="1" version="7.2.12" release="1.el7" arch="noarch" src="zabbix7.2-7.2.12-1.el7.src.rpm">
					<filename>zabbix7.2-web-pgsql-1:7.2.12-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0043</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2025-61726-7.3/</description>
               <solution>Установить обновление для пакета(ов) golang
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2025-61726-7.3/" type="self" id="ROS-20260209-73-0043" title="ROS-20260209-73-0043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61726" type="cve" id="CVE-2025-61726" title="CVE-2025-61726" />
			<reference href="https://bdu.fstec.ru/vul/2026-03409" type="self" id="BDU:2026-03409" title="BDU:2026-03409" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.25.6" release="1.el7" arch="x86_64" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-0:1.25.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.25.6" release="1.el7" arch="x86_64" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-bin-0:1.25.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.25.6" release="1.el7" arch="x86_64" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-shared-0:1.25.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-docs" epoch="0" version="1.25.6" release="1.el7" arch="noarch" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-docs-0:1.25.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-misc" epoch="0" version="1.25.6" release="1.el7" arch="noarch" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-misc-0:1.25.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-src" epoch="0" version="1.25.6" release="1.el7" arch="noarch" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-src-0:1.25.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-tests" epoch="0" version="1.25.6" release="1.el7" arch="noarch" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-tests-0:1.25.6-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0044</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2025-61728-7.3/</description>
               <solution>Установить обновление для пакета(ов) golang
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2025-61728-7.3/" type="self" id="ROS-20260209-73-0044" title="ROS-20260209-73-0044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61728" type="cve" id="CVE-2025-61728" title="CVE-2025-61728" />
			<reference href="https://bdu.fstec.ru/vul/2026-03410" type="self" id="BDU:2026-03410" title="BDU:2026-03410" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.25.6" release="1.el7" arch="x86_64" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-0:1.25.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.25.6" release="1.el7" arch="x86_64" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-bin-0:1.25.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.25.6" release="1.el7" arch="x86_64" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-shared-0:1.25.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-docs" epoch="0" version="1.25.6" release="1.el7" arch="noarch" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-docs-0:1.25.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-misc" epoch="0" version="1.25.6" release="1.el7" arch="noarch" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-misc-0:1.25.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-src" epoch="0" version="1.25.6" release="1.el7" arch="noarch" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-src-0:1.25.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-tests" epoch="0" version="1.25.6" release="1.el7" arch="noarch" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-tests-0:1.25.6-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0045</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2025-61730-7.3/</description>
               <solution>Установить обновление для пакета(ов) golang
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2025-61730-7.3/" type="self" id="ROS-20260209-73-0045" title="ROS-20260209-73-0045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61730" type="cve" id="CVE-2025-61730" title="CVE-2025-61730" />
			<reference href="https://bdu.fstec.ru/vul/2026-03603" type="self" id="BDU:2026-03603" title="BDU:2026-03603" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.25.6" release="1.el7" arch="x86_64" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-0:1.25.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.25.6" release="1.el7" arch="x86_64" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-bin-0:1.25.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.25.6" release="1.el7" arch="x86_64" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-shared-0:1.25.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-docs" epoch="0" version="1.25.6" release="1.el7" arch="noarch" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-docs-0:1.25.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-misc" epoch="0" version="1.25.6" release="1.el7" arch="noarch" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-misc-0:1.25.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-src" epoch="0" version="1.25.6" release="1.el7" arch="noarch" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-src-0:1.25.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-tests" epoch="0" version="1.25.6" release="1.el7" arch="noarch" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-tests-0:1.25.6-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0046</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2025-61731-7.3/</description>
               <solution>Установить обновление для пакета(ов) golang
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2025-61731-7.3/" type="self" id="ROS-20260209-73-0046" title="ROS-20260209-73-0046" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61731" type="cve" id="CVE-2025-61731" title="CVE-2025-61731" />
			<reference href="https://bdu.fstec.ru/vul/2026-03411" type="self" id="BDU:2026-03411" title="BDU:2026-03411" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.25.6" release="1.el7" arch="x86_64" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-0:1.25.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.25.6" release="1.el7" arch="x86_64" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-bin-0:1.25.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.25.6" release="1.el7" arch="x86_64" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-shared-0:1.25.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-docs" epoch="0" version="1.25.6" release="1.el7" arch="noarch" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-docs-0:1.25.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-misc" epoch="0" version="1.25.6" release="1.el7" arch="noarch" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-misc-0:1.25.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-src" epoch="0" version="1.25.6" release="1.el7" arch="noarch" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-src-0:1.25.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-tests" epoch="0" version="1.25.6" release="1.el7" arch="noarch" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-tests-0:1.25.6-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-73-0047</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2025-68119-7.3/</description>
               <solution>Установить обновление для пакета(ов) golang
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2025-68119-7.3/" type="self" id="ROS-20260209-73-0047" title="ROS-20260209-73-0047" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68119" type="cve" id="CVE-2025-68119" title="CVE-2025-68119" />
			<reference href="https://bdu.fstec.ru/vul/2026-03601" type="self" id="BDU:2026-03601" title="BDU:2026-03601" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.25.6" release="1.el7" arch="x86_64" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-0:1.25.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.25.6" release="1.el7" arch="x86_64" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-bin-0:1.25.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.25.6" release="1.el7" arch="x86_64" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-shared-0:1.25.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-docs" epoch="0" version="1.25.6" release="1.el7" arch="noarch" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-docs-0:1.25.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-misc" epoch="0" version="1.25.6" release="1.el7" arch="noarch" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-misc-0:1.25.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-src" epoch="0" version="1.25.6" release="1.el7" arch="noarch" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-src-0:1.25.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-tests" epoch="0" version="1.25.6" release="1.el7" arch="noarch" src="golang-1.25.6-1.el7.src.rpm">
					<filename>golang-tests-0:1.25.6-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260211-73-0001</id>
		<issued date="2026-02-11" />
		<updated date="2026-02-11" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37897-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37897-7.3/" type="self" id="ROS-20260211-73-0001" title="ROS-20260211-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37897" type="cve" id="CVE-2025-37897" title="CVE-2025-37897" />
			<reference href="https://bdu.fstec.ru/vul/2025-12237" type="self" id="BDU:2025-12237" title="BDU:2025-12237" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260211-73-0002</id>
		<issued date="2026-02-11" />
		<updated date="2026-02-11" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37901-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37901-7.3/" type="self" id="ROS-20260211-73-0002" title="ROS-20260211-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37901" type="cve" id="CVE-2025-37901" title="CVE-2025-37901" />
			<reference href="https://bdu.fstec.ru/vul/2025-11900" type="self" id="BDU:2025-11900" title="BDU:2025-11900" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260211-73-0003</id>
		<issued date="2026-02-11" />
		<updated date="2026-02-11" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37998-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37998-7.3/" type="self" id="ROS-20260211-73-0003" title="ROS-20260211-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37998" type="cve" id="CVE-2025-37998" title="CVE-2025-37998" />
			<reference href="https://bdu.fstec.ru/vul/2025-11970" type="self" id="BDU:2025-11970" title="BDU:2025-11970" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260211-73-0004</id>
		<issued date="2026-02-11" />
		<updated date="2026-02-11" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38003-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38003-7.3/" type="self" id="ROS-20260211-73-0004" title="ROS-20260211-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38003" type="cve" id="CVE-2025-38003" title="CVE-2025-38003" />
			<reference href="https://bdu.fstec.ru/vul/2025-12065" type="self" id="BDU:2025-12065" title="BDU:2025-12065" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260211-73-0005</id>
		<issued date="2026-02-11" />
		<updated date="2026-02-11" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38083-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38083-7.3/" type="self" id="ROS-20260211-73-0005" title="ROS-20260211-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38083" type="cve" id="CVE-2025-38083" title="CVE-2025-38083" />
			<reference href="https://bdu.fstec.ru/vul/2025-11467" type="self" id="BDU:2025-11467" title="BDU:2025-11467" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260211-73-0006</id>
		<issued date="2026-02-11" />
		<updated date="2026-02-11" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38084-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38084-7.3/" type="self" id="ROS-20260211-73-0006" title="ROS-20260211-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38084" type="cve" id="CVE-2025-38084" title="CVE-2025-38084" />
			<reference href="https://bdu.fstec.ru/vul/2025-15825" type="self" id="BDU:2025-15825" title="BDU:2025-15825" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260211-73-0007</id>
		<issued date="2026-02-11" />
		<updated date="2026-02-11" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38085-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38085-7.3/" type="self" id="ROS-20260211-73-0007" title="ROS-20260211-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38085" type="cve" id="CVE-2025-38085" title="CVE-2025-38085" />
			<reference href="https://bdu.fstec.ru/vul/2025-15824" type="self" id="BDU:2025-15824" title="BDU:2025-15824" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260211-73-0008</id>
		<issued date="2026-02-11" />
		<updated date="2026-02-11" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38086-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38086-7.3/" type="self" id="ROS-20260211-73-0008" title="ROS-20260211-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38086" type="cve" id="CVE-2025-38086" title="CVE-2025-38086" />
			<reference href="https://bdu.fstec.ru/vul/2025-09834" type="self" id="BDU:2025-09834" title="BDU:2025-09834" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260211-73-0009</id>
		<issued date="2026-02-11" />
		<updated date="2026-02-11" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38088-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38088-7.3/" type="self" id="ROS-20260211-73-0009" title="ROS-20260211-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38088" type="cve" id="CVE-2025-38088" title="CVE-2025-38088" />
			<reference href="https://bdu.fstec.ru/vul/2025-09826" type="self" id="BDU:2025-09826" title="BDU:2025-09826" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260211-73-0010</id>
		<issued date="2026-02-11" />
		<updated date="2026-02-11" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38090-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38090-7.3/" type="self" id="ROS-20260211-73-0010" title="ROS-20260211-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38090" type="cve" id="CVE-2025-38090" title="CVE-2025-38090" />
			<reference href="https://bdu.fstec.ru/vul/2025-14095" type="self" id="BDU:2025-14095" title="BDU:2025-14095" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0001</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость pgadmin4 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в pgadmin4</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pgadmin4-cve-2025-13780-7.3/</description>
               <solution>Установить обновление для пакета(ов) pgadmin4
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pgadmin4-cve-2025-13780-7.3/" type="self" id="ROS-20260216-73-0001" title="ROS-20260216-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13780" type="cve" id="CVE-2025-13780" title="CVE-2025-13780" />
			<reference href="https://bdu.fstec.ru/vul/2025-15881" type="self" id="BDU:2025-15881" title="BDU:2025-15881" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pgadmin4" epoch="0" version="8.6" release="3.el7" arch="x86_64" src="pgadmin4-8.6-3.el7.src.rpm">
					<filename>pgadmin4-0:8.6-3.el7.x86_64.rpm</filename>
				</package>
				<package name="pgadmin4-httpd" epoch="0" version="8.6" release="3.el7" arch="x86_64" src="pgadmin4-8.6-3.el7.src.rpm">
					<filename>pgadmin4-httpd-0:8.6-3.el7.x86_64.rpm</filename>
				</package>
				<package name="pgadmin4-qt" epoch="0" version="8.6" release="3.el7" arch="x86_64" src="pgadmin4-8.6-3.el7.src.rpm">
					<filename>pgadmin4-qt-0:8.6-3.el7.x86_64.rpm</filename>
				</package>
				<package name="pgadmin4-langpack-cs" epoch="0" version="8.6" release="3.el7" arch="noarch" src="pgadmin4-8.6-3.el7.src.rpm">
					<filename>pgadmin4-langpack-cs-0:8.6-3.el7.noarch.rpm</filename>
				</package>
				<package name="pgadmin4-langpack-de" epoch="0" version="8.6" release="3.el7" arch="noarch" src="pgadmin4-8.6-3.el7.src.rpm">
					<filename>pgadmin4-langpack-de-0:8.6-3.el7.noarch.rpm</filename>
				</package>
				<package name="pgadmin4-langpack-es" epoch="0" version="8.6" release="3.el7" arch="noarch" src="pgadmin4-8.6-3.el7.src.rpm">
					<filename>pgadmin4-langpack-es-0:8.6-3.el7.noarch.rpm</filename>
				</package>
				<package name="pgadmin4-langpack-fr" epoch="0" version="8.6" release="3.el7" arch="noarch" src="pgadmin4-8.6-3.el7.src.rpm">
					<filename>pgadmin4-langpack-fr-0:8.6-3.el7.noarch.rpm</filename>
				</package>
				<package name="pgadmin4-langpack-it" epoch="0" version="8.6" release="3.el7" arch="noarch" src="pgadmin4-8.6-3.el7.src.rpm">
					<filename>pgadmin4-langpack-it-0:8.6-3.el7.noarch.rpm</filename>
				</package>
				<package name="pgadmin4-langpack-ja" epoch="0" version="8.6" release="3.el7" arch="noarch" src="pgadmin4-8.6-3.el7.src.rpm">
					<filename>pgadmin4-langpack-ja-0:8.6-3.el7.noarch.rpm</filename>
				</package>
				<package name="pgadmin4-langpack-ko" epoch="0" version="8.6" release="3.el7" arch="noarch" src="pgadmin4-8.6-3.el7.src.rpm">
					<filename>pgadmin4-langpack-ko-0:8.6-3.el7.noarch.rpm</filename>
				</package>
				<package name="pgadmin4-langpack-pl" epoch="0" version="8.6" release="3.el7" arch="noarch" src="pgadmin4-8.6-3.el7.src.rpm">
					<filename>pgadmin4-langpack-pl-0:8.6-3.el7.noarch.rpm</filename>
				</package>
				<package name="pgadmin4-langpack-ru" epoch="0" version="8.6" release="3.el7" arch="noarch" src="pgadmin4-8.6-3.el7.src.rpm">
					<filename>pgadmin4-langpack-ru-0:8.6-3.el7.noarch.rpm</filename>
				</package>
				<package name="pgadmin4-langpack-zh" epoch="0" version="8.6" release="3.el7" arch="noarch" src="pgadmin4-8.6-3.el7.src.rpm">
					<filename>pgadmin4-langpack-zh-0:8.6-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0002</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость rubygem-activesupport </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в rubygem-activesupport</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-activesupport-cve-2023-38037-7.3/</description>
               <solution>Установить обновление для пакета(ов) rubygem-activesupport
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-activesupport-cve-2023-38037-7.3/" type="self" id="ROS-20260216-73-0002" title="ROS-20260216-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38037" type="cve" id="CVE-2023-38037" title="CVE-2023-38037" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-activesupport" epoch="2" version="6.1.6.1" release="4.el7" arch="noarch" src="rubygem-activesupport-6.1.6.1-4.el7.src.rpm">
					<filename>rubygem-activesupport-2:6.1.6.1-4.el7.noarch.rpm</filename>
				</package>
				<package name="rubygem-activesupport-doc" epoch="2" version="6.1.6.1" release="4.el7" arch="noarch" src="rubygem-activesupport-6.1.6.1-4.el7.src.rpm">
					<filename>rubygem-activesupport-doc-2:6.1.6.1-4.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0003</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость libeconf </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libeconf</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libeconf-cve-2023-22652-7.3/</description>
               <solution>Установить обновление для пакета(ов) libeconf
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libeconf-cve-2023-22652-7.3/" type="self" id="ROS-20260216-73-0003" title="ROS-20260216-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22652" type="cve" id="CVE-2023-22652" title="CVE-2023-22652" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libeconf" epoch="0" version="0.5.2" release="2.el7" arch="x86_64" src="libeconf-0.5.2-2.el7.src.rpm">
					<filename>libeconf-0:0.5.2-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libeconf-devel" epoch="0" version="0.5.2" release="2.el7" arch="x86_64" src="libeconf-0.5.2-2.el7.src.rpm">
					<filename>libeconf-devel-0:0.5.2-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libeconf-utils" epoch="0" version="0.5.2" release="2.el7" arch="x86_64" src="libeconf-0.5.2-2.el7.src.rpm">
					<filename>libeconf-utils-0:0.5.2-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0004</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость python-socketio </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-socketio</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-socketio-cve-2025-61765-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-socketio
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-socketio-cve-2025-61765-7.3/" type="self" id="ROS-20260216-73-0004" title="ROS-20260216-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61765" type="cve" id="CVE-2025-61765" title="CVE-2025-61765" />
			<reference href="https://bdu.fstec.ru/vul/2026-03615" type="self" id="BDU:2026-03615" title="BDU:2026-03615" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python-socketio-doc" epoch="0" version="5.15.1" release="1.el7" arch="noarch" src="python-socketio-5.15.1-1.el7.src.rpm">
					<filename>python-socketio-doc-0:5.15.1-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-socketio" epoch="0" version="5.15.1" release="1.el7" arch="noarch" src="python-socketio-5.15.1-1.el7.src.rpm">
					<filename>python3-socketio-0:5.15.1-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-socketio+asyncio_client" epoch="0" version="5.15.1" release="1.el7" arch="noarch" src="python-socketio-5.15.1-1.el7.src.rpm">
					<filename>python3-socketio+asyncio_client-0:5.15.1-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-socketio+client" epoch="0" version="5.15.1" release="1.el7" arch="noarch" src="python-socketio-5.15.1-1.el7.src.rpm">
					<filename>python3-socketio+client-0:5.15.1-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0005</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость unbound </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в unbound</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-unbound-cve-2025-11411-7.3/</description>
               <solution>Установить обновление для пакета(ов) unbound
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-unbound-cve-2025-11411-7.3/" type="self" id="ROS-20260216-73-0005" title="ROS-20260216-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11411" type="cve" id="CVE-2025-11411" title="CVE-2025-11411" />
			<reference href="https://bdu.fstec.ru/vul/2026-03595" type="self" id="BDU:2026-03595" title="BDU:2026-03595" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python2-unbound" epoch="0" version="1.19.2" release="7.el7" arch="x86_64" src="unbound-1.19.2-7.el7.src.rpm">
					<filename>python2-unbound-0:1.19.2-7.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-unbound" epoch="0" version="1.19.2" release="7.el7" arch="x86_64" src="unbound-1.19.2-7.el7.src.rpm">
					<filename>python3-unbound-0:1.19.2-7.el7.x86_64.rpm</filename>
				</package>
				<package name="unbound" epoch="0" version="1.19.2" release="7.el7" arch="x86_64" src="unbound-1.19.2-7.el7.src.rpm">
					<filename>unbound-0:1.19.2-7.el7.x86_64.rpm</filename>
				</package>
				<package name="unbound-devel" epoch="0" version="1.19.2" release="7.el7" arch="x86_64" src="unbound-1.19.2-7.el7.src.rpm">
					<filename>unbound-devel-0:1.19.2-7.el7.x86_64.rpm</filename>
				</package>
				<package name="unbound-libs" epoch="0" version="1.19.2" release="7.el7" arch="x86_64" src="unbound-1.19.2-7.el7.src.rpm">
					<filename>unbound-libs-0:1.19.2-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0006</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость wireshark </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в wireshark</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-wireshark-cve-2026-0961-7.3/</description>
               <solution>Установить обновление для пакета(ов) wireshark
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-wireshark-cve-2026-0961-7.3/" type="self" id="ROS-20260216-73-0006" title="ROS-20260216-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0961" type="cve" id="CVE-2026-0961" title="CVE-2026-0961" />
			<reference href="https://bdu.fstec.ru/vul/2026-03612" type="self" id="BDU:2026-03612" title="BDU:2026-03612" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="wireshark" epoch="1" version="4.6.3" release="2.el7" arch="x86_64" src="wireshark-4.6.3-2.el7.src.rpm">
					<filename>wireshark-1:4.6.3-2.el7.x86_64.rpm</filename>
				</package>
				<package name="wireshark-cli" epoch="1" version="4.6.3" release="2.el7" arch="x86_64" src="wireshark-4.6.3-2.el7.src.rpm">
					<filename>wireshark-cli-1:4.6.3-2.el7.x86_64.rpm</filename>
				</package>
				<package name="wireshark-devel" epoch="1" version="4.6.3" release="2.el7" arch="x86_64" src="wireshark-4.6.3-2.el7.src.rpm">
					<filename>wireshark-devel-1:4.6.3-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0007</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость wireshark </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в wireshark</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-wireshark-cve-2026-0959-7.3/</description>
               <solution>Установить обновление для пакета(ов) wireshark
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-wireshark-cve-2026-0959-7.3/" type="self" id="ROS-20260216-73-0007" title="ROS-20260216-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0959" type="cve" id="CVE-2026-0959" title="CVE-2026-0959" />
			<reference href="https://bdu.fstec.ru/vul/2026-03610" type="self" id="BDU:2026-03610" title="BDU:2026-03610" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="wireshark" epoch="1" version="4.6.3" release="2.el7" arch="x86_64" src="wireshark-4.6.3-2.el7.src.rpm">
					<filename>wireshark-1:4.6.3-2.el7.x86_64.rpm</filename>
				</package>
				<package name="wireshark-cli" epoch="1" version="4.6.3" release="2.el7" arch="x86_64" src="wireshark-4.6.3-2.el7.src.rpm">
					<filename>wireshark-cli-1:4.6.3-2.el7.x86_64.rpm</filename>
				</package>
				<package name="wireshark-devel" epoch="1" version="4.6.3" release="2.el7" arch="x86_64" src="wireshark-4.6.3-2.el7.src.rpm">
					<filename>wireshark-devel-1:4.6.3-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0008</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость wireshark </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в wireshark</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-wireshark-cve-2026-0960-7.3/</description>
               <solution>Установить обновление для пакета(ов) wireshark
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-wireshark-cve-2026-0960-7.3/" type="self" id="ROS-20260216-73-0008" title="ROS-20260216-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0960" type="cve" id="CVE-2026-0960" title="CVE-2026-0960" />
			<reference href="https://bdu.fstec.ru/vul/2026-03611" type="self" id="BDU:2026-03611" title="BDU:2026-03611" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="wireshark" epoch="1" version="4.6.3" release="2.el7" arch="x86_64" src="wireshark-4.6.3-2.el7.src.rpm">
					<filename>wireshark-1:4.6.3-2.el7.x86_64.rpm</filename>
				</package>
				<package name="wireshark-cli" epoch="1" version="4.6.3" release="2.el7" arch="x86_64" src="wireshark-4.6.3-2.el7.src.rpm">
					<filename>wireshark-cli-1:4.6.3-2.el7.x86_64.rpm</filename>
				</package>
				<package name="wireshark-devel" epoch="1" version="4.6.3" release="2.el7" arch="x86_64" src="wireshark-4.6.3-2.el7.src.rpm">
					<filename>wireshark-devel-1:4.6.3-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0009</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость wireshark </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в wireshark</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-wireshark-cve-2025-13945-7.3/</description>
               <solution>Установить обновление для пакета(ов) wireshark
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-wireshark-cve-2025-13945-7.3/" type="self" id="ROS-20260216-73-0009" title="ROS-20260216-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13945" type="cve" id="CVE-2025-13945" title="CVE-2025-13945" />
			<reference href="https://bdu.fstec.ru/vul/2026-03608" type="self" id="BDU:2026-03608" title="BDU:2026-03608" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="wireshark" epoch="1" version="4.6.3" release="2.el7" arch="x86_64" src="wireshark-4.6.3-2.el7.src.rpm">
					<filename>wireshark-1:4.6.3-2.el7.x86_64.rpm</filename>
				</package>
				<package name="wireshark-cli" epoch="1" version="4.6.3" release="2.el7" arch="x86_64" src="wireshark-4.6.3-2.el7.src.rpm">
					<filename>wireshark-cli-1:4.6.3-2.el7.x86_64.rpm</filename>
				</package>
				<package name="wireshark-devel" epoch="1" version="4.6.3" release="2.el7" arch="x86_64" src="wireshark-4.6.3-2.el7.src.rpm">
					<filename>wireshark-devel-1:4.6.3-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0010</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость wireshark </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в wireshark</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-wireshark-cve-2025-13946-7.3/</description>
               <solution>Установить обновление для пакета(ов) wireshark
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-wireshark-cve-2025-13946-7.3/" type="self" id="ROS-20260216-73-0010" title="ROS-20260216-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13946" type="cve" id="CVE-2025-13946" title="CVE-2025-13946" />
			<reference href="https://bdu.fstec.ru/vul/2026-03609" type="self" id="BDU:2026-03609" title="BDU:2026-03609" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="wireshark" epoch="1" version="4.6.3" release="2.el7" arch="x86_64" src="wireshark-4.6.3-2.el7.src.rpm">
					<filename>wireshark-1:4.6.3-2.el7.x86_64.rpm</filename>
				</package>
				<package name="wireshark-cli" epoch="1" version="4.6.3" release="2.el7" arch="x86_64" src="wireshark-4.6.3-2.el7.src.rpm">
					<filename>wireshark-cli-1:4.6.3-2.el7.x86_64.rpm</filename>
				</package>
				<package name="wireshark-devel" epoch="1" version="4.6.3" release="2.el7" arch="x86_64" src="wireshark-4.6.3-2.el7.src.rpm">
					<filename>wireshark-devel-1:4.6.3-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0011</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость netty </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в netty</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-netty-cve-2025-67735-7.3/</description>
               <solution>Установить обновление для пакета(ов) netty
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-netty-cve-2025-67735-7.3/" type="self" id="ROS-20260216-73-0011" title="ROS-20260216-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67735" type="cve" id="CVE-2025-67735" title="CVE-2025-67735" />
			<reference href="https://bdu.fstec.ru/vul/2026-01632" type="self" id="BDU:2026-01632" title="BDU:2026-01632" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="netty" epoch="0" version="4.1.130" release="1.el7" arch="x86_64" src="netty-4.1.130-1.el7.src.rpm">
					<filename>netty-0:4.1.130-1.el7.x86_64.rpm</filename>
				</package>
				<package name="netty-javadoc" epoch="0" version="4.1.130" release="1.el7" arch="noarch" src="netty-4.1.130-1.el7.src.rpm">
					<filename>netty-javadoc-0:4.1.130-1.el7.noarch.rpm</filename>
				</package>
				<package name="netty-poms" epoch="0" version="4.1.130" release="1.el7" arch="noarch" src="netty-4.1.130-1.el7.src.rpm">
					<filename>netty-poms-0:4.1.130-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0012</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость avahi </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в avahi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-avahi-cve-2025-59529-7.3/</description>
               <solution>Установить обновление для пакета(ов) avahi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-avahi-cve-2025-59529-7.3/" type="self" id="ROS-20260216-73-0012" title="ROS-20260216-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59529" type="cve" id="CVE-2025-59529" title="CVE-2025-59529" />
			<reference href="https://bdu.fstec.ru/vul/2026-03596" type="self" id="BDU:2026-03596" title="BDU:2026-03596" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="avahi" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-autoipd" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-autoipd-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-howl" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-compat-howl-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-howl-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-compat-howl-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-compat-libdns_sd-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-compat-libdns_sd-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-dnsconfd" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-dnsconfd-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-glib" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-glib-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-glib-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-glib-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-gobject" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-gobject-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-gobject-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-gobject-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-libs" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-libs-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt3" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-qt3-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt3-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-qt3-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt4" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-qt4-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt4-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-qt4-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt5" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-qt5-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt5-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-qt5-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-sharp" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-sharp-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-tools" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-tools-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-ui-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-ui-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-gtk3" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-ui-gtk3-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-ui-sharp-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-ui-sharp-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-tools" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-ui-tools-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-avahi" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>python3-avahi-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0013</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость kubernetes </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kubernetes</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kubernetes-cve-2025-13281-7.3/</description>
               <solution>Установить обновление для пакета(ов) kubernetes
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kubernetes-cve-2025-13281-7.3/" type="self" id="ROS-20260216-73-0013" title="ROS-20260216-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13281" type="cve" id="CVE-2025-13281" title="CVE-2025-13281" />
			<reference href="https://bdu.fstec.ru/vul/2026-03571" type="self" id="BDU:2026-03571" title="BDU:2026-03571" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kubernetes" epoch="0" version="1.24.17" release="11.el7" arch="x86_64" src="kubernetes-1.24.17-11.el7.src.rpm">
					<filename>kubernetes-0:1.24.17-11.el7.x86_64.rpm</filename>
				</package>
				<package name="kubernetes-client" epoch="0" version="1.24.17" release="11.el7" arch="x86_64" src="kubernetes-1.24.17-11.el7.src.rpm">
					<filename>kubernetes-client-0:1.24.17-11.el7.x86_64.rpm</filename>
				</package>
				<package name="kubernetes-kubeadm" epoch="0" version="1.24.17" release="11.el7" arch="x86_64" src="kubernetes-1.24.17-11.el7.src.rpm">
					<filename>kubernetes-kubeadm-0:1.24.17-11.el7.x86_64.rpm</filename>
				</package>
				<package name="kubernetes-master" epoch="0" version="1.24.17" release="11.el7" arch="x86_64" src="kubernetes-1.24.17-11.el7.src.rpm">
					<filename>kubernetes-master-0:1.24.17-11.el7.x86_64.rpm</filename>
				</package>
				<package name="kubernetes-node" epoch="0" version="1.24.17" release="11.el7" arch="x86_64" src="kubernetes-1.24.17-11.el7.src.rpm">
					<filename>kubernetes-node-0:1.24.17-11.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0014</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость avahi </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в avahi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-avahi-cve-2025-68471-7.3/</description>
               <solution>Установить обновление для пакета(ов) avahi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-avahi-cve-2025-68471-7.3/" type="self" id="ROS-20260216-73-0014" title="ROS-20260216-73-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68471" type="cve" id="CVE-2025-68471" title="CVE-2025-68471" />
			<reference href="https://bdu.fstec.ru/vul/2026-03599" type="self" id="BDU:2026-03599" title="BDU:2026-03599" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="avahi" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-autoipd" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-autoipd-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-howl" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-compat-howl-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-howl-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-compat-howl-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-compat-libdns_sd-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-compat-libdns_sd-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-dnsconfd" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-dnsconfd-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-glib" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-glib-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-glib-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-glib-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-gobject" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-gobject-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-gobject-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-gobject-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-libs" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-libs-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt3" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-qt3-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt3-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-qt3-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt4" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-qt4-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt4-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-qt4-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt5" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-qt5-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt5-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-qt5-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-sharp" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-sharp-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-tools" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-tools-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-ui-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-ui-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-gtk3" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-ui-gtk3-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-ui-sharp-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-ui-sharp-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-tools" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-ui-tools-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-avahi" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>python3-avahi-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0015</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость avahi </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в avahi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-avahi-cve-2025-68468-7.3/</description>
               <solution>Установить обновление для пакета(ов) avahi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-avahi-cve-2025-68468-7.3/" type="self" id="ROS-20260216-73-0015" title="ROS-20260216-73-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68468" type="cve" id="CVE-2025-68468" title="CVE-2025-68468" />
			<reference href="https://bdu.fstec.ru/vul/2026-03598" type="self" id="BDU:2026-03598" title="BDU:2026-03598" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="avahi" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-autoipd" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-autoipd-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-howl" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-compat-howl-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-howl-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-compat-howl-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-compat-libdns_sd-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-compat-libdns_sd-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-dnsconfd" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-dnsconfd-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-glib" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-glib-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-glib-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-glib-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-gobject" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-gobject-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-gobject-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-gobject-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-libs" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-libs-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt3" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-qt3-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt3-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-qt3-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt4" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-qt4-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt4-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-qt4-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt5" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-qt5-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt5-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-qt5-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-sharp" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-sharp-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-tools" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-tools-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-ui-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-ui-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-gtk3" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-ui-gtk3-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-ui-sharp-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-ui-sharp-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-tools" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-ui-tools-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-avahi" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>python3-avahi-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0016</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость gpac </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в gpac</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gpac-cve-2026-1417-7.3/</description>
               <solution>Установить обновление для пакета(ов) gpac
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gpac-cve-2026-1417-7.3/" type="self" id="ROS-20260216-73-0016" title="ROS-20260216-73-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1417" type="cve" id="CVE-2026-1417" title="CVE-2026-1417" />
			<reference href="https://bdu.fstec.ru/vul/2026-03620" type="self" id="BDU:2026-03620" title="BDU:2026-03620" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gpac" epoch="0" version="2.4.0" release="7.el7" arch="x86_64" src="gpac-2.4.0-7.el7.src.rpm">
					<filename>gpac-0:2.4.0-7.el7.x86_64.rpm</filename>
				</package>
				<package name="gpac-devel" epoch="0" version="2.4.0" release="7.el7" arch="x86_64" src="gpac-2.4.0-7.el7.src.rpm">
					<filename>gpac-devel-0:2.4.0-7.el7.x86_64.rpm</filename>
				</package>
				<package name="gpac-doc" epoch="0" version="2.4.0" release="7.el7" arch="x86_64" src="gpac-2.4.0-7.el7.src.rpm">
					<filename>gpac-doc-0:2.4.0-7.el7.x86_64.rpm</filename>
				</package>
				<package name="gpac-libs" epoch="0" version="2.4.0" release="7.el7" arch="x86_64" src="gpac-2.4.0-7.el7.src.rpm">
					<filename>gpac-libs-0:2.4.0-7.el7.x86_64.rpm</filename>
				</package>
				<package name="gpac-static" epoch="0" version="2.4.0" release="7.el7" arch="x86_64" src="gpac-2.4.0-7.el7.src.rpm">
					<filename>gpac-static-0:2.4.0-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0017</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость gpac </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в gpac</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gpac-cve-2026-1415-7.3/</description>
               <solution>Установить обновление для пакета(ов) gpac
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gpac-cve-2026-1415-7.3/" type="self" id="ROS-20260216-73-0017" title="ROS-20260216-73-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1415" type="cve" id="CVE-2026-1415" title="CVE-2026-1415" />
			<reference href="https://bdu.fstec.ru/vul/2026-03616" type="self" id="BDU:2026-03616" title="BDU:2026-03616" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gpac" epoch="0" version="2.4.0" release="7.el7" arch="x86_64" src="gpac-2.4.0-7.el7.src.rpm">
					<filename>gpac-0:2.4.0-7.el7.x86_64.rpm</filename>
				</package>
				<package name="gpac-devel" epoch="0" version="2.4.0" release="7.el7" arch="x86_64" src="gpac-2.4.0-7.el7.src.rpm">
					<filename>gpac-devel-0:2.4.0-7.el7.x86_64.rpm</filename>
				</package>
				<package name="gpac-doc" epoch="0" version="2.4.0" release="7.el7" arch="x86_64" src="gpac-2.4.0-7.el7.src.rpm">
					<filename>gpac-doc-0:2.4.0-7.el7.x86_64.rpm</filename>
				</package>
				<package name="gpac-libs" epoch="0" version="2.4.0" release="7.el7" arch="x86_64" src="gpac-2.4.0-7.el7.src.rpm">
					<filename>gpac-libs-0:2.4.0-7.el7.x86_64.rpm</filename>
				</package>
				<package name="gpac-static" epoch="0" version="2.4.0" release="7.el7" arch="x86_64" src="gpac-2.4.0-7.el7.src.rpm">
					<filename>gpac-static-0:2.4.0-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0018</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость gpac </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в gpac</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gpac-cve-2026-1416-7.3/</description>
               <solution>Установить обновление для пакета(ов) gpac
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gpac-cve-2026-1416-7.3/" type="self" id="ROS-20260216-73-0018" title="ROS-20260216-73-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1416" type="cve" id="CVE-2026-1416" title="CVE-2026-1416" />
			<reference href="https://bdu.fstec.ru/vul/2026-03619" type="self" id="BDU:2026-03619" title="BDU:2026-03619" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gpac" epoch="0" version="2.4.0" release="7.el7" arch="x86_64" src="gpac-2.4.0-7.el7.src.rpm">
					<filename>gpac-0:2.4.0-7.el7.x86_64.rpm</filename>
				</package>
				<package name="gpac-devel" epoch="0" version="2.4.0" release="7.el7" arch="x86_64" src="gpac-2.4.0-7.el7.src.rpm">
					<filename>gpac-devel-0:2.4.0-7.el7.x86_64.rpm</filename>
				</package>
				<package name="gpac-doc" epoch="0" version="2.4.0" release="7.el7" arch="x86_64" src="gpac-2.4.0-7.el7.src.rpm">
					<filename>gpac-doc-0:2.4.0-7.el7.x86_64.rpm</filename>
				</package>
				<package name="gpac-libs" epoch="0" version="2.4.0" release="7.el7" arch="x86_64" src="gpac-2.4.0-7.el7.src.rpm">
					<filename>gpac-libs-0:2.4.0-7.el7.x86_64.rpm</filename>
				</package>
				<package name="gpac-static" epoch="0" version="2.4.0" release="7.el7" arch="x86_64" src="gpac-2.4.0-7.el7.src.rpm">
					<filename>gpac-static-0:2.4.0-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0019</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость gpac </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gpac</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gpac-cve-2026-1418-7.3/</description>
               <solution>Установить обновление для пакета(ов) gpac
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gpac-cve-2026-1418-7.3/" type="self" id="ROS-20260216-73-0019" title="ROS-20260216-73-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1418" type="cve" id="CVE-2026-1418" title="CVE-2026-1418" />
			<reference href="https://bdu.fstec.ru/vul/2026-03617" type="self" id="BDU:2026-03617" title="BDU:2026-03617" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gpac" epoch="0" version="2.4.0" release="7.el7" arch="x86_64" src="gpac-2.4.0-7.el7.src.rpm">
					<filename>gpac-0:2.4.0-7.el7.x86_64.rpm</filename>
				</package>
				<package name="gpac-devel" epoch="0" version="2.4.0" release="7.el7" arch="x86_64" src="gpac-2.4.0-7.el7.src.rpm">
					<filename>gpac-devel-0:2.4.0-7.el7.x86_64.rpm</filename>
				</package>
				<package name="gpac-doc" epoch="0" version="2.4.0" release="7.el7" arch="x86_64" src="gpac-2.4.0-7.el7.src.rpm">
					<filename>gpac-doc-0:2.4.0-7.el7.x86_64.rpm</filename>
				</package>
				<package name="gpac-libs" epoch="0" version="2.4.0" release="7.el7" arch="x86_64" src="gpac-2.4.0-7.el7.src.rpm">
					<filename>gpac-libs-0:2.4.0-7.el7.x86_64.rpm</filename>
				</package>
				<package name="gpac-static" epoch="0" version="2.4.0" release="7.el7" arch="x86_64" src="gpac-2.4.0-7.el7.src.rpm">
					<filename>gpac-static-0:2.4.0-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0020</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость zabbix7.2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в zabbix7.2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-2-cve-2025-49643-7.3/</description>
               <solution>Установить обновление для пакета(ов) zabbix7.2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-2-cve-2025-49643-7.3/" type="self" id="ROS-20260216-73-0020" title="ROS-20260216-73-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49643" type="cve" id="CVE-2025-49643" title="CVE-2025-49643" />
			<reference href="https://bdu.fstec.ru/vul/2025-15873" type="self" id="BDU:2025-15873" title="BDU:2025-15873" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix7.2-agent" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-agent-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-agent2" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-agent2-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-get" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-get-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-java-gateway-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway-openjdk11" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-java-gateway-openjdk11-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway-openjdk17" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-java-gateway-openjdk17-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway-openjdk21" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-java-gateway-openjdk21-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-js" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-js-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-proxy-mysql" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-proxy-mysql-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-proxy-pgsql" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-proxy-pgsql-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-proxy-sqlite3" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-proxy-sqlite3-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-sender" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-sender-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-server-mysql" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-server-mysql-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-server-pgsql" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-server-pgsql-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-web-service" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-web-service-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-apache-conf" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-apache-conf-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-nginx-conf" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-nginx-conf-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-selinux-policy" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-selinux-policy-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-sql-scripts" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-sql-scripts-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-web" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-web-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-web-deps" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-web-deps-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-web-mysql" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-web-mysql-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-web-pgsql" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-web-pgsql-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0021</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость zabbix7.4 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в zabbix7.4</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-4-cve-2025-49643-7.3/</description>
               <solution>Установить обновление для пакета(ов) zabbix7.4
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-4-cve-2025-49643-7.3/" type="self" id="ROS-20260216-73-0021" title="ROS-20260216-73-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49643" type="cve" id="CVE-2025-49643" title="CVE-2025-49643" />
			<reference href="https://bdu.fstec.ru/vul/2025-15873" type="self" id="BDU:2025-15873" title="BDU:2025-15873" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix7.4-agent" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-agent-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-agent2" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-agent2-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-get" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-get-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-java-gateway-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway-openjdk11" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-java-gateway-openjdk11-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway-openjdk17" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-java-gateway-openjdk17-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway-openjdk21" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-java-gateway-openjdk21-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-js" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-js-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-proxy-mysql" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-proxy-mysql-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-proxy-pgsql" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-proxy-pgsql-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-proxy-sqlite3" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-proxy-sqlite3-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-sender" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-sender-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-server-mysql" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-server-mysql-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-server-pgsql" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-server-pgsql-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-web-service" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-web-service-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-apache-conf" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-apache-conf-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-nginx-conf" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-nginx-conf-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-selinux-policy" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-selinux-policy-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-sql-scripts" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-sql-scripts-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-web" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-web-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-web-deps" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-web-deps-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-web-mysql" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-web-mysql-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-web-pgsql" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-web-pgsql-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0022</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость zabbix-latest </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в zabbix-latest</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix-latest-cve-2025-49643-7.3/</description>
               <solution>Установить обновление для пакета(ов) zabbix-latest
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix-latest-cve-2025-49643-7.3/" type="self" id="ROS-20260216-73-0022" title="ROS-20260216-73-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49643" type="cve" id="CVE-2025-49643" title="CVE-2025-49643" />
			<reference href="https://bdu.fstec.ru/vul/2025-15873" type="self" id="BDU:2025-15873" title="BDU:2025-15873" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix-latest-agent" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-agent-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-agent2" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-agent2-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-get" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-get-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-java-gateway" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-java-gateway-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-java-gateway-openjdk11" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-java-gateway-openjdk11-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-java-gateway-openjdk17" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-java-gateway-openjdk17-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-java-gateway-openjdk21" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-java-gateway-openjdk21-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-js" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-js-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-proxy-mysql" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-proxy-mysql-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-proxy-pgsql" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-proxy-pgsql-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-proxy-sqlite3" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-proxy-sqlite3-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-sender" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-sender-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-server-mysql" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-server-mysql-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-server-pgsql" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-server-pgsql-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-web-service" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-web-service-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-apache-conf" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-apache-conf-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-latest-nginx-conf" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-nginx-conf-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-latest-selinux-policy" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-selinux-policy-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-latest-sql-scripts" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-sql-scripts-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-latest-web" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-web-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-latest-web-deps" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-web-deps-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-latest-web-mysql" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-web-mysql-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-latest-web-pgsql" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-web-pgsql-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0023</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость zabbix7.2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в zabbix7.2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-2-cve-2025-27232-7.3/</description>
               <solution>Установить обновление для пакета(ов) zabbix7.2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-2-cve-2025-27232-7.3/" type="self" id="ROS-20260216-73-0023" title="ROS-20260216-73-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27232" type="cve" id="CVE-2025-27232" title="CVE-2025-27232" />
			<reference href="https://bdu.fstec.ru/vul/2025-15874" type="self" id="BDU:2025-15874" title="BDU:2025-15874" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix7.2-agent" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-agent-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-agent2" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-agent2-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-get" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-get-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-java-gateway-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway-openjdk11" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-java-gateway-openjdk11-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway-openjdk17" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-java-gateway-openjdk17-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway-openjdk21" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-java-gateway-openjdk21-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-js" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-js-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-proxy-mysql" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-proxy-mysql-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-proxy-pgsql" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-proxy-pgsql-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-proxy-sqlite3" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-proxy-sqlite3-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-sender" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-sender-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-server-mysql" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-server-mysql-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-server-pgsql" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-server-pgsql-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-web-service" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-web-service-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-apache-conf" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-apache-conf-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-nginx-conf" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-nginx-conf-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-selinux-policy" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-selinux-policy-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-sql-scripts" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-sql-scripts-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-web" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-web-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-web-deps" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-web-deps-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-web-mysql" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-web-mysql-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-web-pgsql" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-web-pgsql-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0024</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость zabbix7.4 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в zabbix7.4</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-4-cve-2025-27232-7.3/</description>
               <solution>Установить обновление для пакета(ов) zabbix7.4
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-4-cve-2025-27232-7.3/" type="self" id="ROS-20260216-73-0024" title="ROS-20260216-73-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27232" type="cve" id="CVE-2025-27232" title="CVE-2025-27232" />
			<reference href="https://bdu.fstec.ru/vul/2025-15874" type="self" id="BDU:2025-15874" title="BDU:2025-15874" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix7.4-agent" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-agent-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-agent2" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-agent2-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-get" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-get-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-java-gateway-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway-openjdk11" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-java-gateway-openjdk11-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway-openjdk17" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-java-gateway-openjdk17-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway-openjdk21" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-java-gateway-openjdk21-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-js" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-js-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-proxy-mysql" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-proxy-mysql-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-proxy-pgsql" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-proxy-pgsql-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-proxy-sqlite3" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-proxy-sqlite3-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-sender" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-sender-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-server-mysql" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-server-mysql-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-server-pgsql" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-server-pgsql-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-web-service" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-web-service-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-apache-conf" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-apache-conf-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-nginx-conf" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-nginx-conf-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-selinux-policy" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-selinux-policy-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-sql-scripts" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-sql-scripts-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-web" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-web-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-web-deps" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-web-deps-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-web-mysql" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-web-mysql-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-web-pgsql" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-web-pgsql-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0025</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость zabbix-latest </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в zabbix-latest</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix-latest-cve-2025-27232-7.3/</description>
               <solution>Установить обновление для пакета(ов) zabbix-latest
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix-latest-cve-2025-27232-7.3/" type="self" id="ROS-20260216-73-0025" title="ROS-20260216-73-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27232" type="cve" id="CVE-2025-27232" title="CVE-2025-27232" />
			<reference href="https://bdu.fstec.ru/vul/2025-15874" type="self" id="BDU:2025-15874" title="BDU:2025-15874" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix-latest-agent" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-agent-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-agent2" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-agent2-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-get" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-get-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-java-gateway" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-java-gateway-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-java-gateway-openjdk11" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-java-gateway-openjdk11-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-java-gateway-openjdk17" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-java-gateway-openjdk17-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-java-gateway-openjdk21" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-java-gateway-openjdk21-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-js" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-js-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-proxy-mysql" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-proxy-mysql-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-proxy-pgsql" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-proxy-pgsql-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-proxy-sqlite3" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-proxy-sqlite3-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-sender" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-sender-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-server-mysql" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-server-mysql-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-server-pgsql" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-server-pgsql-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-web-service" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-web-service-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-apache-conf" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-apache-conf-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-latest-nginx-conf" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-nginx-conf-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-latest-selinux-policy" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-selinux-policy-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-latest-sql-scripts" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-sql-scripts-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-latest-web" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-web-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-latest-web-deps" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-web-deps-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-latest-web-mysql" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-web-mysql-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-latest-web-pgsql" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix-latest-7.4.6-1.el7.src.rpm">
					<filename>zabbix-latest-web-pgsql-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0026</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость java-1.8.0-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в java-1.8.0-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-1-8-0-openjdk-cve-2026-21947-7.3/</description>
               <solution>Установить обновление для пакета(ов) java-1.8.0-openjdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-1-8-0-openjdk-cve-2026-21947-7.3/" type="self" id="ROS-20260216-73-0026" title="ROS-20260216-73-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21947" type="cve" id="CVE-2026-21947" title="CVE-2026-21947" />
			<reference href="https://bdu.fstec.ru/vul/2026-00827" type="self" id="BDU:2026-00827" title="BDU:2026-00827" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-1.8.0-openjdk" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-1:1.8.0.482.b03-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-demo" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-demo-1:1.8.0.482.b03-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-devel" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-devel-1:1.8.0.482.b03-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-headless" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-headless-1:1.8.0.482.b03-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-openjfx" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-openjfx-1:1.8.0.482.b03-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-openjfx-devel" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-openjfx-devel-1:1.8.0.482.b03-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-src" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-src-1:1.8.0.482.b03-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-javadoc" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="noarch" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-javadoc-1:1.8.0.482.b03-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0027</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость java-21-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в java-21-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-21-openjdk-cve-2026-21925-7.3/</description>
               <solution>Установить обновление для пакета(ов) java-21-openjdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-21-openjdk-cve-2026-21925-7.3/" type="self" id="ROS-20260216-73-0027" title="ROS-20260216-73-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21925" type="cve" id="CVE-2026-21925" title="CVE-2026-21925" />
			<reference href="https://bdu.fstec.ru/vul/2026-00695" type="self" id="BDU:2026-00695" title="BDU:2026-00695" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-21-openjdk" epoch="1" version="21.0.10.0.7" release="1.el7" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.el7.src.rpm">
					<filename>java-21-openjdk-1:21.0.10.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-demo" epoch="1" version="21.0.10.0.7" release="1.el7" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.el7.src.rpm">
					<filename>java-21-openjdk-demo-1:21.0.10.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-devel" epoch="1" version="21.0.10.0.7" release="1.el7" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.el7.src.rpm">
					<filename>java-21-openjdk-devel-1:21.0.10.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-headless" epoch="1" version="21.0.10.0.7" release="1.el7" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.el7.src.rpm">
					<filename>java-21-openjdk-headless-1:21.0.10.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-javadoc" epoch="1" version="21.0.10.0.7" release="1.el7" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.el7.src.rpm">
					<filename>java-21-openjdk-javadoc-1:21.0.10.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-jmods" epoch="1" version="21.0.10.0.7" release="1.el7" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.el7.src.rpm">
					<filename>java-21-openjdk-jmods-1:21.0.10.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-src" epoch="1" version="21.0.10.0.7" release="1.el7" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.el7.src.rpm">
					<filename>java-21-openjdk-src-1:21.0.10.0.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0028</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость java-17-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в java-17-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-17-openjdk-cve-2026-21925-7.3/</description>
               <solution>Установить обновление для пакета(ов) java-17-openjdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-17-openjdk-cve-2026-21925-7.3/" type="self" id="ROS-20260216-73-0028" title="ROS-20260216-73-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21925" type="cve" id="CVE-2026-21925" title="CVE-2026-21925" />
			<reference href="https://bdu.fstec.ru/vul/2026-00695" type="self" id="BDU:2026-00695" title="BDU:2026-00695" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-17-openjdk" epoch="1" version="17.0.18.0.8" release="1.el7" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.el7.src.rpm">
					<filename>java-17-openjdk-1:17.0.18.0.8-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-demo" epoch="1" version="17.0.18.0.8" release="1.el7" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.el7.src.rpm">
					<filename>java-17-openjdk-demo-1:17.0.18.0.8-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-devel" epoch="1" version="17.0.18.0.8" release="1.el7" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.el7.src.rpm">
					<filename>java-17-openjdk-devel-1:17.0.18.0.8-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-headless" epoch="1" version="17.0.18.0.8" release="1.el7" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.el7.src.rpm">
					<filename>java-17-openjdk-headless-1:17.0.18.0.8-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-javadoc" epoch="1" version="17.0.18.0.8" release="1.el7" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.el7.src.rpm">
					<filename>java-17-openjdk-javadoc-1:17.0.18.0.8-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-jmods" epoch="1" version="17.0.18.0.8" release="1.el7" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.el7.src.rpm">
					<filename>java-17-openjdk-jmods-1:17.0.18.0.8-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-src" epoch="1" version="17.0.18.0.8" release="1.el7" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.el7.src.rpm">
					<filename>java-17-openjdk-src-1:17.0.18.0.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0029</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость java-11-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в java-11-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-11-openjdk-cve-2026-21925-7.3/</description>
               <solution>Установить обновление для пакета(ов) java-11-openjdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-11-openjdk-cve-2026-21925-7.3/" type="self" id="ROS-20260216-73-0029" title="ROS-20260216-73-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21925" type="cve" id="CVE-2026-21925" title="CVE-2026-21925" />
			<reference href="https://bdu.fstec.ru/vul/2026-00695" type="self" id="BDU:2026-00695" title="BDU:2026-00695" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-11-openjdk" epoch="1" version="11.0.30.0.7" release="1.el7" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.el7.src.rpm">
					<filename>java-11-openjdk-1:11.0.30.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-demo" epoch="1" version="11.0.30.0.7" release="1.el7" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.el7.src.rpm">
					<filename>java-11-openjdk-demo-1:11.0.30.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-devel" epoch="1" version="11.0.30.0.7" release="1.el7" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.el7.src.rpm">
					<filename>java-11-openjdk-devel-1:11.0.30.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-headless" epoch="1" version="11.0.30.0.7" release="1.el7" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.el7.src.rpm">
					<filename>java-11-openjdk-headless-1:11.0.30.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-javadoc" epoch="1" version="11.0.30.0.7" release="1.el7" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.el7.src.rpm">
					<filename>java-11-openjdk-javadoc-1:11.0.30.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-jmods" epoch="1" version="11.0.30.0.7" release="1.el7" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.el7.src.rpm">
					<filename>java-11-openjdk-jmods-1:11.0.30.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-src" epoch="1" version="11.0.30.0.7" release="1.el7" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.el7.src.rpm">
					<filename>java-11-openjdk-src-1:11.0.30.0.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0030</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость java-1.8.0-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в java-1.8.0-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-1-8-0-openjdk-cve-2026-21925-7.3/</description>
               <solution>Установить обновление для пакета(ов) java-1.8.0-openjdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-1-8-0-openjdk-cve-2026-21925-7.3/" type="self" id="ROS-20260216-73-0030" title="ROS-20260216-73-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21925" type="cve" id="CVE-2026-21925" title="CVE-2026-21925" />
			<reference href="https://bdu.fstec.ru/vul/2026-00695" type="self" id="BDU:2026-00695" title="BDU:2026-00695" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-1.8.0-openjdk" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-1:1.8.0.482.b03-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-demo" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-demo-1:1.8.0.482.b03-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-devel" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-devel-1:1.8.0.482.b03-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-headless" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-headless-1:1.8.0.482.b03-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-openjfx" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-openjfx-1:1.8.0.482.b03-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-openjfx-devel" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-openjfx-devel-1:1.8.0.482.b03-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-src" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-src-1:1.8.0.482.b03-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-javadoc" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="noarch" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-javadoc-1:1.8.0.482.b03-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0031</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость java-21-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в java-21-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-21-openjdk-cve-2026-21933-7.3/</description>
               <solution>Установить обновление для пакета(ов) java-21-openjdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-21-openjdk-cve-2026-21933-7.3/" type="self" id="ROS-20260216-73-0031" title="ROS-20260216-73-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21933" type="cve" id="CVE-2026-21933" title="CVE-2026-21933" />
			<reference href="https://bdu.fstec.ru/vul/2026-00694" type="self" id="BDU:2026-00694" title="BDU:2026-00694" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-21-openjdk" epoch="1" version="21.0.10.0.7" release="1.el7" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.el7.src.rpm">
					<filename>java-21-openjdk-1:21.0.10.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-demo" epoch="1" version="21.0.10.0.7" release="1.el7" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.el7.src.rpm">
					<filename>java-21-openjdk-demo-1:21.0.10.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-devel" epoch="1" version="21.0.10.0.7" release="1.el7" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.el7.src.rpm">
					<filename>java-21-openjdk-devel-1:21.0.10.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-headless" epoch="1" version="21.0.10.0.7" release="1.el7" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.el7.src.rpm">
					<filename>java-21-openjdk-headless-1:21.0.10.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-javadoc" epoch="1" version="21.0.10.0.7" release="1.el7" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.el7.src.rpm">
					<filename>java-21-openjdk-javadoc-1:21.0.10.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-jmods" epoch="1" version="21.0.10.0.7" release="1.el7" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.el7.src.rpm">
					<filename>java-21-openjdk-jmods-1:21.0.10.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-src" epoch="1" version="21.0.10.0.7" release="1.el7" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.el7.src.rpm">
					<filename>java-21-openjdk-src-1:21.0.10.0.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0032</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость java-17-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в java-17-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-17-openjdk-cve-2026-21933-7.3/</description>
               <solution>Установить обновление для пакета(ов) java-17-openjdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-17-openjdk-cve-2026-21933-7.3/" type="self" id="ROS-20260216-73-0032" title="ROS-20260216-73-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21933" type="cve" id="CVE-2026-21933" title="CVE-2026-21933" />
			<reference href="https://bdu.fstec.ru/vul/2026-00694" type="self" id="BDU:2026-00694" title="BDU:2026-00694" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-17-openjdk" epoch="1" version="17.0.18.0.8" release="1.el7" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.el7.src.rpm">
					<filename>java-17-openjdk-1:17.0.18.0.8-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-demo" epoch="1" version="17.0.18.0.8" release="1.el7" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.el7.src.rpm">
					<filename>java-17-openjdk-demo-1:17.0.18.0.8-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-devel" epoch="1" version="17.0.18.0.8" release="1.el7" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.el7.src.rpm">
					<filename>java-17-openjdk-devel-1:17.0.18.0.8-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-headless" epoch="1" version="17.0.18.0.8" release="1.el7" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.el7.src.rpm">
					<filename>java-17-openjdk-headless-1:17.0.18.0.8-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-javadoc" epoch="1" version="17.0.18.0.8" release="1.el7" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.el7.src.rpm">
					<filename>java-17-openjdk-javadoc-1:17.0.18.0.8-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-jmods" epoch="1" version="17.0.18.0.8" release="1.el7" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.el7.src.rpm">
					<filename>java-17-openjdk-jmods-1:17.0.18.0.8-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-src" epoch="1" version="17.0.18.0.8" release="1.el7" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.el7.src.rpm">
					<filename>java-17-openjdk-src-1:17.0.18.0.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0033</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость java-11-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в java-11-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-11-openjdk-cve-2026-21933-7.3/</description>
               <solution>Установить обновление для пакета(ов) java-11-openjdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-11-openjdk-cve-2026-21933-7.3/" type="self" id="ROS-20260216-73-0033" title="ROS-20260216-73-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21933" type="cve" id="CVE-2026-21933" title="CVE-2026-21933" />
			<reference href="https://bdu.fstec.ru/vul/2026-00694" type="self" id="BDU:2026-00694" title="BDU:2026-00694" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-11-openjdk" epoch="1" version="11.0.30.0.7" release="1.el7" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.el7.src.rpm">
					<filename>java-11-openjdk-1:11.0.30.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-demo" epoch="1" version="11.0.30.0.7" release="1.el7" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.el7.src.rpm">
					<filename>java-11-openjdk-demo-1:11.0.30.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-devel" epoch="1" version="11.0.30.0.7" release="1.el7" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.el7.src.rpm">
					<filename>java-11-openjdk-devel-1:11.0.30.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-headless" epoch="1" version="11.0.30.0.7" release="1.el7" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.el7.src.rpm">
					<filename>java-11-openjdk-headless-1:11.0.30.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-javadoc" epoch="1" version="11.0.30.0.7" release="1.el7" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.el7.src.rpm">
					<filename>java-11-openjdk-javadoc-1:11.0.30.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-jmods" epoch="1" version="11.0.30.0.7" release="1.el7" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.el7.src.rpm">
					<filename>java-11-openjdk-jmods-1:11.0.30.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-src" epoch="1" version="11.0.30.0.7" release="1.el7" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.el7.src.rpm">
					<filename>java-11-openjdk-src-1:11.0.30.0.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0034</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость java-1.8.0-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в java-1.8.0-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-1-8-0-openjdk-cve-2026-21933-7.3/</description>
               <solution>Установить обновление для пакета(ов) java-1.8.0-openjdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-1-8-0-openjdk-cve-2026-21933-7.3/" type="self" id="ROS-20260216-73-0034" title="ROS-20260216-73-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21933" type="cve" id="CVE-2026-21933" title="CVE-2026-21933" />
			<reference href="https://bdu.fstec.ru/vul/2026-00694" type="self" id="BDU:2026-00694" title="BDU:2026-00694" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-1.8.0-openjdk" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-1:1.8.0.482.b03-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-demo" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-demo-1:1.8.0.482.b03-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-devel" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-devel-1:1.8.0.482.b03-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-headless" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-headless-1:1.8.0.482.b03-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-openjfx" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-openjfx-1:1.8.0.482.b03-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-openjfx-devel" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-openjfx-devel-1:1.8.0.482.b03-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-src" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-src-1:1.8.0.482.b03-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-javadoc" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="noarch" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-javadoc-1:1.8.0.482.b03-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0035</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость java-21-openjdk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-21-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-21-openjdk-cve-2026-21932-7.3/</description>
               <solution>Установить обновление для пакета(ов) java-21-openjdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-21-openjdk-cve-2026-21932-7.3/" type="self" id="ROS-20260216-73-0035" title="ROS-20260216-73-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21932" type="cve" id="CVE-2026-21932" title="CVE-2026-21932" />
			<reference href="https://bdu.fstec.ru/vul/2026-00681" type="self" id="BDU:2026-00681" title="BDU:2026-00681" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-21-openjdk" epoch="1" version="21.0.10.0.7" release="1.el7" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.el7.src.rpm">
					<filename>java-21-openjdk-1:21.0.10.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-demo" epoch="1" version="21.0.10.0.7" release="1.el7" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.el7.src.rpm">
					<filename>java-21-openjdk-demo-1:21.0.10.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-devel" epoch="1" version="21.0.10.0.7" release="1.el7" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.el7.src.rpm">
					<filename>java-21-openjdk-devel-1:21.0.10.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-headless" epoch="1" version="21.0.10.0.7" release="1.el7" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.el7.src.rpm">
					<filename>java-21-openjdk-headless-1:21.0.10.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-javadoc" epoch="1" version="21.0.10.0.7" release="1.el7" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.el7.src.rpm">
					<filename>java-21-openjdk-javadoc-1:21.0.10.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-jmods" epoch="1" version="21.0.10.0.7" release="1.el7" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.el7.src.rpm">
					<filename>java-21-openjdk-jmods-1:21.0.10.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-src" epoch="1" version="21.0.10.0.7" release="1.el7" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.el7.src.rpm">
					<filename>java-21-openjdk-src-1:21.0.10.0.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0036</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость java-17-openjdk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-17-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-17-openjdk-cve-2026-21932-7.3/</description>
               <solution>Установить обновление для пакета(ов) java-17-openjdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-17-openjdk-cve-2026-21932-7.3/" type="self" id="ROS-20260216-73-0036" title="ROS-20260216-73-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21932" type="cve" id="CVE-2026-21932" title="CVE-2026-21932" />
			<reference href="https://bdu.fstec.ru/vul/2026-00681" type="self" id="BDU:2026-00681" title="BDU:2026-00681" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-17-openjdk" epoch="1" version="17.0.18.0.8" release="1.el7" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.el7.src.rpm">
					<filename>java-17-openjdk-1:17.0.18.0.8-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-demo" epoch="1" version="17.0.18.0.8" release="1.el7" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.el7.src.rpm">
					<filename>java-17-openjdk-demo-1:17.0.18.0.8-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-devel" epoch="1" version="17.0.18.0.8" release="1.el7" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.el7.src.rpm">
					<filename>java-17-openjdk-devel-1:17.0.18.0.8-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-headless" epoch="1" version="17.0.18.0.8" release="1.el7" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.el7.src.rpm">
					<filename>java-17-openjdk-headless-1:17.0.18.0.8-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-javadoc" epoch="1" version="17.0.18.0.8" release="1.el7" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.el7.src.rpm">
					<filename>java-17-openjdk-javadoc-1:17.0.18.0.8-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-jmods" epoch="1" version="17.0.18.0.8" release="1.el7" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.el7.src.rpm">
					<filename>java-17-openjdk-jmods-1:17.0.18.0.8-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-src" epoch="1" version="17.0.18.0.8" release="1.el7" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.el7.src.rpm">
					<filename>java-17-openjdk-src-1:17.0.18.0.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0037</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость java-11-openjdk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-11-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-11-openjdk-cve-2026-21932-7.3/</description>
               <solution>Установить обновление для пакета(ов) java-11-openjdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-11-openjdk-cve-2026-21932-7.3/" type="self" id="ROS-20260216-73-0037" title="ROS-20260216-73-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21932" type="cve" id="CVE-2026-21932" title="CVE-2026-21932" />
			<reference href="https://bdu.fstec.ru/vul/2026-00681" type="self" id="BDU:2026-00681" title="BDU:2026-00681" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-11-openjdk" epoch="1" version="11.0.30.0.7" release="1.el7" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.el7.src.rpm">
					<filename>java-11-openjdk-1:11.0.30.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-demo" epoch="1" version="11.0.30.0.7" release="1.el7" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.el7.src.rpm">
					<filename>java-11-openjdk-demo-1:11.0.30.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-devel" epoch="1" version="11.0.30.0.7" release="1.el7" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.el7.src.rpm">
					<filename>java-11-openjdk-devel-1:11.0.30.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-headless" epoch="1" version="11.0.30.0.7" release="1.el7" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.el7.src.rpm">
					<filename>java-11-openjdk-headless-1:11.0.30.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-javadoc" epoch="1" version="11.0.30.0.7" release="1.el7" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.el7.src.rpm">
					<filename>java-11-openjdk-javadoc-1:11.0.30.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-jmods" epoch="1" version="11.0.30.0.7" release="1.el7" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.el7.src.rpm">
					<filename>java-11-openjdk-jmods-1:11.0.30.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-src" epoch="1" version="11.0.30.0.7" release="1.el7" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.el7.src.rpm">
					<filename>java-11-openjdk-src-1:11.0.30.0.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0038</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость java-1.8.0-openjdk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-1.8.0-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-1-8-0-openjdk-cve-2026-21932-7.3/</description>
               <solution>Установить обновление для пакета(ов) java-1.8.0-openjdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-1-8-0-openjdk-cve-2026-21932-7.3/" type="self" id="ROS-20260216-73-0038" title="ROS-20260216-73-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21932" type="cve" id="CVE-2026-21932" title="CVE-2026-21932" />
			<reference href="https://bdu.fstec.ru/vul/2026-00681" type="self" id="BDU:2026-00681" title="BDU:2026-00681" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-1.8.0-openjdk" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-1:1.8.0.482.b03-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-demo" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-demo-1:1.8.0.482.b03-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-devel" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-devel-1:1.8.0.482.b03-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-headless" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-headless-1:1.8.0.482.b03-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-openjfx" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-openjfx-1:1.8.0.482.b03-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-openjfx-devel" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-openjfx-devel-1:1.8.0.482.b03-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-src" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-src-1:1.8.0.482.b03-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-javadoc" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="noarch" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-javadoc-1:1.8.0.482.b03-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0039</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость java-21-openjdk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-21-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-21-openjdk-cve-2026-21945-7.3/</description>
               <solution>Установить обновление для пакета(ов) java-21-openjdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-21-openjdk-cve-2026-21945-7.3/" type="self" id="ROS-20260216-73-0039" title="ROS-20260216-73-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21945" type="cve" id="CVE-2026-21945" title="CVE-2026-21945" />
			<reference href="https://bdu.fstec.ru/vul/2026-00680" type="self" id="BDU:2026-00680" title="BDU:2026-00680" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-21-openjdk" epoch="1" version="21.0.10.0.7" release="1.el7" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.el7.src.rpm">
					<filename>java-21-openjdk-1:21.0.10.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-demo" epoch="1" version="21.0.10.0.7" release="1.el7" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.el7.src.rpm">
					<filename>java-21-openjdk-demo-1:21.0.10.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-devel" epoch="1" version="21.0.10.0.7" release="1.el7" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.el7.src.rpm">
					<filename>java-21-openjdk-devel-1:21.0.10.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-headless" epoch="1" version="21.0.10.0.7" release="1.el7" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.el7.src.rpm">
					<filename>java-21-openjdk-headless-1:21.0.10.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-javadoc" epoch="1" version="21.0.10.0.7" release="1.el7" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.el7.src.rpm">
					<filename>java-21-openjdk-javadoc-1:21.0.10.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-jmods" epoch="1" version="21.0.10.0.7" release="1.el7" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.el7.src.rpm">
					<filename>java-21-openjdk-jmods-1:21.0.10.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-src" epoch="1" version="21.0.10.0.7" release="1.el7" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.el7.src.rpm">
					<filename>java-21-openjdk-src-1:21.0.10.0.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0040</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость java-17-openjdk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-17-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-17-openjdk-cve-2026-21945-7.3/</description>
               <solution>Установить обновление для пакета(ов) java-17-openjdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-17-openjdk-cve-2026-21945-7.3/" type="self" id="ROS-20260216-73-0040" title="ROS-20260216-73-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21945" type="cve" id="CVE-2026-21945" title="CVE-2026-21945" />
			<reference href="https://bdu.fstec.ru/vul/2026-00680" type="self" id="BDU:2026-00680" title="BDU:2026-00680" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-17-openjdk" epoch="1" version="17.0.18.0.8" release="1.el7" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.el7.src.rpm">
					<filename>java-17-openjdk-1:17.0.18.0.8-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-demo" epoch="1" version="17.0.18.0.8" release="1.el7" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.el7.src.rpm">
					<filename>java-17-openjdk-demo-1:17.0.18.0.8-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-devel" epoch="1" version="17.0.18.0.8" release="1.el7" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.el7.src.rpm">
					<filename>java-17-openjdk-devel-1:17.0.18.0.8-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-headless" epoch="1" version="17.0.18.0.8" release="1.el7" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.el7.src.rpm">
					<filename>java-17-openjdk-headless-1:17.0.18.0.8-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-javadoc" epoch="1" version="17.0.18.0.8" release="1.el7" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.el7.src.rpm">
					<filename>java-17-openjdk-javadoc-1:17.0.18.0.8-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-jmods" epoch="1" version="17.0.18.0.8" release="1.el7" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.el7.src.rpm">
					<filename>java-17-openjdk-jmods-1:17.0.18.0.8-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-src" epoch="1" version="17.0.18.0.8" release="1.el7" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.el7.src.rpm">
					<filename>java-17-openjdk-src-1:17.0.18.0.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0041</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость java-11-openjdk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-11-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-11-openjdk-cve-2026-21945-7.3/</description>
               <solution>Установить обновление для пакета(ов) java-11-openjdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-11-openjdk-cve-2026-21945-7.3/" type="self" id="ROS-20260216-73-0041" title="ROS-20260216-73-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21945" type="cve" id="CVE-2026-21945" title="CVE-2026-21945" />
			<reference href="https://bdu.fstec.ru/vul/2026-00680" type="self" id="BDU:2026-00680" title="BDU:2026-00680" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-11-openjdk" epoch="1" version="11.0.30.0.7" release="1.el7" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.el7.src.rpm">
					<filename>java-11-openjdk-1:11.0.30.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-demo" epoch="1" version="11.0.30.0.7" release="1.el7" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.el7.src.rpm">
					<filename>java-11-openjdk-demo-1:11.0.30.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-devel" epoch="1" version="11.0.30.0.7" release="1.el7" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.el7.src.rpm">
					<filename>java-11-openjdk-devel-1:11.0.30.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-headless" epoch="1" version="11.0.30.0.7" release="1.el7" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.el7.src.rpm">
					<filename>java-11-openjdk-headless-1:11.0.30.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-javadoc" epoch="1" version="11.0.30.0.7" release="1.el7" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.el7.src.rpm">
					<filename>java-11-openjdk-javadoc-1:11.0.30.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-jmods" epoch="1" version="11.0.30.0.7" release="1.el7" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.el7.src.rpm">
					<filename>java-11-openjdk-jmods-1:11.0.30.0.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-src" epoch="1" version="11.0.30.0.7" release="1.el7" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.el7.src.rpm">
					<filename>java-11-openjdk-src-1:11.0.30.0.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0042</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость java-1.8.0-openjdk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-1.8.0-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-1-8-0-openjdk-cve-2026-21945-7.3/</description>
               <solution>Установить обновление для пакета(ов) java-1.8.0-openjdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-java-1-8-0-openjdk-cve-2026-21945-7.3/" type="self" id="ROS-20260216-73-0042" title="ROS-20260216-73-0042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21945" type="cve" id="CVE-2026-21945" title="CVE-2026-21945" />
			<reference href="https://bdu.fstec.ru/vul/2026-00680" type="self" id="BDU:2026-00680" title="BDU:2026-00680" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="java-1.8.0-openjdk" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-1:1.8.0.482.b03-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-demo" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-demo-1:1.8.0.482.b03-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-devel" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-devel-1:1.8.0.482.b03-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-headless" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-headless-1:1.8.0.482.b03-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-openjfx" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-openjfx-1:1.8.0.482.b03-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-openjfx-devel" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-openjfx-devel-1:1.8.0.482.b03-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-src" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-src-1:1.8.0.482.b03-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-javadoc" epoch="1" version="1.8.0.482.b03" release="1.el7" arch="noarch" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7.src.rpm">
					<filename>java-1.8.0-openjdk-javadoc-1:1.8.0.482.b03-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0043</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость libsodium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libsodium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libsodium-cve-2025-69277-7.3/</description>
               <solution>Установить обновление для пакета(ов) libsodium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libsodium-cve-2025-69277-7.3/" type="self" id="ROS-20260216-73-0043" title="ROS-20260216-73-0043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69277" type="cve" id="CVE-2025-69277" title="CVE-2025-69277" />
			<reference href="https://bdu.fstec.ru/vul/2026-02383" type="self" id="BDU:2026-02383" title="BDU:2026-02383" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libsodium" epoch="0" version="1.0.18" release="4.el7" arch="x86_64" src="libsodium-1.0.18-4.el7.src.rpm">
					<filename>libsodium-0:1.0.18-4.el7.x86_64.rpm</filename>
				</package>
				<package name="libsodium-devel" epoch="0" version="1.0.18" release="4.el7" arch="x86_64" src="libsodium-1.0.18-4.el7.src.rpm">
					<filename>libsodium-devel-0:1.0.18-4.el7.x86_64.rpm</filename>
				</package>
				<package name="libsodium-static" epoch="0" version="1.0.18" release="4.el7" arch="x86_64" src="libsodium-1.0.18-4.el7.src.rpm">
					<filename>libsodium-static-0:1.0.18-4.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0044</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость avahi </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в avahi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-avahi-cve-2025-68276-7.3/</description>
               <solution>Установить обновление для пакета(ов) avahi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-avahi-cve-2025-68276-7.3/" type="self" id="ROS-20260216-73-0044" title="ROS-20260216-73-0044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68276" type="cve" id="CVE-2025-68276" title="CVE-2025-68276" />
			<reference href="https://bdu.fstec.ru/vul/2026-03597" type="self" id="BDU:2026-03597" title="BDU:2026-03597" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="avahi" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-autoipd" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-autoipd-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-howl" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-compat-howl-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-howl-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-compat-howl-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-compat-libdns_sd-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-compat-libdns_sd-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-dnsconfd" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-dnsconfd-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-glib" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-glib-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-glib-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-glib-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-gobject" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-gobject-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-gobject-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-gobject-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-libs" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-libs-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt3" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-qt3-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt3-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-qt3-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt4" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-qt4-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt4-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-qt4-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt5" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-qt5-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt5-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-qt5-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-sharp" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-sharp-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-tools" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-tools-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-ui-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-ui-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-gtk3" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-ui-gtk3-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-ui-sharp-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-ui-sharp-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-tools" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-ui-tools-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-avahi" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>python3-avahi-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0045</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость opensearch </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в opensearch</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opensearch-cve-2025-9624-7.3/</description>
               <solution>Установить обновление для пакета(ов) opensearch
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opensearch-cve-2025-9624-7.3/" type="self" id="ROS-20260216-73-0045" title="ROS-20260216-73-0045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9624" type="cve" id="CVE-2025-9624" title="CVE-2025-9624" />
			<reference href="https://bdu.fstec.ru/vul/2026-03614" type="self" id="BDU:2026-03614" title="BDU:2026-03614" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="opensearch" epoch="0" version="2.19.2" release="5.el7" arch="x86_64" src="opensearch-2.19.2-5.el7.src.rpm">
					<filename>opensearch-0:2.19.2-5.el7.x86_64.rpm</filename>
				</package>
				<package name="opensearch-ingest-attachment-plugin" epoch="0" version="2.19.2" release="5.el7" arch="x86_64" src="opensearch-2.19.2-5.el7.src.rpm">
					<filename>opensearch-ingest-attachment-plugin-0:2.19.2-5.el7.x86_64.rpm</filename>
				</package>
				<package name="opensearch-mapper-annotated-text-plugin" epoch="0" version="2.19.2" release="5.el7" arch="x86_64" src="opensearch-2.19.2-5.el7.src.rpm">
					<filename>opensearch-mapper-annotated-text-plugin-0:2.19.2-5.el7.x86_64.rpm</filename>
				</package>
				<package name="opensearch-mapper-murmur3-plugin" epoch="0" version="2.19.2" release="5.el7" arch="x86_64" src="opensearch-2.19.2-5.el7.src.rpm">
					<filename>opensearch-mapper-murmur3-plugin-0:2.19.2-5.el7.x86_64.rpm</filename>
				</package>
				<package name="opensearch-mapper-size-plugin" epoch="0" version="2.19.2" release="5.el7" arch="x86_64" src="opensearch-2.19.2-5.el7.src.rpm">
					<filename>opensearch-mapper-size-plugin-0:2.19.2-5.el7.x86_64.rpm</filename>
				</package>
				<package name="opensearch-repository-hdfs-plugin" epoch="0" version="2.19.2" release="5.el7" arch="x86_64" src="opensearch-2.19.2-5.el7.src.rpm">
					<filename>opensearch-repository-hdfs-plugin-0:2.19.2-5.el7.x86_64.rpm</filename>
				</package>
				<package name="opensearch-repository-s3-plugin" epoch="0" version="2.19.2" release="5.el7" arch="x86_64" src="opensearch-2.19.2-5.el7.src.rpm">
					<filename>opensearch-repository-s3-plugin-0:2.19.2-5.el7.x86_64.rpm</filename>
				</package>
				<package name="opensearch-store-mb-plugin" epoch="0" version="2.19.2" release="5.el7" arch="x86_64" src="opensearch-2.19.2-5.el7.src.rpm">
					<filename>opensearch-store-mb-plugin-0:2.19.2-5.el7.x86_64.rpm</filename>
				</package>
				<package name="opensearch-transport-nio-plugin" epoch="0" version="2.19.2" release="5.el7" arch="x86_64" src="opensearch-2.19.2-5.el7.src.rpm">
					<filename>opensearch-transport-nio-plugin-0:2.19.2-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0046</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость avahi </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в avahi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-avahi-cve-2023-38473-7.3/</description>
               <solution>Установить обновление для пакета(ов) avahi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-avahi-cve-2023-38473-7.3/" type="self" id="ROS-20260216-73-0046" title="ROS-20260216-73-0046" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38473" type="cve" id="CVE-2023-38473" title="CVE-2023-38473" />
			<reference href="https://bdu.fstec.ru/vul/2025-03952" type="self" id="BDU:2025-03952" title="BDU:2025-03952" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="avahi" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-autoipd" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-autoipd-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-howl" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-compat-howl-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-howl-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-compat-howl-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-compat-libdns_sd-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-compat-libdns_sd-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-dnsconfd" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-dnsconfd-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-glib" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-glib-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-glib-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-glib-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-gobject" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-gobject-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-gobject-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-gobject-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-libs" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-libs-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt3" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-qt3-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt3-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-qt3-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt4" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-qt4-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt4-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-qt4-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt5" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-qt5-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt5-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-qt5-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-sharp" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-sharp-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-tools" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-tools-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-ui-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-ui-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-gtk3" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-ui-gtk3-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-ui-sharp-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-ui-sharp-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-tools" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-ui-tools-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-avahi" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>python3-avahi-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0047</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость avahi </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в avahi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-avahi-cve-2021-3468-7.3/</description>
               <solution>Установить обновление для пакета(ов) avahi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-avahi-cve-2021-3468-7.3/" type="self" id="ROS-20260216-73-0047" title="ROS-20260216-73-0047" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468" type="cve" id="CVE-2021-3468" title="CVE-2021-3468" />
			<reference href="https://bdu.fstec.ru/vul/2022-05709" type="self" id="BDU:2022-05709" title="BDU:2022-05709" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="avahi" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-autoipd" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-autoipd-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-howl" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-compat-howl-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-howl-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-compat-howl-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-compat-libdns_sd-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-compat-libdns_sd-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-dnsconfd" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-dnsconfd-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-glib" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-glib-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-glib-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-glib-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-gobject" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-gobject-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-gobject-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-gobject-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-libs" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-libs-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt3" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-qt3-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt3-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-qt3-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt4" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-qt4-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt4-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-qt4-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt5" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-qt5-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt5-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-qt5-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-sharp" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-sharp-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-tools" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-tools-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-ui-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-ui-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-gtk3" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-ui-gtk3-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-ui-sharp-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp-devel" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-ui-sharp-devel-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-tools" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>avahi-ui-tools-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-avahi" epoch="0" version="0.8" release="21.el7" arch="x86_64" src="avahi-0.8-21.el7.src.rpm">
					<filename>python3-avahi-0:0.8-21.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-73-0048</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость python-PyPDF2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-PyPDF2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pypdf2-cve-2026-24688-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-PyPDF2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pypdf2-cve-2026-24688-7.3/" type="self" id="ROS-20260216-73-0048" title="ROS-20260216-73-0048" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24688" type="cve" id="CVE-2026-24688" title="CVE-2026-24688" />
			<reference href="https://bdu.fstec.ru/vul/2026-03618" type="self" id="BDU:2026-03618" title="BDU:2026-03618" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python2-PyPDF2" epoch="0" version="1.26.0" release="2.el7" arch="noarch" src="python-PyPDF2-1.26.0-2.el7.src.rpm">
					<filename>python2-PyPDF2-0:1.26.0-2.el7.noarch.rpm</filename>
				</package>
				<package name="python3-PyPDF2" epoch="0" version="1.26.0" release="2.el7" arch="noarch" src="python-PyPDF2-1.26.0-2.el7.src.rpm">
					<filename>python3-PyPDF2-0:1.26.0-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-73-0001</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38153-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38153-7.3/" type="self" id="ROS-20260220-73-0001" title="ROS-20260220-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38153" type="cve" id="CVE-2025-38153" title="CVE-2025-38153" />
			<reference href="https://bdu.fstec.ru/vul/2025-09614" type="self" id="BDU:2025-09614" title="BDU:2025-09614" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-73-0002</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38154-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38154-7.3/" type="self" id="ROS-20260220-73-0002" title="ROS-20260220-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38154" type="cve" id="CVE-2025-38154" title="CVE-2025-38154" />
			<reference href="https://bdu.fstec.ru/vul/2025-09918" type="self" id="BDU:2025-09918" title="BDU:2025-09918" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-73-0003</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38157-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38157-7.3/" type="self" id="ROS-20260220-73-0003" title="ROS-20260220-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38157" type="cve" id="CVE-2025-38157" title="CVE-2025-38157" />
			<reference href="https://bdu.fstec.ru/vul/2025-10132" type="self" id="BDU:2025-10132" title="BDU:2025-10132" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-73-0004</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38158-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38158-7.3/" type="self" id="ROS-20260220-73-0004" title="ROS-20260220-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38158" type="cve" id="CVE-2025-38158" title="CVE-2025-38158" />
			<reference href="https://bdu.fstec.ru/vul/2025-10125" type="self" id="BDU:2025-10125" title="BDU:2025-10125" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-73-0005</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38159-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38159-7.3/" type="self" id="ROS-20260220-73-0005" title="ROS-20260220-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38159" type="cve" id="CVE-2025-38159" title="CVE-2025-38159" />
			<reference href="https://bdu.fstec.ru/vul/2025-10128" type="self" id="BDU:2025-10128" title="BDU:2025-10128" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-73-0006</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38160-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38160-7.3/" type="self" id="ROS-20260220-73-0006" title="ROS-20260220-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38160" type="cve" id="CVE-2025-38160" title="CVE-2025-38160" />
			<reference href="https://bdu.fstec.ru/vul/2025-10131" type="self" id="BDU:2025-10131" title="BDU:2025-10131" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-73-0007</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38161-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38161-7.3/" type="self" id="ROS-20260220-73-0007" title="ROS-20260220-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38161" type="cve" id="CVE-2025-38161" title="CVE-2025-38161" />
			<reference href="https://bdu.fstec.ru/vul/2025-09610" type="self" id="BDU:2025-09610" title="BDU:2025-09610" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-73-0008</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38163-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38163-7.3/" type="self" id="ROS-20260220-73-0008" title="ROS-20260220-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38163" type="cve" id="CVE-2025-38163" title="CVE-2025-38163" />
			<reference href="https://bdu.fstec.ru/vul/2025-09616" type="self" id="BDU:2025-09616" title="BDU:2025-09616" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-73-0009</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38165-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38165-7.3/" type="self" id="ROS-20260220-73-0009" title="ROS-20260220-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38165" type="cve" id="CVE-2025-38165" title="CVE-2025-38165" />
			<reference href="https://bdu.fstec.ru/vul/2025-10126" type="self" id="BDU:2025-10126" title="BDU:2025-10126" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-73-0010</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38166-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38166-7.3/" type="self" id="ROS-20260220-73-0010" title="ROS-20260220-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38166" type="cve" id="CVE-2025-38166" title="CVE-2025-38166" />
			<reference href="https://bdu.fstec.ru/vul/2025-14099" type="self" id="BDU:2025-14099" title="BDU:2025-14099" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-73-0011</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38167-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38167-7.3/" type="self" id="ROS-20260220-73-0011" title="ROS-20260220-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38167" type="cve" id="CVE-2025-38167" title="CVE-2025-38167" />
			<reference href="https://bdu.fstec.ru/vul/2025-14098" type="self" id="BDU:2025-14098" title="BDU:2025-14098" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-73-0012</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38170-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38170-7.3/" type="self" id="ROS-20260220-73-0012" title="ROS-20260220-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38170" type="cve" id="CVE-2025-38170" title="CVE-2025-38170" />
			<reference href="https://bdu.fstec.ru/vul/2025-14100" type="self" id="BDU:2025-14100" title="BDU:2025-14100" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-73-0013</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38173-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38173-7.3/" type="self" id="ROS-20260220-73-0013" title="ROS-20260220-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38173" type="cve" id="CVE-2025-38173" title="CVE-2025-38173" />
			<reference href="https://bdu.fstec.ru/vul/2025-09835" type="self" id="BDU:2025-09835" title="BDU:2025-09835" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-73-0014</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38174-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38174-7.3/" type="self" id="ROS-20260220-73-0014" title="ROS-20260220-73-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38174" type="cve" id="CVE-2025-38174" title="CVE-2025-38174" />
			<reference href="https://bdu.fstec.ru/vul/2025-08271" type="self" id="BDU:2025-08271" title="BDU:2025-08271" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-73-0015</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38177-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38177-7.3/" type="self" id="ROS-20260220-73-0015" title="ROS-20260220-73-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38177" type="cve" id="CVE-2025-38177" title="CVE-2025-38177" />
			<reference href="https://bdu.fstec.ru/vul/2025-12111" type="self" id="BDU:2025-12111" title="BDU:2025-12111" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-73-0016</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38180-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38180-7.3/" type="self" id="ROS-20260220-73-0016" title="ROS-20260220-73-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38180" type="cve" id="CVE-2025-38180" title="CVE-2025-38180" />
			<reference href="https://bdu.fstec.ru/vul/2025-08806" type="self" id="BDU:2025-08806" title="BDU:2025-08806" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-73-0017</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38181-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38181-7.3/" type="self" id="ROS-20260220-73-0017" title="ROS-20260220-73-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38181" type="cve" id="CVE-2025-38181" title="CVE-2025-38181" />
			<reference href="https://bdu.fstec.ru/vul/2025-09674" type="self" id="BDU:2025-09674" title="BDU:2025-09674" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-73-0018</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38183-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38183-7.3/" type="self" id="ROS-20260220-73-0018" title="ROS-20260220-73-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38183" type="cve" id="CVE-2025-38183" title="CVE-2025-38183" />
			<reference href="https://bdu.fstec.ru/vul/2025-09665" type="self" id="BDU:2025-09665" title="BDU:2025-09665" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-73-0019</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38184-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38184-7.3/" type="self" id="ROS-20260220-73-0019" title="ROS-20260220-73-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38184" type="cve" id="CVE-2025-38184" title="CVE-2025-38184" />
			<reference href="https://bdu.fstec.ru/vul/2025-09660" type="self" id="BDU:2025-09660" title="BDU:2025-09660" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-73-0020</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38185-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38185-7.3/" type="self" id="ROS-20260220-73-0020" title="ROS-20260220-73-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38185" type="cve" id="CVE-2025-38185" title="CVE-2025-38185" />
			<reference href="https://bdu.fstec.ru/vul/2025-09621" type="self" id="BDU:2025-09621" title="BDU:2025-09621" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-73-0021</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38190-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38190-7.3/" type="self" id="ROS-20260220-73-0021" title="ROS-20260220-73-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38190" type="cve" id="CVE-2025-38190" title="CVE-2025-38190" />
			<reference href="https://bdu.fstec.ru/vul/2025-09624" type="self" id="BDU:2025-09624" title="BDU:2025-09624" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-73-0022</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38191-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38191-7.3/" type="self" id="ROS-20260220-73-0022" title="ROS-20260220-73-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38191" type="cve" id="CVE-2025-38191" title="CVE-2025-38191" />
			<reference href="https://bdu.fstec.ru/vul/2025-09626" type="self" id="BDU:2025-09626" title="BDU:2025-09626" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-73-0023</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38193-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38193-7.3/" type="self" id="ROS-20260220-73-0023" title="ROS-20260220-73-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38193" type="cve" id="CVE-2025-38193" title="CVE-2025-38193" />
			<reference href="https://bdu.fstec.ru/vul/2025-09617" type="self" id="BDU:2025-09617" title="BDU:2025-09617" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-73-0024</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38194-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38194-7.3/" type="self" id="ROS-20260220-73-0024" title="ROS-20260220-73-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38194" type="cve" id="CVE-2025-38194" title="CVE-2025-38194" />
			<reference href="https://bdu.fstec.ru/vul/2025-13475" type="self" id="BDU:2025-13475" title="BDU:2025-13475" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-73-0025</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38197-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38197-7.3/" type="self" id="ROS-20260220-73-0025" title="ROS-20260220-73-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38197" type="cve" id="CVE-2025-38197" title="CVE-2025-38197" />
			<reference href="https://bdu.fstec.ru/vul/2025-10763" type="self" id="BDU:2025-10763" title="BDU:2025-10763" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-73-0026</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38198-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38198-7.3/" type="self" id="ROS-20260220-73-0026" title="ROS-20260220-73-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38198" type="cve" id="CVE-2025-38198" title="CVE-2025-38198" />
			<reference href="https://bdu.fstec.ru/vul/2025-10766" type="self" id="BDU:2025-10766" title="BDU:2025-10766" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-73-0027</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38200-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38200-7.3/" type="self" id="ROS-20260220-73-0027" title="ROS-20260220-73-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38200" type="cve" id="CVE-2025-38200" title="CVE-2025-38200" />
			<reference href="https://bdu.fstec.ru/vul/2025-09174" type="self" id="BDU:2025-09174" title="BDU:2025-09174" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-73-0028</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38202-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38202-7.3/" type="self" id="ROS-20260220-73-0028" title="ROS-20260220-73-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38202" type="cve" id="CVE-2025-38202" title="CVE-2025-38202" />
			<reference href="https://bdu.fstec.ru/vul/2025-10764" type="self" id="BDU:2025-10764" title="BDU:2025-10764" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-73-0029</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38211-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38211-7.3/" type="self" id="ROS-20260220-73-0029" title="ROS-20260220-73-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38211" type="cve" id="CVE-2025-38211" title="CVE-2025-38211" />
			<reference href="https://bdu.fstec.ru/vul/2025-15216" type="self" id="BDU:2025-15216" title="BDU:2025-15216" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-73-0030</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38212-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38212-7.3/" type="self" id="ROS-20260220-73-0030" title="ROS-20260220-73-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38212" type="cve" id="CVE-2025-38212" title="CVE-2025-38212" />
			<reference href="https://bdu.fstec.ru/vul/2025-08999" type="self" id="BDU:2025-08999" title="BDU:2025-08999" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-73-0031</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38213-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38213-7.3/" type="self" id="ROS-20260220-73-0031" title="ROS-20260220-73-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38213" type="cve" id="CVE-2025-38213" title="CVE-2025-38213" />
			<reference href="https://bdu.fstec.ru/vul/2025-15460" type="self" id="BDU:2025-15460" title="BDU:2025-15460" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-73-0032</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38214-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38214-7.3/" type="self" id="ROS-20260220-73-0032" title="ROS-20260220-73-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38214" type="cve" id="CVE-2025-38214" title="CVE-2025-38214" />
			<reference href="https://bdu.fstec.ru/vul/2025-13564" type="self" id="BDU:2025-13564" title="BDU:2025-13564" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-73-0033</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38215-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38215-7.3/" type="self" id="ROS-20260220-73-0033" title="ROS-20260220-73-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38215" type="cve" id="CVE-2025-38215" title="CVE-2025-38215" />
			<reference href="https://bdu.fstec.ru/vul/2025-13563" type="self" id="BDU:2025-13563" title="BDU:2025-13563" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-73-0034</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38218-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38218-7.3/" type="self" id="ROS-20260220-73-0034" title="ROS-20260220-73-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38218" type="cve" id="CVE-2025-38218" title="CVE-2025-38218" />
			<reference href="https://bdu.fstec.ru/vul/2025-13477" type="self" id="BDU:2025-13477" title="BDU:2025-13477" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-73-0035</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38219-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38219-7.3/" type="self" id="ROS-20260220-73-0035" title="ROS-20260220-73-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38219" type="cve" id="CVE-2025-38219" title="CVE-2025-38219" />
			<reference href="https://bdu.fstec.ru/vul/2025-13482" type="self" id="BDU:2025-13482" title="BDU:2025-13482" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-73-0036</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38222-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38222-7.3/" type="self" id="ROS-20260220-73-0036" title="ROS-20260220-73-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38222" type="cve" id="CVE-2025-38222" title="CVE-2025-38222" />
			<reference href="https://bdu.fstec.ru/vul/2025-10768" type="self" id="BDU:2025-10768" title="BDU:2025-10768" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-73-0001</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость krb5 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в krb5</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-krb5-cve-2025-24528-7.3/</description>
               <solution>Установить обновление для пакета(ов) krb5
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-krb5-cve-2025-24528-7.3/" type="self" id="ROS-20260224-73-0001" title="ROS-20260224-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24528" type="cve" id="CVE-2025-24528" title="CVE-2025-24528" />
			<reference href="https://bdu.fstec.ru/vul/2025-12302" type="self" id="BDU:2025-12302" title="BDU:2025-12302" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="krb5-devel" epoch="0" version="1.20.1" release="5.el7" arch="x86_64" src="krb5-1.20.1-5.el7.src.rpm">
					<filename>krb5-devel-0:1.20.1-5.el7.x86_64.rpm</filename>
				</package>
				<package name="krb5-libs" epoch="0" version="1.20.1" release="5.el7" arch="x86_64" src="krb5-1.20.1-5.el7.src.rpm">
					<filename>krb5-libs-0:1.20.1-5.el7.x86_64.rpm</filename>
				</package>
				<package name="krb5-pkinit" epoch="0" version="1.20.1" release="5.el7" arch="x86_64" src="krb5-1.20.1-5.el7.src.rpm">
					<filename>krb5-pkinit-0:1.20.1-5.el7.x86_64.rpm</filename>
				</package>
				<package name="krb5-server" epoch="0" version="1.20.1" release="5.el7" arch="x86_64" src="krb5-1.20.1-5.el7.src.rpm">
					<filename>krb5-server-0:1.20.1-5.el7.x86_64.rpm</filename>
				</package>
				<package name="krb5-server-ldap" epoch="0" version="1.20.1" release="5.el7" arch="x86_64" src="krb5-1.20.1-5.el7.src.rpm">
					<filename>krb5-server-ldap-0:1.20.1-5.el7.x86_64.rpm</filename>
				</package>
				<package name="krb5-tests" epoch="0" version="1.20.1" release="5.el7" arch="x86_64" src="krb5-1.20.1-5.el7.src.rpm">
					<filename>krb5-tests-0:1.20.1-5.el7.x86_64.rpm</filename>
				</package>
				<package name="krb5-workstation" epoch="0" version="1.20.1" release="5.el7" arch="x86_64" src="krb5-1.20.1-5.el7.src.rpm">
					<filename>krb5-workstation-0:1.20.1-5.el7.x86_64.rpm</filename>
				</package>
				<package name="libkadm5" epoch="0" version="1.20.1" release="5.el7" arch="x86_64" src="krb5-1.20.1-5.el7.src.rpm">
					<filename>libkadm5-0:1.20.1-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-73-0002</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость angie </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в angie</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-angie-cve-2025-23419-7.3/</description>
               <solution>Установить обновление для пакета(ов) angie
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-angie-cve-2025-23419-7.3/" type="self" id="ROS-20260224-73-0002" title="ROS-20260224-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23419" type="cve" id="CVE-2025-23419" title="CVE-2025-23419" />
			<reference href="https://bdu.fstec.ru/vul/2025-03281" type="self" id="BDU:2025-03281" title="BDU:2025-03281" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="angie" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-auth-jwt" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-auth-jwt-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-auth-ldap" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-auth-ldap-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-auth-pam" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-auth-pam-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-auth-spnego" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-auth-spnego-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-brotli" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-brotli-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-cache-purge" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-cache-purge-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-cgi" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-cgi-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-dav-ext" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-dav-ext-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-dynamic-limit-req" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-dynamic-limit-req-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-echo" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-echo-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-enhanced-memcached" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-enhanced-memcached-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-eval" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-eval-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-geoip2" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-geoip2-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-headers-more" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-headers-more-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-http-auth-radius" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-http-auth-radius-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-image-filter" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-image-filter-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-keyval" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-keyval-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-lua" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-lua-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-modsecurity" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-modsecurity-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-ndk" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-ndk-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-njs" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-njs-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-njs-cli" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-njs-cli-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-opentracing" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-opentracing-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-otel" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-otel-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-perl" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-perl-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-postgres" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-postgres-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-redis2" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-redis2-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-rtmp" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-rtmp-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-set-misc" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-set-misc-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-subs" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-subs-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-testcookie" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-testcookie-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-unbrotli" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-unbrotli-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-upload" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-upload-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-vod" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-vod-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-vts" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-vts-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-wamr" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-wamr-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-wasm" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-wasm-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-wasmtime" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-wasmtime-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-xslt" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-xslt-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-zip" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-zip-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-zstd" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-zstd-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-73-0003</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость angie </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в angie</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-angie-cve-2025-53859-7.3/</description>
               <solution>Установить обновление для пакета(ов) angie
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-angie-cve-2025-53859-7.3/" type="self" id="ROS-20260224-73-0003" title="ROS-20260224-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53859" type="cve" id="CVE-2025-53859" title="CVE-2025-53859" />
			<reference href="https://bdu.fstec.ru/vul/2025-16019" type="self" id="BDU:2025-16019" title="BDU:2025-16019" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="angie" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-auth-jwt" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-auth-jwt-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-auth-ldap" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-auth-ldap-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-auth-pam" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-auth-pam-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-auth-spnego" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-auth-spnego-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-brotli" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-brotli-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-cache-purge" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-cache-purge-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-cgi" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-cgi-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-dav-ext" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-dav-ext-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-dynamic-limit-req" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-dynamic-limit-req-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-echo" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-echo-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-enhanced-memcached" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-enhanced-memcached-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-eval" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-eval-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-geoip2" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-geoip2-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-headers-more" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-headers-more-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-http-auth-radius" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-http-auth-radius-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-image-filter" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-image-filter-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-keyval" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-keyval-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-lua" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-lua-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-modsecurity" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-modsecurity-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-ndk" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-ndk-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-njs" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-njs-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-njs-cli" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-njs-cli-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-opentracing" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-opentracing-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-otel" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-otel-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-perl" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-perl-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-postgres" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-postgres-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-redis2" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-redis2-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-rtmp" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-rtmp-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-set-misc" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-set-misc-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-subs" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-subs-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-testcookie" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-testcookie-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-unbrotli" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-unbrotli-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-upload" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-upload-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-vod" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-vod-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-vts" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-vts-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-wamr" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-wamr-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-wasm" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-wasm-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-wasmtime" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-wasmtime-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-xslt" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-xslt-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-zip" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-zip-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-zstd" epoch="0" version="1.9.0" release="1.el7" arch="x86_64" src="angie-1.9.0-1.el7.src.rpm">
					<filename>angie-module-zstd-0:1.9.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-73-0004</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость gimp </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в gimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2025-14425-7.3/</description>
               <solution>Установить обновление для пакета(ов) gimp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2025-14425-7.3/" type="self" id="ROS-20260224-73-0004" title="ROS-20260224-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14425" type="cve" id="CVE-2025-14425" title="CVE-2025-14425" />
			<reference href="https://bdu.fstec.ru/vul/2026-06438" type="self" id="BDU:2026-06438" title="BDU:2026-06438" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gimp" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-devel-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-devel-tools-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-libs-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-73-0005</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость gimp </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в gimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2025-14422-7.3/</description>
               <solution>Установить обновление для пакета(ов) gimp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2025-14422-7.3/" type="self" id="ROS-20260224-73-0005" title="ROS-20260224-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14422" type="cve" id="CVE-2025-14422" title="CVE-2025-14422" />
			<reference href="https://bdu.fstec.ru/vul/2026-06437" type="self" id="BDU:2026-06437" title="BDU:2026-06437" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gimp" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-devel-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-devel-tools-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-libs-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-73-0006</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость gimp </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в gimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2025-14424-7.3/</description>
               <solution>Установить обновление для пакета(ов) gimp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2025-14424-7.3/" type="self" id="ROS-20260224-73-0006" title="ROS-20260224-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14424" type="cve" id="CVE-2025-14424" title="CVE-2025-14424" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gimp" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-devel-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-devel-tools-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-libs-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-73-0007</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость gimp </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в gimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2025-14423-7.3/</description>
               <solution>Установить обновление для пакета(ов) gimp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2025-14423-7.3/" type="self" id="ROS-20260224-73-0007" title="ROS-20260224-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14423" type="cve" id="CVE-2025-14423" title="CVE-2025-14423" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gimp" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-devel-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-devel-tools-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="2.10.36" release="6.el7" arch="x86_64" src="gimp-2.10.36-6.el7.src.rpm">
					<filename>gimp-libs-2:2.10.36-6.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-73-0008</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость glib2 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в glib2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glib2-cve-2025-14087-7.3/</description>
               <solution>Установить обновление для пакета(ов) glib2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glib2-cve-2025-14087-7.3/" type="self" id="ROS-20260224-73-0008" title="ROS-20260224-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14087" type="cve" id="CVE-2025-14087" title="CVE-2025-14087" />
			<reference href="https://bdu.fstec.ru/vul/2026-05069" type="self" id="BDU:2026-05069" title="BDU:2026-05069" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glib2" epoch="0" version="2.65.3" release="9.el7" arch="x86_64" src="glib2-2.65.3-9.el7.src.rpm">
					<filename>glib2-0:2.65.3-9.el7.x86_64.rpm</filename>
				</package>
				<package name="glib2-devel" epoch="0" version="2.65.3" release="9.el7" arch="x86_64" src="glib2-2.65.3-9.el7.src.rpm">
					<filename>glib2-devel-0:2.65.3-9.el7.x86_64.rpm</filename>
				</package>
				<package name="glib2-fam" epoch="0" version="2.65.3" release="9.el7" arch="x86_64" src="glib2-2.65.3-9.el7.src.rpm">
					<filename>glib2-fam-0:2.65.3-9.el7.x86_64.rpm</filename>
				</package>
				<package name="glib2-static" epoch="0" version="2.65.3" release="9.el7" arch="x86_64" src="glib2-2.65.3-9.el7.src.rpm">
					<filename>glib2-static-0:2.65.3-9.el7.x86_64.rpm</filename>
				</package>
				<package name="glib2-tests" epoch="0" version="2.65.3" release="9.el7" arch="x86_64" src="glib2-2.65.3-9.el7.src.rpm">
					<filename>glib2-tests-0:2.65.3-9.el7.x86_64.rpm</filename>
				</package>
				<package name="glib2-doc" epoch="0" version="2.65.3" release="9.el7" arch="noarch" src="glib2-2.65.3-9.el7.src.rpm">
					<filename>glib2-doc-0:2.65.3-9.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-73-0009</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость apache-commons-text </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в apache-commons-text</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-commons-text-cve-2025-46295-7.3/</description>
               <solution>Установить обновление для пакета(ов) apache-commons-text
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-apache-commons-text-cve-2025-46295-7.3/" type="self" id="ROS-20260224-73-0009" title="ROS-20260224-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46295" type="cve" id="CVE-2025-46295" title="CVE-2025-46295" />
			<reference href="https://bdu.fstec.ru/vul/2025-16425" type="self" id="BDU:2025-16425" title="BDU:2025-16425" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="apache-commons-text" epoch="0" version="1.15.0" release="1.el7" arch="noarch" src="apache-commons-text-1.15.0-1.el7.src.rpm">
					<filename>apache-commons-text-0:1.15.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-73-0010</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость libsndfile </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libsndfile</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libsndfile-cve-2025-56226-7.3/</description>
               <solution>Установить обновление для пакета(ов) libsndfile
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libsndfile-cve-2025-56226-7.3/" type="self" id="ROS-20260224-73-0010" title="ROS-20260224-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-56226" type="cve" id="CVE-2025-56226" title="CVE-2025-56226" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libsndfile" epoch="0" version="1.0.28" release="15.el7" arch="x86_64" src="libsndfile-1.0.28-15.el7.src.rpm">
					<filename>libsndfile-0:1.0.28-15.el7.x86_64.rpm</filename>
				</package>
				<package name="libsndfile-devel" epoch="0" version="1.0.28" release="15.el7" arch="x86_64" src="libsndfile-1.0.28-15.el7.src.rpm">
					<filename>libsndfile-devel-0:1.0.28-15.el7.x86_64.rpm</filename>
				</package>
				<package name="libsndfile-utils" epoch="0" version="1.0.28" release="15.el7" arch="x86_64" src="libsndfile-1.0.28-15.el7.src.rpm">
					<filename>libsndfile-utils-0:1.0.28-15.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-73-0011</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость php-itop </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в php-itop</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-itop-cve-2025-47286-7.3/</description>
               <solution>Установить обновление для пакета(ов) php-itop
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-itop-cve-2025-47286-7.3/" type="self" id="ROS-20260224-73-0011" title="ROS-20260224-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47286" type="cve" id="CVE-2025-47286" title="CVE-2025-47286" />
			<reference href="https://bdu.fstec.ru/vul/2025-06926" type="self" id="BDU:2025-06926" title="BDU:2025-06926" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php-itop" epoch="0" version="3.2.2.1.17851" release="2.el7" arch="noarch" src="php-itop-3.2.2.1.17851-2.el7.src.rpm">
					<filename>php-itop-0:3.2.2.1.17851-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-73-0012</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость php-itop </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в php-itop</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-itop-cve-2025-49145-7.3/</description>
               <solution>Установить обновление для пакета(ов) php-itop
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-itop-cve-2025-49145-7.3/" type="self" id="ROS-20260224-73-0012" title="ROS-20260224-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49145" type="cve" id="CVE-2025-49145" title="CVE-2025-49145" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php-itop" epoch="0" version="3.2.2.1.17851" release="2.el7" arch="noarch" src="php-itop-3.2.2.1.17851-2.el7.src.rpm">
					<filename>php-itop-0:3.2.2.1.17851-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-73-0013</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость log4j </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в log4j</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-log4j-cve-2025-68161-7.3/</description>
               <solution>Установить обновление для пакета(ов) log4j
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-log4j-cve-2025-68161-7.3/" type="self" id="ROS-20260224-73-0013" title="ROS-20260224-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68161" type="cve" id="CVE-2025-68161" title="CVE-2025-68161" />
			<reference href="https://bdu.fstec.ru/vul/2026-00009" type="self" id="BDU:2026-00009" title="BDU:2026-00009" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="log4j" epoch="0" version="2.20.0" release="4.el7" arch="noarch" src="log4j-2.20.0-4.el7.src.rpm">
					<filename>log4j-0:2.20.0-4.el7.noarch.rpm</filename>
				</package>
				<package name="log4j-bom" epoch="0" version="2.20.0" release="4.el7" arch="noarch" src="log4j-2.20.0-4.el7.src.rpm">
					<filename>log4j-bom-0:2.20.0-4.el7.noarch.rpm</filename>
				</package>
				<package name="log4j-javadoc" epoch="0" version="2.20.0" release="4.el7" arch="noarch" src="log4j-2.20.0-4.el7.src.rpm">
					<filename>log4j-javadoc-0:2.20.0-4.el7.noarch.rpm</filename>
				</package>
				<package name="log4j-jcl" epoch="0" version="2.20.0" release="4.el7" arch="noarch" src="log4j-2.20.0-4.el7.src.rpm">
					<filename>log4j-jcl-0:2.20.0-4.el7.noarch.rpm</filename>
				</package>
				<package name="log4j-slf4j" epoch="0" version="2.20.0" release="4.el7" arch="noarch" src="log4j-2.20.0-4.el7.src.rpm">
					<filename>log4j-slf4j-0:2.20.0-4.el7.noarch.rpm</filename>
				</package>
				<package name="log4j-web" epoch="0" version="2.20.0" release="4.el7" arch="noarch" src="log4j-2.20.0-4.el7.src.rpm">
					<filename>log4j-web-0:2.20.0-4.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-73-0014</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость moodle </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-moodle-cve-2025-67857-7.3/</description>
               <solution>Установить обновление для пакета(ов) moodle
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-moodle-cve-2025-67857-7.3/" type="self" id="ROS-20260224-73-0014" title="ROS-20260224-73-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67857" type="cve" id="CVE-2025-67857" title="CVE-2025-67857" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="moodle" epoch="0" version="5.1.1" release="1.el7" arch="noarch" src="moodle-5.1.1-1.el7.src.rpm">
					<filename>moodle-0:5.1.1-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-73-0015</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость moodle </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-moodle-cve-2025-67848-7.3/</description>
               <solution>Установить обновление для пакета(ов) moodle
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-moodle-cve-2025-67848-7.3/" type="self" id="ROS-20260224-73-0015" title="ROS-20260224-73-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67848" type="cve" id="CVE-2025-67848" title="CVE-2025-67848" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="moodle" epoch="0" version="5.1.1" release="1.el7" arch="noarch" src="moodle-5.1.1-1.el7.src.rpm">
					<filename>moodle-0:5.1.1-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-73-0016</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость moodle </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-moodle-cve-2025-67851-7.3/</description>
               <solution>Установить обновление для пакета(ов) moodle
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-moodle-cve-2025-67851-7.3/" type="self" id="ROS-20260224-73-0016" title="ROS-20260224-73-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67851" type="cve" id="CVE-2025-67851" title="CVE-2025-67851" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="moodle" epoch="0" version="5.1.1" release="1.el7" arch="noarch" src="moodle-5.1.1-1.el7.src.rpm">
					<filename>moodle-0:5.1.1-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-73-0017</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость moodle </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-moodle-cve-2025-67853-7.3/</description>
               <solution>Установить обновление для пакета(ов) moodle
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-moodle-cve-2025-67853-7.3/" type="self" id="ROS-20260224-73-0017" title="ROS-20260224-73-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67853" type="cve" id="CVE-2025-67853" title="CVE-2025-67853" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="moodle" epoch="0" version="5.1.1" release="1.el7" arch="noarch" src="moodle-5.1.1-1.el7.src.rpm">
					<filename>moodle-0:5.1.1-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-73-0018</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость moodle </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-moodle-cve-2025-67855-7.3/</description>
               <solution>Установить обновление для пакета(ов) moodle
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-moodle-cve-2025-67855-7.3/" type="self" id="ROS-20260224-73-0018" title="ROS-20260224-73-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67855" type="cve" id="CVE-2025-67855" title="CVE-2025-67855" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="moodle" epoch="0" version="5.1.1" release="1.el7" arch="noarch" src="moodle-5.1.1-1.el7.src.rpm">
					<filename>moodle-0:5.1.1-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-73-0019</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость moodle </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-moodle-cve-2025-67852-7.3/</description>
               <solution>Установить обновление для пакета(ов) moodle
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-moodle-cve-2025-67852-7.3/" type="self" id="ROS-20260224-73-0019" title="ROS-20260224-73-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67852" type="cve" id="CVE-2025-67852" title="CVE-2025-67852" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="moodle" epoch="0" version="5.1.1" release="1.el7" arch="noarch" src="moodle-5.1.1-1.el7.src.rpm">
					<filename>moodle-0:5.1.1-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-73-0020</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость moodle </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-moodle-cve-2025-67856-7.3/</description>
               <solution>Установить обновление для пакета(ов) moodle
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-moodle-cve-2025-67856-7.3/" type="self" id="ROS-20260224-73-0020" title="ROS-20260224-73-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67856" type="cve" id="CVE-2025-67856" title="CVE-2025-67856" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="moodle" epoch="0" version="5.1.1" release="1.el7" arch="noarch" src="moodle-5.1.1-1.el7.src.rpm">
					<filename>moodle-0:5.1.1-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-73-0021</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость moodle </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-moodle-cve-2025-67849-7.3/</description>
               <solution>Установить обновление для пакета(ов) moodle
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-moodle-cve-2025-67849-7.3/" type="self" id="ROS-20260224-73-0021" title="ROS-20260224-73-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67849" type="cve" id="CVE-2025-67849" title="CVE-2025-67849" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="moodle" epoch="0" version="5.1.1" release="1.el7" arch="noarch" src="moodle-5.1.1-1.el7.src.rpm">
					<filename>moodle-0:5.1.1-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-73-0022</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость moodle </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-moodle-cve-2025-67850-7.3/</description>
               <solution>Установить обновление для пакета(ов) moodle
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-moodle-cve-2025-67850-7.3/" type="self" id="ROS-20260224-73-0022" title="ROS-20260224-73-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67850" type="cve" id="CVE-2025-67850" title="CVE-2025-67850" />
			<reference href="https://bdu.fstec.ru/vul/2025-11660" type="self" id="BDU:2025-11660" title="BDU:2025-11660" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="moodle" epoch="0" version="5.1.1" release="1.el7" arch="noarch" src="moodle-5.1.1-1.el7.src.rpm">
					<filename>moodle-0:5.1.1-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-73-0023</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость moodle </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-moodle-cve-2025-67847-7.3/</description>
               <solution>Установить обновление для пакета(ов) moodle
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-moodle-cve-2025-67847-7.3/" type="self" id="ROS-20260224-73-0023" title="ROS-20260224-73-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67847" type="cve" id="CVE-2025-67847" title="CVE-2025-67847" />
			<reference href="https://bdu.fstec.ru/vul/2026-00821" type="self" id="BDU:2026-00821" title="BDU:2026-00821" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="moodle" epoch="0" version="5.1.1" release="1.el7" arch="noarch" src="moodle-5.1.1-1.el7.src.rpm">
					<filename>moodle-0:5.1.1-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-73-0024</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость python-django </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-django</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-django-cve-2026-1312-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-django
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-django-cve-2026-1312-7.3/" type="self" id="ROS-20260224-73-0024" title="ROS-20260224-73-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1312" type="cve" id="CVE-2026-1312" title="CVE-2026-1312" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python-django-bash-completion" epoch="0" version="4.2.28" release="1.el7" arch="noarch" src="python-django-4.2.28-1.el7.src.rpm">
					<filename>python-django-bash-completion-0:4.2.28-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-django" epoch="0" version="4.2.28" release="1.el7" arch="noarch" src="python-django-4.2.28-1.el7.src.rpm">
					<filename>python3-django-0:4.2.28-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-django-doc" epoch="0" version="4.2.28" release="1.el7" arch="noarch" src="python-django-4.2.28-1.el7.src.rpm">
					<filename>python3-django-doc-0:4.2.28-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-73-0025</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость gitea </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в gitea</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gitea-cve-2026-20912-7.3/</description>
               <solution>Установить обновление для пакета(ов) gitea
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gitea-cve-2026-20912-7.3/" type="self" id="ROS-20260224-73-0025" title="ROS-20260224-73-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20912" type="cve" id="CVE-2026-20912" title="CVE-2026-20912" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gitea" epoch="0" version="1.25.4" release="1.el7" arch="x86_64" src="gitea-1.25.4-1.el7.src.rpm">
					<filename>gitea-0:1.25.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="gitea-docs" epoch="0" version="1.25.4" release="1.el7" arch="noarch" src="gitea-1.25.4-1.el7.src.rpm">
					<filename>gitea-docs-0:1.25.4-1.el7.noarch.rpm</filename>
				</package>
				<package name="gitea-fish-completion" epoch="0" version="1.25.4" release="1.el7" arch="noarch" src="gitea-1.25.4-1.el7.src.rpm">
					<filename>gitea-fish-completion-0:1.25.4-1.el7.noarch.rpm</filename>
				</package>
				<package name="gitea-zsh-completion" epoch="0" version="1.25.4" release="1.el7" arch="noarch" src="gitea-1.25.4-1.el7.src.rpm">
					<filename>gitea-zsh-completion-0:1.25.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-73-0026</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость gitea </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gitea</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gitea-cve-2026-20904-7.3/</description>
               <solution>Установить обновление для пакета(ов) gitea
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gitea-cve-2026-20904-7.3/" type="self" id="ROS-20260224-73-0026" title="ROS-20260224-73-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20904" type="cve" id="CVE-2026-20904" title="CVE-2026-20904" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gitea" epoch="0" version="1.25.4" release="1.el7" arch="x86_64" src="gitea-1.25.4-1.el7.src.rpm">
					<filename>gitea-0:1.25.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="gitea-docs" epoch="0" version="1.25.4" release="1.el7" arch="noarch" src="gitea-1.25.4-1.el7.src.rpm">
					<filename>gitea-docs-0:1.25.4-1.el7.noarch.rpm</filename>
				</package>
				<package name="gitea-fish-completion" epoch="0" version="1.25.4" release="1.el7" arch="noarch" src="gitea-1.25.4-1.el7.src.rpm">
					<filename>gitea-fish-completion-0:1.25.4-1.el7.noarch.rpm</filename>
				</package>
				<package name="gitea-zsh-completion" epoch="0" version="1.25.4" release="1.el7" arch="noarch" src="gitea-1.25.4-1.el7.src.rpm">
					<filename>gitea-zsh-completion-0:1.25.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-73-0027</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость gitea </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gitea</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gitea-cve-2026-20888-7.3/</description>
               <solution>Установить обновление для пакета(ов) gitea
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gitea-cve-2026-20888-7.3/" type="self" id="ROS-20260224-73-0027" title="ROS-20260224-73-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20888" type="cve" id="CVE-2026-20888" title="CVE-2026-20888" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gitea" epoch="0" version="1.25.4" release="1.el7" arch="x86_64" src="gitea-1.25.4-1.el7.src.rpm">
					<filename>gitea-0:1.25.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="gitea-docs" epoch="0" version="1.25.4" release="1.el7" arch="noarch" src="gitea-1.25.4-1.el7.src.rpm">
					<filename>gitea-docs-0:1.25.4-1.el7.noarch.rpm</filename>
				</package>
				<package name="gitea-fish-completion" epoch="0" version="1.25.4" release="1.el7" arch="noarch" src="gitea-1.25.4-1.el7.src.rpm">
					<filename>gitea-fish-completion-0:1.25.4-1.el7.noarch.rpm</filename>
				</package>
				<package name="gitea-zsh-completion" epoch="0" version="1.25.4" release="1.el7" arch="noarch" src="gitea-1.25.4-1.el7.src.rpm">
					<filename>gitea-zsh-completion-0:1.25.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-73-0028</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость gitea </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gitea</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gitea-cve-2026-20883-7.3/</description>
               <solution>Установить обновление для пакета(ов) gitea
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gitea-cve-2026-20883-7.3/" type="self" id="ROS-20260224-73-0028" title="ROS-20260224-73-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20883" type="cve" id="CVE-2026-20883" title="CVE-2026-20883" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gitea" epoch="0" version="1.25.4" release="1.el7" arch="x86_64" src="gitea-1.25.4-1.el7.src.rpm">
					<filename>gitea-0:1.25.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="gitea-docs" epoch="0" version="1.25.4" release="1.el7" arch="noarch" src="gitea-1.25.4-1.el7.src.rpm">
					<filename>gitea-docs-0:1.25.4-1.el7.noarch.rpm</filename>
				</package>
				<package name="gitea-fish-completion" epoch="0" version="1.25.4" release="1.el7" arch="noarch" src="gitea-1.25.4-1.el7.src.rpm">
					<filename>gitea-fish-completion-0:1.25.4-1.el7.noarch.rpm</filename>
				</package>
				<package name="gitea-zsh-completion" epoch="0" version="1.25.4" release="1.el7" arch="noarch" src="gitea-1.25.4-1.el7.src.rpm">
					<filename>gitea-zsh-completion-0:1.25.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-73-0029</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость gitea </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gitea</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gitea-cve-2026-20736-7.3/</description>
               <solution>Установить обновление для пакета(ов) gitea
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gitea-cve-2026-20736-7.3/" type="self" id="ROS-20260224-73-0029" title="ROS-20260224-73-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20736" type="cve" id="CVE-2026-20736" title="CVE-2026-20736" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gitea" epoch="0" version="1.25.4" release="1.el7" arch="x86_64" src="gitea-1.25.4-1.el7.src.rpm">
					<filename>gitea-0:1.25.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="gitea-docs" epoch="0" version="1.25.4" release="1.el7" arch="noarch" src="gitea-1.25.4-1.el7.src.rpm">
					<filename>gitea-docs-0:1.25.4-1.el7.noarch.rpm</filename>
				</package>
				<package name="gitea-fish-completion" epoch="0" version="1.25.4" release="1.el7" arch="noarch" src="gitea-1.25.4-1.el7.src.rpm">
					<filename>gitea-fish-completion-0:1.25.4-1.el7.noarch.rpm</filename>
				</package>
				<package name="gitea-zsh-completion" epoch="0" version="1.25.4" release="1.el7" arch="noarch" src="gitea-1.25.4-1.el7.src.rpm">
					<filename>gitea-zsh-completion-0:1.25.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-73-0030</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость gitea </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в gitea</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gitea-cve-2026-20897-7.3/</description>
               <solution>Установить обновление для пакета(ов) gitea
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gitea-cve-2026-20897-7.3/" type="self" id="ROS-20260224-73-0030" title="ROS-20260224-73-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20897" type="cve" id="CVE-2026-20897" title="CVE-2026-20897" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gitea" epoch="0" version="1.25.4" release="1.el7" arch="x86_64" src="gitea-1.25.4-1.el7.src.rpm">
					<filename>gitea-0:1.25.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="gitea-docs" epoch="0" version="1.25.4" release="1.el7" arch="noarch" src="gitea-1.25.4-1.el7.src.rpm">
					<filename>gitea-docs-0:1.25.4-1.el7.noarch.rpm</filename>
				</package>
				<package name="gitea-fish-completion" epoch="0" version="1.25.4" release="1.el7" arch="noarch" src="gitea-1.25.4-1.el7.src.rpm">
					<filename>gitea-fish-completion-0:1.25.4-1.el7.noarch.rpm</filename>
				</package>
				<package name="gitea-zsh-completion" epoch="0" version="1.25.4" release="1.el7" arch="noarch" src="gitea-1.25.4-1.el7.src.rpm">
					<filename>gitea-zsh-completion-0:1.25.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-73-0031</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость gitea </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в gitea</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gitea-cve-2026-0798-7.3/</description>
               <solution>Установить обновление для пакета(ов) gitea
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gitea-cve-2026-0798-7.3/" type="self" id="ROS-20260224-73-0031" title="ROS-20260224-73-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0798" type="cve" id="CVE-2026-0798" title="CVE-2026-0798" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gitea" epoch="0" version="1.25.4" release="1.el7" arch="x86_64" src="gitea-1.25.4-1.el7.src.rpm">
					<filename>gitea-0:1.25.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="gitea-docs" epoch="0" version="1.25.4" release="1.el7" arch="noarch" src="gitea-1.25.4-1.el7.src.rpm">
					<filename>gitea-docs-0:1.25.4-1.el7.noarch.rpm</filename>
				</package>
				<package name="gitea-fish-completion" epoch="0" version="1.25.4" release="1.el7" arch="noarch" src="gitea-1.25.4-1.el7.src.rpm">
					<filename>gitea-fish-completion-0:1.25.4-1.el7.noarch.rpm</filename>
				</package>
				<package name="gitea-zsh-completion" epoch="0" version="1.25.4" release="1.el7" arch="noarch" src="gitea-1.25.4-1.el7.src.rpm">
					<filename>gitea-zsh-completion-0:1.25.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-73-0032</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость gitea </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в gitea</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gitea-cve-2026-20750-7.3/</description>
               <solution>Установить обновление для пакета(ов) gitea
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gitea-cve-2026-20750-7.3/" type="self" id="ROS-20260224-73-0032" title="ROS-20260224-73-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20750" type="cve" id="CVE-2026-20750" title="CVE-2026-20750" />
			<reference href="https://bdu.fstec.ru/vul/2026-01994" type="self" id="BDU:2026-01994" title="BDU:2026-01994" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gitea" epoch="0" version="1.25.4" release="1.el7" arch="x86_64" src="gitea-1.25.4-1.el7.src.rpm">
					<filename>gitea-0:1.25.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="gitea-docs" epoch="0" version="1.25.4" release="1.el7" arch="noarch" src="gitea-1.25.4-1.el7.src.rpm">
					<filename>gitea-docs-0:1.25.4-1.el7.noarch.rpm</filename>
				</package>
				<package name="gitea-fish-completion" epoch="0" version="1.25.4" release="1.el7" arch="noarch" src="gitea-1.25.4-1.el7.src.rpm">
					<filename>gitea-fish-completion-0:1.25.4-1.el7.noarch.rpm</filename>
				</package>
				<package name="gitea-zsh-completion" epoch="0" version="1.25.4" release="1.el7" arch="noarch" src="gitea-1.25.4-1.el7.src.rpm">
					<filename>gitea-zsh-completion-0:1.25.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-73-0033</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость gitea </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gitea</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gitea-cve-2026-20800-7.3/</description>
               <solution>Установить обновление для пакета(ов) gitea
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gitea-cve-2026-20800-7.3/" type="self" id="ROS-20260224-73-0033" title="ROS-20260224-73-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20800" type="cve" id="CVE-2026-20800" title="CVE-2026-20800" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gitea" epoch="0" version="1.25.4" release="1.el7" arch="x86_64" src="gitea-1.25.4-1.el7.src.rpm">
					<filename>gitea-0:1.25.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="gitea-docs" epoch="0" version="1.25.4" release="1.el7" arch="noarch" src="gitea-1.25.4-1.el7.src.rpm">
					<filename>gitea-docs-0:1.25.4-1.el7.noarch.rpm</filename>
				</package>
				<package name="gitea-fish-completion" epoch="0" version="1.25.4" release="1.el7" arch="noarch" src="gitea-1.25.4-1.el7.src.rpm">
					<filename>gitea-fish-completion-0:1.25.4-1.el7.noarch.rpm</filename>
				</package>
				<package name="gitea-zsh-completion" epoch="0" version="1.25.4" release="1.el7" arch="noarch" src="gitea-1.25.4-1.el7.src.rpm">
					<filename>gitea-zsh-completion-0:1.25.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-73-0034</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость gitea </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gitea</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gitea-cve-2025-68941-7.3/</description>
               <solution>Установить обновление для пакета(ов) gitea
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gitea-cve-2025-68941-7.3/" type="self" id="ROS-20260224-73-0034" title="ROS-20260224-73-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68941" type="cve" id="CVE-2025-68941" title="CVE-2025-68941" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gitea" epoch="0" version="1.22.3" release="1.el7" arch="x86_64" src="gitea-1.22.3-1.el7.src.rpm">
					<filename>gitea-0:1.22.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-73-0035</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость gitea </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gitea</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gitea-cve-2025-68940-7.3/</description>
               <solution>Установить обновление для пакета(ов) gitea
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gitea-cve-2025-68940-7.3/" type="self" id="ROS-20260224-73-0035" title="ROS-20260224-73-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68940" type="cve" id="CVE-2025-68940" title="CVE-2025-68940" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gitea" epoch="0" version="1.22.6" release="1.el7" arch="x86_64" src="gitea-1.22.6-1.el7.src.rpm">
					<filename>gitea-0:1.22.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-73-0036</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость gitea </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gitea</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gitea-cve-2025-68939-7.3/</description>
               <solution>Установить обновление для пакета(ов) gitea
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gitea-cve-2025-68939-7.3/" type="self" id="ROS-20260224-73-0036" title="ROS-20260224-73-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68939" type="cve" id="CVE-2025-68939" title="CVE-2025-68939" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gitea" epoch="0" version="1.23.1" release="1.el7" arch="x86_64" src="gitea-1.23.1-1.el7.src.rpm">
					<filename>gitea-0:1.23.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-73-0001</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38102-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38102-7.3/" type="self" id="ROS-20260304-73-0001" title="ROS-20260304-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38102" type="cve" id="CVE-2025-38102" title="CVE-2025-38102" />
			<reference href="https://bdu.fstec.ru/vul/2025-10781" type="self" id="BDU:2025-10781" title="BDU:2025-10781" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-73-0002</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38103-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38103-7.3/" type="self" id="ROS-20260304-73-0002" title="ROS-20260304-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38103" type="cve" id="CVE-2025-38103" title="CVE-2025-38103" />
			<reference href="https://bdu.fstec.ru/vul/2025-10779" type="self" id="BDU:2025-10779" title="BDU:2025-10779" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-73-0003</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38107-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38107-7.3/" type="self" id="ROS-20260304-73-0003" title="ROS-20260304-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38107" type="cve" id="CVE-2025-38107" title="CVE-2025-38107" />
			<reference href="https://bdu.fstec.ru/vul/2025-10783" type="self" id="BDU:2025-10783" title="BDU:2025-10783" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-73-0004</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38108-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38108-7.3/" type="self" id="ROS-20260304-73-0004" title="ROS-20260304-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38108" type="cve" id="CVE-2025-38108" title="CVE-2025-38108" />
			<reference href="https://bdu.fstec.ru/vul/2025-10774" type="self" id="BDU:2025-10774" title="BDU:2025-10774" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-73-0005</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38111-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38111-7.3/" type="self" id="ROS-20260304-73-0005" title="ROS-20260304-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38111" type="cve" id="CVE-2025-38111" title="CVE-2025-38111" />
			<reference href="https://bdu.fstec.ru/vul/2025-10777" type="self" id="BDU:2025-10777" title="BDU:2025-10777" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-73-0006</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38112-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38112-7.3/" type="self" id="ROS-20260304-73-0006" title="ROS-20260304-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38112" type="cve" id="CVE-2025-38112" title="CVE-2025-38112" />
			<reference href="https://bdu.fstec.ru/vul/2025-10773" type="self" id="BDU:2025-10773" title="BDU:2025-10773" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-73-0007</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38113-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38113-7.3/" type="self" id="ROS-20260304-73-0007" title="ROS-20260304-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38113" type="cve" id="CVE-2025-38113" title="CVE-2025-38113" />
			<reference href="https://bdu.fstec.ru/vul/2025-10778" type="self" id="BDU:2025-10778" title="BDU:2025-10778" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-73-0008</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38115-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38115-7.3/" type="self" id="ROS-20260304-73-0008" title="ROS-20260304-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38115" type="cve" id="CVE-2025-38115" title="CVE-2025-38115" />
			<reference href="https://bdu.fstec.ru/vul/2025-10780" type="self" id="BDU:2025-10780" title="BDU:2025-10780" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-73-0009</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38118-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38118-7.3/" type="self" id="ROS-20260304-73-0009" title="ROS-20260304-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38118" type="cve" id="CVE-2025-38118" title="CVE-2025-38118" />
			<reference href="https://bdu.fstec.ru/vul/2025-09003" type="self" id="BDU:2025-09003" title="BDU:2025-09003" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-73-0010</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38119-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38119-7.3/" type="self" id="ROS-20260304-73-0010" title="ROS-20260304-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38119" type="cve" id="CVE-2025-38119" title="CVE-2025-38119" />
			<reference href="https://bdu.fstec.ru/vul/2025-09002" type="self" id="BDU:2025-09002" title="BDU:2025-09002" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-73-0011</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38120-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38120-7.3/" type="self" id="ROS-20260304-73-0011" title="ROS-20260304-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38120" type="cve" id="CVE-2025-38120" title="CVE-2025-38120" />
			<reference href="https://bdu.fstec.ru/vul/2025-10784" type="self" id="BDU:2025-10784" title="BDU:2025-10784" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-73-0012</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38122-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38122-7.3/" type="self" id="ROS-20260304-73-0012" title="ROS-20260304-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38122" type="cve" id="CVE-2025-38122" title="CVE-2025-38122" />
			<reference href="https://bdu.fstec.ru/vul/2025-09004" type="self" id="BDU:2025-09004" title="BDU:2025-09004" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-73-0013</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38124-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38124-7.3/" type="self" id="ROS-20260304-73-0013" title="ROS-20260304-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38124" type="cve" id="CVE-2025-38124" title="CVE-2025-38124" />
			<reference href="https://bdu.fstec.ru/vul/2025-09605" type="self" id="BDU:2025-09605" title="BDU:2025-09605" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-73-0014</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38126-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38126-7.3/" type="self" id="ROS-20260304-73-0014" title="ROS-20260304-73-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38126" type="cve" id="CVE-2025-38126" title="CVE-2025-38126" />
			<reference href="https://bdu.fstec.ru/vul/2025-09823" type="self" id="BDU:2025-09823" title="BDU:2025-09823" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-73-0015</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38131-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38131-7.3/" type="self" id="ROS-20260304-73-0015" title="ROS-20260304-73-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38131" type="cve" id="CVE-2025-38131" title="CVE-2025-38131" />
			<reference href="https://bdu.fstec.ru/vul/2025-09615" type="self" id="BDU:2025-09615" title="BDU:2025-09615" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-73-0016</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38135-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38135-7.3/" type="self" id="ROS-20260304-73-0016" title="ROS-20260304-73-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38135" type="cve" id="CVE-2025-38135" title="CVE-2025-38135" />
			<reference href="https://bdu.fstec.ru/vul/2025-09630" type="self" id="BDU:2025-09630" title="BDU:2025-09630" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-73-0017</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38136-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38136-7.3/" type="self" id="ROS-20260304-73-0017" title="ROS-20260304-73-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38136" type="cve" id="CVE-2025-38136" title="CVE-2025-38136" />
			<reference href="https://bdu.fstec.ru/vul/2025-09631" type="self" id="BDU:2025-09631" title="BDU:2025-09631" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-73-0018</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38138-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38138-7.3/" type="self" id="ROS-20260304-73-0018" title="ROS-20260304-73-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38138" type="cve" id="CVE-2025-38138" title="CVE-2025-38138" />
			<reference href="https://bdu.fstec.ru/vul/2025-09632" type="self" id="BDU:2025-09632" title="BDU:2025-09632" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-73-0019</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38142-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38142-7.3/" type="self" id="ROS-20260304-73-0019" title="ROS-20260304-73-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38142" type="cve" id="CVE-2025-38142" title="CVE-2025-38142" />
			<reference href="https://bdu.fstec.ru/vul/2025-09636" type="self" id="BDU:2025-09636" title="BDU:2025-09636" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-73-0020</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38143-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38143-7.3/" type="self" id="ROS-20260304-73-0020" title="ROS-20260304-73-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38143" type="cve" id="CVE-2025-38143" title="CVE-2025-38143" />
			<reference href="https://bdu.fstec.ru/vul/2025-09638" type="self" id="BDU:2025-09638" title="BDU:2025-09638" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-73-0021</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38145-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38145-7.3/" type="self" id="ROS-20260304-73-0021" title="ROS-20260304-73-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38145" type="cve" id="CVE-2025-38145" title="CVE-2025-38145" />
			<reference href="https://bdu.fstec.ru/vul/2025-09824" type="self" id="BDU:2025-09824" title="BDU:2025-09824" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-73-0022</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38146-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38146-7.3/" type="self" id="ROS-20260304-73-0022" title="ROS-20260304-73-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38146" type="cve" id="CVE-2025-38146" title="CVE-2025-38146" />
			<reference href="https://bdu.fstec.ru/vul/2025-09609" type="self" id="BDU:2025-09609" title="BDU:2025-09609" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-73-0023</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38148-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38148-7.3/" type="self" id="ROS-20260304-73-0023" title="ROS-20260304-73-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38148" type="cve" id="CVE-2025-38148" title="CVE-2025-38148" />
			<reference href="https://bdu.fstec.ru/vul/2025-09641" type="self" id="BDU:2025-09641" title="BDU:2025-09641" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-73-0024</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38147-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38147-7.3/" type="self" id="ROS-20260304-73-0024" title="ROS-20260304-73-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38147" type="cve" id="CVE-2025-38147" title="CVE-2025-38147" />
			<reference href="https://bdu.fstec.ru/vul/2025-09640" type="self" id="BDU:2025-09640" title="BDU:2025-09640" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-73-0025</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38225-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38225-7.3/" type="self" id="ROS-20260304-73-0025" title="ROS-20260304-73-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38225" type="cve" id="CVE-2025-38225" title="CVE-2025-38225" />
			<reference href="https://bdu.fstec.ru/vul/2025-13479" type="self" id="BDU:2025-13479" title="BDU:2025-13479" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-73-0026</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38226-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38226-7.3/" type="self" id="ROS-20260304-73-0026" title="ROS-20260304-73-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38226" type="cve" id="CVE-2025-38226" title="CVE-2025-38226" />
			<reference href="https://bdu.fstec.ru/vul/2025-13484" type="self" id="BDU:2025-13484" title="BDU:2025-13484" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-73-0027</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38227-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38227-7.3/" type="self" id="ROS-20260304-73-0027" title="ROS-20260304-73-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38227" type="cve" id="CVE-2025-38227" title="CVE-2025-38227" />
			<reference href="https://bdu.fstec.ru/vul/2025-13485" type="self" id="BDU:2025-13485" title="BDU:2025-13485" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-73-0028</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38229-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38229-7.3/" type="self" id="ROS-20260304-73-0028" title="ROS-20260304-73-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38229" type="cve" id="CVE-2025-38229" title="CVE-2025-38229" />
			<reference href="https://bdu.fstec.ru/vul/2025-10770" type="self" id="BDU:2025-10770" title="BDU:2025-10770" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-73-0029</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38230-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38230-7.3/" type="self" id="ROS-20260304-73-0029" title="ROS-20260304-73-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38230" type="cve" id="CVE-2025-38230" title="CVE-2025-38230" />
			<reference href="https://bdu.fstec.ru/vul/2025-13486" type="self" id="BDU:2025-13486" title="BDU:2025-13486" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-73-0030</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38231-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38231-7.3/" type="self" id="ROS-20260304-73-0030" title="ROS-20260304-73-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38231" type="cve" id="CVE-2025-38231" title="CVE-2025-38231" />
			<reference href="https://bdu.fstec.ru/vul/2025-10772" type="self" id="BDU:2025-10772" title="BDU:2025-10772" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-73-0031</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38239-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38239-7.3/" type="self" id="ROS-20260304-73-0031" title="ROS-20260304-73-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38239" type="cve" id="CVE-2025-38239" title="CVE-2025-38239" />
			<reference href="https://bdu.fstec.ru/vul/2025-10755" type="self" id="BDU:2025-10755" title="BDU:2025-10755" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-73-0032</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38245-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38245-7.3/" type="self" id="ROS-20260304-73-0032" title="ROS-20260304-73-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38245" type="cve" id="CVE-2025-38245" title="CVE-2025-38245" />
			<reference href="https://bdu.fstec.ru/vul/2025-08803" type="self" id="BDU:2025-08803" title="BDU:2025-08803" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-73-0033</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38249-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38249-7.3/" type="self" id="ROS-20260304-73-0033" title="ROS-20260304-73-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38249" type="cve" id="CVE-2025-38249" title="CVE-2025-38249" />
			<reference href="https://bdu.fstec.ru/vul/2025-09576" type="self" id="BDU:2025-09576" title="BDU:2025-09576" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-73-0034</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38251-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38251-7.3/" type="self" id="ROS-20260304-73-0034" title="ROS-20260304-73-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38251" type="cve" id="CVE-2025-38251" title="CVE-2025-38251" />
			<reference href="https://bdu.fstec.ru/vul/2025-10749" type="self" id="BDU:2025-10749" title="BDU:2025-10749" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-73-0035</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38257-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38257-7.3/" type="self" id="ROS-20260304-73-0035" title="ROS-20260304-73-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38257" type="cve" id="CVE-2025-38257" title="CVE-2025-38257" />
			<reference href="https://bdu.fstec.ru/vul/2025-10752" type="self" id="BDU:2025-10752" title="BDU:2025-10752" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-73-0036</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38259-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38259-7.3/" type="self" id="ROS-20260304-73-0036" title="ROS-20260304-73-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38259" type="cve" id="CVE-2025-38259" title="CVE-2025-38259" />
			<reference href="https://bdu.fstec.ru/vul/2025-13465" type="self" id="BDU:2025-13465" title="BDU:2025-13465" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-73-0001</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37932-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37932-7.3/" type="self" id="ROS-20260306-73-0001" title="ROS-20260306-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37932" type="cve" id="CVE-2025-37932" title="CVE-2025-37932" />
			<reference href="https://bdu.fstec.ru/vul/2025-11828" type="self" id="BDU:2025-11828" title="BDU:2025-11828" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-73-0002</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53099-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53099-7.3/" type="self" id="ROS-20260306-73-0002" title="ROS-20260306-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53099" type="cve" id="CVE-2023-53099" title="CVE-2023-53099" />
			<reference href="https://bdu.fstec.ru/vul/2026-03855" type="self" id="BDU:2026-03855" title="BDU:2026-03855" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-73-0003</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38275-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38275-7.3/" type="self" id="ROS-20260306-73-0003" title="ROS-20260306-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38275" type="cve" id="CVE-2025-38275" title="CVE-2025-38275" />
			<reference href="https://bdu.fstec.ru/vul/2025-09522" type="self" id="BDU:2025-09522" title="BDU:2025-09522" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-73-0004</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38277-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38277-7.3/" type="self" id="ROS-20260306-73-0004" title="ROS-20260306-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38277" type="cve" id="CVE-2025-38277" title="CVE-2025-38277" />
			<reference href="https://bdu.fstec.ru/vul/2025-10310" type="self" id="BDU:2025-10310" title="BDU:2025-10310" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-73-0005</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38280-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38280-7.3/" type="self" id="ROS-20260306-73-0005" title="ROS-20260306-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38280" type="cve" id="CVE-2025-38280" title="CVE-2025-38280" />
			<reference href="https://bdu.fstec.ru/vul/2025-09683" type="self" id="BDU:2025-09683" title="BDU:2025-09683" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-73-0006</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38282-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38282-7.3/" type="self" id="ROS-20260306-73-0006" title="ROS-20260306-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38282" type="cve" id="CVE-2025-38282" title="CVE-2025-38282" />
			<reference href="https://bdu.fstec.ru/vul/2025-09675" type="self" id="BDU:2025-09675" title="BDU:2025-09675" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-73-0007</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38285-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38285-7.3/" type="self" id="ROS-20260306-73-0007" title="ROS-20260306-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38285" type="cve" id="CVE-2025-38285" title="CVE-2025-38285" />
			<reference href="https://bdu.fstec.ru/vul/2025-08622" type="self" id="BDU:2025-08622" title="BDU:2025-08622" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-73-0008</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38286-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38286-7.3/" type="self" id="ROS-20260306-73-0008" title="ROS-20260306-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38286" type="cve" id="CVE-2025-38286" title="CVE-2025-38286" />
			<reference href="https://bdu.fstec.ru/vul/2025-10311" type="self" id="BDU:2025-10311" title="BDU:2025-10311" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-73-0009</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38293-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38293-7.3/" type="self" id="ROS-20260306-73-0009" title="ROS-20260306-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38293" type="cve" id="CVE-2025-38293" title="CVE-2025-38293" />
			<reference href="https://bdu.fstec.ru/vul/2025-08509" type="self" id="BDU:2025-08509" title="BDU:2025-08509" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-73-0010</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38298-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38298-7.3/" type="self" id="ROS-20260306-73-0010" title="ROS-20260306-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38298" type="cve" id="CVE-2025-38298" title="CVE-2025-38298" />
			<reference href="https://bdu.fstec.ru/vul/2025-13454" type="self" id="BDU:2025-13454" title="BDU:2025-13454" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-73-0011</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38300-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38300-7.3/" type="self" id="ROS-20260306-73-0011" title="ROS-20260306-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38300" type="cve" id="CVE-2025-38300" title="CVE-2025-38300" />
			<reference href="https://bdu.fstec.ru/vul/2025-08510" type="self" id="BDU:2025-08510" title="BDU:2025-08510" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-73-0012</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38304-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38304-7.3/" type="self" id="ROS-20260306-73-0012" title="ROS-20260306-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38304" type="cve" id="CVE-2025-38304" title="CVE-2025-38304" />
			<reference href="https://bdu.fstec.ru/vul/2025-08927" type="self" id="BDU:2025-08927" title="BDU:2025-08927" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-73-0013</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38305-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38305-7.3/" type="self" id="ROS-20260306-73-0013" title="ROS-20260306-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38305" type="cve" id="CVE-2025-38305" title="CVE-2025-38305" />
			<reference href="https://bdu.fstec.ru/vul/2025-10739" type="self" id="BDU:2025-10739" title="BDU:2025-10739" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-73-0014</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38310-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38310-7.3/" type="self" id="ROS-20260306-73-0014" title="ROS-20260306-73-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38310" type="cve" id="CVE-2025-38310" title="CVE-2025-38310" />
			<reference href="https://bdu.fstec.ru/vul/2025-09047" type="self" id="BDU:2025-09047" title="BDU:2025-09047" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-73-0015</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38312-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38312-7.3/" type="self" id="ROS-20260306-73-0015" title="ROS-20260306-73-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38312" type="cve" id="CVE-2025-38312" title="CVE-2025-38312" />
			<reference href="https://bdu.fstec.ru/vul/2025-09059" type="self" id="BDU:2025-09059" title="BDU:2025-09059" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-73-0016</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38313-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38313-7.3/" type="self" id="ROS-20260306-73-0016" title="ROS-20260306-73-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38313" type="cve" id="CVE-2025-38313" title="CVE-2025-38313" />
			<reference href="https://bdu.fstec.ru/vul/2025-08706" type="self" id="BDU:2025-08706" title="BDU:2025-08706" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-73-0017</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38319-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38319-7.3/" type="self" id="ROS-20260306-73-0017" title="ROS-20260306-73-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38319" type="cve" id="CVE-2025-38319" title="CVE-2025-38319" />
			<reference href="https://bdu.fstec.ru/vul/2025-09048" type="self" id="BDU:2025-09048" title="BDU:2025-09048" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-73-0018</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38320-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38320-7.3/" type="self" id="ROS-20260306-73-0018" title="ROS-20260306-73-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38320" type="cve" id="CVE-2025-38320" title="CVE-2025-38320" />
			<reference href="https://bdu.fstec.ru/vul/2025-08924" type="self" id="BDU:2025-08924" title="BDU:2025-08924" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-73-0019</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38323-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38323-7.3/" type="self" id="ROS-20260306-73-0019" title="ROS-20260306-73-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38323" type="cve" id="CVE-2025-38323" title="CVE-2025-38323" />
			<reference href="https://bdu.fstec.ru/vul/2025-10735" type="self" id="BDU:2025-10735" title="BDU:2025-10735" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-73-0020</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38324-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38324-7.3/" type="self" id="ROS-20260306-73-0020" title="ROS-20260306-73-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38324" type="cve" id="CVE-2025-38324" title="CVE-2025-38324" />
			<reference href="https://bdu.fstec.ru/vul/2025-10737" type="self" id="BDU:2025-10737" title="BDU:2025-10737" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-73-0021</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38326-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38326-7.3/" type="self" id="ROS-20260306-73-0021" title="ROS-20260306-73-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38326" type="cve" id="CVE-2025-38326" title="CVE-2025-38326" />
			<reference href="https://bdu.fstec.ru/vul/2025-13456" type="self" id="BDU:2025-13456" title="BDU:2025-13456" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-73-0022</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38328-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38328-7.3/" type="self" id="ROS-20260306-73-0022" title="ROS-20260306-73-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38328" type="cve" id="CVE-2025-38328" title="CVE-2025-38328" />
			<reference href="https://bdu.fstec.ru/vul/2025-13463" type="self" id="BDU:2025-13463" title="BDU:2025-13463" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-73-0023</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38331-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38331-7.3/" type="self" id="ROS-20260306-73-0023" title="ROS-20260306-73-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38331" type="cve" id="CVE-2025-38331" title="CVE-2025-38331" />
			<reference href="https://bdu.fstec.ru/vul/2025-13459" type="self" id="BDU:2025-13459" title="BDU:2025-13459" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-73-0024</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38332-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38332-7.3/" type="self" id="ROS-20260306-73-0024" title="ROS-20260306-73-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38332" type="cve" id="CVE-2025-38332" title="CVE-2025-38332" />
			<reference href="https://bdu.fstec.ru/vul/2025-10743" type="self" id="BDU:2025-10743" title="BDU:2025-10743" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-73-0025</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38334-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38334-7.3/" type="self" id="ROS-20260306-73-0025" title="ROS-20260306-73-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38334" type="cve" id="CVE-2025-38334" title="CVE-2025-38334" />
			<reference href="https://bdu.fstec.ru/vul/2025-10744" type="self" id="BDU:2025-10744" title="BDU:2025-10744" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-73-0026</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38335-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38335-7.3/" type="self" id="ROS-20260306-73-0026" title="ROS-20260306-73-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38335" type="cve" id="CVE-2025-38335" title="CVE-2025-38335" />
			<reference href="https://bdu.fstec.ru/vul/2025-10745" type="self" id="BDU:2025-10745" title="BDU:2025-10745" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-73-0027</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38336-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38336-7.3/" type="self" id="ROS-20260306-73-0027" title="ROS-20260306-73-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38336" type="cve" id="CVE-2025-38336" title="CVE-2025-38336" />
			<reference href="https://bdu.fstec.ru/vul/2025-10746" type="self" id="BDU:2025-10746" title="BDU:2025-10746" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-73-0028</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38337-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38337-7.3/" type="self" id="ROS-20260306-73-0028" title="ROS-20260306-73-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38337" type="cve" id="CVE-2025-38337" title="CVE-2025-38337" />
			<reference href="https://bdu.fstec.ru/vul/2025-10747" type="self" id="BDU:2025-10747" title="BDU:2025-10747" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-73-0029</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38342-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38342-7.3/" type="self" id="ROS-20260306-73-0029" title="ROS-20260306-73-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38342" type="cve" id="CVE-2025-38342" title="CVE-2025-38342" />
			<reference href="https://bdu.fstec.ru/vul/2025-08796" type="self" id="BDU:2025-08796" title="BDU:2025-08796" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-73-0030</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38344-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38344-7.3/" type="self" id="ROS-20260306-73-0030" title="ROS-20260306-73-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38344" type="cve" id="CVE-2025-38344" title="CVE-2025-38344" />
			<reference href="https://bdu.fstec.ru/vul/2025-08802" type="self" id="BDU:2025-08802" title="BDU:2025-08802" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0001</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость mariadb </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mariadb</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mariadb-cve-2025-30693-7.3/</description>
               <solution>Установить обновление для пакета(ов) mariadb
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mariadb-cve-2025-30693-7.3/" type="self" id="ROS-20260310-73-0001" title="ROS-20260310-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30693" type="cve" id="CVE-2025-30693" title="CVE-2025-30693" />
			<reference href="https://bdu.fstec.ru/vul/2025-05237" type="self" id="BDU:2025-05237" title="BDU:2025-05237" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mariadb" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-backup" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-backup-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-common" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-common-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-connect-engine" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-connect-engine-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-cracklib-password-check" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-cracklib-password-check-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-devel" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-devel-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-embedded" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-embedded-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-embedded-devel" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-embedded-devel-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-errmsg" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-errmsg-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-gssapi-server" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-gssapi-server-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-oqgraph-engine" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-oqgraph-engine-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-rocksdb-engine" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-rocksdb-engine-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-s3-engine" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-s3-engine-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-server" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-server-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-server-galera" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-server-galera-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-server-utils" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-server-utils-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-sphinx-engine" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-sphinx-engine-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-test" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-test-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0002</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость mariadb </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mariadb</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mariadb-cve-2025-30722-7.3/</description>
               <solution>Установить обновление для пакета(ов) mariadb
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mariadb-cve-2025-30722-7.3/" type="self" id="ROS-20260310-73-0002" title="ROS-20260310-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30722" type="cve" id="CVE-2025-30722" title="CVE-2025-30722" />
			<reference href="https://bdu.fstec.ru/vul/2025-15829" type="self" id="BDU:2025-15829" title="BDU:2025-15829" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mariadb" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-backup" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-backup-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-common" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-common-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-connect-engine" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-connect-engine-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-cracklib-password-check" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-cracklib-password-check-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-devel" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-devel-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-embedded" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-embedded-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-embedded-devel" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-embedded-devel-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-errmsg" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-errmsg-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-gssapi-server" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-gssapi-server-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-oqgraph-engine" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-oqgraph-engine-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-rocksdb-engine" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-rocksdb-engine-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-s3-engine" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-s3-engine-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-server" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-server-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-server-galera" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-server-galera-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-server-utils" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-server-utils-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-sphinx-engine" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-sphinx-engine-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mariadb-test" epoch="3" version="10.11.15" release="1.el7" arch="x86_64" src="mariadb-10.11.15-1.el7.src.rpm">
					<filename>mariadb-test-3:10.11.15-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0003</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость nbdkit </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nbdkit</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nbdkit-cve-2025-47711-7.3/</description>
               <solution>Установить обновление для пакета(ов) nbdkit
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nbdkit-cve-2025-47711-7.3/" type="self" id="ROS-20260310-73-0003" title="ROS-20260310-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47711" type="cve" id="CVE-2025-47711" title="CVE-2025-47711" />
			<reference href="https://bdu.fstec.ru/vul/2026-03008" type="self" id="BDU:2026-03008" title="BDU:2026-03008" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nbdkit" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-S3-plugin" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-S3-plugin-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-basic-filters" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-basic-filters-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-basic-plugins" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-basic-plugins-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-cc-plugin" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-cc-plugin-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-cdi-plugin" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-cdi-plugin-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-curl-plugin" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-curl-plugin-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-devel" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-devel-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-example-plugins" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-example-plugins-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-ext2-filter" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-ext2-filter-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-guestfs-plugin" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-guestfs-plugin-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-gzip-filter" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-gzip-filter-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-iso-plugin" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-iso-plugin-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-libvirt-plugin" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-libvirt-plugin-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-linuxdisk-plugin" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-linuxdisk-plugin-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-lua-plugin" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-lua-plugin-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-nbd-plugin" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-nbd-plugin-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-ocaml-plugin" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-ocaml-plugin-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-ocaml-plugin-devel" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-ocaml-plugin-devel-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-perl-plugin" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-perl-plugin-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-python-plugin" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-python-plugin-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-ruby-plugin" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-ruby-plugin-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-server" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-server-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-ssh-plugin" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-ssh-plugin-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-tar-filter" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-tar-filter-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-tcl-plugin" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-tcl-plugin-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-tmpdisk-plugin" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-tmpdisk-plugin-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-torrent-plugin" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-torrent-plugin-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-vddk-plugin" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-vddk-plugin-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-xz-filter" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-xz-filter-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-bash-completion" epoch="0" version="1.28.0" release="5.el7" arch="noarch" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-bash-completion-0:1.28.0-5.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0004</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость nbdkit </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nbdkit</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nbdkit-cve-2025-47712-7.3/</description>
               <solution>Установить обновление для пакета(ов) nbdkit
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nbdkit-cve-2025-47712-7.3/" type="self" id="ROS-20260310-73-0004" title="ROS-20260310-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47712" type="cve" id="CVE-2025-47712" title="CVE-2025-47712" />
			<reference href="https://bdu.fstec.ru/vul/2026-03009" type="self" id="BDU:2026-03009" title="BDU:2026-03009" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nbdkit" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-S3-plugin" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-S3-plugin-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-basic-filters" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-basic-filters-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-basic-plugins" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-basic-plugins-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-cc-plugin" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-cc-plugin-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-cdi-plugin" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-cdi-plugin-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-curl-plugin" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-curl-plugin-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-devel" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-devel-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-example-plugins" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-example-plugins-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-ext2-filter" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-ext2-filter-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-guestfs-plugin" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-guestfs-plugin-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-gzip-filter" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-gzip-filter-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-iso-plugin" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-iso-plugin-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-libvirt-plugin" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-libvirt-plugin-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-linuxdisk-plugin" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-linuxdisk-plugin-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-lua-plugin" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-lua-plugin-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-nbd-plugin" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-nbd-plugin-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-ocaml-plugin" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-ocaml-plugin-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-ocaml-plugin-devel" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-ocaml-plugin-devel-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-perl-plugin" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-perl-plugin-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-python-plugin" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-python-plugin-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-ruby-plugin" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-ruby-plugin-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-server" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-server-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-ssh-plugin" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-ssh-plugin-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-tar-filter" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-tar-filter-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-tcl-plugin" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-tcl-plugin-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-tmpdisk-plugin" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-tmpdisk-plugin-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-torrent-plugin" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-torrent-plugin-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-vddk-plugin" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-vddk-plugin-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-xz-filter" epoch="0" version="1.28.0" release="5.el7" arch="x86_64" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-xz-filter-0:1.28.0-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-bash-completion" epoch="0" version="1.28.0" release="5.el7" arch="noarch" src="nbdkit-1.28.0-5.el7.src.rpm">
					<filename>nbdkit-bash-completion-0:1.28.0-5.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0005</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость expat </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в expat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-expat-cve-2025-66382-7.3/</description>
               <solution>Установить обновление для пакета(ов) expat
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-expat-cve-2025-66382-7.3/" type="self" id="ROS-20260310-73-0005" title="ROS-20260310-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66382" type="cve" id="CVE-2025-66382" title="CVE-2025-66382" />
			<reference href="https://bdu.fstec.ru/vul/2026-03628" type="self" id="BDU:2026-03628" title="BDU:2026-03628" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="expat" epoch="0" version="2.7.4" release="1.el7" arch="x86_64" src="expat-2.7.4-1.el7.src.rpm">
					<filename>expat-0:2.7.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="expat-devel" epoch="0" version="2.7.4" release="1.el7" arch="x86_64" src="expat-2.7.4-1.el7.src.rpm">
					<filename>expat-devel-0:2.7.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="expat-static" epoch="0" version="2.7.4" release="1.el7" arch="x86_64" src="expat-2.7.4-1.el7.src.rpm">
					<filename>expat-static-0:2.7.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0006</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость wcurl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в wcurl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-wcurl-cve-2025-11563-7.3/</description>
               <solution>Установить обновление для пакета(ов) wcurl
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-wcurl-cve-2025-11563-7.3/" type="self" id="ROS-20260310-73-0006" title="ROS-20260310-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11563" type="cve" id="CVE-2025-11563" title="CVE-2025-11563" />
			<reference href="https://bdu.fstec.ru/vul/2026-03626" type="self" id="BDU:2026-03626" title="BDU:2026-03626" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="wcurl" epoch="0" version="2026.01.05" release="1.el7" arch="noarch" src="wcurl-2026.01.05-1.el7.src.rpm">
					<filename>wcurl-0:2026.01.05-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0007</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-0899-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-0899-7.3/" type="self" id="ROS-20260310-73-0007" title="ROS-20260310-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0899" type="cve" id="CVE-2026-0899" title="CVE-2026-0899" />
			<reference href="https://bdu.fstec.ru/vul/2026-00514" type="self" id="BDU:2026-00514" title="BDU:2026-00514" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="144.0.7559.109" release="1.el7" arch="x86_64" src="chromium-144.0.7559.109-1.el7.src.rpm">
					<filename>chromedriver-0:144.0.7559.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="144.0.7559.109" release="1.el7" arch="x86_64" src="chromium-144.0.7559.109-1.el7.src.rpm">
					<filename>chromium-0:144.0.7559.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="144.0.7559.109" release="1.el7" arch="x86_64" src="chromium-144.0.7559.109-1.el7.src.rpm">
					<filename>chromium-common-0:144.0.7559.109-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0008</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-0900-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-0900-7.3/" type="self" id="ROS-20260310-73-0008" title="ROS-20260310-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0900" type="cve" id="CVE-2026-0900" title="CVE-2026-0900" />
			<reference href="https://bdu.fstec.ru/vul/2026-00460" type="self" id="BDU:2026-00460" title="BDU:2026-00460" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="144.0.7559.109" release="1.el7" arch="x86_64" src="chromium-144.0.7559.109-1.el7.src.rpm">
					<filename>chromedriver-0:144.0.7559.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="144.0.7559.109" release="1.el7" arch="x86_64" src="chromium-144.0.7559.109-1.el7.src.rpm">
					<filename>chromium-0:144.0.7559.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="144.0.7559.109" release="1.el7" arch="x86_64" src="chromium-144.0.7559.109-1.el7.src.rpm">
					<filename>chromium-common-0:144.0.7559.109-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0009</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-0901-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-0901-7.3/" type="self" id="ROS-20260310-73-0009" title="ROS-20260310-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0901" type="cve" id="CVE-2026-0901" title="CVE-2026-0901" />
			<reference href="https://bdu.fstec.ru/vul/2026-00515" type="self" id="BDU:2026-00515" title="BDU:2026-00515" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="144.0.7559.109" release="1.el7" arch="x86_64" src="chromium-144.0.7559.109-1.el7.src.rpm">
					<filename>chromedriver-0:144.0.7559.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="144.0.7559.109" release="1.el7" arch="x86_64" src="chromium-144.0.7559.109-1.el7.src.rpm">
					<filename>chromium-0:144.0.7559.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="144.0.7559.109" release="1.el7" arch="x86_64" src="chromium-144.0.7559.109-1.el7.src.rpm">
					<filename>chromium-common-0:144.0.7559.109-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0010</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-0902-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-0902-7.3/" type="self" id="ROS-20260310-73-0010" title="ROS-20260310-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0902" type="cve" id="CVE-2026-0902" title="CVE-2026-0902" />
			<reference href="https://bdu.fstec.ru/vul/2026-00513" type="self" id="BDU:2026-00513" title="BDU:2026-00513" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="144.0.7559.109" release="1.el7" arch="x86_64" src="chromium-144.0.7559.109-1.el7.src.rpm">
					<filename>chromedriver-0:144.0.7559.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="144.0.7559.109" release="1.el7" arch="x86_64" src="chromium-144.0.7559.109-1.el7.src.rpm">
					<filename>chromium-0:144.0.7559.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="144.0.7559.109" release="1.el7" arch="x86_64" src="chromium-144.0.7559.109-1.el7.src.rpm">
					<filename>chromium-common-0:144.0.7559.109-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0011</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-0904-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-0904-7.3/" type="self" id="ROS-20260310-73-0011" title="ROS-20260310-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0904" type="cve" id="CVE-2026-0904" title="CVE-2026-0904" />
			<reference href="https://bdu.fstec.ru/vul/2026-00576" type="self" id="BDU:2026-00576" title="BDU:2026-00576" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="144.0.7559.109" release="1.el7" arch="x86_64" src="chromium-144.0.7559.109-1.el7.src.rpm">
					<filename>chromedriver-0:144.0.7559.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="144.0.7559.109" release="1.el7" arch="x86_64" src="chromium-144.0.7559.109-1.el7.src.rpm">
					<filename>chromium-0:144.0.7559.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="144.0.7559.109" release="1.el7" arch="x86_64" src="chromium-144.0.7559.109-1.el7.src.rpm">
					<filename>chromium-common-0:144.0.7559.109-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0012</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-0905-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-0905-7.3/" type="self" id="ROS-20260310-73-0012" title="ROS-20260310-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0905" type="cve" id="CVE-2026-0905" title="CVE-2026-0905" />
			<reference href="https://bdu.fstec.ru/vul/2026-00510" type="self" id="BDU:2026-00510" title="BDU:2026-00510" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="144.0.7559.109" release="1.el7" arch="x86_64" src="chromium-144.0.7559.109-1.el7.src.rpm">
					<filename>chromedriver-0:144.0.7559.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="144.0.7559.109" release="1.el7" arch="x86_64" src="chromium-144.0.7559.109-1.el7.src.rpm">
					<filename>chromium-0:144.0.7559.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="144.0.7559.109" release="1.el7" arch="x86_64" src="chromium-144.0.7559.109-1.el7.src.rpm">
					<filename>chromium-common-0:144.0.7559.109-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0013</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-0906-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-0906-7.3/" type="self" id="ROS-20260310-73-0013" title="ROS-20260310-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0906" type="cve" id="CVE-2026-0906" title="CVE-2026-0906" />
			<reference href="https://bdu.fstec.ru/vul/2026-00511" type="self" id="BDU:2026-00511" title="BDU:2026-00511" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="144.0.7559.109" release="1.el7" arch="x86_64" src="chromium-144.0.7559.109-1.el7.src.rpm">
					<filename>chromedriver-0:144.0.7559.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="144.0.7559.109" release="1.el7" arch="x86_64" src="chromium-144.0.7559.109-1.el7.src.rpm">
					<filename>chromium-0:144.0.7559.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="144.0.7559.109" release="1.el7" arch="x86_64" src="chromium-144.0.7559.109-1.el7.src.rpm">
					<filename>chromium-common-0:144.0.7559.109-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0014</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-0907-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-0907-7.3/" type="self" id="ROS-20260310-73-0014" title="ROS-20260310-73-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0907" type="cve" id="CVE-2026-0907" title="CVE-2026-0907" />
			<reference href="https://bdu.fstec.ru/vul/2026-00512" type="self" id="BDU:2026-00512" title="BDU:2026-00512" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="144.0.7559.109" release="1.el7" arch="x86_64" src="chromium-144.0.7559.109-1.el7.src.rpm">
					<filename>chromedriver-0:144.0.7559.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="144.0.7559.109" release="1.el7" arch="x86_64" src="chromium-144.0.7559.109-1.el7.src.rpm">
					<filename>chromium-0:144.0.7559.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="144.0.7559.109" release="1.el7" arch="x86_64" src="chromium-144.0.7559.109-1.el7.src.rpm">
					<filename>chromium-common-0:144.0.7559.109-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0015</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-0908-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-0908-7.3/" type="self" id="ROS-20260310-73-0015" title="ROS-20260310-73-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0908" type="cve" id="CVE-2026-0908" title="CVE-2026-0908" />
			<reference href="https://bdu.fstec.ru/vul/2026-00459" type="self" id="BDU:2026-00459" title="BDU:2026-00459" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="144.0.7559.109" release="1.el7" arch="x86_64" src="chromium-144.0.7559.109-1.el7.src.rpm">
					<filename>chromedriver-0:144.0.7559.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="144.0.7559.109" release="1.el7" arch="x86_64" src="chromium-144.0.7559.109-1.el7.src.rpm">
					<filename>chromium-0:144.0.7559.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="144.0.7559.109" release="1.el7" arch="x86_64" src="chromium-144.0.7559.109-1.el7.src.rpm">
					<filename>chromium-common-0:144.0.7559.109-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0016</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость wireshark </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в wireshark</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-wireshark-cve-2026-0962-7.3/</description>
               <solution>Установить обновление для пакета(ов) wireshark
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-wireshark-cve-2026-0962-7.3/" type="self" id="ROS-20260310-73-0016" title="ROS-20260310-73-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0962" type="cve" id="CVE-2026-0962" title="CVE-2026-0962" />
			<reference href="https://bdu.fstec.ru/vul/2026-03613" type="self" id="BDU:2026-03613" title="BDU:2026-03613" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="wireshark" epoch="1" version="4.6.3" release="2.el7" arch="x86_64" src="wireshark-4.6.3-2.el7.src.rpm">
					<filename>wireshark-1:4.6.3-2.el7.x86_64.rpm</filename>
				</package>
				<package name="wireshark-cli" epoch="1" version="4.6.3" release="2.el7" arch="x86_64" src="wireshark-4.6.3-2.el7.src.rpm">
					<filename>wireshark-cli-1:4.6.3-2.el7.x86_64.rpm</filename>
				</package>
				<package name="wireshark-devel" epoch="1" version="4.6.3" release="2.el7" arch="x86_64" src="wireshark-4.6.3-2.el7.src.rpm">
					<filename>wireshark-devel-1:4.6.3-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0017</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость exim </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в exim</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-exim-cve-2025-67896-7.3/</description>
               <solution>Установить обновление для пакета(ов) exim
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-exim-cve-2025-67896-7.3/" type="self" id="ROS-20260310-73-0017" title="ROS-20260310-73-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67896" type="cve" id="CVE-2025-67896" title="CVE-2025-67896" />
			<reference href="https://bdu.fstec.ru/vul/2026-00906" type="self" id="BDU:2026-00906" title="BDU:2026-00906" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="exim" epoch="0" version="4.99.1" release="1.el7" arch="x86_64" src="exim-4.99.1-1.el7.src.rpm">
					<filename>exim-0:4.99.1-1.el7.x86_64.rpm</filename>
				</package>
				<package name="exim-greylist" epoch="0" version="4.99.1" release="1.el7" arch="x86_64" src="exim-4.99.1-1.el7.src.rpm">
					<filename>exim-greylist-0:4.99.1-1.el7.x86_64.rpm</filename>
				</package>
				<package name="exim-mon" epoch="0" version="4.99.1" release="1.el7" arch="x86_64" src="exim-4.99.1-1.el7.src.rpm">
					<filename>exim-mon-0:4.99.1-1.el7.x86_64.rpm</filename>
				</package>
				<package name="exim-mysql" epoch="0" version="4.99.1" release="1.el7" arch="x86_64" src="exim-4.99.1-1.el7.src.rpm">
					<filename>exim-mysql-0:4.99.1-1.el7.x86_64.rpm</filename>
				</package>
				<package name="exim-pgsql" epoch="0" version="4.99.1" release="1.el7" arch="x86_64" src="exim-4.99.1-1.el7.src.rpm">
					<filename>exim-pgsql-0:4.99.1-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0018</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость libsoup </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libsoup</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libsoup-cve-2025-14523-7.3/</description>
               <solution>Установить обновление для пакета(ов) libsoup
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libsoup-cve-2025-14523-7.3/" type="self" id="ROS-20260310-73-0018" title="ROS-20260310-73-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14523" type="cve" id="CVE-2025-14523" title="CVE-2025-14523" />
			<reference href="https://bdu.fstec.ru/vul/2026-03568" type="self" id="BDU:2026-03568" title="BDU:2026-03568" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libsoup" epoch="0" version="2.74.3" release="5.el7" arch="x86_64" src="libsoup-2.74.3-5.el7.src.rpm">
					<filename>libsoup-0:2.74.3-5.el7.x86_64.rpm</filename>
				</package>
				<package name="libsoup-devel" epoch="0" version="2.74.3" release="5.el7" arch="x86_64" src="libsoup-2.74.3-5.el7.src.rpm">
					<filename>libsoup-devel-0:2.74.3-5.el7.x86_64.rpm</filename>
				</package>
				<package name="libsoup-doc" epoch="0" version="2.74.3" release="5.el7" arch="noarch" src="libsoup-2.74.3-5.el7.src.rpm">
					<filename>libsoup-doc-0:2.74.3-5.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0019</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость vsftpd </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в vsftpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vsftpd-cve-2025-14242-7.3/</description>
               <solution>Установить обновление для пакета(ов) vsftpd
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vsftpd-cve-2025-14242-7.3/" type="self" id="ROS-20260310-73-0019" title="ROS-20260310-73-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14242" type="cve" id="CVE-2025-14242" title="CVE-2025-14242" />
			<reference href="https://bdu.fstec.ru/vul/2026-03569" type="self" id="BDU:2026-03569" title="BDU:2026-03569" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vsftpd" epoch="0" version="3.0.5" release="3.el7" arch="x86_64" src="vsftpd-3.0.5-3.el7.src.rpm">
					<filename>vsftpd-0:3.0.5-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0020</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость tinyproxy </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в tinyproxy</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tinyproxy-cve-2025-63938-7.3/</description>
               <solution>Установить обновление для пакета(ов) tinyproxy
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tinyproxy-cve-2025-63938-7.3/" type="self" id="ROS-20260310-73-0020" title="ROS-20260310-73-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-63938" type="cve" id="CVE-2025-63938" title="CVE-2025-63938" />
			<reference href="https://bdu.fstec.ru/vul/2026-03627" type="self" id="BDU:2026-03627" title="BDU:2026-03627" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tinyproxy" epoch="0" version="1.11.2" release="2.el7" arch="x86_64" src="tinyproxy-1.11.2-2.el7.src.rpm">
					<filename>tinyproxy-0:1.11.2-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0021</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость python-pymdown-extensions </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-pymdown-extensions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pymdown-extensions-cve-2025-68142-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-pymdown-extensions
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pymdown-extensions-cve-2025-68142-7.3/" type="self" id="ROS-20260310-73-0021" title="ROS-20260310-73-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68142" type="cve" id="CVE-2025-68142" title="CVE-2025-68142" />
			<reference href="https://bdu.fstec.ru/vul/2026-03573" type="self" id="BDU:2026-03573" title="BDU:2026-03573" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-pymdown-extensions" epoch="0" version="10.12" release="2.el7" arch="noarch" src="python-pymdown-extensions-10.12-2.el7.src.rpm">
					<filename>python3-pymdown-extensions-0:10.12-2.el7.noarch.rpm</filename>
				</package>
				<package name="python3-pymdown-extensions+extra" epoch="0" version="10.12" release="2.el7" arch="noarch" src="python-pymdown-extensions-10.12-2.el7.src.rpm">
					<filename>python3-pymdown-extensions+extra-0:10.12-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0022</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость python-filelock </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-filelock</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-filelock-cve-2025-68146-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-filelock
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-filelock-cve-2025-68146-7.3/" type="self" id="ROS-20260310-73-0022" title="ROS-20260310-73-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68146" type="cve" id="CVE-2025-68146" title="CVE-2025-68146" />
			<reference href="https://bdu.fstec.ru/vul/2026-03629" type="self" id="BDU:2026-03629" title="BDU:2026-03629" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python-filelock-doc" epoch="0" version="3.16.1" release="2.el7" arch="noarch" src="python-filelock-3.16.1-2.el7.src.rpm">
					<filename>python-filelock-doc-0:3.16.1-2.el7.noarch.rpm</filename>
				</package>
				<package name="python3-filelock" epoch="0" version="3.16.1" release="2.el7" arch="noarch" src="python-filelock-3.16.1-2.el7.src.rpm">
					<filename>python3-filelock-0:3.16.1-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0023</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость coredns </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в coredns</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-coredns-cve-2025-68151-7.3/</description>
               <solution>Установить обновление для пакета(ов) coredns
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-coredns-cve-2025-68151-7.3/" type="self" id="ROS-20260310-73-0023" title="ROS-20260310-73-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68151" type="cve" id="CVE-2025-68151" title="CVE-2025-68151" />
			<reference href="https://bdu.fstec.ru/vul/2026-03630" type="self" id="BDU:2026-03630" title="BDU:2026-03630" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="coredns" epoch="0" version="1.8.6" release="5.el7" arch="x86_64" src="coredns-1.8.6-5.el7.src.rpm">
					<filename>coredns-0:1.8.6-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0024</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость beats </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в beats</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-beats-cve-2025-68383-7.3/</description>
               <solution>Установить обновление для пакета(ов) beats
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-beats-cve-2025-68383-7.3/" type="self" id="ROS-20260310-73-0024" title="ROS-20260310-73-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68383" type="cve" id="CVE-2025-68383" title="CVE-2025-68383" />
			<reference href="https://bdu.fstec.ru/vul/2026-03566" type="self" id="BDU:2026-03566" title="BDU:2026-03566" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="auditbeat" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>auditbeat-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="auditbeat-docs" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>auditbeat-docs-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="beats" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>beats-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="filebeat" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>filebeat-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="filebeat-docs" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>filebeat-docs-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="heartbeat" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>heartbeat-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="heartbeat-docs" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>heartbeat-docs-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="metricbeat" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>metricbeat-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="metricbeat-docs" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>metricbeat-docs-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="packetbeat" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>packetbeat-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="packetbeat-docs" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>packetbeat-docs-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0025</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость beats </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в beats</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-beats-cve-2025-68388-7.3/</description>
               <solution>Установить обновление для пакета(ов) beats
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-beats-cve-2025-68388-7.3/" type="self" id="ROS-20260310-73-0025" title="ROS-20260310-73-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68388" type="cve" id="CVE-2025-68388" title="CVE-2025-68388" />
			<reference href="https://bdu.fstec.ru/vul/2026-03567" type="self" id="BDU:2026-03567" title="BDU:2026-03567" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="auditbeat" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>auditbeat-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="auditbeat-docs" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>auditbeat-docs-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="beats" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>beats-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="filebeat" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>filebeat-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="filebeat-docs" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>filebeat-docs-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="heartbeat" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>heartbeat-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="heartbeat-docs" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>heartbeat-docs-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="metricbeat" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>metricbeat-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="metricbeat-docs" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>metricbeat-docs-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="packetbeat" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>packetbeat-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="packetbeat-docs" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>packetbeat-docs-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0026</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость kf5-messagelib </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kf5-messagelib</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kf5-messagelib-cve-2025-69412-7.3/</description>
               <solution>Установить обновление для пакета(ов) kf5-messagelib
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kf5-messagelib-cve-2025-69412-7.3/" type="self" id="ROS-20260310-73-0026" title="ROS-20260310-73-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69412" type="cve" id="CVE-2025-69412" title="CVE-2025-69412" />
			<reference href="https://bdu.fstec.ru/vul/2026-03574" type="self" id="BDU:2026-03574" title="BDU:2026-03574" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kf5-messagelib" epoch="0" version="20.08.3" release="3.el7" arch="x86_64" src="kf5-messagelib-20.08.3-3.el7.src.rpm">
					<filename>kf5-messagelib-0:20.08.3-3.el7.x86_64.rpm</filename>
				</package>
				<package name="kf5-messagelib-devel" epoch="0" version="20.08.3" release="3.el7" arch="x86_64" src="kf5-messagelib-20.08.3-3.el7.src.rpm">
					<filename>kf5-messagelib-devel-0:20.08.3-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0027</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость libxml2 </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в libxml2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libxml2-cve-2026-0989-7.3/</description>
               <solution>Установить обновление для пакета(ов) libxml2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libxml2-cve-2026-0989-7.3/" type="self" id="ROS-20260310-73-0027" title="ROS-20260310-73-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0989" type="cve" id="CVE-2026-0989" title="CVE-2026-0989" />
			<reference href="https://bdu.fstec.ru/vul/2026-03633" type="self" id="BDU:2026-03633" title="BDU:2026-03633" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libxml2" epoch="0" version="2.9.8" release="24.el7.3" arch="x86_64" src="libxml2-2.9.8-24.el7.3.src.rpm">
					<filename>libxml2-0:2.9.8-24.el7.3.x86_64.rpm</filename>
				</package>
				<package name="libxml2-devel" epoch="0" version="2.9.8" release="24.el7.3" arch="x86_64" src="libxml2-2.9.8-24.el7.3.src.rpm">
					<filename>libxml2-devel-0:2.9.8-24.el7.3.x86_64.rpm</filename>
				</package>
				<package name="libxml2-static" epoch="0" version="2.9.8" release="24.el7.3" arch="x86_64" src="libxml2-2.9.8-24.el7.3.src.rpm">
					<filename>libxml2-static-0:2.9.8-24.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python2-libxml2" epoch="0" version="2.9.8" release="24.el7.3" arch="x86_64" src="libxml2-2.9.8-24.el7.3.src.rpm">
					<filename>python2-libxml2-0:2.9.8-24.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-libxml2" epoch="0" version="2.9.8" release="24.el7.3" arch="x86_64" src="libxml2-2.9.8-24.el7.3.src.rpm">
					<filename>python3-libxml2-0:2.9.8-24.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0028</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость libxml2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libxml2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libxml2-cve-2026-0990-7.3/</description>
               <solution>Установить обновление для пакета(ов) libxml2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libxml2-cve-2026-0990-7.3/" type="self" id="ROS-20260310-73-0028" title="ROS-20260310-73-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0990" type="cve" id="CVE-2026-0990" title="CVE-2026-0990" />
			<reference href="https://bdu.fstec.ru/vul/2026-03631" type="self" id="BDU:2026-03631" title="BDU:2026-03631" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libxml2" epoch="0" version="2.9.8" release="24.el7.3" arch="x86_64" src="libxml2-2.9.8-24.el7.3.src.rpm">
					<filename>libxml2-0:2.9.8-24.el7.3.x86_64.rpm</filename>
				</package>
				<package name="libxml2-devel" epoch="0" version="2.9.8" release="24.el7.3" arch="x86_64" src="libxml2-2.9.8-24.el7.3.src.rpm">
					<filename>libxml2-devel-0:2.9.8-24.el7.3.x86_64.rpm</filename>
				</package>
				<package name="libxml2-static" epoch="0" version="2.9.8" release="24.el7.3" arch="x86_64" src="libxml2-2.9.8-24.el7.3.src.rpm">
					<filename>libxml2-static-0:2.9.8-24.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python2-libxml2" epoch="0" version="2.9.8" release="24.el7.3" arch="x86_64" src="libxml2-2.9.8-24.el7.3.src.rpm">
					<filename>python2-libxml2-0:2.9.8-24.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-libxml2" epoch="0" version="2.9.8" release="24.el7.3" arch="x86_64" src="libxml2-2.9.8-24.el7.3.src.rpm">
					<filename>python3-libxml2-0:2.9.8-24.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0029</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость libxml2 </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в libxml2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libxml2-cve-2026-0992-7.3/</description>
               <solution>Установить обновление для пакета(ов) libxml2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libxml2-cve-2026-0992-7.3/" type="self" id="ROS-20260310-73-0029" title="ROS-20260310-73-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0992" type="cve" id="CVE-2026-0992" title="CVE-2026-0992" />
			<reference href="https://bdu.fstec.ru/vul/2026-03632" type="self" id="BDU:2026-03632" title="BDU:2026-03632" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libxml2" epoch="0" version="2.9.8" release="24.el7.3" arch="x86_64" src="libxml2-2.9.8-24.el7.3.src.rpm">
					<filename>libxml2-0:2.9.8-24.el7.3.x86_64.rpm</filename>
				</package>
				<package name="libxml2-devel" epoch="0" version="2.9.8" release="24.el7.3" arch="x86_64" src="libxml2-2.9.8-24.el7.3.src.rpm">
					<filename>libxml2-devel-0:2.9.8-24.el7.3.x86_64.rpm</filename>
				</package>
				<package name="libxml2-static" epoch="0" version="2.9.8" release="24.el7.3" arch="x86_64" src="libxml2-2.9.8-24.el7.3.src.rpm">
					<filename>libxml2-static-0:2.9.8-24.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python2-libxml2" epoch="0" version="2.9.8" release="24.el7.3" arch="x86_64" src="libxml2-2.9.8-24.el7.3.src.rpm">
					<filename>python2-libxml2-0:2.9.8-24.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-libxml2" epoch="0" version="2.9.8" release="24.el7.3" arch="x86_64" src="libxml2-2.9.8-24.el7.3.src.rpm">
					<filename>python3-libxml2-0:2.9.8-24.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0030</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость openldap </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в openldap</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openldap-cve-2026-22185-7.3/</description>
               <solution>Установить обновление для пакета(ов) openldap
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openldap-cve-2026-22185-7.3/" type="self" id="ROS-20260310-73-0030" title="ROS-20260310-73-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22185" type="cve" id="CVE-2026-22185" title="CVE-2026-22185" />
			<reference href="https://bdu.fstec.ru/vul/2026-03592" type="self" id="BDU:2026-03592" title="BDU:2026-03592" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openldap" epoch="0" version="2.4.55" release="10.el7" arch="x86_64" src="openldap-2.4.55-10.el7.src.rpm">
					<filename>openldap-0:2.4.55-10.el7.x86_64.rpm</filename>
				</package>
				<package name="openldap-clients" epoch="0" version="2.4.55" release="10.el7" arch="x86_64" src="openldap-2.4.55-10.el7.src.rpm">
					<filename>openldap-clients-0:2.4.55-10.el7.x86_64.rpm</filename>
				</package>
				<package name="openldap-devel" epoch="0" version="2.4.55" release="10.el7" arch="x86_64" src="openldap-2.4.55-10.el7.src.rpm">
					<filename>openldap-devel-0:2.4.55-10.el7.x86_64.rpm</filename>
				</package>
				<package name="openldap-servers" epoch="0" version="2.4.55" release="10.el7" arch="x86_64" src="openldap-2.4.55-10.el7.src.rpm">
					<filename>openldap-servers-0:2.4.55-10.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0031</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость openldap </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в openldap</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openldap-cve-2020-25710-7.3/</description>
               <solution>Установить обновление для пакета(ов) openldap
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openldap-cve-2020-25710-7.3/" type="self" id="ROS-20260310-73-0031" title="ROS-20260310-73-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25710" type="cve" id="CVE-2020-25710" title="CVE-2020-25710" />
			<reference href="https://bdu.fstec.ru/vul/2022-00230" type="self" id="BDU:2022-00230" title="BDU:2022-00230" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openldap" epoch="0" version="2.4.55" release="10.el7" arch="x86_64" src="openldap-2.4.55-10.el7.src.rpm">
					<filename>openldap-0:2.4.55-10.el7.x86_64.rpm</filename>
				</package>
				<package name="openldap-clients" epoch="0" version="2.4.55" release="10.el7" arch="x86_64" src="openldap-2.4.55-10.el7.src.rpm">
					<filename>openldap-clients-0:2.4.55-10.el7.x86_64.rpm</filename>
				</package>
				<package name="openldap-devel" epoch="0" version="2.4.55" release="10.el7" arch="x86_64" src="openldap-2.4.55-10.el7.src.rpm">
					<filename>openldap-devel-0:2.4.55-10.el7.x86_64.rpm</filename>
				</package>
				<package name="openldap-servers" epoch="0" version="2.4.55" release="10.el7" arch="x86_64" src="openldap-2.4.55-10.el7.src.rpm">
					<filename>openldap-servers-0:2.4.55-10.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0032</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость openldap </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в openldap</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openldap-cve-2020-25709-7.3/</description>
               <solution>Установить обновление для пакета(ов) openldap
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openldap-cve-2020-25709-7.3/" type="self" id="ROS-20260310-73-0032" title="ROS-20260310-73-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25709" type="cve" id="CVE-2020-25709" title="CVE-2020-25709" />
			<reference href="https://bdu.fstec.ru/vul/2022-00231" type="self" id="BDU:2022-00231" title="BDU:2022-00231" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openldap" epoch="0" version="2.4.55" release="10.el7" arch="x86_64" src="openldap-2.4.55-10.el7.src.rpm">
					<filename>openldap-0:2.4.55-10.el7.x86_64.rpm</filename>
				</package>
				<package name="openldap-clients" epoch="0" version="2.4.55" release="10.el7" arch="x86_64" src="openldap-2.4.55-10.el7.src.rpm">
					<filename>openldap-clients-0:2.4.55-10.el7.x86_64.rpm</filename>
				</package>
				<package name="openldap-devel" epoch="0" version="2.4.55" release="10.el7" arch="x86_64" src="openldap-2.4.55-10.el7.src.rpm">
					<filename>openldap-devel-0:2.4.55-10.el7.x86_64.rpm</filename>
				</package>
				<package name="openldap-servers" epoch="0" version="2.4.55" release="10.el7" arch="x86_64" src="openldap-2.4.55-10.el7.src.rpm">
					<filename>openldap-servers-0:2.4.55-10.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0033</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость perl </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в perl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-cve-2020-12723-7.3/</description>
               <solution>Установить обновление для пакета(ов) perl
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-cve-2020-12723-7.3/" type="self" id="ROS-20260310-73-0033" title="ROS-20260310-73-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12723" type="cve" id="CVE-2020-12723" title="CVE-2020-12723" />
			<reference href="https://bdu.fstec.ru/vul/2020-04041" type="self" id="BDU:2020-04041" title="BDU:2020-04041" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="perl" epoch="4" version="5.30.1" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-4:5.30.1-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-B" epoch="0" version="1.76" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-B-0:1.76-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-Devel-Peek" epoch="0" version="1.28" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Devel-Peek-0:1.28-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-DynaLoader" epoch="0" version="1.45" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-DynaLoader-0:1.45-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-Errno" epoch="0" version="1.30" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Errno-0:1.30-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-Fcntl" epoch="0" version="1.13" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Fcntl-0:1.13-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-File-DosGlob" epoch="0" version="1.12" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-File-DosGlob-0:1.12-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-GDBM_File" epoch="0" version="1.18" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-GDBM_File-0:1.18-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-Hash-Util" epoch="0" version="0.22" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Hash-Util-0:0.22-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-Hash-Util-FieldHash" epoch="0" version="1.20" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Hash-Util-FieldHash-0:1.20-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-I18N-Langinfo" epoch="0" version="0.18" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-I18N-Langinfo-0:0.18-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-IO" epoch="0" version="1.40" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-IO-0:1.40-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-NDBM_File" epoch="0" version="1.15" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-NDBM_File-0:1.15-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-ODBM_File" epoch="0" version="1.16" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-ODBM_File-0:1.16-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-Opcode" epoch="0" version="1.43" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Opcode-0:1.43-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-POSIX" epoch="0" version="1.88" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-POSIX-0:1.88-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-Sys-Hostname" epoch="0" version="1.22" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Sys-Hostname-0:1.22-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-Time-Piece" epoch="0" version="1.33" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Time-Piece-0:1.33-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-devel" epoch="4" version="5.30.1" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-devel-4:5.30.1-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-interpreter" epoch="4" version="5.30.1" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-interpreter-4:5.30.1-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-lib" epoch="0" version="0.65" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-lib-0:0.65-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-libs" epoch="4" version="5.30.1" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-libs-4:5.30.1-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-macros" epoch="4" version="5.30.1" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-macros-4:5.30.1-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-mro" epoch="0" version="1.22" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-mro-0:1.22-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-ph" epoch="0" version="5.30.1" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-ph-0:5.30.1-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-tests" epoch="4" version="5.30.1" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-tests-4:5.30.1-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-Attribute-Handlers" epoch="0" version="1.01" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Attribute-Handlers-0:1.01-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-AutoLoader" epoch="0" version="5.74" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-AutoLoader-0:5.74-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-AutoSplit" epoch="0" version="5.74" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-AutoSplit-0:5.74-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Benchmark" epoch="0" version="1.22" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Benchmark-0:1.22-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Class-Struct" epoch="0" version="0.65" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Class-Struct-0:0.65-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Config-Extensions" epoch="0" version="0.03" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Config-Extensions-0:0.03-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-DBM_Filter" epoch="0" version="0.06" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-DBM_Filter-0:0.06-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Devel-SelfStubber" epoch="0" version="1.06" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Devel-SelfStubber-0:1.06-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-DirHandle" epoch="0" version="1.05" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-DirHandle-0:1.05-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Dumpvalue" epoch="0" version="2.27" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Dumpvalue-0:2.27-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-English" epoch="0" version="1.10" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-English-0:1.10-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-ExtUtils-Constant" epoch="0" version="0.25" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-ExtUtils-Constant-0:0.25-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-ExtUtils-Embed" epoch="0" version="1.35" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-ExtUtils-Embed-0:1.35-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-ExtUtils-Miniperl" epoch="0" version="1.09" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-ExtUtils-Miniperl-0:1.09-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-File-Basename" epoch="0" version="2.85" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-File-Basename-0:2.85-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-File-Compare" epoch="0" version="1.100.600" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-File-Compare-0:1.100.600-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-File-Copy" epoch="0" version="2.34" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-File-Copy-0:2.34-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-File-Find" epoch="0" version="1.36" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-File-Find-0:1.36-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-File-stat" epoch="0" version="1.08" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-File-stat-0:1.08-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-FileCache" epoch="0" version="1.10" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-FileCache-0:1.10-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-FileHandle" epoch="0" version="2.03" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-FileHandle-0:2.03-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-FindBin" epoch="0" version="1.51" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-FindBin-0:1.51-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Getopt-Std" epoch="0" version="1.12" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Getopt-Std-0:1.12-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-I18N-Collate" epoch="0" version="1.02" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-I18N-Collate-0:1.02-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-I18N-LangTags" epoch="0" version="0.43" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-I18N-LangTags-0:0.43-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-IO-Zlib" epoch="1" version="1.10" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-IO-Zlib-1:1.10-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-IPC-Open3" epoch="0" version="1.20" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-IPC-Open3-0:1.20-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Locale-Maketext-Simple" epoch="1" version="0.21" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Locale-Maketext-Simple-1:0.21-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Math-Complex" epoch="0" version="1.59" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Math-Complex-0:1.59-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Memoize" epoch="0" version="1.03" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Memoize-0:1.03-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Module-Loaded" epoch="1" version="0.08" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Module-Loaded-1:0.08-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-NEXT" epoch="0" version="0.67" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-NEXT-0:0.67-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Net" epoch="0" version="1.02" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Net-0:1.02-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Net-Ping" epoch="0" version="2.71" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Net-Ping-0:2.71-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Pod-Functions" epoch="0" version="1.13" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Pod-Functions-0:1.13-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Pod-Html" epoch="0" version="1.24" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Pod-Html-0:1.24-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Safe" epoch="0" version="2.40" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Safe-0:2.40-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Search-Dict" epoch="0" version="1.07" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Search-Dict-0:1.07-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-SelectSaver" epoch="0" version="1.02" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-SelectSaver-0:1.02-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-SelfLoader" epoch="0" version="1.25" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-SelfLoader-0:1.25-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Symbol" epoch="0" version="1.08" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Symbol-0:1.08-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Term-Complete" epoch="0" version="1.403" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Term-Complete-0:1.403-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Term-ReadLine" epoch="0" version="1.17" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Term-ReadLine-0:1.17-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Test" epoch="0" version="1.31" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Test-0:1.31-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Text-Abbrev" epoch="0" version="1.02" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Text-Abbrev-0:1.02-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Thread" epoch="0" version="3.04" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Thread-0:3.04-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Thread-Semaphore" epoch="0" version="2.13" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Thread-Semaphore-0:2.13-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Tie" epoch="0" version="4.6" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Tie-0:4.6-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Tie-File" epoch="0" version="1.02" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Tie-File-0:1.02-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Tie-Memoize" epoch="0" version="1.1" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Tie-Memoize-0:1.1-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Tie-RefHash" epoch="0" version="1.39" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Tie-RefHash-0:1.39-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Time" epoch="0" version="1.03" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Time-0:1.03-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Unicode-UCD" epoch="0" version="0.72" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Unicode-UCD-0:0.72-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-User-pwent" epoch="0" version="1.03" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-User-pwent-0:1.03-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-autouse" epoch="0" version="1.11" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-autouse-0:1.11-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-base" epoch="0" version="2.27" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-base-0:2.27-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-blib" epoch="0" version="1.07" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-blib-0:1.07-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-debugger" epoch="0" version="1.55" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-debugger-0:1.55-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-deprecate" epoch="0" version="0.04" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-deprecate-0:0.04-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-diagnostics" epoch="0" version="1.36" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-diagnostics-0:1.36-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-doc" epoch="0" version="5.30.1" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-doc-0:5.30.1-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-encoding-warnings" epoch="0" version="0.13" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-encoding-warnings-0:0.13-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-fields" epoch="0" version="2.27" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-fields-0:2.27-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-filetest" epoch="0" version="1.03" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-filetest-0:1.03-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-if" epoch="0" version="0.60.800" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-if-0:0.60.800-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-less" epoch="0" version="0.03" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-less-0:0.03-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-libnetcfg" epoch="4" version="5.30.1" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-libnetcfg-4:5.30.1-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-locale" epoch="0" version="1.09" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-locale-0:1.09-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-meta-notation" epoch="0" version="5.30.1" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-meta-notation-0:5.30.1-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-open" epoch="0" version="1.11" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-open-0:1.11-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-overload" epoch="0" version="1.30" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-overload-0:1.30-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-overloading" epoch="0" version="0.02" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-overloading-0:0.02-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-sigtrap" epoch="0" version="1.09" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-sigtrap-0:1.09-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-sort" epoch="0" version="2.04" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-sort-0:2.04-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-subs" epoch="0" version="1.03" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-subs-0:1.03-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-utils" epoch="0" version="5.30.1" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-utils-0:5.30.1-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-vars" epoch="0" version="1.05" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-vars-0:1.05-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-vmsish" epoch="0" version="1.04" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-vmsish-0:1.04-468.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0034</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость perl </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в perl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-cve-2020-10878-7.3/</description>
               <solution>Установить обновление для пакета(ов) perl
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-perl-cve-2020-10878-7.3/" type="self" id="ROS-20260310-73-0034" title="ROS-20260310-73-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10878" type="cve" id="CVE-2020-10878" title="CVE-2020-10878" />
			<reference href="https://bdu.fstec.ru/vul/2020-04040" type="self" id="BDU:2020-04040" title="BDU:2020-04040" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="perl" epoch="4" version="5.30.1" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-4:5.30.1-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-B" epoch="0" version="1.76" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-B-0:1.76-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-Devel-Peek" epoch="0" version="1.28" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Devel-Peek-0:1.28-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-DynaLoader" epoch="0" version="1.45" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-DynaLoader-0:1.45-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-Errno" epoch="0" version="1.30" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Errno-0:1.30-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-Fcntl" epoch="0" version="1.13" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Fcntl-0:1.13-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-File-DosGlob" epoch="0" version="1.12" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-File-DosGlob-0:1.12-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-GDBM_File" epoch="0" version="1.18" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-GDBM_File-0:1.18-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-Hash-Util" epoch="0" version="0.22" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Hash-Util-0:0.22-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-Hash-Util-FieldHash" epoch="0" version="1.20" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Hash-Util-FieldHash-0:1.20-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-I18N-Langinfo" epoch="0" version="0.18" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-I18N-Langinfo-0:0.18-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-IO" epoch="0" version="1.40" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-IO-0:1.40-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-NDBM_File" epoch="0" version="1.15" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-NDBM_File-0:1.15-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-ODBM_File" epoch="0" version="1.16" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-ODBM_File-0:1.16-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-Opcode" epoch="0" version="1.43" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Opcode-0:1.43-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-POSIX" epoch="0" version="1.88" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-POSIX-0:1.88-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-Sys-Hostname" epoch="0" version="1.22" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Sys-Hostname-0:1.22-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-Time-Piece" epoch="0" version="1.33" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Time-Piece-0:1.33-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-devel" epoch="4" version="5.30.1" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-devel-4:5.30.1-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-interpreter" epoch="4" version="5.30.1" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-interpreter-4:5.30.1-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-lib" epoch="0" version="0.65" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-lib-0:0.65-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-libs" epoch="4" version="5.30.1" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-libs-4:5.30.1-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-macros" epoch="4" version="5.30.1" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-macros-4:5.30.1-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-mro" epoch="0" version="1.22" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-mro-0:1.22-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-ph" epoch="0" version="5.30.1" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-ph-0:5.30.1-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-tests" epoch="4" version="5.30.1" release="468.el7" arch="x86_64" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-tests-4:5.30.1-468.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-Attribute-Handlers" epoch="0" version="1.01" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Attribute-Handlers-0:1.01-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-AutoLoader" epoch="0" version="5.74" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-AutoLoader-0:5.74-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-AutoSplit" epoch="0" version="5.74" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-AutoSplit-0:5.74-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Benchmark" epoch="0" version="1.22" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Benchmark-0:1.22-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Class-Struct" epoch="0" version="0.65" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Class-Struct-0:0.65-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Config-Extensions" epoch="0" version="0.03" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Config-Extensions-0:0.03-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-DBM_Filter" epoch="0" version="0.06" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-DBM_Filter-0:0.06-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Devel-SelfStubber" epoch="0" version="1.06" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Devel-SelfStubber-0:1.06-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-DirHandle" epoch="0" version="1.05" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-DirHandle-0:1.05-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Dumpvalue" epoch="0" version="2.27" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Dumpvalue-0:2.27-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-English" epoch="0" version="1.10" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-English-0:1.10-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-ExtUtils-Constant" epoch="0" version="0.25" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-ExtUtils-Constant-0:0.25-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-ExtUtils-Embed" epoch="0" version="1.35" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-ExtUtils-Embed-0:1.35-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-ExtUtils-Miniperl" epoch="0" version="1.09" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-ExtUtils-Miniperl-0:1.09-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-File-Basename" epoch="0" version="2.85" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-File-Basename-0:2.85-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-File-Compare" epoch="0" version="1.100.600" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-File-Compare-0:1.100.600-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-File-Copy" epoch="0" version="2.34" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-File-Copy-0:2.34-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-File-Find" epoch="0" version="1.36" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-File-Find-0:1.36-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-File-stat" epoch="0" version="1.08" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-File-stat-0:1.08-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-FileCache" epoch="0" version="1.10" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-FileCache-0:1.10-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-FileHandle" epoch="0" version="2.03" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-FileHandle-0:2.03-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-FindBin" epoch="0" version="1.51" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-FindBin-0:1.51-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Getopt-Std" epoch="0" version="1.12" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Getopt-Std-0:1.12-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-I18N-Collate" epoch="0" version="1.02" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-I18N-Collate-0:1.02-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-I18N-LangTags" epoch="0" version="0.43" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-I18N-LangTags-0:0.43-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-IO-Zlib" epoch="1" version="1.10" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-IO-Zlib-1:1.10-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-IPC-Open3" epoch="0" version="1.20" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-IPC-Open3-0:1.20-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Locale-Maketext-Simple" epoch="1" version="0.21" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Locale-Maketext-Simple-1:0.21-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Math-Complex" epoch="0" version="1.59" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Math-Complex-0:1.59-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Memoize" epoch="0" version="1.03" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Memoize-0:1.03-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Module-Loaded" epoch="1" version="0.08" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Module-Loaded-1:0.08-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-NEXT" epoch="0" version="0.67" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-NEXT-0:0.67-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Net" epoch="0" version="1.02" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Net-0:1.02-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Net-Ping" epoch="0" version="2.71" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Net-Ping-0:2.71-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Pod-Functions" epoch="0" version="1.13" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Pod-Functions-0:1.13-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Pod-Html" epoch="0" version="1.24" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Pod-Html-0:1.24-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Safe" epoch="0" version="2.40" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Safe-0:2.40-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Search-Dict" epoch="0" version="1.07" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Search-Dict-0:1.07-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-SelectSaver" epoch="0" version="1.02" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-SelectSaver-0:1.02-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-SelfLoader" epoch="0" version="1.25" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-SelfLoader-0:1.25-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Symbol" epoch="0" version="1.08" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Symbol-0:1.08-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Term-Complete" epoch="0" version="1.403" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Term-Complete-0:1.403-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Term-ReadLine" epoch="0" version="1.17" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Term-ReadLine-0:1.17-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Test" epoch="0" version="1.31" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Test-0:1.31-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Text-Abbrev" epoch="0" version="1.02" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Text-Abbrev-0:1.02-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Thread" epoch="0" version="3.04" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Thread-0:3.04-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Thread-Semaphore" epoch="0" version="2.13" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Thread-Semaphore-0:2.13-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Tie" epoch="0" version="4.6" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Tie-0:4.6-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Tie-File" epoch="0" version="1.02" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Tie-File-0:1.02-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Tie-Memoize" epoch="0" version="1.1" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Tie-Memoize-0:1.1-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Tie-RefHash" epoch="0" version="1.39" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Tie-RefHash-0:1.39-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Time" epoch="0" version="1.03" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Time-0:1.03-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-Unicode-UCD" epoch="0" version="0.72" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-Unicode-UCD-0:0.72-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-User-pwent" epoch="0" version="1.03" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-User-pwent-0:1.03-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-autouse" epoch="0" version="1.11" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-autouse-0:1.11-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-base" epoch="0" version="2.27" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-base-0:2.27-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-blib" epoch="0" version="1.07" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-blib-0:1.07-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-debugger" epoch="0" version="1.55" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-debugger-0:1.55-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-deprecate" epoch="0" version="0.04" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-deprecate-0:0.04-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-diagnostics" epoch="0" version="1.36" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-diagnostics-0:1.36-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-doc" epoch="0" version="5.30.1" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-doc-0:5.30.1-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-encoding-warnings" epoch="0" version="0.13" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-encoding-warnings-0:0.13-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-fields" epoch="0" version="2.27" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-fields-0:2.27-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-filetest" epoch="0" version="1.03" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-filetest-0:1.03-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-if" epoch="0" version="0.60.800" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-if-0:0.60.800-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-less" epoch="0" version="0.03" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-less-0:0.03-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-libnetcfg" epoch="4" version="5.30.1" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-libnetcfg-4:5.30.1-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-locale" epoch="0" version="1.09" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-locale-0:1.09-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-meta-notation" epoch="0" version="5.30.1" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-meta-notation-0:5.30.1-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-open" epoch="0" version="1.11" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-open-0:1.11-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-overload" epoch="0" version="1.30" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-overload-0:1.30-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-overloading" epoch="0" version="0.02" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-overloading-0:0.02-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-sigtrap" epoch="0" version="1.09" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-sigtrap-0:1.09-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-sort" epoch="0" version="2.04" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-sort-0:2.04-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-subs" epoch="0" version="1.03" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-subs-0:1.03-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-utils" epoch="0" version="5.30.1" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-utils-0:5.30.1-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-vars" epoch="0" version="1.05" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-vars-0:1.05-468.el7.noarch.rpm</filename>
				</package>
				<package name="perl-vmsish" epoch="0" version="1.04" release="468.el7" arch="noarch" src="perl-5.30.1-468.el7.src.rpm">
					<filename>perl-vmsish-0:1.04-468.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0035</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость python-wheel </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-wheel</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-wheel-cve-2026-24049-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-wheel
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-wheel-cve-2026-24049-7.3/" type="self" id="ROS-20260310-73-0035" title="ROS-20260310-73-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24049" type="cve" id="CVE-2026-24049" title="CVE-2026-24049" />
			<reference href="https://bdu.fstec.ru/vul/2026-03593" type="self" id="BDU:2026-03593" title="BDU:2026-03593" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python-wheel-doc" epoch="1" version="0.45.1" release="3.el7" arch="noarch" src="python-wheel-0.45.1-3.el7.src.rpm">
					<filename>python-wheel-doc-1:0.45.1-3.el7.noarch.rpm</filename>
				</package>
				<package name="python-wheel-wheel" epoch="1" version="0.45.1" release="3.el7" arch="noarch" src="python-wheel-0.45.1-3.el7.src.rpm">
					<filename>python-wheel-wheel-1:0.45.1-3.el7.noarch.rpm</filename>
				</package>
				<package name="python3-wheel" epoch="1" version="0.45.1" release="3.el7" arch="noarch" src="python-wheel-0.45.1-3.el7.src.rpm">
					<filename>python3-wheel-1:0.45.1-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0036</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость grafana </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в grafana</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grafana-cve-2026-21720-7.3/</description>
               <solution>Установить обновление для пакета(ов) grafana
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grafana-cve-2026-21720-7.3/" type="self" id="ROS-20260310-73-0036" title="ROS-20260310-73-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21720" type="cve" id="CVE-2026-21720" title="CVE-2026-21720" />
			<reference href="https://bdu.fstec.ru/vul/2026-03572" type="self" id="BDU:2026-03572" title="BDU:2026-03572" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="grafana" epoch="0" version="11.6.11" release="1.el7" arch="x86_64" src="grafana-11.6.11-1.el7.src.rpm">
					<filename>grafana-0:11.6.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="grafana-selinux" epoch="0" version="11.6.11" release="1.el7" arch="noarch" src="grafana-11.6.11-1.el7.src.rpm">
					<filename>grafana-selinux-0:11.6.11-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0037</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-1504-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-1504-7.3/" type="self" id="ROS-20260310-73-0037" title="ROS-20260310-73-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1504" type="cve" id="CVE-2026-1504" title="CVE-2026-1504" />
			<reference href="https://bdu.fstec.ru/vul/2026-00964" type="self" id="BDU:2026-00964" title="BDU:2026-00964" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="144.0.7559.109" release="1.el7" arch="x86_64" src="chromium-144.0.7559.109-1.el7.src.rpm">
					<filename>chromedriver-0:144.0.7559.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="144.0.7559.109" release="1.el7" arch="x86_64" src="chromium-144.0.7559.109-1.el7.src.rpm">
					<filename>chromium-0:144.0.7559.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="144.0.7559.109" release="1.el7" arch="x86_64" src="chromium-144.0.7559.109-1.el7.src.rpm">
					<filename>chromium-common-0:144.0.7559.109-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0038</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-1861-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-1861-7.3/" type="self" id="ROS-20260310-73-0038" title="ROS-20260310-73-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1861" type="cve" id="CVE-2026-1861" title="CVE-2026-1861" />
			<reference href="https://bdu.fstec.ru/vul/2026-01937" type="self" id="BDU:2026-01937" title="BDU:2026-01937" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="144.0.7559.109" release="1.el7" arch="x86_64" src="chromium-144.0.7559.109-1.el7.src.rpm">
					<filename>chromedriver-0:144.0.7559.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="144.0.7559.109" release="1.el7" arch="x86_64" src="chromium-144.0.7559.109-1.el7.src.rpm">
					<filename>chromium-0:144.0.7559.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="144.0.7559.109" release="1.el7" arch="x86_64" src="chromium-144.0.7559.109-1.el7.src.rpm">
					<filename>chromium-common-0:144.0.7559.109-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0039</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-1862-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-1862-7.3/" type="self" id="ROS-20260310-73-0039" title="ROS-20260310-73-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1862" type="cve" id="CVE-2026-1862" title="CVE-2026-1862" />
			<reference href="https://bdu.fstec.ru/vul/2026-01938" type="self" id="BDU:2026-01938" title="BDU:2026-01938" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="144.0.7559.109" release="1.el7" arch="x86_64" src="chromium-144.0.7559.109-1.el7.src.rpm">
					<filename>chromedriver-0:144.0.7559.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="144.0.7559.109" release="1.el7" arch="x86_64" src="chromium-144.0.7559.109-1.el7.src.rpm">
					<filename>chromium-0:144.0.7559.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="144.0.7559.109" release="1.el7" arch="x86_64" src="chromium-144.0.7559.109-1.el7.src.rpm">
					<filename>chromium-common-0:144.0.7559.109-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0040</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость nettle </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nettle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nettle-cve-2021-20305-7.3/</description>
               <solution>Установить обновление для пакета(ов) nettle
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nettle-cve-2021-20305-7.3/" type="self" id="ROS-20260310-73-0040" title="ROS-20260310-73-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20305" type="cve" id="CVE-2021-20305" title="CVE-2021-20305" />
			<reference href="https://bdu.fstec.ru/vul/2021-02748" type="self" id="BDU:2021-02748" title="BDU:2021-02748" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nettle" epoch="0" version="3.5.1" release="3.el7" arch="x86_64" src="nettle-3.5.1-3.el7.src.rpm">
					<filename>nettle-0:3.5.1-3.el7.x86_64.rpm</filename>
				</package>
				<package name="nettle-devel" epoch="0" version="3.5.1" release="3.el7" arch="x86_64" src="nettle-3.5.1-3.el7.src.rpm">
					<filename>nettle-devel-0:3.5.1-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0041</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость python-jaraco-context </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-jaraco-context</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-jaraco-context-cve-2026-23949-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-jaraco-context
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-jaraco-context-cve-2026-23949-7.3/" type="self" id="ROS-20260310-73-0041" title="ROS-20260310-73-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23949" type="cve" id="CVE-2026-23949" title="CVE-2026-23949" />
			<reference href="https://bdu.fstec.ru/vul/2026-03594" type="self" id="BDU:2026-03594" title="BDU:2026-03594" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-jaraco-context" epoch="0" version="5.3.0" release="2.el7" arch="noarch" src="python-jaraco-context-5.3.0-2.el7.src.rpm">
					<filename>python3-jaraco-context-0:5.3.0-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0042</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость python-setuptools </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-setuptools</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-setuptools-cve-2026-23949-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-setuptools
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-setuptools-cve-2026-23949-7.3/" type="self" id="ROS-20260310-73-0042" title="ROS-20260310-73-0042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23949" type="cve" id="CVE-2026-23949" title="CVE-2026-23949" />
			<reference href="https://bdu.fstec.ru/vul/2026-03594" type="self" id="BDU:2026-03594" title="BDU:2026-03594" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python-setuptools-wheel" epoch="0" version="75.3.2" release="2.el7" arch="noarch" src="python-setuptools-75.3.2-2.el7.src.rpm">
					<filename>python-setuptools-wheel-0:75.3.2-2.el7.noarch.rpm</filename>
				</package>
				<package name="python3-setuptools" epoch="0" version="75.3.2" release="2.el7" arch="noarch" src="python-setuptools-75.3.2-2.el7.src.rpm">
					<filename>python3-setuptools-0:75.3.2-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0043</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость python-django </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-django</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-django-cve-2025-13473-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-django
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-django-cve-2025-13473-7.3/" type="self" id="ROS-20260310-73-0043" title="ROS-20260310-73-0043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13473" type="cve" id="CVE-2025-13473" title="CVE-2025-13473" />
			<reference href="https://bdu.fstec.ru/vul/2026-03464" type="self" id="BDU:2026-03464" title="BDU:2026-03464" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python-django-bash-completion" epoch="0" version="4.2.28" release="1.el7" arch="noarch" src="python-django-4.2.28-1.el7.src.rpm">
					<filename>python-django-bash-completion-0:4.2.28-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-django" epoch="0" version="4.2.28" release="1.el7" arch="noarch" src="python-django-4.2.28-1.el7.src.rpm">
					<filename>python3-django-0:4.2.28-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-django-doc" epoch="0" version="4.2.28" release="1.el7" arch="noarch" src="python-django-4.2.28-1.el7.src.rpm">
					<filename>python3-django-doc-0:4.2.28-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0044</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость python-django </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-django</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-django-cve-2025-14550-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-django
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-django-cve-2025-14550-7.3/" type="self" id="ROS-20260310-73-0044" title="ROS-20260310-73-0044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14550" type="cve" id="CVE-2025-14550" title="CVE-2025-14550" />
			<reference href="https://bdu.fstec.ru/vul/2026-03465" type="self" id="BDU:2026-03465" title="BDU:2026-03465" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python-django-bash-completion" epoch="0" version="4.2.28" release="1.el7" arch="noarch" src="python-django-4.2.28-1.el7.src.rpm">
					<filename>python-django-bash-completion-0:4.2.28-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-django" epoch="0" version="4.2.28" release="1.el7" arch="noarch" src="python-django-4.2.28-1.el7.src.rpm">
					<filename>python3-django-0:4.2.28-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-django-doc" epoch="0" version="4.2.28" release="1.el7" arch="noarch" src="python-django-4.2.28-1.el7.src.rpm">
					<filename>python3-django-doc-0:4.2.28-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0045</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость python-django </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-django</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-django-cve-2026-1207-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-django
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-django-cve-2026-1207-7.3/" type="self" id="ROS-20260310-73-0045" title="ROS-20260310-73-0045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1207" type="cve" id="CVE-2026-1207" title="CVE-2026-1207" />
			<reference href="https://bdu.fstec.ru/vul/2026-03466" type="self" id="BDU:2026-03466" title="BDU:2026-03466" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python-django-bash-completion" epoch="0" version="4.2.28" release="1.el7" arch="noarch" src="python-django-4.2.28-1.el7.src.rpm">
					<filename>python-django-bash-completion-0:4.2.28-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-django" epoch="0" version="4.2.28" release="1.el7" arch="noarch" src="python-django-4.2.28-1.el7.src.rpm">
					<filename>python3-django-0:4.2.28-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-django-doc" epoch="0" version="4.2.28" release="1.el7" arch="noarch" src="python-django-4.2.28-1.el7.src.rpm">
					<filename>python3-django-doc-0:4.2.28-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0046</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость python-django </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-django</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-django-cve-2026-1285-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-django
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-django-cve-2026-1285-7.3/" type="self" id="ROS-20260310-73-0046" title="ROS-20260310-73-0046" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1285" type="cve" id="CVE-2026-1285" title="CVE-2026-1285" />
			<reference href="https://bdu.fstec.ru/vul/2026-03467" type="self" id="BDU:2026-03467" title="BDU:2026-03467" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python-django-bash-completion" epoch="0" version="4.2.28" release="1.el7" arch="noarch" src="python-django-4.2.28-1.el7.src.rpm">
					<filename>python-django-bash-completion-0:4.2.28-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-django" epoch="0" version="4.2.28" release="1.el7" arch="noarch" src="python-django-4.2.28-1.el7.src.rpm">
					<filename>python3-django-0:4.2.28-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-django-doc" epoch="0" version="4.2.28" release="1.el7" arch="noarch" src="python-django-4.2.28-1.el7.src.rpm">
					<filename>python3-django-doc-0:4.2.28-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0047</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость python-django </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-django</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-django-cve-2026-1287-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-django
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-django-cve-2026-1287-7.3/" type="self" id="ROS-20260310-73-0047" title="ROS-20260310-73-0047" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1287" type="cve" id="CVE-2026-1287" title="CVE-2026-1287" />
			<reference href="https://bdu.fstec.ru/vul/2026-03469" type="self" id="BDU:2026-03469" title="BDU:2026-03469" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python-django-bash-completion" epoch="0" version="4.2.28" release="1.el7" arch="noarch" src="python-django-4.2.28-1.el7.src.rpm">
					<filename>python-django-bash-completion-0:4.2.28-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-django" epoch="0" version="4.2.28" release="1.el7" arch="noarch" src="python-django-4.2.28-1.el7.src.rpm">
					<filename>python3-django-0:4.2.28-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-django-doc" epoch="0" version="4.2.28" release="1.el7" arch="noarch" src="python-django-4.2.28-1.el7.src.rpm">
					<filename>python3-django-doc-0:4.2.28-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0048</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость golang-k8s-ingress-nginx </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang-k8s-ingress-nginx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-k8s-ingress-nginx-cve-2026-1580-7.3/</description>
               <solution>Установить обновление для пакета(ов) golang-k8s-ingress-nginx
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-k8s-ingress-nginx-cve-2026-1580-7.3/" type="self" id="ROS-20260310-73-0048" title="ROS-20260310-73-0048" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1580" type="cve" id="CVE-2026-1580" title="CVE-2026-1580" />
			<reference href="https://bdu.fstec.ru/vul/2026-03565" type="self" id="BDU:2026-03565" title="BDU:2026-03565" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang-k8s-ingress-nginx" epoch="0" version="1.13.7" release="1.el7" arch="x86_64" src="golang-k8s-ingress-nginx-1.13.7-1.el7.src.rpm">
					<filename>golang-k8s-ingress-nginx-0:1.13.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0049</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость golang-k8s-ingress-nginx </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang-k8s-ingress-nginx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-k8s-ingress-nginx-cve-2025-15566-7.3/</description>
               <solution>Установить обновление для пакета(ов) golang-k8s-ingress-nginx
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-k8s-ingress-nginx-cve-2025-15566-7.3/" type="self" id="ROS-20260310-73-0049" title="ROS-20260310-73-0049" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15566" type="cve" id="CVE-2025-15566" title="CVE-2025-15566" />
			<reference href="https://bdu.fstec.ru/vul/2026-03604" type="self" id="BDU:2026-03604" title="BDU:2026-03604" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang-k8s-ingress-nginx" epoch="0" version="1.13.7" release="1.el7" arch="x86_64" src="golang-k8s-ingress-nginx-1.13.7-1.el7.src.rpm">
					<filename>golang-k8s-ingress-nginx-0:1.13.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0050</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2025-61732-7.3/</description>
               <solution>Установить обновление для пакета(ов) golang
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2025-61732-7.3/" type="self" id="ROS-20260310-73-0050" title="ROS-20260310-73-0050" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61732" type="cve" id="CVE-2025-61732" title="CVE-2025-61732" />
			<reference href="https://bdu.fstec.ru/vul/2026-02553" type="self" id="BDU:2026-02553" title="BDU:2026-02553" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.25.7" release="1.el7" arch="x86_64" src="golang-1.25.7-1.el7.src.rpm">
					<filename>golang-0:1.25.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.25.7" release="1.el7" arch="x86_64" src="golang-1.25.7-1.el7.src.rpm">
					<filename>golang-bin-0:1.25.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.25.7" release="1.el7" arch="x86_64" src="golang-1.25.7-1.el7.src.rpm">
					<filename>golang-shared-0:1.25.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-docs" epoch="0" version="1.25.7" release="1.el7" arch="noarch" src="golang-1.25.7-1.el7.src.rpm">
					<filename>golang-docs-0:1.25.7-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-misc" epoch="0" version="1.25.7" release="1.el7" arch="noarch" src="golang-1.25.7-1.el7.src.rpm">
					<filename>golang-misc-0:1.25.7-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-src" epoch="0" version="1.25.7" release="1.el7" arch="noarch" src="golang-1.25.7-1.el7.src.rpm">
					<filename>golang-src-0:1.25.7-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-tests" epoch="0" version="1.25.7" release="1.el7" arch="noarch" src="golang-1.25.7-1.el7.src.rpm">
					<filename>golang-tests-0:1.25.7-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-73-0051</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость angie </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в angie</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-angie-cve-2026-1642-7.3/</description>
               <solution>Установить обновление для пакета(ов) angie
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-angie-cve-2026-1642-7.3/" type="self" id="ROS-20260310-73-0051" title="ROS-20260310-73-0051" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1642" type="cve" id="CVE-2026-1642" title="CVE-2026-1642" />
			<reference href="https://bdu.fstec.ru/vul/2026-03559" type="self" id="BDU:2026-03559" title="BDU:2026-03559" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="angie" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-auth-jwt" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-auth-jwt-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-auth-ldap" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-auth-ldap-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-auth-pam" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-auth-pam-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-auth-spnego" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-auth-spnego-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-auth-totp" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-auth-totp-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-brotli" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-brotli-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-cache-purge" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-cache-purge-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-cgi" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-cgi-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-combined-upstreams" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-combined-upstreams-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-dav-ext" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-dav-ext-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-dynamic-limit-req" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-dynamic-limit-req-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-echo" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-echo-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-enhanced-memcached" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-enhanced-memcached-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-eval" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-eval-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-geoip2" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-geoip2-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-headers-more" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-headers-more-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-http-auth-radius" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-http-auth-radius-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-image-filter" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-image-filter-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-keyval" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-keyval-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-lua" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-lua-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-modsecurity" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-modsecurity-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-ndk" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-ndk-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-njs" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-njs-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-njs-cli" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-njs-cli-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-njs-light" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-njs-light-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-njs-light-cli" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-njs-light-cli-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-opentracing" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-opentracing-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-otel" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-otel-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-perl" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-perl-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-postgres" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-postgres-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-redis2" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-redis2-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-rtmp" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-rtmp-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-set-misc" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-set-misc-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-subs" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-subs-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-testcookie" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-testcookie-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-unbrotli" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-unbrotli-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-upload" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-upload-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-vod" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-vod-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-vts" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-vts-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-wamr" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-wamr-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-wasm" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-wasm-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-wasmtime" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-wasmtime-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-xslt" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-xslt-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-zip" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-zip-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-zstd" epoch="0" version="1.11.3" release="1.el7" arch="x86_64" src="angie-1.11.3-1.el7.src.rpm">
					<filename>angie-module-zstd-0:1.11.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260311-73-0001</id>
		<issued date="2026-03-11" />
		<updated date="2026-03-11" />
		<title>Уязвимость mongodb-org </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2026-1847-7.3/</description>
               <solution>Установить обновление для пакета(ов) mongodb-org
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2026-1847-7.3/" type="self" id="ROS-20260311-73-0001" title="ROS-20260311-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1847" type="cve" id="CVE-2026-1847" title="CVE-2026-1847" />
			<reference href="https://bdu.fstec.ru/vul/2026-03576" type="self" id="BDU:2026-03576" title="BDU:2026-03576" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mongodb-org" epoch="0" version="7.0.30" release="1.el7" arch="x86_64" src="mongodb-org-7.0.30-1.el7.src.rpm">
					<filename>mongodb-org-0:7.0.30-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-mongos" epoch="0" version="7.0.30" release="1.el7" arch="x86_64" src="mongodb-org-7.0.30-1.el7.src.rpm">
					<filename>mongodb-org-mongos-0:7.0.30-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-server" epoch="0" version="7.0.30" release="1.el7" arch="x86_64" src="mongodb-org-7.0.30-1.el7.src.rpm">
					<filename>mongodb-org-server-0:7.0.30-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-shell" epoch="0" version="7.0.30" release="1.el7" arch="x86_64" src="mongodb-org-7.0.30-1.el7.src.rpm">
					<filename>mongodb-org-shell-0:7.0.30-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260311-73-0002</id>
		<issued date="2026-03-11" />
		<updated date="2026-03-11" />
		<title>Уязвимость mongodb-org </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2026-1848-7.3/</description>
               <solution>Установить обновление для пакета(ов) mongodb-org
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2026-1848-7.3/" type="self" id="ROS-20260311-73-0002" title="ROS-20260311-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1848" type="cve" id="CVE-2026-1848" title="CVE-2026-1848" />
			<reference href="https://bdu.fstec.ru/vul/2026-03575" type="self" id="BDU:2026-03575" title="BDU:2026-03575" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mongodb-org" epoch="0" version="7.0.30" release="1.el7" arch="x86_64" src="mongodb-org-7.0.30-1.el7.src.rpm">
					<filename>mongodb-org-0:7.0.30-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-mongos" epoch="0" version="7.0.30" release="1.el7" arch="x86_64" src="mongodb-org-7.0.30-1.el7.src.rpm">
					<filename>mongodb-org-mongos-0:7.0.30-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-server" epoch="0" version="7.0.30" release="1.el7" arch="x86_64" src="mongodb-org-7.0.30-1.el7.src.rpm">
					<filename>mongodb-org-server-0:7.0.30-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-shell" epoch="0" version="7.0.30" release="1.el7" arch="x86_64" src="mongodb-org-7.0.30-1.el7.src.rpm">
					<filename>mongodb-org-shell-0:7.0.30-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260311-73-0003</id>
		<issued date="2026-03-11" />
		<updated date="2026-03-11" />
		<title>Уязвимость mongodb-org </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2026-25609-7.3/</description>
               <solution>Установить обновление для пакета(ов) mongodb-org
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2026-25609-7.3/" type="self" id="ROS-20260311-73-0003" title="ROS-20260311-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25609" type="cve" id="CVE-2026-25609" title="CVE-2026-25609" />
			<reference href="https://bdu.fstec.ru/vul/2026-03577" type="self" id="BDU:2026-03577" title="BDU:2026-03577" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mongodb-org" epoch="0" version="7.0.30" release="1.el7" arch="x86_64" src="mongodb-org-7.0.30-1.el7.src.rpm">
					<filename>mongodb-org-0:7.0.30-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-mongos" epoch="0" version="7.0.30" release="1.el7" arch="x86_64" src="mongodb-org-7.0.30-1.el7.src.rpm">
					<filename>mongodb-org-mongos-0:7.0.30-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-server" epoch="0" version="7.0.30" release="1.el7" arch="x86_64" src="mongodb-org-7.0.30-1.el7.src.rpm">
					<filename>mongodb-org-server-0:7.0.30-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-shell" epoch="0" version="7.0.30" release="1.el7" arch="x86_64" src="mongodb-org-7.0.30-1.el7.src.rpm">
					<filename>mongodb-org-shell-0:7.0.30-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260311-73-0004</id>
		<issued date="2026-03-11" />
		<updated date="2026-03-11" />
		<title>Уязвимость mongodb-org </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2026-25610-7.3/</description>
               <solution>Установить обновление для пакета(ов) mongodb-org
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2026-25610-7.3/" type="self" id="ROS-20260311-73-0004" title="ROS-20260311-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25610" type="cve" id="CVE-2026-25610" title="CVE-2026-25610" />
			<reference href="https://bdu.fstec.ru/vul/2026-03578" type="self" id="BDU:2026-03578" title="BDU:2026-03578" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mongodb-org" epoch="0" version="7.0.30" release="1.el7" arch="x86_64" src="mongodb-org-7.0.30-1.el7.src.rpm">
					<filename>mongodb-org-0:7.0.30-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-mongos" epoch="0" version="7.0.30" release="1.el7" arch="x86_64" src="mongodb-org-7.0.30-1.el7.src.rpm">
					<filename>mongodb-org-mongos-0:7.0.30-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-server" epoch="0" version="7.0.30" release="1.el7" arch="x86_64" src="mongodb-org-7.0.30-1.el7.src.rpm">
					<filename>mongodb-org-server-0:7.0.30-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-shell" epoch="0" version="7.0.30" release="1.el7" arch="x86_64" src="mongodb-org-7.0.30-1.el7.src.rpm">
					<filename>mongodb-org-shell-0:7.0.30-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260311-73-0005</id>
		<issued date="2026-03-11" />
		<updated date="2026-03-11" />
		<title>Уязвимость mongodb-org </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2026-25611-7.3/</description>
               <solution>Установить обновление для пакета(ов) mongodb-org
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2026-25611-7.3/" type="self" id="ROS-20260311-73-0005" title="ROS-20260311-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25611" type="cve" id="CVE-2026-25611" title="CVE-2026-25611" />
			<reference href="https://bdu.fstec.ru/vul/2026-03579" type="self" id="BDU:2026-03579" title="BDU:2026-03579" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mongodb-org" epoch="0" version="7.0.30" release="1.el7" arch="x86_64" src="mongodb-org-7.0.30-1.el7.src.rpm">
					<filename>mongodb-org-0:7.0.30-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-mongos" epoch="0" version="7.0.30" release="1.el7" arch="x86_64" src="mongodb-org-7.0.30-1.el7.src.rpm">
					<filename>mongodb-org-mongos-0:7.0.30-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-server" epoch="0" version="7.0.30" release="1.el7" arch="x86_64" src="mongodb-org-7.0.30-1.el7.src.rpm">
					<filename>mongodb-org-server-0:7.0.30-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-shell" epoch="0" version="7.0.30" release="1.el7" arch="x86_64" src="mongodb-org-7.0.30-1.el7.src.rpm">
					<filename>mongodb-org-shell-0:7.0.30-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260311-73-0006</id>
		<issued date="2026-03-11" />
		<updated date="2026-03-11" />
		<title>Уязвимость mongodb-org </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2026-25612-7.3/</description>
               <solution>Установить обновление для пакета(ов) mongodb-org
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2026-25612-7.3/" type="self" id="ROS-20260311-73-0006" title="ROS-20260311-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25612" type="cve" id="CVE-2026-25612" title="CVE-2026-25612" />
			<reference href="https://bdu.fstec.ru/vul/2026-01954" type="self" id="BDU:2026-01954" title="BDU:2026-01954" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mongodb-org" epoch="0" version="7.0.30" release="1.el7" arch="x86_64" src="mongodb-org-7.0.30-1.el7.src.rpm">
					<filename>mongodb-org-0:7.0.30-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-mongos" epoch="0" version="7.0.30" release="1.el7" arch="x86_64" src="mongodb-org-7.0.30-1.el7.src.rpm">
					<filename>mongodb-org-mongos-0:7.0.30-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-server" epoch="0" version="7.0.30" release="1.el7" arch="x86_64" src="mongodb-org-7.0.30-1.el7.src.rpm">
					<filename>mongodb-org-server-0:7.0.30-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-shell" epoch="0" version="7.0.30" release="1.el7" arch="x86_64" src="mongodb-org-7.0.30-1.el7.src.rpm">
					<filename>mongodb-org-shell-0:7.0.30-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260311-73-0007</id>
		<issued date="2026-03-11" />
		<updated date="2026-03-11" />
		<title>Уязвимость mongodb-org </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2026-1849-7.3/</description>
               <solution>Установить обновление для пакета(ов) mongodb-org
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2026-1849-7.3/" type="self" id="ROS-20260311-73-0007" title="ROS-20260311-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1849" type="cve" id="CVE-2026-1849" title="CVE-2026-1849" />
			<reference href="https://bdu.fstec.ru/vul/2026-01873" type="self" id="BDU:2026-01873" title="BDU:2026-01873" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mongodb-org" epoch="0" version="7.0.30" release="1.el7" arch="x86_64" src="mongodb-org-7.0.30-1.el7.src.rpm">
					<filename>mongodb-org-0:7.0.30-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-mongos" epoch="0" version="7.0.30" release="1.el7" arch="x86_64" src="mongodb-org-7.0.30-1.el7.src.rpm">
					<filename>mongodb-org-mongos-0:7.0.30-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-server" epoch="0" version="7.0.30" release="1.el7" arch="x86_64" src="mongodb-org-7.0.30-1.el7.src.rpm">
					<filename>mongodb-org-server-0:7.0.30-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-shell" epoch="0" version="7.0.30" release="1.el7" arch="x86_64" src="mongodb-org-7.0.30-1.el7.src.rpm">
					<filename>mongodb-org-shell-0:7.0.30-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260311-73-0008</id>
		<issued date="2026-03-11" />
		<updated date="2026-03-11" />
		<title>Уязвимость mongodb-org </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2026-1850-7.3/</description>
               <solution>Установить обновление для пакета(ов) mongodb-org
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2026-1850-7.3/" type="self" id="ROS-20260311-73-0008" title="ROS-20260311-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1850" type="cve" id="CVE-2026-1850" title="CVE-2026-1850" />
			<reference href="https://bdu.fstec.ru/vul/2026-01863" type="self" id="BDU:2026-01863" title="BDU:2026-01863" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mongodb-org" epoch="0" version="7.0.30" release="1.el7" arch="x86_64" src="mongodb-org-7.0.30-1.el7.src.rpm">
					<filename>mongodb-org-0:7.0.30-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-mongos" epoch="0" version="7.0.30" release="1.el7" arch="x86_64" src="mongodb-org-7.0.30-1.el7.src.rpm">
					<filename>mongodb-org-mongos-0:7.0.30-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-server" epoch="0" version="7.0.30" release="1.el7" arch="x86_64" src="mongodb-org-7.0.30-1.el7.src.rpm">
					<filename>mongodb-org-server-0:7.0.30-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-shell" epoch="0" version="7.0.30" release="1.el7" arch="x86_64" src="mongodb-org-7.0.30-1.el7.src.rpm">
					<filename>mongodb-org-shell-0:7.0.30-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260311-73-0009</id>
		<issued date="2026-03-11" />
		<updated date="2026-03-11" />
		<title>Уязвимость mongodb-org </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2026-25613-7.3/</description>
               <solution>Установить обновление для пакета(ов) mongodb-org
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongodb-org-cve-2026-25613-7.3/" type="self" id="ROS-20260311-73-0009" title="ROS-20260311-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25613" type="cve" id="CVE-2026-25613" title="CVE-2026-25613" />
			<reference href="https://bdu.fstec.ru/vul/2026-01862" type="self" id="BDU:2026-01862" title="BDU:2026-01862" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mongodb-org" epoch="0" version="7.0.30" release="1.el7" arch="x86_64" src="mongodb-org-7.0.30-1.el7.src.rpm">
					<filename>mongodb-org-0:7.0.30-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-mongos" epoch="0" version="7.0.30" release="1.el7" arch="x86_64" src="mongodb-org-7.0.30-1.el7.src.rpm">
					<filename>mongodb-org-mongos-0:7.0.30-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-server" epoch="0" version="7.0.30" release="1.el7" arch="x86_64" src="mongodb-org-7.0.30-1.el7.src.rpm">
					<filename>mongodb-org-server-0:7.0.30-1.el7.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-shell" epoch="0" version="7.0.30" release="1.el7" arch="x86_64" src="mongodb-org-7.0.30-1.el7.src.rpm">
					<filename>mongodb-org-shell-0:7.0.30-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260311-73-0010</id>
		<issued date="2026-03-11" />
		<updated date="2026-03-11" />
		<title>Уязвимость grafana </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в grafana</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grafana-cve-2026-21721-7.3/</description>
               <solution>Установить обновление для пакета(ов) grafana
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grafana-cve-2026-21721-7.3/" type="self" id="ROS-20260311-73-0010" title="ROS-20260311-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21721" type="cve" id="CVE-2026-21721" title="CVE-2026-21721" />
			<reference href="https://bdu.fstec.ru/vul/2026-01120" type="self" id="BDU:2026-01120" title="BDU:2026-01120" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="grafana" epoch="0" version="11.6.11" release="1.el7" arch="x86_64" src="grafana-11.6.11-1.el7.src.rpm">
					<filename>grafana-0:11.6.11-1.el7.x86_64.rpm</filename>
				</package>
				<package name="grafana-selinux" epoch="0" version="11.6.11" release="1.el7" arch="noarch" src="grafana-11.6.11-1.el7.src.rpm">
					<filename>grafana-selinux-0:11.6.11-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260311-73-0011</id>
		<issued date="2026-03-11" />
		<updated date="2026-03-11" />
		<title>Уязвимость golang-k8s-ingress-nginx </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang-k8s-ingress-nginx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-k8s-ingress-nginx-cve-2026-24512-7.3/</description>
               <solution>Установить обновление для пакета(ов) golang-k8s-ingress-nginx
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-k8s-ingress-nginx-cve-2026-24512-7.3/" type="self" id="ROS-20260311-73-0011" title="ROS-20260311-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24512" type="cve" id="CVE-2026-24512" title="CVE-2026-24512" />
			<reference href="https://bdu.fstec.ru/vul/2026-01287" type="self" id="BDU:2026-01287" title="BDU:2026-01287" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang-k8s-ingress-nginx" epoch="0" version="1.13.7" release="1.el7" arch="x86_64" src="golang-k8s-ingress-nginx-1.13.7-1.el7.src.rpm">
					<filename>golang-k8s-ingress-nginx-0:1.13.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260311-73-0012</id>
		<issued date="2026-03-11" />
		<updated date="2026-03-11" />
		<title>Уязвимость golang-k8s-ingress-nginx </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в golang-k8s-ingress-nginx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-k8s-ingress-nginx-cve-2026-24513-7.3/</description>
               <solution>Установить обновление для пакета(ов) golang-k8s-ingress-nginx
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-k8s-ingress-nginx-cve-2026-24513-7.3/" type="self" id="ROS-20260311-73-0012" title="ROS-20260311-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24513" type="cve" id="CVE-2026-24513" title="CVE-2026-24513" />
			<reference href="https://bdu.fstec.ru/vul/2026-03605" type="self" id="BDU:2026-03605" title="BDU:2026-03605" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang-k8s-ingress-nginx" epoch="0" version="1.13.7" release="1.el7" arch="x86_64" src="golang-k8s-ingress-nginx-1.13.7-1.el7.src.rpm">
					<filename>golang-k8s-ingress-nginx-0:1.13.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260311-73-0013</id>
		<issued date="2026-03-11" />
		<updated date="2026-03-11" />
		<title>Уязвимость golang-k8s-ingress-nginx </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang-k8s-ingress-nginx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-k8s-ingress-nginx-cve-2026-24514-7.3/</description>
               <solution>Установить обновление для пакета(ов) golang-k8s-ingress-nginx
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-k8s-ingress-nginx-cve-2026-24514-7.3/" type="self" id="ROS-20260311-73-0013" title="ROS-20260311-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24514" type="cve" id="CVE-2026-24514" title="CVE-2026-24514" />
			<reference href="https://bdu.fstec.ru/vul/2026-03606" type="self" id="BDU:2026-03606" title="BDU:2026-03606" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang-k8s-ingress-nginx" epoch="0" version="1.13.7" release="1.el7" arch="x86_64" src="golang-k8s-ingress-nginx-1.13.7-1.el7.src.rpm">
					<filename>golang-k8s-ingress-nginx-0:1.13.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260311-73-0014</id>
		<issued date="2026-03-11" />
		<updated date="2026-03-11" />
		<title>Уязвимость expat </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в expat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-expat-cve-2026-25210-7.3/</description>
               <solution>Установить обновление для пакета(ов) expat
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-expat-cve-2026-25210-7.3/" type="self" id="ROS-20260311-73-0014" title="ROS-20260311-73-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25210" type="cve" id="CVE-2026-25210" title="CVE-2026-25210" />
			<reference href="https://bdu.fstec.ru/vul/2026-03635" type="self" id="BDU:2026-03635" title="BDU:2026-03635" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="expat" epoch="0" version="2.7.4" release="1.el7" arch="x86_64" src="expat-2.7.4-1.el7.src.rpm">
					<filename>expat-0:2.7.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="expat-devel" epoch="0" version="2.7.4" release="1.el7" arch="x86_64" src="expat-2.7.4-1.el7.src.rpm">
					<filename>expat-devel-0:2.7.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="expat-static" epoch="0" version="2.7.4" release="1.el7" arch="x86_64" src="expat-2.7.4-1.el7.src.rpm">
					<filename>expat-static-0:2.7.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260311-73-0015</id>
		<issued date="2026-03-11" />
		<updated date="2026-03-11" />
		<title>Уязвимость expat </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в expat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-expat-cve-2026-24515-7.3/</description>
               <solution>Установить обновление для пакета(ов) expat
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-expat-cve-2026-24515-7.3/" type="self" id="ROS-20260311-73-0015" title="ROS-20260311-73-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24515" type="cve" id="CVE-2026-24515" title="CVE-2026-24515" />
			<reference href="https://bdu.fstec.ru/vul/2026-03634" type="self" id="BDU:2026-03634" title="BDU:2026-03634" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="expat" epoch="0" version="2.7.4" release="1.el7" arch="x86_64" src="expat-2.7.4-1.el7.src.rpm">
					<filename>expat-0:2.7.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="expat-devel" epoch="0" version="2.7.4" release="1.el7" arch="x86_64" src="expat-2.7.4-1.el7.src.rpm">
					<filename>expat-devel-0:2.7.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="expat-static" epoch="0" version="2.7.4" release="1.el7" arch="x86_64" src="expat-2.7.4-1.el7.src.rpm">
					<filename>expat-static-0:2.7.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0001</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38386-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38386-7.3/" type="self" id="ROS-20260313-73-0001" title="ROS-20260313-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38386" type="cve" id="CVE-2025-38386" title="CVE-2025-38386" />
			<reference href="https://bdu.fstec.ru/vul/2025-10801" type="self" id="BDU:2025-10801" title="BDU:2025-10801" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0002</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38387-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38387-7.3/" type="self" id="ROS-20260313-73-0002" title="ROS-20260313-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38387" type="cve" id="CVE-2025-38387" title="CVE-2025-38387" />
			<reference href="https://bdu.fstec.ru/vul/2025-10794" type="self" id="BDU:2025-10794" title="BDU:2025-10794" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0003</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38389-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38389-7.3/" type="self" id="ROS-20260313-73-0003" title="ROS-20260313-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38389" type="cve" id="CVE-2025-38389" title="CVE-2025-38389" />
			<reference href="https://bdu.fstec.ru/vul/2025-13498" type="self" id="BDU:2025-13498" title="BDU:2025-13498" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0004</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38391-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38391-7.3/" type="self" id="ROS-20260313-73-0004" title="ROS-20260313-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38391" type="cve" id="CVE-2025-38391" title="CVE-2025-38391" />
			<reference href="https://bdu.fstec.ru/vul/2025-10800" type="self" id="BDU:2025-10800" title="BDU:2025-10800" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0005</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38393-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38393-7.3/" type="self" id="ROS-20260313-73-0005" title="ROS-20260313-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38393" type="cve" id="CVE-2025-38393" title="CVE-2025-38393" />
			<reference href="https://bdu.fstec.ru/vul/2025-10799" type="self" id="BDU:2025-10799" title="BDU:2025-10799" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0006</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38395-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38395-7.3/" type="self" id="ROS-20260313-73-0006" title="ROS-20260313-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38395" type="cve" id="CVE-2025-38395" title="CVE-2025-38395" />
			<reference href="https://bdu.fstec.ru/vul/2025-11113" type="self" id="BDU:2025-11113" title="BDU:2025-11113" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0007</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38396-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38396-7.3/" type="self" id="ROS-20260313-73-0007" title="ROS-20260313-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38396" type="cve" id="CVE-2025-38396" title="CVE-2025-38396" />
			<reference href="https://bdu.fstec.ru/vul/2025-10787" type="self" id="BDU:2025-10787" title="BDU:2025-10787" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0008</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38399-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38399-7.3/" type="self" id="ROS-20260313-73-0008" title="ROS-20260313-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38399" type="cve" id="CVE-2025-38399" title="CVE-2025-38399" />
			<reference href="https://bdu.fstec.ru/vul/2025-10789" type="self" id="BDU:2025-10789" title="BDU:2025-10789" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0009</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38400-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38400-7.3/" type="self" id="ROS-20260313-73-0009" title="ROS-20260313-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38400" type="cve" id="CVE-2025-38400" title="CVE-2025-38400" />
			<reference href="https://bdu.fstec.ru/vul/2025-10791" type="self" id="BDU:2025-10791" title="BDU:2025-10791" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0010</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38401-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38401-7.3/" type="self" id="ROS-20260313-73-0010" title="ROS-20260313-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38401" type="cve" id="CVE-2025-38401" title="CVE-2025-38401" />
			<reference href="https://bdu.fstec.ru/vul/2025-13493" type="self" id="BDU:2025-13493" title="BDU:2025-13493" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0011</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38403-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38403-7.3/" type="self" id="ROS-20260313-73-0011" title="ROS-20260313-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38403" type="cve" id="CVE-2025-38403" title="CVE-2025-38403" />
			<reference href="https://bdu.fstec.ru/vul/2025-10792" type="self" id="BDU:2025-10792" title="BDU:2025-10792" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0012</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38404-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38404-7.3/" type="self" id="ROS-20260313-73-0012" title="ROS-20260313-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38404" type="cve" id="CVE-2025-38404" title="CVE-2025-38404" />
			<reference href="https://bdu.fstec.ru/vul/2025-11635" type="self" id="BDU:2025-11635" title="BDU:2025-11635" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0013</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38406-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38406-7.3/" type="self" id="ROS-20260313-73-0013" title="ROS-20260313-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38406" type="cve" id="CVE-2025-38406" title="CVE-2025-38406" />
			<reference href="https://bdu.fstec.ru/vul/2025-13494" type="self" id="BDU:2025-13494" title="BDU:2025-13494" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0014</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38409-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38409-7.3/" type="self" id="ROS-20260313-73-0014" title="ROS-20260313-73-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38409" type="cve" id="CVE-2025-38409" title="CVE-2025-38409" />
			<reference href="https://bdu.fstec.ru/vul/2025-09128" type="self" id="BDU:2025-09128" title="BDU:2025-09128" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0015</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38410-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38410-7.3/" type="self" id="ROS-20260313-73-0015" title="ROS-20260313-73-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38410" type="cve" id="CVE-2025-38410" title="CVE-2025-38410" />
			<reference href="https://bdu.fstec.ru/vul/2025-09130" type="self" id="BDU:2025-09130" title="BDU:2025-09130" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0016</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38412-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38412-7.3/" type="self" id="ROS-20260313-73-0016" title="ROS-20260313-73-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38412" type="cve" id="CVE-2025-38412" title="CVE-2025-38412" />
			<reference href="https://bdu.fstec.ru/vul/2025-10600" type="self" id="BDU:2025-10600" title="BDU:2025-10600" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0017</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38437-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38437-7.3/" type="self" id="ROS-20260313-73-0017" title="ROS-20260313-73-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38437" type="cve" id="CVE-2025-38437" title="CVE-2025-38437" />
			<reference href="https://bdu.fstec.ru/vul/2025-09194" type="self" id="BDU:2025-09194" title="BDU:2025-09194" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0018</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38439-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38439-7.3/" type="self" id="ROS-20260313-73-0018" title="ROS-20260313-73-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38439" type="cve" id="CVE-2025-38439" title="CVE-2025-38439" />
			<reference href="https://bdu.fstec.ru/vul/2025-09199" type="self" id="BDU:2025-09199" title="BDU:2025-09199" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0019</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38441-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38441-7.3/" type="self" id="ROS-20260313-73-0019" title="ROS-20260313-73-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38441" type="cve" id="CVE-2025-38441" title="CVE-2025-38441" />
			<reference href="https://bdu.fstec.ru/vul/2025-09228" type="self" id="BDU:2025-09228" title="BDU:2025-09228" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0020</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38443-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38443-7.3/" type="self" id="ROS-20260313-73-0020" title="ROS-20260313-73-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38443" type="cve" id="CVE-2025-38443" title="CVE-2025-38443" />
			<reference href="https://bdu.fstec.ru/vul/2025-09225" type="self" id="BDU:2025-09225" title="BDU:2025-09225" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0021</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38444-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38444-7.3/" type="self" id="ROS-20260313-73-0021" title="ROS-20260313-73-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38444" type="cve" id="CVE-2025-38444" title="CVE-2025-38444" />
			<reference href="https://bdu.fstec.ru/vul/2025-09183" type="self" id="BDU:2025-09183" title="BDU:2025-09183" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0022</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38445-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38445-7.3/" type="self" id="ROS-20260313-73-0022" title="ROS-20260313-73-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38445" type="cve" id="CVE-2025-38445" title="CVE-2025-38445" />
			<reference href="https://bdu.fstec.ru/vul/2025-09190" type="self" id="BDU:2025-09190" title="BDU:2025-09190" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0023</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38448-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38448-7.3/" type="self" id="ROS-20260313-73-0023" title="ROS-20260313-73-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38448" type="cve" id="CVE-2025-38448" title="CVE-2025-38448" />
			<reference href="https://bdu.fstec.ru/vul/2025-09187" type="self" id="BDU:2025-09187" title="BDU:2025-09187" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0024</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38451-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38451-7.3/" type="self" id="ROS-20260313-73-0024" title="ROS-20260313-73-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38451" type="cve" id="CVE-2025-38451" title="CVE-2025-38451" />
			<reference href="https://bdu.fstec.ru/vul/2025-09235" type="self" id="BDU:2025-09235" title="BDU:2025-09235" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0025</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38455-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38455-7.3/" type="self" id="ROS-20260313-73-0025" title="ROS-20260313-73-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38455" type="cve" id="CVE-2025-38455" title="CVE-2025-38455" />
			<reference href="https://bdu.fstec.ru/vul/2025-09811" type="self" id="BDU:2025-09811" title="BDU:2025-09811" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0026</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38456-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38456-7.3/" type="self" id="ROS-20260313-73-0026" title="ROS-20260313-73-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38456" type="cve" id="CVE-2025-38456" title="CVE-2025-38456" />
			<reference href="https://bdu.fstec.ru/vul/2025-09812" type="self" id="BDU:2025-09812" title="BDU:2025-09812" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0027</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38457-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38457-7.3/" type="self" id="ROS-20260313-73-0027" title="ROS-20260313-73-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38457" type="cve" id="CVE-2025-38457" title="CVE-2025-38457" />
			<reference href="https://bdu.fstec.ru/vul/2025-11503" type="self" id="BDU:2025-11503" title="BDU:2025-11503" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0028</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38458-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38458-7.3/" type="self" id="ROS-20260313-73-0028" title="ROS-20260313-73-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38458" type="cve" id="CVE-2025-38458" title="CVE-2025-38458" />
			<reference href="https://bdu.fstec.ru/vul/2025-11504" type="self" id="BDU:2025-11504" title="BDU:2025-11504" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0029</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38459-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38459-7.3/" type="self" id="ROS-20260313-73-0029" title="ROS-20260313-73-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38459" type="cve" id="CVE-2025-38459" title="CVE-2025-38459" />
			<reference href="https://bdu.fstec.ru/vul/2025-09813" type="self" id="BDU:2025-09813" title="BDU:2025-09813" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0030</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38460-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38460-7.3/" type="self" id="ROS-20260313-73-0030" title="ROS-20260313-73-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38460" type="cve" id="CVE-2025-38460" title="CVE-2025-38460" />
			<reference href="https://bdu.fstec.ru/vul/2025-09814" type="self" id="BDU:2025-09814" title="BDU:2025-09814" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0031</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38461-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38461-7.3/" type="self" id="ROS-20260313-73-0031" title="ROS-20260313-73-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38461" type="cve" id="CVE-2025-38461" title="CVE-2025-38461" />
			<reference href="https://bdu.fstec.ru/vul/2025-09815" type="self" id="BDU:2025-09815" title="BDU:2025-09815" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0032</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38462-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38462-7.3/" type="self" id="ROS-20260313-73-0032" title="ROS-20260313-73-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38462" type="cve" id="CVE-2025-38462" title="CVE-2025-38462" />
			<reference href="https://bdu.fstec.ru/vul/2025-14090" type="self" id="BDU:2025-14090" title="BDU:2025-14090" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0033</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38464-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38464-7.3/" type="self" id="ROS-20260313-73-0033" title="ROS-20260313-73-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38464" type="cve" id="CVE-2025-38464" title="CVE-2025-38464" />
			<reference href="https://bdu.fstec.ru/vul/2025-09817" type="self" id="BDU:2025-09817" title="BDU:2025-09817" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0034</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38465-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38465-7.3/" type="self" id="ROS-20260313-73-0034" title="ROS-20260313-73-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38465" type="cve" id="CVE-2025-38465" title="CVE-2025-38465" />
			<reference href="https://bdu.fstec.ru/vul/2025-09818" type="self" id="BDU:2025-09818" title="BDU:2025-09818" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0035</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38466-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38466-7.3/" type="self" id="ROS-20260313-73-0035" title="ROS-20260313-73-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38466" type="cve" id="CVE-2025-38466" title="CVE-2025-38466" />
			<reference href="https://bdu.fstec.ru/vul/2025-09819" type="self" id="BDU:2025-09819" title="BDU:2025-09819" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0036</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38467-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38467-7.3/" type="self" id="ROS-20260313-73-0036" title="ROS-20260313-73-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38467" type="cve" id="CVE-2025-38467" title="CVE-2025-38467" />
			<reference href="https://bdu.fstec.ru/vul/2025-11506" type="self" id="BDU:2025-11506" title="BDU:2025-11506" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0037</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38468-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38468-7.3/" type="self" id="ROS-20260313-73-0037" title="ROS-20260313-73-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38468" type="cve" id="CVE-2025-38468" title="CVE-2025-38468" />
			<reference href="https://bdu.fstec.ru/vul/2025-09175" type="self" id="BDU:2025-09175" title="BDU:2025-09175" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0038</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38470-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38470-7.3/" type="self" id="ROS-20260313-73-0038" title="ROS-20260313-73-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38470" type="cve" id="CVE-2025-38470" title="CVE-2025-38470" />
			<reference href="https://bdu.fstec.ru/vul/2025-10795" type="self" id="BDU:2025-10795" title="BDU:2025-10795" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0039</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38471-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38471-7.3/" type="self" id="ROS-20260313-73-0039" title="ROS-20260313-73-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38471" type="cve" id="CVE-2025-38471" title="CVE-2025-38471" />
			<reference href="https://bdu.fstec.ru/vul/2025-10796" type="self" id="BDU:2025-10796" title="BDU:2025-10796" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0040</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38472-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38472-7.3/" type="self" id="ROS-20260313-73-0040" title="ROS-20260313-73-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38472" type="cve" id="CVE-2025-38472" title="CVE-2025-38472" />
			<reference href="https://bdu.fstec.ru/vul/2025-10797" type="self" id="BDU:2025-10797" title="BDU:2025-10797" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0041</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38473-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38473-7.3/" type="self" id="ROS-20260313-73-0041" title="ROS-20260313-73-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38473" type="cve" id="CVE-2025-38473" title="CVE-2025-38473" />
			<reference href="https://bdu.fstec.ru/vul/2025-10798" type="self" id="BDU:2025-10798" title="BDU:2025-10798" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-73-0042</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38474-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38474-7.3/" type="self" id="ROS-20260313-73-0042" title="ROS-20260313-73-0042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38474" type="cve" id="CVE-2025-38474" title="CVE-2025-38474" />
			<reference href="https://bdu.fstec.ru/vul/2025-09176" type="self" id="BDU:2025-09176" title="BDU:2025-09176" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-73-0001</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38345-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38345-7.3/" type="self" id="ROS-20260317-73-0001" title="ROS-20260317-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38345" type="cve" id="CVE-2025-38345" title="CVE-2025-38345" />
			<reference href="https://bdu.fstec.ru/vul/2025-09628" type="self" id="BDU:2025-09628" title="BDU:2025-09628" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-73-0002</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38346-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38346-7.3/" type="self" id="ROS-20260317-73-0002" title="ROS-20260317-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38346" type="cve" id="CVE-2025-38346" title="CVE-2025-38346" />
			<reference href="https://bdu.fstec.ru/vul/2025-09917" type="self" id="BDU:2025-09917" title="BDU:2025-09917" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-73-0003</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38347-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38347-7.3/" type="self" id="ROS-20260317-73-0003" title="ROS-20260317-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38347" type="cve" id="CVE-2025-38347" title="CVE-2025-38347" />
			<reference href="https://bdu.fstec.ru/vul/2025-08807" type="self" id="BDU:2025-08807" title="BDU:2025-08807" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-73-0004</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38348-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38348-7.3/" type="self" id="ROS-20260317-73-0004" title="ROS-20260317-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38348" type="cve" id="CVE-2025-38348" title="CVE-2025-38348" />
			<reference href="https://bdu.fstec.ru/vul/2025-09657" type="self" id="BDU:2025-09657" title="BDU:2025-09657" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-73-0005</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38350-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38350-7.3/" type="self" id="ROS-20260317-73-0005" title="ROS-20260317-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38350" type="cve" id="CVE-2025-38350" title="CVE-2025-38350" />
			<reference href="https://bdu.fstec.ru/vul/2025-13471" type="self" id="BDU:2025-13471" title="BDU:2025-13471" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-73-0006</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38361-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38361-7.3/" type="self" id="ROS-20260317-73-0006" title="ROS-20260317-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38361" type="cve" id="CVE-2025-38361" title="CVE-2025-38361" />
			<reference href="https://bdu.fstec.ru/vul/2025-16076" type="self" id="BDU:2025-16076" title="BDU:2025-16076" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.162" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.162-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-73-0007</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38364-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38364-7.3/" type="self" id="ROS-20260317-73-0007" title="ROS-20260317-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38364" type="cve" id="CVE-2025-38364" title="CVE-2025-38364" />
			<reference href="https://bdu.fstec.ru/vul/2025-09245" type="self" id="BDU:2025-09245" title="BDU:2025-09245" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-73-0008</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38371-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38371-7.3/" type="self" id="ROS-20260317-73-0008" title="ROS-20260317-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38371" type="cve" id="CVE-2025-38371" title="CVE-2025-38371" />
			<reference href="https://bdu.fstec.ru/vul/2025-09143" type="self" id="BDU:2025-09143" title="BDU:2025-09143" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-73-0009</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38375-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38375-7.3/" type="self" id="ROS-20260317-73-0009" title="ROS-20260317-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38375" type="cve" id="CVE-2025-38375" title="CVE-2025-38375" />
			<reference href="https://bdu.fstec.ru/vul/2025-09140" type="self" id="BDU:2025-09140" title="BDU:2025-09140" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-73-0010</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38377-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38377-7.3/" type="self" id="ROS-20260317-73-0010" title="ROS-20260317-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38377" type="cve" id="CVE-2025-38377" title="CVE-2025-38377" />
			<reference href="https://bdu.fstec.ru/vul/2025-13512" type="self" id="BDU:2025-13512" title="BDU:2025-13512" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-73-0011</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38380-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38380-7.3/" type="self" id="ROS-20260317-73-0011" title="ROS-20260317-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38380" type="cve" id="CVE-2025-38380" title="CVE-2025-38380" />
			<reference href="https://bdu.fstec.ru/vul/2025-09138" type="self" id="BDU:2025-09138" title="BDU:2025-09138" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-73-0012</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38382-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38382-7.3/" type="self" id="ROS-20260317-73-0012" title="ROS-20260317-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38382" type="cve" id="CVE-2025-38382" title="CVE-2025-38382" />
			<reference href="https://bdu.fstec.ru/vul/2025-09172" type="self" id="BDU:2025-09172" title="BDU:2025-09172" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-73-0013</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38384-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38384-7.3/" type="self" id="ROS-20260317-73-0013" title="ROS-20260317-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38384" type="cve" id="CVE-2025-38384" title="CVE-2025-38384" />
			<reference href="https://bdu.fstec.ru/vul/2025-11114" type="self" id="BDU:2025-11114" title="BDU:2025-11114" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-73-0014</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38385-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38385-7.3/" type="self" id="ROS-20260317-73-0014" title="ROS-20260317-73-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38385" type="cve" id="CVE-2025-38385" title="CVE-2025-38385" />
			<reference href="https://bdu.fstec.ru/vul/2025-10802" type="self" id="BDU:2025-10802" title="BDU:2025-10802" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-73-0015</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38408-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38408-7.3/" type="self" id="ROS-20260317-73-0015" title="ROS-20260317-73-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38408" type="cve" id="CVE-2025-38408" title="CVE-2025-38408" />
			<reference href="https://bdu.fstec.ru/vul/2025-09131" type="self" id="BDU:2025-09131" title="BDU:2025-09131" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.162" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.162-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-73-0016</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38476-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38476-7.3/" type="self" id="ROS-20260317-73-0016" title="ROS-20260317-73-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38476" type="cve" id="CVE-2025-38476" title="CVE-2025-38476" />
			<reference href="https://bdu.fstec.ru/vul/2025-13511" type="self" id="BDU:2025-13511" title="BDU:2025-13511" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-73-0017</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38477-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38477-7.3/" type="self" id="ROS-20260317-73-0017" title="ROS-20260317-73-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38477" type="cve" id="CVE-2025-38477" title="CVE-2025-38477" />
			<reference href="https://bdu.fstec.ru/vul/2025-09177" type="self" id="BDU:2025-09177" title="BDU:2025-09177" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-73-0018</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38478-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38478-7.3/" type="self" id="ROS-20260317-73-0018" title="ROS-20260317-73-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38478" type="cve" id="CVE-2025-38478" title="CVE-2025-38478" />
			<reference href="https://bdu.fstec.ru/vul/2025-10804" type="self" id="BDU:2025-10804" title="BDU:2025-10804" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-73-0019</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38480-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38480-7.3/" type="self" id="ROS-20260317-73-0019" title="ROS-20260317-73-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38480" type="cve" id="CVE-2025-38480" title="CVE-2025-38480" />
			<reference href="https://bdu.fstec.ru/vul/2025-09178" type="self" id="BDU:2025-09178" title="BDU:2025-09178" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-73-0020</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38481-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38481-7.3/" type="self" id="ROS-20260317-73-0020" title="ROS-20260317-73-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38481" type="cve" id="CVE-2025-38481" title="CVE-2025-38481" />
			<reference href="https://bdu.fstec.ru/vul/2025-09179" type="self" id="BDU:2025-09179" title="BDU:2025-09179" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-73-0021</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38482-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38482-7.3/" type="self" id="ROS-20260317-73-0021" title="ROS-20260317-73-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38482" type="cve" id="CVE-2025-38482" title="CVE-2025-38482" />
			<reference href="https://bdu.fstec.ru/vul/2025-09180" type="self" id="BDU:2025-09180" title="BDU:2025-09180" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-73-0022</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38483-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38483-7.3/" type="self" id="ROS-20260317-73-0022" title="ROS-20260317-73-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38483" type="cve" id="CVE-2025-38483" title="CVE-2025-38483" />
			<reference href="https://bdu.fstec.ru/vul/2025-09181" type="self" id="BDU:2025-09181" title="BDU:2025-09181" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-73-0023</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38485-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38485-7.3/" type="self" id="ROS-20260317-73-0023" title="ROS-20260317-73-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38485" type="cve" id="CVE-2025-38485" title="CVE-2025-38485" />
			<reference href="https://bdu.fstec.ru/vul/2025-13513" type="self" id="BDU:2025-13513" title="BDU:2025-13513" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-73-0024</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38487-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38487-7.3/" type="self" id="ROS-20260317-73-0024" title="ROS-20260317-73-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38487" type="cve" id="CVE-2025-38487" title="CVE-2025-38487" />
			<reference href="https://bdu.fstec.ru/vul/2025-13514" type="self" id="BDU:2025-13514" title="BDU:2025-13514" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-73-0025</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38488-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38488-7.3/" type="self" id="ROS-20260317-73-0025" title="ROS-20260317-73-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38488" type="cve" id="CVE-2025-38488" title="CVE-2025-38488" />
			<reference href="https://bdu.fstec.ru/vul/2025-10805" type="self" id="BDU:2025-10805" title="BDU:2025-10805" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-73-0026</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38491-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38491-7.3/" type="self" id="ROS-20260317-73-0026" title="ROS-20260317-73-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38491" type="cve" id="CVE-2025-38491" title="CVE-2025-38491" />
			<reference href="https://bdu.fstec.ru/vul/2025-13520" type="self" id="BDU:2025-13520" title="BDU:2025-13520" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-73-0027</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38494-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38494-7.3/" type="self" id="ROS-20260317-73-0027" title="ROS-20260317-73-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38494" type="cve" id="CVE-2025-38494" title="CVE-2025-38494" />
			<reference href="https://bdu.fstec.ru/vul/2025-13522" type="self" id="BDU:2025-13522" title="BDU:2025-13522" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-73-0028</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38495-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38495-7.3/" type="self" id="ROS-20260317-73-0028" title="ROS-20260317-73-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38495" type="cve" id="CVE-2025-38495" title="CVE-2025-38495" />
			<reference href="https://bdu.fstec.ru/vul/2025-13517" type="self" id="BDU:2025-13517" title="BDU:2025-13517" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-73-0029</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38497-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38497-7.3/" type="self" id="ROS-20260317-73-0029" title="ROS-20260317-73-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38497" type="cve" id="CVE-2025-38497" title="CVE-2025-38497" />
			<reference href="https://bdu.fstec.ru/vul/2025-11510" type="self" id="BDU:2025-11510" title="BDU:2025-11510" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-73-0030</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38500-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38500-7.3/" type="self" id="ROS-20260317-73-0030" title="ROS-20260317-73-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38500" type="cve" id="CVE-2025-38500" title="CVE-2025-38500" />
			<reference href="https://bdu.fstec.ru/vul/2025-15162" type="self" id="BDU:2025-15162" title="BDU:2025-15162" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-73-0031</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38499-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38499-7.3/" type="self" id="ROS-20260317-73-0031" title="ROS-20260317-73-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38499" type="cve" id="CVE-2025-38499" title="CVE-2025-38499" />
			<reference href="https://bdu.fstec.ru/vul/2025-15160" type="self" id="BDU:2025-15160" title="BDU:2025-15160" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-73-0032</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38501-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38501-7.3/" type="self" id="ROS-20260317-73-0032" title="ROS-20260317-73-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38501" type="cve" id="CVE-2025-38501" title="CVE-2025-38501" />
			<reference href="https://bdu.fstec.ru/vul/2025-15555" type="self" id="BDU:2025-15555" title="BDU:2025-15555" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-73-0033</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38502-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38502-7.3/" type="self" id="ROS-20260317-73-0033" title="ROS-20260317-73-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38502" type="cve" id="CVE-2025-38502" title="CVE-2025-38502" />
			<reference href="https://bdu.fstec.ru/vul/2025-10441" type="self" id="BDU:2025-10441" title="BDU:2025-10441" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-73-0034</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38503-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38503-7.3/" type="self" id="ROS-20260317-73-0034" title="ROS-20260317-73-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38503" type="cve" id="CVE-2025-38503" title="CVE-2025-38503" />
			<reference href="https://bdu.fstec.ru/vul/2025-10444" type="self" id="BDU:2025-10444" title="BDU:2025-10444" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-73-0035</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38510-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38510-7.3/" type="self" id="ROS-20260317-73-0035" title="ROS-20260317-73-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38510" type="cve" id="CVE-2025-38510" title="CVE-2025-38510" />
			<reference href="https://bdu.fstec.ru/vul/2025-11349" type="self" id="BDU:2025-11349" title="BDU:2025-11349" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-73-0036</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38512-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38512-7.3/" type="self" id="ROS-20260317-73-0036" title="ROS-20260317-73-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38512" type="cve" id="CVE-2025-38512" title="CVE-2025-38512" />
			<reference href="https://bdu.fstec.ru/vul/2025-11343" type="self" id="BDU:2025-11343" title="BDU:2025-11343" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-73-0037</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38513-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38513-7.3/" type="self" id="ROS-20260317-73-0037" title="ROS-20260317-73-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38513" type="cve" id="CVE-2025-38513" title="CVE-2025-38513" />
			<reference href="https://bdu.fstec.ru/vul/2025-11348" type="self" id="BDU:2025-11348" title="BDU:2025-11348" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260318-73-0001</id>
		<issued date="2026-03-18" />
		<updated date="2026-03-18" />
		<title>Уязвимость libmodsecurity </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libmodsecurity</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libmodsecurity-cve-2024-1019-7.3/</description>
               <solution>Установить обновление для пакета(ов) libmodsecurity
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libmodsecurity-cve-2024-1019-7.3/" type="self" id="ROS-20260318-73-0001" title="ROS-20260318-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1019" type="cve" id="CVE-2024-1019" title="CVE-2024-1019" />
			<reference href="https://bdu.fstec.ru/vul/2024-01024" type="self" id="BDU:2024-01024" title="BDU:2024-01024" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libmodsecurity" epoch="0" version="3.0.12" release="1.el7" arch="x86_64" src="libmodsecurity-3.0.12-1.el7.src.rpm">
					<filename>libmodsecurity-0:3.0.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libmodsecurity-devel" epoch="0" version="3.0.12" release="1.el7" arch="x86_64" src="libmodsecurity-3.0.12-1.el7.src.rpm">
					<filename>libmodsecurity-devel-0:3.0.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libmodsecurity-static" epoch="0" version="3.0.12" release="1.el7" arch="x86_64" src="libmodsecurity-3.0.12-1.el7.src.rpm">
					<filename>libmodsecurity-static-0:3.0.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260318-73-0002</id>
		<issued date="2026-03-18" />
		<updated date="2026-03-18" />
		<title>Уязвимость libmodsecurity </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libmodsecurity</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libmodsecurity-cve-2023-28882-7.3/</description>
               <solution>Установить обновление для пакета(ов) libmodsecurity
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libmodsecurity-cve-2023-28882-7.3/" type="self" id="ROS-20260318-73-0002" title="ROS-20260318-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28882" type="cve" id="CVE-2023-28882" title="CVE-2023-28882" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libmodsecurity" epoch="0" version="3.0.12" release="1.el7" arch="x86_64" src="libmodsecurity-3.0.12-1.el7.src.rpm">
					<filename>libmodsecurity-0:3.0.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libmodsecurity-devel" epoch="0" version="3.0.12" release="1.el7" arch="x86_64" src="libmodsecurity-3.0.12-1.el7.src.rpm">
					<filename>libmodsecurity-devel-0:3.0.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libmodsecurity-static" epoch="0" version="3.0.12" release="1.el7" arch="x86_64" src="libmodsecurity-3.0.12-1.el7.src.rpm">
					<filename>libmodsecurity-static-0:3.0.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260318-73-0003</id>
		<issued date="2026-03-18" />
		<updated date="2026-03-18" />
		<title>Уязвимость libmodsecurity </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libmodsecurity</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libmodsecurity-cve-2023-38285-7.3/</description>
               <solution>Установить обновление для пакета(ов) libmodsecurity
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libmodsecurity-cve-2023-38285-7.3/" type="self" id="ROS-20260318-73-0003" title="ROS-20260318-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38285" type="cve" id="CVE-2023-38285" title="CVE-2023-38285" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libmodsecurity" epoch="0" version="3.0.12" release="1.el7" arch="x86_64" src="libmodsecurity-3.0.12-1.el7.src.rpm">
					<filename>libmodsecurity-0:3.0.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libmodsecurity-devel" epoch="0" version="3.0.12" release="1.el7" arch="x86_64" src="libmodsecurity-3.0.12-1.el7.src.rpm">
					<filename>libmodsecurity-devel-0:3.0.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libmodsecurity-static" epoch="0" version="3.0.12" release="1.el7" arch="x86_64" src="libmodsecurity-3.0.12-1.el7.src.rpm">
					<filename>libmodsecurity-static-0:3.0.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260318-73-0004</id>
		<issued date="2026-03-18" />
		<updated date="2026-03-18" />
		<title>Уязвимость busybox </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в busybox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-busybox-cve-2025-60876-7.3/</description>
               <solution>Установить обновление для пакета(ов) busybox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-busybox-cve-2025-60876-7.3/" type="self" id="ROS-20260318-73-0004" title="ROS-20260318-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-60876" type="cve" id="CVE-2025-60876" title="CVE-2025-60876" />
			<reference href="https://bdu.fstec.ru/vul/2026-05705" type="self" id="BDU:2026-05705" title="BDU:2026-05705" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="busybox" epoch="1" version="1.37.0" release="1.el7" arch="x86_64" src="busybox-1.37.0-1.el7.src.rpm">
					<filename>busybox-1:1.37.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="busybox-petitboot" epoch="1" version="1.37.0" release="1.el7" arch="x86_64" src="busybox-1.37.0-1.el7.src.rpm">
					<filename>busybox-petitboot-1:1.37.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-73-0001</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость gimp </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2026-2047-7.3/</description>
               <solution>Установить обновление для пакета(ов) gimp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2026-2047-7.3/" type="self" id="ROS-20260319-73-0001" title="ROS-20260319-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2047" type="cve" id="CVE-2026-2047" title="CVE-2026-2047" />
			<reference href="https://bdu.fstec.ru/vul/2026-02554" type="self" id="BDU:2026-02554" title="BDU:2026-02554" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gimp" epoch="2" version="2.10.36" release="7.el7" arch="x86_64" src="gimp-2.10.36-7.el7.src.rpm">
					<filename>gimp-2:2.10.36-7.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="2.10.36" release="7.el7" arch="x86_64" src="gimp-2.10.36-7.el7.src.rpm">
					<filename>gimp-devel-2:2.10.36-7.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="2.10.36" release="7.el7" arch="x86_64" src="gimp-2.10.36-7.el7.src.rpm">
					<filename>gimp-devel-tools-2:2.10.36-7.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="2.10.36" release="7.el7" arch="x86_64" src="gimp-2.10.36-7.el7.src.rpm">
					<filename>gimp-libs-2:2.10.36-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-73-0002</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость jetty </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в jetty</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jetty-cve-2023-44487-7.3/</description>
               <solution>Установить обновление для пакета(ов) jetty
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jetty-cve-2023-44487-7.3/" type="self" id="ROS-20260319-73-0002" title="ROS-20260319-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487" type="cve" id="CVE-2023-44487" title="CVE-2023-44487" />
			<reference href="https://bdu.fstec.ru/vul/2023-06559" type="self" id="BDU:2023-06559" title="BDU:2023-06559" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jetty" epoch="0" version="9.4.54" release="1.el7" arch="noarch" src="jetty-9.4.54-1.el7.src.rpm">
					<filename>jetty-0:9.4.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="jetty-client" epoch="0" version="9.4.54" release="1.el7" arch="noarch" src="jetty-9.4.54-1.el7.src.rpm">
					<filename>jetty-client-0:9.4.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="jetty-continuation" epoch="0" version="9.4.54" release="1.el7" arch="noarch" src="jetty-9.4.54-1.el7.src.rpm">
					<filename>jetty-continuation-0:9.4.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="jetty-http" epoch="0" version="9.4.54" release="1.el7" arch="noarch" src="jetty-9.4.54-1.el7.src.rpm">
					<filename>jetty-http-0:9.4.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="jetty-io" epoch="0" version="9.4.54" release="1.el7" arch="noarch" src="jetty-9.4.54-1.el7.src.rpm">
					<filename>jetty-io-0:9.4.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="jetty-jaas" epoch="0" version="9.4.54" release="1.el7" arch="noarch" src="jetty-9.4.54-1.el7.src.rpm">
					<filename>jetty-jaas-0:9.4.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="jetty-javadoc" epoch="0" version="9.4.54" release="1.el7" arch="noarch" src="jetty-9.4.54-1.el7.src.rpm">
					<filename>jetty-javadoc-0:9.4.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="jetty-jmx" epoch="0" version="9.4.54" release="1.el7" arch="noarch" src="jetty-9.4.54-1.el7.src.rpm">
					<filename>jetty-jmx-0:9.4.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="jetty-security" epoch="0" version="9.4.54" release="1.el7" arch="noarch" src="jetty-9.4.54-1.el7.src.rpm">
					<filename>jetty-security-0:9.4.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="jetty-server" epoch="0" version="9.4.54" release="1.el7" arch="noarch" src="jetty-9.4.54-1.el7.src.rpm">
					<filename>jetty-server-0:9.4.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="jetty-servlet" epoch="0" version="9.4.54" release="1.el7" arch="noarch" src="jetty-9.4.54-1.el7.src.rpm">
					<filename>jetty-servlet-0:9.4.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="jetty-util" epoch="0" version="9.4.54" release="1.el7" arch="noarch" src="jetty-9.4.54-1.el7.src.rpm">
					<filename>jetty-util-0:9.4.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="jetty-util-ajax" epoch="0" version="9.4.54" release="1.el7" arch="noarch" src="jetty-9.4.54-1.el7.src.rpm">
					<filename>jetty-util-ajax-0:9.4.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="jetty-webapp" epoch="0" version="9.4.54" release="1.el7" arch="noarch" src="jetty-9.4.54-1.el7.src.rpm">
					<filename>jetty-webapp-0:9.4.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="jetty-xml" epoch="0" version="9.4.54" release="1.el7" arch="noarch" src="jetty-9.4.54-1.el7.src.rpm">
					<filename>jetty-xml-0:9.4.54-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-73-0003</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость grub2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в grub2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grub2-cve-2025-54770-7.3/</description>
               <solution>Установить обновление для пакета(ов) grub2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grub2-cve-2025-54770-7.3/" type="self" id="ROS-20260319-73-0003" title="ROS-20260319-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54770" type="cve" id="CVE-2025-54770" title="CVE-2025-54770" />
			<reference href="https://bdu.fstec.ru/vul/2025-14789" type="self" id="BDU:2025-14789" title="BDU:2025-14789" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="grub2-efi-ia32" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-efi-ia32-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-efi-ia32-cdboot" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-efi-ia32-cdboot-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-efi-x64" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-efi-x64-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-efi-x64-cdboot" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-efi-x64-cdboot-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-emu" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-emu-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-emu-modules" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-emu-modules-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-pc" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-pc-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-tools-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools-efi" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-tools-efi-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools-extra" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-tools-extra-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools-minimal" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-tools-minimal-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-common" epoch="1" version="2.06" release="69.el7" arch="noarch" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-common-1:2.06-69.el7.noarch.rpm</filename>
				</package>
				<package name="grub2-efi-ia32-modules" epoch="1" version="2.06" release="69.el7" arch="noarch" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-efi-ia32-modules-1:2.06-69.el7.noarch.rpm</filename>
				</package>
				<package name="grub2-efi-x64-modules" epoch="1" version="2.06" release="69.el7" arch="noarch" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-efi-x64-modules-1:2.06-69.el7.noarch.rpm</filename>
				</package>
				<package name="grub2-pc-modules" epoch="1" version="2.06" release="69.el7" arch="noarch" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-pc-modules-1:2.06-69.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-73-0004</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость nodejs </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в nodejs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-cve-2025-47279-7.3/</description>
               <solution>Установить обновление для пакета(ов) nodejs
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-cve-2025-47279-7.3/" type="self" id="ROS-20260319-73-0004" title="ROS-20260319-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47279" type="cve" id="CVE-2025-47279" title="CVE-2025-47279" />
			<reference href="https://bdu.fstec.ru/vul/2026-05692" type="self" id="BDU:2026-05692" title="BDU:2026-05692" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs" epoch="1" version="22.19.0" release="1.el7" arch="x86_64" src="nodejs-22.19.0-1.el7.src.rpm">
					<filename>nodejs-1:22.19.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-devel" epoch="1" version="22.19.0" release="1.el7" arch="x86_64" src="nodejs-22.19.0-1.el7.src.rpm">
					<filename>nodejs-devel-1:22.19.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-full-i18n" epoch="1" version="22.19.0" release="1.el7" arch="x86_64" src="nodejs-22.19.0-1.el7.src.rpm">
					<filename>nodejs-full-i18n-1:22.19.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-libs" epoch="1" version="22.19.0" release="1.el7" arch="x86_64" src="nodejs-22.19.0-1.el7.src.rpm">
					<filename>nodejs-libs-1:22.19.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-npm" epoch="1" version="10.9.3" release="1.22.19.0.1.el7" arch="x86_64" src="nodejs-22.19.0-1.el7.src.rpm">
					<filename>nodejs-npm-1:10.9.3-1.22.19.0.1.el7.x86_64.rpm</filename>
				</package>
				<package name="v8-12.4-devel" epoch="3" version="12.4.254.21" release="1.22.19.0.1.el7" arch="x86_64" src="nodejs-22.19.0-1.el7.src.rpm">
					<filename>v8-12.4-devel-3:12.4.254.21-1.22.19.0.1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-docs" epoch="1" version="22.19.0" release="1.el7" arch="noarch" src="nodejs-22.19.0-1.el7.src.rpm">
					<filename>nodejs-docs-1:22.19.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-73-0005</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость nodejs20 </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в nodejs20</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs20-cve-2025-47279-7.3/</description>
               <solution>Установить обновление для пакета(ов) nodejs20
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs20-cve-2025-47279-7.3/" type="self" id="ROS-20260319-73-0005" title="ROS-20260319-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47279" type="cve" id="CVE-2025-47279" title="CVE-2025-47279" />
			<reference href="https://bdu.fstec.ru/vul/2026-05692" type="self" id="BDU:2026-05692" title="BDU:2026-05692" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs20" epoch="1" version="20.19.4" release="1.el7" arch="x86_64" src="nodejs20-20.19.4-1.el7.src.rpm">
					<filename>nodejs20-1:20.19.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs20-devel" epoch="1" version="20.19.4" release="1.el7" arch="x86_64" src="nodejs20-20.19.4-1.el7.src.rpm">
					<filename>nodejs20-devel-1:20.19.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs20-full-i18n" epoch="1" version="20.19.4" release="1.el7" arch="x86_64" src="nodejs20-20.19.4-1.el7.src.rpm">
					<filename>nodejs20-full-i18n-1:20.19.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs20-libs" epoch="1" version="20.19.4" release="1.el7" arch="x86_64" src="nodejs20-20.19.4-1.el7.src.rpm">
					<filename>nodejs20-libs-1:20.19.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs20-npm" epoch="1" version="10.8.2" release="1.20.19.4.1.el7" arch="x86_64" src="nodejs20-20.19.4-1.el7.src.rpm">
					<filename>nodejs20-npm-1:10.8.2-1.20.19.4.1.el7.x86_64.rpm</filename>
				</package>
				<package name="v8-11.3-devel" epoch="3" version="11.3.244.8" release="1.20.19.4.1.el7" arch="x86_64" src="nodejs20-20.19.4-1.el7.src.rpm">
					<filename>v8-11.3-devel-3:11.3.244.8-1.20.19.4.1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs20-docs" epoch="1" version="20.19.4" release="1.el7" arch="noarch" src="nodejs20-20.19.4-1.el7.src.rpm">
					<filename>nodejs20-docs-1:20.19.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-73-0006</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость glpi </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2025-64516-7.3/</description>
               <solution>Установить обновление для пакета(ов) glpi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2025-64516-7.3/" type="self" id="ROS-20260319-73-0006" title="ROS-20260319-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64516" type="cve" id="CVE-2025-64516" title="CVE-2025-64516" />
			<reference href="https://bdu.fstec.ru/vul/2026-05593" type="self" id="BDU:2026-05593" title="BDU:2026-05593" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi" epoch="0" version="11.0.5" release="1.el7" arch="noarch" src="glpi-11.0.5-1.el7.src.rpm">
					<filename>glpi-0:11.0.5-1.el7.noarch.rpm</filename>
				</package>
				<package name="glpi-marketplace" epoch="0" version="11.0.5" release="1.el7" arch="noarch" src="glpi-11.0.5-1.el7.src.rpm">
					<filename>glpi-marketplace-0:11.0.5-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-73-0007</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость glpi </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2025-66417-7.3/</description>
               <solution>Установить обновление для пакета(ов) glpi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2025-66417-7.3/" type="self" id="ROS-20260319-73-0007" title="ROS-20260319-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66417" type="cve" id="CVE-2025-66417" title="CVE-2025-66417" />
			<reference href="https://bdu.fstec.ru/vul/2026-05695" type="self" id="BDU:2026-05695" title="BDU:2026-05695" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi" epoch="0" version="11.0.5" release="1.el7" arch="noarch" src="glpi-11.0.5-1.el7.src.rpm">
					<filename>glpi-0:11.0.5-1.el7.noarch.rpm</filename>
				</package>
				<package name="glpi-marketplace" epoch="0" version="11.0.5" release="1.el7" arch="noarch" src="glpi-11.0.5-1.el7.src.rpm">
					<filename>glpi-marketplace-0:11.0.5-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-73-0008</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость fluent-bit </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в fluent-bit</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-fluent-bit-cve-2025-12970-7.3/</description>
               <solution>Установить обновление для пакета(ов) fluent-bit
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-fluent-bit-cve-2025-12970-7.3/" type="self" id="ROS-20260319-73-0008" title="ROS-20260319-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12970" type="cve" id="CVE-2025-12970" title="CVE-2025-12970" />
			<reference href="https://bdu.fstec.ru/vul/2025-15407" type="self" id="BDU:2025-15407" title="BDU:2025-15407" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="fluent-bit" epoch="0" version="4.2.2" release="1.el7" arch="x86_64" src="fluent-bit-4.2.2-1.el7.src.rpm">
					<filename>fluent-bit-0:4.2.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="fluent-bit-devel" epoch="0" version="4.2.2" release="1.el7" arch="x86_64" src="fluent-bit-4.2.2-1.el7.src.rpm">
					<filename>fluent-bit-devel-0:4.2.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-73-0009</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость fluent-bit </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в fluent-bit</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-fluent-bit-cve-2025-12972-7.3/</description>
               <solution>Установить обновление для пакета(ов) fluent-bit
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-fluent-bit-cve-2025-12972-7.3/" type="self" id="ROS-20260319-73-0009" title="ROS-20260319-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12972" type="cve" id="CVE-2025-12972" title="CVE-2025-12972" />
			<reference href="https://bdu.fstec.ru/vul/2025-15408" type="self" id="BDU:2025-15408" title="BDU:2025-15408" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="fluent-bit" epoch="0" version="4.2.2" release="1.el7" arch="x86_64" src="fluent-bit-4.2.2-1.el7.src.rpm">
					<filename>fluent-bit-0:4.2.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="fluent-bit-devel" epoch="0" version="4.2.2" release="1.el7" arch="x86_64" src="fluent-bit-4.2.2-1.el7.src.rpm">
					<filename>fluent-bit-devel-0:4.2.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-73-0010</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость fluent-bit </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в fluent-bit</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-fluent-bit-cve-2025-12969-7.3/</description>
               <solution>Установить обновление для пакета(ов) fluent-bit
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-fluent-bit-cve-2025-12969-7.3/" type="self" id="ROS-20260319-73-0010" title="ROS-20260319-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12969" type="cve" id="CVE-2025-12969" title="CVE-2025-12969" />
			<reference href="https://bdu.fstec.ru/vul/2025-15406" type="self" id="BDU:2025-15406" title="BDU:2025-15406" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="fluent-bit" epoch="0" version="4.2.2" release="1.el7" arch="x86_64" src="fluent-bit-4.2.2-1.el7.src.rpm">
					<filename>fluent-bit-0:4.2.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="fluent-bit-devel" epoch="0" version="4.2.2" release="1.el7" arch="x86_64" src="fluent-bit-4.2.2-1.el7.src.rpm">
					<filename>fluent-bit-devel-0:4.2.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-73-0011</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость fluent-bit </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в fluent-bit</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-fluent-bit-cve-2025-12977-7.3/</description>
               <solution>Установить обновление для пакета(ов) fluent-bit
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-fluent-bit-cve-2025-12977-7.3/" type="self" id="ROS-20260319-73-0011" title="ROS-20260319-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12977" type="cve" id="CVE-2025-12977" title="CVE-2025-12977" />
			<reference href="https://bdu.fstec.ru/vul/2025-14810" type="self" id="BDU:2025-14810" title="BDU:2025-14810" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="fluent-bit" epoch="0" version="4.2.2" release="1.el7" arch="x86_64" src="fluent-bit-4.2.2-1.el7.src.rpm">
					<filename>fluent-bit-0:4.2.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="fluent-bit-devel" epoch="0" version="4.2.2" release="1.el7" arch="x86_64" src="fluent-bit-4.2.2-1.el7.src.rpm">
					<filename>fluent-bit-devel-0:4.2.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-73-0012</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость fluent-bit </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в fluent-bit</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-fluent-bit-cve-2025-12978-7.3/</description>
               <solution>Установить обновление для пакета(ов) fluent-bit
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-fluent-bit-cve-2025-12978-7.3/" type="self" id="ROS-20260319-73-0012" title="ROS-20260319-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12978" type="cve" id="CVE-2025-12978" title="CVE-2025-12978" />
			<reference href="https://bdu.fstec.ru/vul/2025-15445" type="self" id="BDU:2025-15445" title="BDU:2025-15445" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="fluent-bit" epoch="0" version="4.2.2" release="1.el7" arch="x86_64" src="fluent-bit-4.2.2-1.el7.src.rpm">
					<filename>fluent-bit-0:4.2.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="fluent-bit-devel" epoch="0" version="4.2.2" release="1.el7" arch="x86_64" src="fluent-bit-4.2.2-1.el7.src.rpm">
					<filename>fluent-bit-devel-0:4.2.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-73-0013</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость glpi </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2025-59935-7.3/</description>
               <solution>Установить обновление для пакета(ов) glpi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2025-59935-7.3/" type="self" id="ROS-20260319-73-0013" title="ROS-20260319-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59935" type="cve" id="CVE-2025-59935" title="CVE-2025-59935" />
			<reference href="https://bdu.fstec.ru/vul/2026-05704" type="self" id="BDU:2026-05704" title="BDU:2026-05704" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi" epoch="0" version="11.0.5" release="1.el7" arch="noarch" src="glpi-11.0.5-1.el7.src.rpm">
					<filename>glpi-0:11.0.5-1.el7.noarch.rpm</filename>
				</package>
				<package name="glpi-marketplace" epoch="0" version="11.0.5" release="1.el7" arch="noarch" src="glpi-11.0.5-1.el7.src.rpm">
					<filename>glpi-marketplace-0:11.0.5-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-73-0014</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость glpi </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2025-64520-7.3/</description>
               <solution>Установить обновление для пакета(ов) glpi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2025-64520-7.3/" type="self" id="ROS-20260319-73-0014" title="ROS-20260319-73-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64520" type="cve" id="CVE-2025-64520" title="CVE-2025-64520" />
			<reference href="https://bdu.fstec.ru/vul/2026-05594" type="self" id="BDU:2026-05594" title="BDU:2026-05594" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi" epoch="0" version="11.0.5" release="1.el7" arch="noarch" src="glpi-11.0.5-1.el7.src.rpm">
					<filename>glpi-0:11.0.5-1.el7.noarch.rpm</filename>
				</package>
				<package name="glpi-marketplace" epoch="0" version="11.0.5" release="1.el7" arch="noarch" src="glpi-11.0.5-1.el7.src.rpm">
					<filename>glpi-marketplace-0:11.0.5-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-73-0015</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость grub2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в grub2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grub2-cve-2025-54771-7.3/</description>
               <solution>Установить обновление для пакета(ов) grub2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grub2-cve-2025-54771-7.3/" type="self" id="ROS-20260319-73-0015" title="ROS-20260319-73-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54771" type="cve" id="CVE-2025-54771" title="CVE-2025-54771" />
			<reference href="https://bdu.fstec.ru/vul/2025-14788" type="self" id="BDU:2025-14788" title="BDU:2025-14788" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="grub2-efi-ia32" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-efi-ia32-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-efi-ia32-cdboot" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-efi-ia32-cdboot-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-efi-x64" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-efi-x64-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-efi-x64-cdboot" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-efi-x64-cdboot-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-emu" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-emu-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-emu-modules" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-emu-modules-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-pc" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-pc-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-tools-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools-efi" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-tools-efi-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools-extra" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-tools-extra-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools-minimal" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-tools-minimal-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-common" epoch="1" version="2.06" release="69.el7" arch="noarch" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-common-1:2.06-69.el7.noarch.rpm</filename>
				</package>
				<package name="grub2-efi-ia32-modules" epoch="1" version="2.06" release="69.el7" arch="noarch" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-efi-ia32-modules-1:2.06-69.el7.noarch.rpm</filename>
				</package>
				<package name="grub2-efi-x64-modules" epoch="1" version="2.06" release="69.el7" arch="noarch" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-efi-x64-modules-1:2.06-69.el7.noarch.rpm</filename>
				</package>
				<package name="grub2-pc-modules" epoch="1" version="2.06" release="69.el7" arch="noarch" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-pc-modules-1:2.06-69.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-73-0016</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость grub2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в grub2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grub2-cve-2025-61663-7.3/</description>
               <solution>Установить обновление для пакета(ов) grub2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grub2-cve-2025-61663-7.3/" type="self" id="ROS-20260319-73-0016" title="ROS-20260319-73-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61663" type="cve" id="CVE-2025-61663" title="CVE-2025-61663" />
			<reference href="https://bdu.fstec.ru/vul/2025-14787" type="self" id="BDU:2025-14787" title="BDU:2025-14787" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="grub2-efi-ia32" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-efi-ia32-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-efi-ia32-cdboot" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-efi-ia32-cdboot-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-efi-x64" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-efi-x64-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-efi-x64-cdboot" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-efi-x64-cdboot-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-emu" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-emu-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-emu-modules" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-emu-modules-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-pc" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-pc-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-tools-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools-efi" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-tools-efi-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools-extra" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-tools-extra-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools-minimal" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-tools-minimal-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-common" epoch="1" version="2.06" release="69.el7" arch="noarch" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-common-1:2.06-69.el7.noarch.rpm</filename>
				</package>
				<package name="grub2-efi-ia32-modules" epoch="1" version="2.06" release="69.el7" arch="noarch" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-efi-ia32-modules-1:2.06-69.el7.noarch.rpm</filename>
				</package>
				<package name="grub2-efi-x64-modules" epoch="1" version="2.06" release="69.el7" arch="noarch" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-efi-x64-modules-1:2.06-69.el7.noarch.rpm</filename>
				</package>
				<package name="grub2-pc-modules" epoch="1" version="2.06" release="69.el7" arch="noarch" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-pc-modules-1:2.06-69.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-73-0017</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость grub2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в grub2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grub2-cve-2025-61664-7.3/</description>
               <solution>Установить обновление для пакета(ов) grub2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grub2-cve-2025-61664-7.3/" type="self" id="ROS-20260319-73-0017" title="ROS-20260319-73-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61664" type="cve" id="CVE-2025-61664" title="CVE-2025-61664" />
			<reference href="https://bdu.fstec.ru/vul/2025-14784" type="self" id="BDU:2025-14784" title="BDU:2025-14784" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="grub2-efi-ia32" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-efi-ia32-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-efi-ia32-cdboot" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-efi-ia32-cdboot-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-efi-x64" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-efi-x64-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-efi-x64-cdboot" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-efi-x64-cdboot-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-emu" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-emu-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-emu-modules" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-emu-modules-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-pc" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-pc-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-tools-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools-efi" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-tools-efi-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools-extra" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-tools-extra-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools-minimal" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-tools-minimal-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-common" epoch="1" version="2.06" release="69.el7" arch="noarch" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-common-1:2.06-69.el7.noarch.rpm</filename>
				</package>
				<package name="grub2-efi-ia32-modules" epoch="1" version="2.06" release="69.el7" arch="noarch" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-efi-ia32-modules-1:2.06-69.el7.noarch.rpm</filename>
				</package>
				<package name="grub2-efi-x64-modules" epoch="1" version="2.06" release="69.el7" arch="noarch" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-efi-x64-modules-1:2.06-69.el7.noarch.rpm</filename>
				</package>
				<package name="grub2-pc-modules" epoch="1" version="2.06" release="69.el7" arch="noarch" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-pc-modules-1:2.06-69.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-73-0018</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость grub2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в grub2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grub2-cve-2025-61661-7.3/</description>
               <solution>Установить обновление для пакета(ов) grub2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grub2-cve-2025-61661-7.3/" type="self" id="ROS-20260319-73-0018" title="ROS-20260319-73-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61661" type="cve" id="CVE-2025-61661" title="CVE-2025-61661" />
			<reference href="https://bdu.fstec.ru/vul/2025-14785" type="self" id="BDU:2025-14785" title="BDU:2025-14785" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="grub2-efi-ia32" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-efi-ia32-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-efi-ia32-cdboot" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-efi-ia32-cdboot-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-efi-x64" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-efi-x64-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-efi-x64-cdboot" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-efi-x64-cdboot-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-emu" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-emu-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-emu-modules" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-emu-modules-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-pc" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-pc-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-tools-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools-efi" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-tools-efi-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools-extra" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-tools-extra-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools-minimal" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-tools-minimal-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-common" epoch="1" version="2.06" release="69.el7" arch="noarch" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-common-1:2.06-69.el7.noarch.rpm</filename>
				</package>
				<package name="grub2-efi-ia32-modules" epoch="1" version="2.06" release="69.el7" arch="noarch" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-efi-ia32-modules-1:2.06-69.el7.noarch.rpm</filename>
				</package>
				<package name="grub2-efi-x64-modules" epoch="1" version="2.06" release="69.el7" arch="noarch" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-efi-x64-modules-1:2.06-69.el7.noarch.rpm</filename>
				</package>
				<package name="grub2-pc-modules" epoch="1" version="2.06" release="69.el7" arch="noarch" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-pc-modules-1:2.06-69.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-73-0019</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость grub2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в grub2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grub2-cve-2025-61662-7.3/</description>
               <solution>Установить обновление для пакета(ов) grub2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grub2-cve-2025-61662-7.3/" type="self" id="ROS-20260319-73-0019" title="ROS-20260319-73-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61662" type="cve" id="CVE-2025-61662" title="CVE-2025-61662" />
			<reference href="https://bdu.fstec.ru/vul/2025-14786" type="self" id="BDU:2025-14786" title="BDU:2025-14786" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="grub2-efi-ia32" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-efi-ia32-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-efi-ia32-cdboot" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-efi-ia32-cdboot-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-efi-x64" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-efi-x64-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-efi-x64-cdboot" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-efi-x64-cdboot-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-emu" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-emu-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-emu-modules" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-emu-modules-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-pc" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-pc-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-tools-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools-efi" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-tools-efi-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools-extra" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-tools-extra-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools-minimal" epoch="1" version="2.06" release="69.el7" arch="x86_64" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-tools-minimal-1:2.06-69.el7.x86_64.rpm</filename>
				</package>
				<package name="grub2-common" epoch="1" version="2.06" release="69.el7" arch="noarch" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-common-1:2.06-69.el7.noarch.rpm</filename>
				</package>
				<package name="grub2-efi-ia32-modules" epoch="1" version="2.06" release="69.el7" arch="noarch" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-efi-ia32-modules-1:2.06-69.el7.noarch.rpm</filename>
				</package>
				<package name="grub2-efi-x64-modules" epoch="1" version="2.06" release="69.el7" arch="noarch" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-efi-x64-modules-1:2.06-69.el7.noarch.rpm</filename>
				</package>
				<package name="grub2-pc-modules" epoch="1" version="2.06" release="69.el7" arch="noarch" src="grub2-2.06-69.el7.src.rpm">
					<filename>grub2-pc-modules-1:2.06-69.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-73-0020</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость ffmpeg </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ffmpeg</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ffmpeg-cve-2025-63757-7.3/</description>
               <solution>Установить обновление для пакета(ов) ffmpeg
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ffmpeg-cve-2025-63757-7.3/" type="self" id="ROS-20260319-73-0020" title="ROS-20260319-73-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-63757" type="cve" id="CVE-2025-63757" title="CVE-2025-63757" />
			<reference href="https://bdu.fstec.ru/vul/2026-03013" type="self" id="BDU:2026-03013" title="BDU:2026-03013" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ffmpeg" epoch="0" version="4.4.3" release="8.el7" arch="x86_64" src="ffmpeg-4.4.3-8.el7.src.rpm">
					<filename>ffmpeg-0:4.4.3-8.el7.x86_64.rpm</filename>
				</package>
				<package name="ffmpeg-devel" epoch="0" version="4.4.3" release="8.el7" arch="x86_64" src="ffmpeg-4.4.3-8.el7.src.rpm">
					<filename>ffmpeg-devel-0:4.4.3-8.el7.x86_64.rpm</filename>
				</package>
				<package name="ffmpeg-libs" epoch="0" version="4.4.3" release="8.el7" arch="x86_64" src="ffmpeg-4.4.3-8.el7.src.rpm">
					<filename>ffmpeg-libs-0:4.4.3-8.el7.x86_64.rpm</filename>
				</package>
				<package name="libavdevice" epoch="0" version="4.4.3" release="8.el7" arch="x86_64" src="ffmpeg-4.4.3-8.el7.src.rpm">
					<filename>libavdevice-0:4.4.3-8.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-73-0021</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость openbao </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в openbao</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openbao-cve-2025-64761-7.3/</description>
               <solution>Установить обновление для пакета(ов) openbao
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openbao-cve-2025-64761-7.3/" type="self" id="ROS-20260319-73-0021" title="ROS-20260319-73-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64761" type="cve" id="CVE-2025-64761" title="CVE-2025-64761" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openbao" epoch="0" version="2.4.4" release="1.el7" arch="x86_64" src="openbao-2.4.4-1.el7.src.rpm">
					<filename>openbao-0:2.4.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openbao-cassandra-database-plugin" epoch="0" version="2.4.4" release="1.el7" arch="x86_64" src="openbao-2.4.4-1.el7.src.rpm">
					<filename>openbao-cassandra-database-plugin-0:2.4.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openbao-influxdb-database-plugin" epoch="0" version="2.4.4" release="1.el7" arch="x86_64" src="openbao-2.4.4-1.el7.src.rpm">
					<filename>openbao-influxdb-database-plugin-0:2.4.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openbao-mysql-database-plugin" epoch="0" version="2.4.4" release="1.el7" arch="x86_64" src="openbao-2.4.4-1.el7.src.rpm">
					<filename>openbao-mysql-database-plugin-0:2.4.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openbao-mysql-legacy-database-plugin" epoch="0" version="2.4.4" release="1.el7" arch="x86_64" src="openbao-2.4.4-1.el7.src.rpm">
					<filename>openbao-mysql-legacy-database-plugin-0:2.4.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openbao-postgresql-database-plugin" epoch="0" version="2.4.4" release="1.el7" arch="x86_64" src="openbao-2.4.4-1.el7.src.rpm">
					<filename>openbao-postgresql-database-plugin-0:2.4.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openbao-agent" epoch="0" version="2.4.4" release="1.el7" arch="noarch" src="openbao-2.4.4-1.el7.src.rpm">
					<filename>openbao-agent-0:2.4.4-1.el7.noarch.rpm</filename>
				</package>
				<package name="openbao-server" epoch="0" version="2.4.4" release="1.el7" arch="noarch" src="openbao-2.4.4-1.el7.src.rpm">
					<filename>openbao-server-0:2.4.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-73-0022</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2026-21986-7.3/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2026-21986-7.3/" type="self" id="ROS-20260319-73-0022" title="ROS-20260319-73-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21986" type="cve" id="CVE-2026-21986" title="CVE-2026-21986" />
			<reference href="https://bdu.fstec.ru/vul/2026-00736" type="self" id="BDU:2026-00736" title="BDU:2026-00736" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-devel" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-devel-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-server" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-server-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-vnc" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-vnc-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-webservice" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-webservice-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-VirtualBox" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>python3-VirtualBox-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmodsrc" epoch="0" version="7.1.16" release="1.el7" arch="noarch" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-kmodsrc-0:7.1.16-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-73-0023</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость virtualbox-guest-additions </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в virtualbox-guest-additions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2026-21986-7.3/</description>
               <solution>Установить обновление для пакета(ов) virtualbox-guest-additions
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2026-21986-7.3/" type="self" id="ROS-20260319-73-0023" title="ROS-20260319-73-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21986" type="cve" id="CVE-2026-21986" title="CVE-2026-21986" />
			<reference href="https://bdu.fstec.ru/vul/2026-00736" type="self" id="BDU:2026-00736" title="BDU:2026-00736" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="virtualbox-guest-additions" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="virtualbox-guest-additions-7.1.16-1.el7.src.rpm">
					<filename>virtualbox-guest-additions-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-73-0024</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2026-21963-7.3/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2026-21963-7.3/" type="self" id="ROS-20260319-73-0024" title="ROS-20260319-73-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21963" type="cve" id="CVE-2026-21963" title="CVE-2026-21963" />
			<reference href="https://bdu.fstec.ru/vul/2026-00722" type="self" id="BDU:2026-00722" title="BDU:2026-00722" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-devel" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-devel-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-server" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-server-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-vnc" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-vnc-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-webservice" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-webservice-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-VirtualBox" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>python3-VirtualBox-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmodsrc" epoch="0" version="7.1.16" release="1.el7" arch="noarch" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-kmodsrc-0:7.1.16-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-73-0025</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость virtualbox-guest-additions </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в virtualbox-guest-additions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2026-21963-7.3/</description>
               <solution>Установить обновление для пакета(ов) virtualbox-guest-additions
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2026-21963-7.3/" type="self" id="ROS-20260319-73-0025" title="ROS-20260319-73-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21963" type="cve" id="CVE-2026-21963" title="CVE-2026-21963" />
			<reference href="https://bdu.fstec.ru/vul/2026-00722" type="self" id="BDU:2026-00722" title="BDU:2026-00722" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="virtualbox-guest-additions" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="virtualbox-guest-additions-7.1.16-1.el7.src.rpm">
					<filename>virtualbox-guest-additions-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-73-0026</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2026-21985-7.3/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2026-21985-7.3/" type="self" id="ROS-20260319-73-0026" title="ROS-20260319-73-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21985" type="cve" id="CVE-2026-21985" title="CVE-2026-21985" />
			<reference href="https://bdu.fstec.ru/vul/2026-00841" type="self" id="BDU:2026-00841" title="BDU:2026-00841" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-devel" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-devel-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-server" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-server-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-vnc" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-vnc-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-webservice" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-webservice-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-VirtualBox" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>python3-VirtualBox-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmodsrc" epoch="0" version="7.1.16" release="1.el7" arch="noarch" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-kmodsrc-0:7.1.16-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-73-0027</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость virtualbox-guest-additions </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в virtualbox-guest-additions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2026-21985-7.3/</description>
               <solution>Установить обновление для пакета(ов) virtualbox-guest-additions
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2026-21985-7.3/" type="self" id="ROS-20260319-73-0027" title="ROS-20260319-73-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21985" type="cve" id="CVE-2026-21985" title="CVE-2026-21985" />
			<reference href="https://bdu.fstec.ru/vul/2026-00841" type="self" id="BDU:2026-00841" title="BDU:2026-00841" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="virtualbox-guest-additions" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="virtualbox-guest-additions-7.1.16-1.el7.src.rpm">
					<filename>virtualbox-guest-additions-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-73-0029</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость virtualbox-guest-additions </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в virtualbox-guest-additions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2026-21981-7.3/</description>
               <solution>Установить обновление для пакета(ов) virtualbox-guest-additions
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2026-21981-7.3/" type="self" id="ROS-20260319-73-0029" title="ROS-20260319-73-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21981" type="cve" id="CVE-2026-21981" title="CVE-2026-21981" />
			<reference href="https://bdu.fstec.ru/vul/2026-00721" type="self" id="BDU:2026-00721" title="BDU:2026-00721" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="virtualbox-guest-additions" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="virtualbox-guest-additions-7.1.16-1.el7.src.rpm">
					<filename>virtualbox-guest-additions-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-73-0030</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2026-21981-7.3/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2026-21981-7.3/" type="self" id="ROS-20260319-73-0030" title="ROS-20260319-73-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21981" type="cve" id="CVE-2026-21981" title="CVE-2026-21981" />
			<reference href="https://bdu.fstec.ru/vul/2026-00721" type="self" id="BDU:2026-00721" title="BDU:2026-00721" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-devel" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-devel-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-server" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-server-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-vnc" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-vnc-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-webservice" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-webservice-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-VirtualBox" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>python3-VirtualBox-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmodsrc" epoch="0" version="7.1.16" release="1.el7" arch="noarch" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-kmodsrc-0:7.1.16-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-73-0031</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость glpi </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2026-22044-7.3/</description>
               <solution>Установить обновление для пакета(ов) glpi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2026-22044-7.3/" type="self" id="ROS-20260319-73-0031" title="ROS-20260319-73-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22044" type="cve" id="CVE-2026-22044" title="CVE-2026-22044" />
			<reference href="https://bdu.fstec.ru/vul/2026-05697" type="self" id="BDU:2026-05697" title="BDU:2026-05697" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi" epoch="0" version="11.0.5" release="1.el7" arch="noarch" src="glpi-11.0.5-1.el7.src.rpm">
					<filename>glpi-0:11.0.5-1.el7.noarch.rpm</filename>
				</package>
				<package name="glpi-marketplace" epoch="0" version="11.0.5" release="1.el7" arch="noarch" src="glpi-11.0.5-1.el7.src.rpm">
					<filename>glpi-marketplace-0:11.0.5-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-73-0032</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость glpi </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2026-22247-7.3/</description>
               <solution>Установить обновление для пакета(ов) glpi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2026-22247-7.3/" type="self" id="ROS-20260319-73-0032" title="ROS-20260319-73-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22247" type="cve" id="CVE-2026-22247" title="CVE-2026-22247" />
			<reference href="https://bdu.fstec.ru/vul/2026-05698" type="self" id="BDU:2026-05698" title="BDU:2026-05698" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi" epoch="0" version="11.0.5" release="1.el7" arch="noarch" src="glpi-11.0.5-1.el7.src.rpm">
					<filename>glpi-0:11.0.5-1.el7.noarch.rpm</filename>
				</package>
				<package name="glpi-marketplace" epoch="0" version="11.0.5" release="1.el7" arch="noarch" src="glpi-11.0.5-1.el7.src.rpm">
					<filename>glpi-marketplace-0:11.0.5-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-73-0033</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость glpi </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2026-23624-7.3/</description>
               <solution>Установить обновление для пакета(ов) glpi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2026-23624-7.3/" type="self" id="ROS-20260319-73-0033" title="ROS-20260319-73-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23624" type="cve" id="CVE-2026-23624" title="CVE-2026-23624" />
			<reference href="https://bdu.fstec.ru/vul/2026-05699" type="self" id="BDU:2026-05699" title="BDU:2026-05699" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi" epoch="0" version="11.0.5" release="1.el7" arch="noarch" src="glpi-11.0.5-1.el7.src.rpm">
					<filename>glpi-0:11.0.5-1.el7.noarch.rpm</filename>
				</package>
				<package name="glpi-marketplace" epoch="0" version="11.0.5" release="1.el7" arch="noarch" src="glpi-11.0.5-1.el7.src.rpm">
					<filename>glpi-marketplace-0:11.0.5-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-73-0034</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость beats </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в beats</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-beats-cve-2025-68381-7.3/</description>
               <solution>Установить обновление для пакета(ов) beats
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-beats-cve-2025-68381-7.3/" type="self" id="ROS-20260319-73-0034" title="ROS-20260319-73-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68381" type="cve" id="CVE-2025-68381" title="CVE-2025-68381" />
			<reference href="https://bdu.fstec.ru/vul/2026-05585" type="self" id="BDU:2026-05585" title="BDU:2026-05585" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="auditbeat" epoch="0" version="9.2.4" release="2.el7" arch="x86_64" src="beats-9.2.4-2.el7.src.rpm">
					<filename>auditbeat-0:9.2.4-2.el7.x86_64.rpm</filename>
				</package>
				<package name="auditbeat-docs" epoch="0" version="9.2.4" release="2.el7" arch="x86_64" src="beats-9.2.4-2.el7.src.rpm">
					<filename>auditbeat-docs-0:9.2.4-2.el7.x86_64.rpm</filename>
				</package>
				<package name="beats" epoch="0" version="9.2.4" release="2.el7" arch="x86_64" src="beats-9.2.4-2.el7.src.rpm">
					<filename>beats-0:9.2.4-2.el7.x86_64.rpm</filename>
				</package>
				<package name="filebeat" epoch="0" version="9.2.4" release="2.el7" arch="x86_64" src="beats-9.2.4-2.el7.src.rpm">
					<filename>filebeat-0:9.2.4-2.el7.x86_64.rpm</filename>
				</package>
				<package name="filebeat-docs" epoch="0" version="9.2.4" release="2.el7" arch="x86_64" src="beats-9.2.4-2.el7.src.rpm">
					<filename>filebeat-docs-0:9.2.4-2.el7.x86_64.rpm</filename>
				</package>
				<package name="heartbeat" epoch="0" version="9.2.4" release="2.el7" arch="x86_64" src="beats-9.2.4-2.el7.src.rpm">
					<filename>heartbeat-0:9.2.4-2.el7.x86_64.rpm</filename>
				</package>
				<package name="heartbeat-docs" epoch="0" version="9.2.4" release="2.el7" arch="x86_64" src="beats-9.2.4-2.el7.src.rpm">
					<filename>heartbeat-docs-0:9.2.4-2.el7.x86_64.rpm</filename>
				</package>
				<package name="metricbeat" epoch="0" version="9.2.4" release="2.el7" arch="x86_64" src="beats-9.2.4-2.el7.src.rpm">
					<filename>metricbeat-0:9.2.4-2.el7.x86_64.rpm</filename>
				</package>
				<package name="metricbeat-docs" epoch="0" version="9.2.4" release="2.el7" arch="x86_64" src="beats-9.2.4-2.el7.src.rpm">
					<filename>metricbeat-docs-0:9.2.4-2.el7.x86_64.rpm</filename>
				</package>
				<package name="packetbeat" epoch="0" version="9.2.4" release="2.el7" arch="x86_64" src="beats-9.2.4-2.el7.src.rpm">
					<filename>packetbeat-0:9.2.4-2.el7.x86_64.rpm</filename>
				</package>
				<package name="packetbeat-docs" epoch="0" version="9.2.4" release="2.el7" arch="x86_64" src="beats-9.2.4-2.el7.src.rpm">
					<filename>packetbeat-docs-0:9.2.4-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-73-0035</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость vim </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в vim</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-cve-2026-25749-7.3/</description>
               <solution>Установить обновление для пакета(ов) vim
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-cve-2026-25749-7.3/" type="self" id="ROS-20260319-73-0035" title="ROS-20260319-73-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25749" type="cve" id="CVE-2026-25749" title="CVE-2026-25749" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-X11" epoch="2" version="9.2.045" release="1.el7" arch="x86_64" src="vim-9.2.045-1.el7.src.rpm">
					<filename>vim-X11-2:9.2.045-1.el7.x86_64.rpm</filename>
				</package>
				<package name="vim-common" epoch="2" version="9.2.045" release="1.el7" arch="x86_64" src="vim-9.2.045-1.el7.src.rpm">
					<filename>vim-common-2:9.2.045-1.el7.x86_64.rpm</filename>
				</package>
				<package name="vim-enhanced" epoch="2" version="9.2.045" release="1.el7" arch="x86_64" src="vim-9.2.045-1.el7.src.rpm">
					<filename>vim-enhanced-2:9.2.045-1.el7.x86_64.rpm</filename>
				</package>
				<package name="vim-minimal" epoch="2" version="9.2.045" release="1.el7" arch="x86_64" src="vim-9.2.045-1.el7.src.rpm">
					<filename>vim-minimal-2:9.2.045-1.el7.x86_64.rpm</filename>
				</package>
				<package name="vim-data" epoch="2" version="9.2.045" release="1.el7" arch="noarch" src="vim-9.2.045-1.el7.src.rpm">
					<filename>vim-data-2:9.2.045-1.el7.noarch.rpm</filename>
				</package>
				<package name="vim-filesystem" epoch="2" version="9.2.045" release="1.el7" arch="noarch" src="vim-9.2.045-1.el7.src.rpm">
					<filename>vim-filesystem-2:9.2.045-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-73-0036</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость vim </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в vim</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-cve-2026-26269-7.3/</description>
               <solution>Установить обновление для пакета(ов) vim
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vim-cve-2026-26269-7.3/" type="self" id="ROS-20260319-73-0036" title="ROS-20260319-73-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26269" type="cve" id="CVE-2026-26269" title="CVE-2026-26269" />
			<reference href="https://bdu.fstec.ru/vul/2026-05139" type="self" id="BDU:2026-05139" title="BDU:2026-05139" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vim-X11" epoch="2" version="9.2.045" release="1.el7" arch="x86_64" src="vim-9.2.045-1.el7.src.rpm">
					<filename>vim-X11-2:9.2.045-1.el7.x86_64.rpm</filename>
				</package>
				<package name="vim-common" epoch="2" version="9.2.045" release="1.el7" arch="x86_64" src="vim-9.2.045-1.el7.src.rpm">
					<filename>vim-common-2:9.2.045-1.el7.x86_64.rpm</filename>
				</package>
				<package name="vim-enhanced" epoch="2" version="9.2.045" release="1.el7" arch="x86_64" src="vim-9.2.045-1.el7.src.rpm">
					<filename>vim-enhanced-2:9.2.045-1.el7.x86_64.rpm</filename>
				</package>
				<package name="vim-minimal" epoch="2" version="9.2.045" release="1.el7" arch="x86_64" src="vim-9.2.045-1.el7.src.rpm">
					<filename>vim-minimal-2:9.2.045-1.el7.x86_64.rpm</filename>
				</package>
				<package name="vim-data" epoch="2" version="9.2.045" release="1.el7" arch="noarch" src="vim-9.2.045-1.el7.src.rpm">
					<filename>vim-data-2:9.2.045-1.el7.noarch.rpm</filename>
				</package>
				<package name="vim-filesystem" epoch="2" version="9.2.045" release="1.el7" arch="noarch" src="vim-9.2.045-1.el7.src.rpm">
					<filename>vim-filesystem-2:9.2.045-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260320-73-0001</id>
		<issued date="2026-03-20" />
		<updated date="2026-03-20" />
		<title>Уязвимость LibRaw </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в LibRaw</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libraw-cve-2020-22628-7.3/</description>
               <solution>Установить обновление для пакета(ов) LibRaw
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libraw-cve-2020-22628-7.3/" type="self" id="ROS-20260320-73-0001" title="ROS-20260320-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22628" type="cve" id="CVE-2020-22628" title="CVE-2020-22628" />
			<reference href="https://bdu.fstec.ru/vul/2023-05897" type="self" id="BDU:2023-05897" title="BDU:2023-05897" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="LibRaw" epoch="0" version="0.19.5" release="7.el7" arch="x86_64" src="LibRaw-0.19.5-7.el7.src.rpm">
					<filename>LibRaw-0:0.19.5-7.el7.x86_64.rpm</filename>
				</package>
				<package name="LibRaw-devel" epoch="0" version="0.19.5" release="7.el7" arch="x86_64" src="LibRaw-0.19.5-7.el7.src.rpm">
					<filename>LibRaw-devel-0:0.19.5-7.el7.x86_64.rpm</filename>
				</package>
				<package name="LibRaw-samples" epoch="0" version="0.19.5" release="7.el7" arch="x86_64" src="LibRaw-0.19.5-7.el7.src.rpm">
					<filename>LibRaw-samples-0:0.19.5-7.el7.x86_64.rpm</filename>
				</package>
				<package name="LibRaw-static" epoch="0" version="0.19.5" release="7.el7" arch="x86_64" src="LibRaw-0.19.5-7.el7.src.rpm">
					<filename>LibRaw-static-0:0.19.5-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260320-73-0002</id>
		<issued date="2026-03-20" />
		<updated date="2026-03-20" />
		<title>Уязвимость sqlite </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в sqlite</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sqlite-cve-2022-46908-7.3/</description>
               <solution>Установить обновление для пакета(ов) sqlite
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-sqlite-cve-2022-46908-7.3/" type="self" id="ROS-20260320-73-0002" title="ROS-20260320-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46908" type="cve" id="CVE-2022-46908" title="CVE-2022-46908" />
			<reference href="https://bdu.fstec.ru/vul/2023-05686" type="self" id="BDU:2023-05686" title="BDU:2023-05686" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="lemon" epoch="0" version="3.35.3" release="3.el7" arch="x86_64" src="sqlite-3.35.3-3.el7.src.rpm">
					<filename>lemon-0:3.35.3-3.el7.x86_64.rpm</filename>
				</package>
				<package name="sqlite" epoch="0" version="3.35.3" release="3.el7" arch="x86_64" src="sqlite-3.35.3-3.el7.src.rpm">
					<filename>sqlite-0:3.35.3-3.el7.x86_64.rpm</filename>
				</package>
				<package name="sqlite-analyzer" epoch="0" version="3.35.3" release="3.el7" arch="x86_64" src="sqlite-3.35.3-3.el7.src.rpm">
					<filename>sqlite-analyzer-0:3.35.3-3.el7.x86_64.rpm</filename>
				</package>
				<package name="sqlite-devel" epoch="0" version="3.35.3" release="3.el7" arch="x86_64" src="sqlite-3.35.3-3.el7.src.rpm">
					<filename>sqlite-devel-0:3.35.3-3.el7.x86_64.rpm</filename>
				</package>
				<package name="sqlite-libs" epoch="0" version="3.35.3" release="3.el7" arch="x86_64" src="sqlite-3.35.3-3.el7.src.rpm">
					<filename>sqlite-libs-0:3.35.3-3.el7.x86_64.rpm</filename>
				</package>
				<package name="sqlite-tcl" epoch="0" version="3.35.3" release="3.el7" arch="x86_64" src="sqlite-3.35.3-3.el7.src.rpm">
					<filename>sqlite-tcl-0:3.35.3-3.el7.x86_64.rpm</filename>
				</package>
				<package name="sqlite-tools" epoch="0" version="3.35.3" release="3.el7" arch="x86_64" src="sqlite-3.35.3-3.el7.src.rpm">
					<filename>sqlite-tools-0:3.35.3-3.el7.x86_64.rpm</filename>
				</package>
				<package name="sqlite-doc" epoch="0" version="3.35.3" release="3.el7" arch="noarch" src="sqlite-3.35.3-3.el7.src.rpm">
					<filename>sqlite-doc-0:3.35.3-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260320-73-0003</id>
		<issued date="2026-03-20" />
		<updated date="2026-03-20" />
		<title>Уязвимость libsoup </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libsoup</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libsoup-cve-2025-32049-7.3/</description>
               <solution>Установить обновление для пакета(ов) libsoup
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libsoup-cve-2025-32049-7.3/" type="self" id="ROS-20260320-73-0003" title="ROS-20260320-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32049" type="cve" id="CVE-2025-32049" title="CVE-2025-32049" />
			<reference href="https://bdu.fstec.ru/vul/2025-07139" type="self" id="BDU:2025-07139" title="BDU:2025-07139" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libsoup" epoch="0" version="2.74.3" release="5.el7" arch="x86_64" src="libsoup-2.74.3-5.el7.src.rpm">
					<filename>libsoup-0:2.74.3-5.el7.x86_64.rpm</filename>
				</package>
				<package name="libsoup-devel" epoch="0" version="2.74.3" release="5.el7" arch="x86_64" src="libsoup-2.74.3-5.el7.src.rpm">
					<filename>libsoup-devel-0:2.74.3-5.el7.x86_64.rpm</filename>
				</package>
				<package name="libsoup-doc" epoch="0" version="2.74.3" release="5.el7" arch="noarch" src="libsoup-2.74.3-5.el7.src.rpm">
					<filename>libsoup-doc-0:2.74.3-5.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260320-73-0004</id>
		<issued date="2026-03-20" />
		<updated date="2026-03-20" />
		<title>Уязвимость opentofu </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в opentofu</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opentofu-cve-2025-61727-7.3/</description>
               <solution>Установить обновление для пакета(ов) opentofu
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opentofu-cve-2025-61727-7.3/" type="self" id="ROS-20260320-73-0004" title="ROS-20260320-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61727" type="cve" id="CVE-2025-61727" title="CVE-2025-61727" />
			<reference href="https://bdu.fstec.ru/vul/2026-00268" type="self" id="BDU:2026-00268" title="BDU:2026-00268" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="opentofu" epoch="0" version="1.11.5" release="1.el7" arch="x86_64" src="opentofu-1.11.5-1.el7.src.rpm">
					<filename>opentofu-0:1.11.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260320-73-0005</id>
		<issued date="2026-03-20" />
		<updated date="2026-03-20" />
		<title>Уязвимость jenkins </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в jenkins</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jenkins-cve-2026-27099-7.3/</description>
               <solution>Установить обновление для пакета(ов) jenkins
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jenkins-cve-2026-27099-7.3/" type="self" id="ROS-20260320-73-0005" title="ROS-20260320-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27099" type="cve" id="CVE-2026-27099" title="CVE-2026-27099" />
			<reference href="https://bdu.fstec.ru/vul/2026-05584" type="self" id="BDU:2026-05584" title="BDU:2026-05584" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jenkins" epoch="0" version="2.541.2" release="1.el7" arch="noarch" src="jenkins-2.541.2-1.el7.src.rpm">
					<filename>jenkins-0:2.541.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260320-73-0006</id>
		<issued date="2026-03-20" />
		<updated date="2026-03-20" />
		<title>Уязвимость jenkins </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в jenkins</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jenkins-cve-2026-27100-7.3/</description>
               <solution>Установить обновление для пакета(ов) jenkins
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-jenkins-cve-2026-27100-7.3/" type="self" id="ROS-20260320-73-0006" title="ROS-20260320-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27100" type="cve" id="CVE-2026-27100" title="CVE-2026-27100" />
			<reference href="https://bdu.fstec.ru/vul/2026-05583" type="self" id="BDU:2026-05583" title="BDU:2026-05583" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="jenkins" epoch="0" version="2.541.2" release="1.el7" arch="noarch" src="jenkins-2.541.2-1.el7.src.rpm">
					<filename>jenkins-0:2.541.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260320-73-0007</id>
		<issued date="2026-03-20" />
		<updated date="2026-03-20" />
		<title>Уязвимость etcd </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в etcd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-etcd-cve-2025-47914-7.3/</description>
               <solution>Установить обновление для пакета(ов) etcd
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-etcd-cve-2025-47914-7.3/" type="self" id="ROS-20260320-73-0007" title="ROS-20260320-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47914" type="cve" id="CVE-2025-47914" title="CVE-2025-47914" />
			<reference href="https://bdu.fstec.ru/vul/2025-14682" type="self" id="BDU:2025-14682" title="BDU:2025-14682" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="etcd" epoch="0" version="3.5.23" release="2.el7" arch="x86_64" src="etcd-3.5.23-2.el7.src.rpm">
					<filename>etcd-0:3.5.23-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260320-73-0008</id>
		<issued date="2026-03-20" />
		<updated date="2026-03-20" />
		<title>Уязвимость etcd </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в etcd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-etcd-cve-2025-58181-7.3/</description>
               <solution>Установить обновление для пакета(ов) etcd
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-etcd-cve-2025-58181-7.3/" type="self" id="ROS-20260320-73-0008" title="ROS-20260320-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58181" type="cve" id="CVE-2025-58181" title="CVE-2025-58181" />
			<reference href="https://bdu.fstec.ru/vul/2025-14688" type="self" id="BDU:2025-14688" title="BDU:2025-14688" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="etcd" epoch="0" version="3.5.23" release="2.el7" arch="x86_64" src="etcd-3.5.23-2.el7.src.rpm">
					<filename>etcd-0:3.5.23-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260320-73-0009</id>
		<issued date="2026-03-20" />
		<updated date="2026-03-20" />
		<title>Уязвимость etcd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в etcd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-etcd-cve-2025-61726-7.3/</description>
               <solution>Установить обновление для пакета(ов) etcd
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-etcd-cve-2025-61726-7.3/" type="self" id="ROS-20260320-73-0009" title="ROS-20260320-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61726" type="cve" id="CVE-2025-61726" title="CVE-2025-61726" />
			<reference href="https://bdu.fstec.ru/vul/2026-03409" type="self" id="BDU:2026-03409" title="BDU:2026-03409" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="etcd" epoch="0" version="3.5.23" release="2.el7" arch="x86_64" src="etcd-3.5.23-2.el7.src.rpm">
					<filename>etcd-0:3.5.23-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260320-73-0010</id>
		<issued date="2026-03-20" />
		<updated date="2026-03-20" />
		<title>Уязвимость etcd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в etcd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-etcd-cve-2025-61731-7.3/</description>
               <solution>Установить обновление для пакета(ов) etcd
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-etcd-cve-2025-61731-7.3/" type="self" id="ROS-20260320-73-0010" title="ROS-20260320-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61731" type="cve" id="CVE-2025-61731" title="CVE-2025-61731" />
			<reference href="https://bdu.fstec.ru/vul/2026-03411" type="self" id="BDU:2026-03411" title="BDU:2026-03411" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="etcd" epoch="0" version="3.5.23" release="2.el7" arch="x86_64" src="etcd-3.5.23-2.el7.src.rpm">
					<filename>etcd-0:3.5.23-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260320-73-0011</id>
		<issued date="2026-03-20" />
		<updated date="2026-03-20" />
		<title>Уязвимость etcd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в etcd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-etcd-cve-2025-61732-7.3/</description>
               <solution>Установить обновление для пакета(ов) etcd
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-etcd-cve-2025-61732-7.3/" type="self" id="ROS-20260320-73-0011" title="ROS-20260320-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61732" type="cve" id="CVE-2025-61732" title="CVE-2025-61732" />
			<reference href="https://bdu.fstec.ru/vul/2026-02553" type="self" id="BDU:2026-02553" title="BDU:2026-02553" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="etcd" epoch="0" version="3.5.23" release="2.el7" arch="x86_64" src="etcd-3.5.23-2.el7.src.rpm">
					<filename>etcd-0:3.5.23-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260320-73-0012</id>
		<issued date="2026-03-20" />
		<updated date="2026-03-20" />
		<title>Уязвимость glpi </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2026-25590-7.3/</description>
               <solution>Установить обновление для пакета(ов) glpi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2026-25590-7.3/" type="self" id="ROS-20260320-73-0012" title="ROS-20260320-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25590" type="cve" id="CVE-2026-25590" title="CVE-2026-25590" />
			<reference href="https://bdu.fstec.ru/vul/2026-05701" type="self" id="BDU:2026-05701" title="BDU:2026-05701" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi" epoch="0" version="11.0.5" release="1.el7" arch="noarch" src="glpi-11.0.5-1.el7.src.rpm">
					<filename>glpi-0:11.0.5-1.el7.noarch.rpm</filename>
				</package>
				<package name="glpi-marketplace" epoch="0" version="11.0.5" release="1.el7" arch="noarch" src="glpi-11.0.5-1.el7.src.rpm">
					<filename>glpi-marketplace-0:11.0.5-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260320-73-0013</id>
		<issued date="2026-03-20" />
		<updated date="2026-03-20" />
		<title>Уязвимость openbao </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в openbao</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openbao-cve-2025-68121-7.3/</description>
               <solution>Установить обновление для пакета(ов) openbao
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openbao-cve-2025-68121-7.3/" type="self" id="ROS-20260320-73-0013" title="ROS-20260320-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68121" type="cve" id="CVE-2025-68121" title="CVE-2025-68121" />
			<reference href="https://bdu.fstec.ru/vul/2026-03408" type="self" id="BDU:2026-03408" title="BDU:2026-03408" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openbao" epoch="0" version="2.4.4" release="1.el7" arch="x86_64" src="openbao-2.4.4-1.el7.src.rpm">
					<filename>openbao-0:2.4.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openbao-cassandra-database-plugin" epoch="0" version="2.4.4" release="1.el7" arch="x86_64" src="openbao-2.4.4-1.el7.src.rpm">
					<filename>openbao-cassandra-database-plugin-0:2.4.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openbao-influxdb-database-plugin" epoch="0" version="2.4.4" release="1.el7" arch="x86_64" src="openbao-2.4.4-1.el7.src.rpm">
					<filename>openbao-influxdb-database-plugin-0:2.4.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openbao-mysql-database-plugin" epoch="0" version="2.4.4" release="1.el7" arch="x86_64" src="openbao-2.4.4-1.el7.src.rpm">
					<filename>openbao-mysql-database-plugin-0:2.4.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openbao-mysql-legacy-database-plugin" epoch="0" version="2.4.4" release="1.el7" arch="x86_64" src="openbao-2.4.4-1.el7.src.rpm">
					<filename>openbao-mysql-legacy-database-plugin-0:2.4.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openbao-postgresql-database-plugin" epoch="0" version="2.4.4" release="1.el7" arch="x86_64" src="openbao-2.4.4-1.el7.src.rpm">
					<filename>openbao-postgresql-database-plugin-0:2.4.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openbao-agent" epoch="0" version="2.4.4" release="1.el7" arch="noarch" src="openbao-2.4.4-1.el7.src.rpm">
					<filename>openbao-agent-0:2.4.4-1.el7.noarch.rpm</filename>
				</package>
				<package name="openbao-server" epoch="0" version="2.4.4" release="1.el7" arch="noarch" src="openbao-2.4.4-1.el7.src.rpm">
					<filename>openbao-server-0:2.4.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260320-73-0014</id>
		<issued date="2026-03-20" />
		<updated date="2026-03-20" />
		<title>Уязвимость glpi </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2026-22248-7.3/</description>
               <solution>Установить обновление для пакета(ов) glpi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2026-22248-7.3/" type="self" id="ROS-20260320-73-0014" title="ROS-20260320-73-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22248" type="cve" id="CVE-2026-22248" title="CVE-2026-22248" />
			<reference href="https://bdu.fstec.ru/vul/2026-05700" type="self" id="BDU:2026-05700" title="BDU:2026-05700" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi" epoch="0" version="11.0.5" release="1.el7" arch="noarch" src="glpi-11.0.5-1.el7.src.rpm">
					<filename>glpi-0:11.0.5-1.el7.noarch.rpm</filename>
				</package>
				<package name="glpi-marketplace" epoch="0" version="11.0.5" release="1.el7" arch="noarch" src="glpi-11.0.5-1.el7.src.rpm">
					<filename>glpi-marketplace-0:11.0.5-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-73-0001</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38095-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38095-7.3/" type="self" id="ROS-20260323-73-0001" title="ROS-20260323-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38095" type="cve" id="CVE-2025-38095" title="CVE-2025-38095" />
			<reference href="https://bdu.fstec.ru/vul/2025-09023" type="self" id="BDU:2025-09023" title="BDU:2025-09023" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-73-0002</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38097-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38097-7.3/" type="self" id="ROS-20260323-73-0002" title="ROS-20260323-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38097" type="cve" id="CVE-2025-38097" title="CVE-2025-38097" />
			<reference href="https://bdu.fstec.ru/vul/2025-09031" type="self" id="BDU:2025-09031" title="BDU:2025-09031" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-73-0003</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38100-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38100-7.3/" type="self" id="ROS-20260323-73-0003" title="ROS-20260323-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38100" type="cve" id="CVE-2025-38100" title="CVE-2025-38100" />
			<reference href="https://bdu.fstec.ru/vul/2025-09025" type="self" id="BDU:2025-09025" title="BDU:2025-09025" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-73-0004</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38125-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38125-7.3/" type="self" id="ROS-20260323-73-0004" title="ROS-20260323-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38125" type="cve" id="CVE-2025-38125" title="CVE-2025-38125" />
			<reference href="https://bdu.fstec.ru/vul/2025-09603" type="self" id="BDU:2025-09603" title="BDU:2025-09603" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.162" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.162-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-73-0005</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38129-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38129-7.3/" type="self" id="ROS-20260323-73-0005" title="ROS-20260323-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38129" type="cve" id="CVE-2025-38129" title="CVE-2025-38129" />
			<reference href="https://bdu.fstec.ru/vul/2025-09604" type="self" id="BDU:2025-09604" title="BDU:2025-09604" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.162" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.162-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-73-0006</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38232-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38232-7.3/" type="self" id="ROS-20260323-73-0006" title="ROS-20260323-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38232" type="cve" id="CVE-2025-38232" title="CVE-2025-38232" />
			<reference href="https://bdu.fstec.ru/vul/2025-09033" type="self" id="BDU:2025-09033" title="BDU:2025-09033" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.162" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.162-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-73-0007</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38260-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38260-7.3/" type="self" id="ROS-20260323-73-0007" title="ROS-20260323-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38260" type="cve" id="CVE-2025-38260" title="CVE-2025-38260" />
			<reference href="https://bdu.fstec.ru/vul/2025-13466" type="self" id="BDU:2025-13466" title="BDU:2025-13466" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-73-0008</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38262-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38262-7.3/" type="self" id="ROS-20260323-73-0008" title="ROS-20260323-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38262" type="cve" id="CVE-2025-38262" title="CVE-2025-38262" />
			<reference href="https://bdu.fstec.ru/vul/2025-13467" type="self" id="BDU:2025-13467" title="BDU:2025-13467" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-73-0009</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38263-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38263-7.3/" type="self" id="ROS-20260323-73-0009" title="ROS-20260323-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38263" type="cve" id="CVE-2025-38263" title="CVE-2025-38263" />
			<reference href="https://bdu.fstec.ru/vul/2025-13565" type="self" id="BDU:2025-13565" title="BDU:2025-13565" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-73-0010</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38514-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38514-7.3/" type="self" id="ROS-20260323-73-0010" title="ROS-20260323-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38514" type="cve" id="CVE-2025-38514" title="CVE-2025-38514" />
			<reference href="https://bdu.fstec.ru/vul/2025-15822" type="self" id="BDU:2025-15822" title="BDU:2025-15822" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-73-0011</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38515-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38515-7.3/" type="self" id="ROS-20260323-73-0011" title="ROS-20260323-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38515" type="cve" id="CVE-2025-38515" title="CVE-2025-38515" />
			<reference href="https://bdu.fstec.ru/vul/2025-15821" type="self" id="BDU:2025-15821" title="BDU:2025-15821" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-73-0012</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38516-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38516-7.3/" type="self" id="ROS-20260323-73-0012" title="ROS-20260323-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38516" type="cve" id="CVE-2025-38516" title="CVE-2025-38516" />
			<reference href="https://bdu.fstec.ru/vul/2025-15820" type="self" id="BDU:2025-15820" title="BDU:2025-15820" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-73-0013</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38520-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38520-7.3/" type="self" id="ROS-20260323-73-0013" title="ROS-20260323-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38520" type="cve" id="CVE-2025-38520" title="CVE-2025-38520" />
			<reference href="https://bdu.fstec.ru/vul/2025-14968" type="self" id="BDU:2025-14968" title="BDU:2025-14968" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-73-0014</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38527-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38527-7.3/" type="self" id="ROS-20260323-73-0014" title="ROS-20260323-73-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38527" type="cve" id="CVE-2025-38527" title="CVE-2025-38527" />
			<reference href="https://bdu.fstec.ru/vul/2025-15816" type="self" id="BDU:2025-15816" title="BDU:2025-15816" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-73-0015</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38528-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38528-7.3/" type="self" id="ROS-20260323-73-0015" title="ROS-20260323-73-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38528" type="cve" id="CVE-2025-38528" title="CVE-2025-38528" />
			<reference href="https://bdu.fstec.ru/vul/2025-15554" type="self" id="BDU:2025-15554" title="BDU:2025-15554" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-73-0016</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38529-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38529-7.3/" type="self" id="ROS-20260323-73-0016" title="ROS-20260323-73-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38529" type="cve" id="CVE-2025-38529" title="CVE-2025-38529" />
			<reference href="https://bdu.fstec.ru/vul/2025-15815" type="self" id="BDU:2025-15815" title="BDU:2025-15815" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-73-0017</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38530-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38530-7.3/" type="self" id="ROS-20260323-73-0017" title="ROS-20260323-73-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38530" type="cve" id="CVE-2025-38530" title="CVE-2025-38530" />
			<reference href="https://bdu.fstec.ru/vul/2025-15814" type="self" id="BDU:2025-15814" title="BDU:2025-15814" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-73-0018</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38535-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38535-7.3/" type="self" id="ROS-20260323-73-0018" title="ROS-20260323-73-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38535" type="cve" id="CVE-2025-38535" title="CVE-2025-38535" />
			<reference href="https://bdu.fstec.ru/vul/2025-15811" type="self" id="BDU:2025-15811" title="BDU:2025-15811" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-73-0019</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38538-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38538-7.3/" type="self" id="ROS-20260323-73-0019" title="ROS-20260323-73-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38538" type="cve" id="CVE-2025-38538" title="CVE-2025-38538" />
			<reference href="https://bdu.fstec.ru/vul/2025-14978" type="self" id="BDU:2025-14978" title="BDU:2025-14978" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-73-0020</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38539-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38539-7.3/" type="self" id="ROS-20260323-73-0020" title="ROS-20260323-73-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38539" type="cve" id="CVE-2025-38539" title="CVE-2025-38539" />
			<reference href="https://bdu.fstec.ru/vul/2025-15810" type="self" id="BDU:2025-15810" title="BDU:2025-15810" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-73-0021</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38540-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38540-7.3/" type="self" id="ROS-20260323-73-0021" title="ROS-20260323-73-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38540" type="cve" id="CVE-2025-38540" title="CVE-2025-38540" />
			<reference href="https://bdu.fstec.ru/vul/2025-15166" type="self" id="BDU:2025-15166" title="BDU:2025-15166" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-73-0022</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38542-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38542-7.3/" type="self" id="ROS-20260323-73-0022" title="ROS-20260323-73-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38542" type="cve" id="CVE-2025-38542" title="CVE-2025-38542" />
			<reference href="https://bdu.fstec.ru/vul/2025-15809" type="self" id="BDU:2025-15809" title="BDU:2025-15809" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-73-0023</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38543-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38543-7.3/" type="self" id="ROS-20260323-73-0023" title="ROS-20260323-73-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38543" type="cve" id="CVE-2025-38543" title="CVE-2025-38543" />
			<reference href="https://bdu.fstec.ru/vul/2025-15808" type="self" id="BDU:2025-15808" title="BDU:2025-15808" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-73-0024</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38546-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38546-7.3/" type="self" id="ROS-20260323-73-0024" title="ROS-20260323-73-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38546" type="cve" id="CVE-2025-38546" title="CVE-2025-38546" />
			<reference href="https://bdu.fstec.ru/vul/2025-15806" type="self" id="BDU:2025-15806" title="BDU:2025-15806" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-73-0025</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38548-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38548-7.3/" type="self" id="ROS-20260323-73-0025" title="ROS-20260323-73-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38548" type="cve" id="CVE-2025-38548" title="CVE-2025-38548" />
			<reference href="https://bdu.fstec.ru/vul/2025-15168" type="self" id="BDU:2025-15168" title="BDU:2025-15168" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-73-0026</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38550-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38550-7.3/" type="self" id="ROS-20260323-73-0026" title="ROS-20260323-73-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38550" type="cve" id="CVE-2025-38550" title="CVE-2025-38550" />
			<reference href="https://bdu.fstec.ru/vul/2025-15804" type="self" id="BDU:2025-15804" title="BDU:2025-15804" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-73-0027</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38552-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38552-7.3/" type="self" id="ROS-20260323-73-0027" title="ROS-20260323-73-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38552" type="cve" id="CVE-2025-38552" title="CVE-2025-38552" />
			<reference href="https://bdu.fstec.ru/vul/2025-15803" type="self" id="BDU:2025-15803" title="BDU:2025-15803" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-73-0028</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-3865-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-3865-7.3/" type="self" id="ROS-20260323-73-0028" title="ROS-20260323-73-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3865" type="cve" id="CVE-2023-3865" title="CVE-2023-3865" />
			<reference href="https://bdu.fstec.ru/vul/2023-04742" type="self" id="BDU:2023-04742" title="BDU:2023-04742" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-73-0029</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-3866-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-3866-7.3/" type="self" id="ROS-20260323-73-0029" title="ROS-20260323-73-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3866" type="cve" id="CVE-2023-3866" title="CVE-2023-3866" />
			<reference href="https://bdu.fstec.ru/vul/2023-04743" type="self" id="BDU:2023-04743" title="BDU:2023-04743" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-73-0030</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-4130-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-4130-7.3/" type="self" id="ROS-20260323-73-0030" title="ROS-20260323-73-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4130" type="cve" id="CVE-2023-4130" title="CVE-2023-4130" />
			<reference href="https://bdu.fstec.ru/vul/2026-03245" type="self" id="BDU:2026-03245" title="BDU:2026-03245" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>perf-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.52" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.52-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-73-0031</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-4515-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-4515-7.3/" type="self" id="ROS-20260323-73-0031" title="ROS-20260323-73-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4515" type="cve" id="CVE-2023-4515" title="CVE-2023-4515" />
			<reference href="https://bdu.fstec.ru/vul/2026-03243" type="self" id="BDU:2026-03243" title="BDU:2026-03243" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>perf-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.52" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.52-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-73-0032</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38553-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38553-7.3/" type="self" id="ROS-20260323-73-0032" title="ROS-20260323-73-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38553" type="cve" id="CVE-2025-38553" title="CVE-2025-38553" />
			<reference href="https://bdu.fstec.ru/vul/2025-15553" type="self" id="BDU:2025-15553" title="BDU:2025-15553" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-73-0033</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38555-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38555-7.3/" type="self" id="ROS-20260323-73-0033" title="ROS-20260323-73-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38555" type="cve" id="CVE-2025-38555" title="CVE-2025-38555" />
			<reference href="https://bdu.fstec.ru/vul/2025-10721" type="self" id="BDU:2025-10721" title="BDU:2025-10721" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-73-0034</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38556-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38556-7.3/" type="self" id="ROS-20260323-73-0034" title="ROS-20260323-73-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38556" type="cve" id="CVE-2025-38556" title="CVE-2025-38556" />
			<reference href="https://bdu.fstec.ru/vul/2025-10722" type="self" id="BDU:2025-10722" title="BDU:2025-10722" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.162" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.162-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-73-0035</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38560-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38560-7.3/" type="self" id="ROS-20260323-73-0035" title="ROS-20260323-73-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38560" type="cve" id="CVE-2025-38560" title="CVE-2025-38560" />
			<reference href="https://bdu.fstec.ru/vul/2025-10726" type="self" id="BDU:2025-10726" title="BDU:2025-10726" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-73-0001</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38561-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38561-7.3/" type="self" id="ROS-20260324-73-0001" title="ROS-20260324-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38561" type="cve" id="CVE-2025-38561" title="CVE-2025-38561" />
			<reference href="https://bdu.fstec.ru/vul/2025-10729" type="self" id="BDU:2025-10729" title="BDU:2025-10729" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-73-0002</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38562-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38562-7.3/" type="self" id="ROS-20260324-73-0002" title="ROS-20260324-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38562" type="cve" id="CVE-2025-38562" title="CVE-2025-38562" />
			<reference href="https://bdu.fstec.ru/vul/2025-10730" type="self" id="BDU:2025-10730" title="BDU:2025-10730" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-73-0003</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38563-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38563-7.3/" type="self" id="ROS-20260324-73-0003" title="ROS-20260324-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38563" type="cve" id="CVE-2025-38563" title="CVE-2025-38563" />
			<reference href="https://bdu.fstec.ru/vul/2025-10727" type="self" id="BDU:2025-10727" title="BDU:2025-10727" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-73-0004</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38565-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38565-7.3/" type="self" id="ROS-20260324-73-0004" title="ROS-20260324-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38565" type="cve" id="CVE-2025-38565" title="CVE-2025-38565" />
			<reference href="https://bdu.fstec.ru/vul/2025-15802" type="self" id="BDU:2025-15802" title="BDU:2025-15802" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-73-0005</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38569-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38569-7.3/" type="self" id="ROS-20260324-73-0005" title="ROS-20260324-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38569" type="cve" id="CVE-2025-38569" title="CVE-2025-38569" />
			<reference href="https://bdu.fstec.ru/vul/2025-15800" type="self" id="BDU:2025-15800" title="BDU:2025-15800" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-73-0006</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38572-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38572-7.3/" type="self" id="ROS-20260324-73-0006" title="ROS-20260324-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38572" type="cve" id="CVE-2025-38572" title="CVE-2025-38572" />
			<reference href="https://bdu.fstec.ru/vul/2025-15171" type="self" id="BDU:2025-15171" title="BDU:2025-15171" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-73-0007</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38574-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38574-7.3/" type="self" id="ROS-20260324-73-0007" title="ROS-20260324-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38574" type="cve" id="CVE-2025-38574" title="CVE-2025-38574" />
			<reference href="https://bdu.fstec.ru/vul/2025-15172" type="self" id="BDU:2025-15172" title="BDU:2025-15172" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-73-0008</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38576-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38576-7.3/" type="self" id="ROS-20260324-73-0008" title="ROS-20260324-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38576" type="cve" id="CVE-2025-38576" title="CVE-2025-38576" />
			<reference href="https://bdu.fstec.ru/vul/2025-15799" type="self" id="BDU:2025-15799" title="BDU:2025-15799" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-73-0009</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38577-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38577-7.3/" type="self" id="ROS-20260324-73-0009" title="ROS-20260324-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38577" type="cve" id="CVE-2025-38577" title="CVE-2025-38577" />
			<reference href="https://bdu.fstec.ru/vul/2025-15173" type="self" id="BDU:2025-15173" title="BDU:2025-15173" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-73-0010</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38578-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38578-7.3/" type="self" id="ROS-20260324-73-0010" title="ROS-20260324-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38578" type="cve" id="CVE-2025-38578" title="CVE-2025-38578" />
			<reference href="https://bdu.fstec.ru/vul/2025-15174" type="self" id="BDU:2025-15174" title="BDU:2025-15174" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-73-0011</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38579-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38579-7.3/" type="self" id="ROS-20260324-73-0011" title="ROS-20260324-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38579" type="cve" id="CVE-2025-38579" title="CVE-2025-38579" />
			<reference href="https://bdu.fstec.ru/vul/2025-15175" type="self" id="BDU:2025-15175" title="BDU:2025-15175" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-73-0012</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38581-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38581-7.3/" type="self" id="ROS-20260324-73-0012" title="ROS-20260324-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38581" type="cve" id="CVE-2025-38581" title="CVE-2025-38581" />
			<reference href="https://bdu.fstec.ru/vul/2025-15798" type="self" id="BDU:2025-15798" title="BDU:2025-15798" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-73-0013</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38583-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38583-7.3/" type="self" id="ROS-20260324-73-0013" title="ROS-20260324-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38583" type="cve" id="CVE-2025-38583" title="CVE-2025-38583" />
			<reference href="https://bdu.fstec.ru/vul/2025-15797" type="self" id="BDU:2025-15797" title="BDU:2025-15797" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-73-0014</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38587-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38587-7.3/" type="self" id="ROS-20260324-73-0014" title="ROS-20260324-73-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38587" type="cve" id="CVE-2025-38587" title="CVE-2025-38587" />
			<reference href="https://bdu.fstec.ru/vul/2025-14981" type="self" id="BDU:2025-14981" title="BDU:2025-14981" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-73-0015</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38588-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38588-7.3/" type="self" id="ROS-20260324-73-0015" title="ROS-20260324-73-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38588" type="cve" id="CVE-2025-38588" title="CVE-2025-38588" />
			<reference href="https://bdu.fstec.ru/vul/2025-14977" type="self" id="BDU:2025-14977" title="BDU:2025-14977" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-73-0016</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38591-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38591-7.3/" type="self" id="ROS-20260324-73-0016" title="ROS-20260324-73-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38591" type="cve" id="CVE-2025-38591" title="CVE-2025-38591" />
			<reference href="https://bdu.fstec.ru/vul/2026-05191" type="self" id="BDU:2026-05191" title="BDU:2026-05191" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.162" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.162-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-73-0017</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38593-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38593-7.3/" type="self" id="ROS-20260324-73-0017" title="ROS-20260324-73-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38593" type="cve" id="CVE-2025-38593" title="CVE-2025-38593" />
			<reference href="https://bdu.fstec.ru/vul/2026-02817" type="self" id="BDU:2026-02817" title="BDU:2026-02817" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.162" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.162-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-73-0018</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38601-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38601-7.3/" type="self" id="ROS-20260324-73-0018" title="ROS-20260324-73-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38601" type="cve" id="CVE-2025-38601" title="CVE-2025-38601" />
			<reference href="https://bdu.fstec.ru/vul/2025-15177" type="self" id="BDU:2025-15177" title="BDU:2025-15177" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-73-0019</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38602-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38602-7.3/" type="self" id="ROS-20260324-73-0019" title="ROS-20260324-73-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38602" type="cve" id="CVE-2025-38602" title="CVE-2025-38602" />
			<reference href="https://bdu.fstec.ru/vul/2025-15796" type="self" id="BDU:2025-15796" title="BDU:2025-15796" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-73-0020</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38604-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38604-7.3/" type="self" id="ROS-20260324-73-0020" title="ROS-20260324-73-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38604" type="cve" id="CVE-2025-38604" title="CVE-2025-38604" />
			<reference href="https://bdu.fstec.ru/vul/2025-15178" type="self" id="BDU:2025-15178" title="BDU:2025-15178" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-73-0021</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38608-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38608-7.3/" type="self" id="ROS-20260324-73-0021" title="ROS-20260324-73-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38608" type="cve" id="CVE-2025-38608" title="CVE-2025-38608" />
			<reference href="https://bdu.fstec.ru/vul/2025-15179" type="self" id="BDU:2025-15179" title="BDU:2025-15179" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-73-0022</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38609-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38609-7.3/" type="self" id="ROS-20260324-73-0022" title="ROS-20260324-73-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38609" type="cve" id="CVE-2025-38609" title="CVE-2025-38609" />
			<reference href="https://bdu.fstec.ru/vul/2025-15795" type="self" id="BDU:2025-15795" title="BDU:2025-15795" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-73-0023</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38610-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38610-7.3/" type="self" id="ROS-20260324-73-0023" title="ROS-20260324-73-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38610" type="cve" id="CVE-2025-38610" title="CVE-2025-38610" />
			<reference href="https://bdu.fstec.ru/vul/2025-15794" type="self" id="BDU:2025-15794" title="BDU:2025-15794" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-73-0024</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38611-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38611-7.3/" type="self" id="ROS-20260324-73-0024" title="ROS-20260324-73-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38611" type="cve" id="CVE-2025-38611" title="CVE-2025-38611" />
			<reference href="https://bdu.fstec.ru/vul/2026-05690" type="self" id="BDU:2026-05690" title="BDU:2026-05690" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-73-0025</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38612-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38612-7.3/" type="self" id="ROS-20260324-73-0025" title="ROS-20260324-73-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38612" type="cve" id="CVE-2025-38612" title="CVE-2025-38612" />
			<reference href="https://bdu.fstec.ru/vul/2025-15793" type="self" id="BDU:2025-15793" title="BDU:2025-15793" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-73-0026</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38614-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38614-7.3/" type="self" id="ROS-20260324-73-0026" title="ROS-20260324-73-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38614" type="cve" id="CVE-2025-38614" title="CVE-2025-38614" />
			<reference href="https://bdu.fstec.ru/vul/2025-15552" type="self" id="BDU:2025-15552" title="BDU:2025-15552" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-73-0027</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38617-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38617-7.3/" type="self" id="ROS-20260324-73-0027" title="ROS-20260324-73-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38617" type="cve" id="CVE-2025-38617" title="CVE-2025-38617" />
			<reference href="https://bdu.fstec.ru/vul/2025-15791" type="self" id="BDU:2025-15791" title="BDU:2025-15791" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-73-0028</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38618-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38618-7.3/" type="self" id="ROS-20260324-73-0028" title="ROS-20260324-73-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38618" type="cve" id="CVE-2025-38618" title="CVE-2025-38618" />
			<reference href="https://bdu.fstec.ru/vul/2025-15180" type="self" id="BDU:2025-15180" title="BDU:2025-15180" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-73-0029</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38622-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38622-7.3/" type="self" id="ROS-20260324-73-0029" title="ROS-20260324-73-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38622" type="cve" id="CVE-2025-38622" title="CVE-2025-38622" />
			<reference href="https://bdu.fstec.ru/vul/2025-15790" type="self" id="BDU:2025-15790" title="BDU:2025-15790" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-73-0030</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38623-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38623-7.3/" type="self" id="ROS-20260324-73-0030" title="ROS-20260324-73-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38623" type="cve" id="CVE-2025-38623" title="CVE-2025-38623" />
			<reference href="https://bdu.fstec.ru/vul/2025-15789" type="self" id="BDU:2025-15789" title="BDU:2025-15789" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-73-0031</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38624-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38624-7.3/" type="self" id="ROS-20260324-73-0031" title="ROS-20260324-73-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38624" type="cve" id="CVE-2025-38624" title="CVE-2025-38624" />
			<reference href="https://bdu.fstec.ru/vul/2025-15788" type="self" id="BDU:2025-15788" title="BDU:2025-15788" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-73-0032</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38630-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38630-7.3/" type="self" id="ROS-20260324-73-0032" title="ROS-20260324-73-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38630" type="cve" id="CVE-2025-38630" title="CVE-2025-38630" />
			<reference href="https://bdu.fstec.ru/vul/2025-15785" type="self" id="BDU:2025-15785" title="BDU:2025-15785" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-73-0033</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38634-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38634-7.3/" type="self" id="ROS-20260324-73-0033" title="ROS-20260324-73-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38634" type="cve" id="CVE-2025-38634" title="CVE-2025-38634" />
			<reference href="https://bdu.fstec.ru/vul/2025-15782" type="self" id="BDU:2025-15782" title="BDU:2025-15782" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-73-0034</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38635-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38635-7.3/" type="self" id="ROS-20260324-73-0034" title="ROS-20260324-73-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38635" type="cve" id="CVE-2025-38635" title="CVE-2025-38635" />
			<reference href="https://bdu.fstec.ru/vul/2025-15781" type="self" id="BDU:2025-15781" title="BDU:2025-15781" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-73-0035</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38639-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38639-7.3/" type="self" id="ROS-20260324-73-0035" title="ROS-20260324-73-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38639" type="cve" id="CVE-2025-38639" title="CVE-2025-38639" />
			<reference href="https://bdu.fstec.ru/vul/2025-15780" type="self" id="BDU:2025-15780" title="BDU:2025-15780" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-73-0036</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38644-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38644-7.3/" type="self" id="ROS-20260324-73-0036" title="ROS-20260324-73-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38644" type="cve" id="CVE-2025-38644" title="CVE-2025-38644" />
			<reference href="https://bdu.fstec.ru/vul/2025-15779" type="self" id="BDU:2025-15779" title="BDU:2025-15779" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-73-0037</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38645-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38645-7.3/" type="self" id="ROS-20260324-73-0037" title="ROS-20260324-73-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38645" type="cve" id="CVE-2025-38645" title="CVE-2025-38645" />
			<reference href="https://bdu.fstec.ru/vul/2025-15778" type="self" id="BDU:2025-15778" title="BDU:2025-15778" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260327-73-0001</id>
		<issued date="2026-03-27" />
		<updated date="2026-03-27" />
		<title>Уязвимость gnupg2 </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в gnupg2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gnupg2-cve-2025-30258-7.3/</description>
               <solution>Установить обновление для пакета(ов) gnupg2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gnupg2-cve-2025-30258-7.3/" type="self" id="ROS-20260327-73-0001" title="ROS-20260327-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30258" type="cve" id="CVE-2025-30258" title="CVE-2025-30258" />
			<reference href="https://bdu.fstec.ru/vul/2025-11080" type="self" id="BDU:2025-11080" title="BDU:2025-11080" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gnupg2" epoch="0" version="2.5.18" release="1.el7" arch="x86_64" src="gnupg2-2.5.18-1.el7.src.rpm">
					<filename>gnupg2-0:2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="gnupg2-smime" epoch="0" version="2.5.18" release="1.el7" arch="x86_64" src="gnupg2-2.5.18-1.el7.src.rpm">
					<filename>gnupg2-smime-0:2.5.18-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260327-73-0002</id>
		<issued date="2026-03-27" />
		<updated date="2026-03-27" />
		<title>Уязвимость busybox </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в busybox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-busybox-cve-2025-46394-7.3/</description>
               <solution>Установить обновление для пакета(ов) busybox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-busybox-cve-2025-46394-7.3/" type="self" id="ROS-20260327-73-0002" title="ROS-20260327-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46394" type="cve" id="CVE-2025-46394" title="CVE-2025-46394" />
			<reference href="https://bdu.fstec.ru/vul/2026-05691" type="self" id="BDU:2026-05691" title="BDU:2026-05691" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="busybox" epoch="1" version="1.37.0" release="2.el7" arch="x86_64" src="busybox-1.37.0-2.el7.src.rpm">
					<filename>busybox-1:1.37.0-2.el7.x86_64.rpm</filename>
				</package>
				<package name="busybox-petitboot" epoch="1" version="1.37.0" release="2.el7" arch="x86_64" src="busybox-1.37.0-2.el7.src.rpm">
					<filename>busybox-petitboot-1:1.37.0-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260327-73-0003</id>
		<issued date="2026-03-27" />
		<updated date="2026-03-27" />
		<title>Уязвимость nodejs </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в nodejs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-cve-2025-5889-7.3/</description>
               <solution>Установить обновление для пакета(ов) nodejs
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-cve-2025-5889-7.3/" type="self" id="ROS-20260327-73-0003" title="ROS-20260327-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5889" type="cve" id="CVE-2025-5889" title="CVE-2025-5889" />
			<reference href="https://bdu.fstec.ru/vul/2026-01715" type="self" id="BDU:2026-01715" title="BDU:2026-01715" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs" epoch="1" version="22.19.0" release="1.el7" arch="x86_64" src="nodejs-22.19.0-1.el7.src.rpm">
					<filename>nodejs-1:22.19.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-devel" epoch="1" version="22.19.0" release="1.el7" arch="x86_64" src="nodejs-22.19.0-1.el7.src.rpm">
					<filename>nodejs-devel-1:22.19.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-full-i18n" epoch="1" version="22.19.0" release="1.el7" arch="x86_64" src="nodejs-22.19.0-1.el7.src.rpm">
					<filename>nodejs-full-i18n-1:22.19.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-libs" epoch="1" version="22.19.0" release="1.el7" arch="x86_64" src="nodejs-22.19.0-1.el7.src.rpm">
					<filename>nodejs-libs-1:22.19.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-npm" epoch="1" version="10.9.3" release="1.22.19.0.1.el7" arch="x86_64" src="nodejs-22.19.0-1.el7.src.rpm">
					<filename>nodejs-npm-1:10.9.3-1.22.19.0.1.el7.x86_64.rpm</filename>
				</package>
				<package name="v8-12.4-devel" epoch="3" version="12.4.254.21" release="1.22.19.0.1.el7" arch="x86_64" src="nodejs-22.19.0-1.el7.src.rpm">
					<filename>v8-12.4-devel-3:12.4.254.21-1.22.19.0.1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-docs" epoch="1" version="22.19.0" release="1.el7" arch="noarch" src="nodejs-22.19.0-1.el7.src.rpm">
					<filename>nodejs-docs-1:22.19.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260327-73-0004</id>
		<issued date="2026-03-27" />
		<updated date="2026-03-27" />
		<title>Уязвимость gnupg2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gnupg2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gnupg2-cve-2025-68972-7.3/</description>
               <solution>Установить обновление для пакета(ов) gnupg2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gnupg2-cve-2025-68972-7.3/" type="self" id="ROS-20260327-73-0004" title="ROS-20260327-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68972" type="cve" id="CVE-2025-68972" title="CVE-2025-68972" />
			<reference href="https://bdu.fstec.ru/vul/2026-05146" type="self" id="BDU:2026-05146" title="BDU:2026-05146" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gnupg2" epoch="0" version="2.5.18" release="1.el7" arch="x86_64" src="gnupg2-2.5.18-1.el7.src.rpm">
					<filename>gnupg2-0:2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="gnupg2-smime" epoch="0" version="2.5.18" release="1.el7" arch="x86_64" src="gnupg2-2.5.18-1.el7.src.rpm">
					<filename>gnupg2-smime-0:2.5.18-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260327-73-0005</id>
		<issued date="2026-03-27" />
		<updated date="2026-03-27" />
		<title>Уязвимость gnupg2 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в gnupg2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gnupg2-cve-2025-68973-7.3/</description>
               <solution>Установить обновление для пакета(ов) gnupg2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gnupg2-cve-2025-68973-7.3/" type="self" id="ROS-20260327-73-0005" title="ROS-20260327-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68973" type="cve" id="CVE-2025-68973" title="CVE-2025-68973" />
			<reference href="https://bdu.fstec.ru/vul/2025-16426" type="self" id="BDU:2025-16426" title="BDU:2025-16426" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gnupg2" epoch="0" version="2.5.18" release="1.el7" arch="x86_64" src="gnupg2-2.5.18-1.el7.src.rpm">
					<filename>gnupg2-0:2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="gnupg2-smime" epoch="0" version="2.5.18" release="1.el7" arch="x86_64" src="gnupg2-2.5.18-1.el7.src.rpm">
					<filename>gnupg2-smime-0:2.5.18-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260327-73-0006</id>
		<issued date="2026-03-27" />
		<updated date="2026-03-27" />
		<title>Уязвимость portainer-ce </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в portainer-ce</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-portainer-ce-cve-2025-61726-7.3/</description>
               <solution>Установить обновление для пакета(ов) portainer-ce
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-portainer-ce-cve-2025-61726-7.3/" type="self" id="ROS-20260327-73-0006" title="ROS-20260327-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61726" type="cve" id="CVE-2025-61726" title="CVE-2025-61726" />
			<reference href="https://bdu.fstec.ru/vul/2026-03409" type="self" id="BDU:2026-03409" title="BDU:2026-03409" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="portainer-ce" epoch="0" version="2.33.7" release="1.el7" arch="x86_64" src="portainer-ce-2.33.7-1.el7.src.rpm">
					<filename>portainer-ce-0:2.33.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="portainer-ce-agent" epoch="0" version="2.33.7" release="1.el7" arch="x86_64" src="portainer-ce-2.33.7-1.el7.src.rpm">
					<filename>portainer-ce-agent-0:2.33.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260327-73-0007</id>
		<issued date="2026-03-27" />
		<updated date="2026-03-27" />
		<title>Уязвимость portainer-ce </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в portainer-ce</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-portainer-ce-cve-2025-68121-7.3/</description>
               <solution>Установить обновление для пакета(ов) portainer-ce
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-portainer-ce-cve-2025-68121-7.3/" type="self" id="ROS-20260327-73-0007" title="ROS-20260327-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68121" type="cve" id="CVE-2025-68121" title="CVE-2025-68121" />
			<reference href="https://bdu.fstec.ru/vul/2026-03408" type="self" id="BDU:2026-03408" title="BDU:2026-03408" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="portainer-ce" epoch="0" version="2.33.7" release="1.el7" arch="x86_64" src="portainer-ce-2.33.7-1.el7.src.rpm">
					<filename>portainer-ce-0:2.33.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="portainer-ce-agent" epoch="0" version="2.33.7" release="1.el7" arch="x86_64" src="portainer-ce-2.33.7-1.el7.src.rpm">
					<filename>portainer-ce-agent-0:2.33.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260327-73-0008</id>
		<issued date="2026-03-27" />
		<updated date="2026-03-27" />
		<title>Уязвимость python-pillow </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в python-pillow</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pillow-cve-2026-25990-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-pillow
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pillow-cve-2026-25990-7.3/" type="self" id="ROS-20260327-73-0008" title="ROS-20260327-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25990" type="cve" id="CVE-2026-25990" title="CVE-2026-25990" />
			<reference href="https://bdu.fstec.ru/vul/2026-05702" type="self" id="BDU:2026-05702" title="BDU:2026-05702" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-pillow" epoch="0" version="10.3.0" release="3.el7" arch="x86_64" src="python-pillow-10.3.0-3.el7.src.rpm">
					<filename>python3-pillow-0:10.3.0-3.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-pillow-devel" epoch="0" version="10.3.0" release="3.el7" arch="x86_64" src="python-pillow-10.3.0-3.el7.src.rpm">
					<filename>python3-pillow-devel-0:10.3.0-3.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-pillow-qt" epoch="0" version="10.3.0" release="3.el7" arch="x86_64" src="python-pillow-10.3.0-3.el7.src.rpm">
					<filename>python3-pillow-qt-0:10.3.0-3.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-pillow-tk" epoch="0" version="10.3.0" release="3.el7" arch="x86_64" src="python-pillow-10.3.0-3.el7.src.rpm">
					<filename>python3-pillow-tk-0:10.3.0-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260327-73-0009</id>
		<issued date="2026-03-27" />
		<updated date="2026-03-27" />
		<title>Уязвимость openbabel </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openbabel</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openbabel-cve-2026-2705-7.3/</description>
               <solution>Установить обновление для пакета(ов) openbabel
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openbabel-cve-2026-2705-7.3/" type="self" id="ROS-20260327-73-0009" title="ROS-20260327-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2705" type="cve" id="CVE-2026-2705" title="CVE-2026-2705" />
			<reference href="https://bdu.fstec.ru/vul/2026-05710" type="self" id="BDU:2026-05710" title="BDU:2026-05710" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openbabel" epoch="0" version="3.1.1" release="2.el7" arch="x86_64" src="openbabel-3.1.1-2.el7.src.rpm">
					<filename>openbabel-0:3.1.1-2.el7.x86_64.rpm</filename>
				</package>
				<package name="openbabel-devel" epoch="0" version="3.1.1" release="2.el7" arch="x86_64" src="openbabel-3.1.1-2.el7.src.rpm">
					<filename>openbabel-devel-0:3.1.1-2.el7.x86_64.rpm</filename>
				</package>
				<package name="openbabel-gui" epoch="0" version="3.1.1" release="2.el7" arch="x86_64" src="openbabel-3.1.1-2.el7.src.rpm">
					<filename>openbabel-gui-0:3.1.1-2.el7.x86_64.rpm</filename>
				</package>
				<package name="openbabel-libs" epoch="0" version="3.1.1" release="2.el7" arch="x86_64" src="openbabel-3.1.1-2.el7.src.rpm">
					<filename>openbabel-libs-0:3.1.1-2.el7.x86_64.rpm</filename>
				</package>
				<package name="perl-openbabel" epoch="0" version="3.1.1" release="2.el7" arch="x86_64" src="openbabel-3.1.1-2.el7.src.rpm">
					<filename>perl-openbabel-0:3.1.1-2.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-openbabel" epoch="0" version="3.1.1" release="2.el7" arch="x86_64" src="openbabel-3.1.1-2.el7.src.rpm">
					<filename>python3-openbabel-0:3.1.1-2.el7.x86_64.rpm</filename>
				</package>
				<package name="ruby-openbabel" epoch="0" version="3.1.1" release="2.el7" arch="x86_64" src="openbabel-3.1.1-2.el7.src.rpm">
					<filename>ruby-openbabel-0:3.1.1-2.el7.x86_64.rpm</filename>
				</package>
				<package name="openbabel-doc" epoch="0" version="3.1.1" release="2.el7" arch="noarch" src="openbabel-3.1.1-2.el7.src.rpm">
					<filename>openbabel-doc-0:3.1.1-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260327-73-0010</id>
		<issued date="2026-03-27" />
		<updated date="2026-03-27" />
		<title>Уязвимость python-rencode </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-rencode</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-rencode-cve-2021-40839-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-rencode
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-rencode-cve-2021-40839-7.3/" type="self" id="ROS-20260327-73-0010" title="ROS-20260327-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40839" type="cve" id="CVE-2021-40839" title="CVE-2021-40839" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python2-rencode" epoch="0" version="1.0.6" release="15.el7" arch="x86_64" src="python-rencode-1.0.6-15.el7.src.rpm">
					<filename>python2-rencode-0:1.0.6-15.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-rencode" epoch="0" version="1.0.6" release="15.el7" arch="x86_64" src="python-rencode-1.0.6-15.el7.src.rpm">
					<filename>python3-rencode-0:1.0.6-15.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260327-73-0011</id>
		<issued date="2026-03-27" />
		<updated date="2026-03-27" />
		<title>Уязвимость NetworkManager </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в NetworkManager</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-networkmanager-cve-2025-9615-7.3/</description>
               <solution>Установить обновление для пакета(ов) NetworkManager
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-networkmanager-cve-2025-9615-7.3/" type="self" id="ROS-20260327-73-0011" title="ROS-20260327-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9615" type="cve" id="CVE-2025-9615" title="CVE-2025-9615" />
			<reference href="https://bdu.fstec.ru/vul/2026-05138" type="self" id="BDU:2026-05138" title="BDU:2026-05138" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="NetworkManager" epoch="1" version="1.52.2" release="1.el7" arch="x86_64" src="NetworkManager-1.52.2-1.el7.src.rpm">
					<filename>NetworkManager-1:1.52.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="NetworkManager-adsl" epoch="1" version="1.52.2" release="1.el7" arch="x86_64" src="NetworkManager-1.52.2-1.el7.src.rpm">
					<filename>NetworkManager-adsl-1:1.52.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="NetworkManager-bluetooth" epoch="1" version="1.52.2" release="1.el7" arch="x86_64" src="NetworkManager-1.52.2-1.el7.src.rpm">
					<filename>NetworkManager-bluetooth-1:1.52.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="NetworkManager-cloud-setup" epoch="1" version="1.52.2" release="1.el7" arch="x86_64" src="NetworkManager-1.52.2-1.el7.src.rpm">
					<filename>NetworkManager-cloud-setup-1:1.52.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="NetworkManager-libnm" epoch="1" version="1.52.2" release="1.el7" arch="x86_64" src="NetworkManager-1.52.2-1.el7.src.rpm">
					<filename>NetworkManager-libnm-1:1.52.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="NetworkManager-libnm-devel" epoch="1" version="1.52.2" release="1.el7" arch="x86_64" src="NetworkManager-1.52.2-1.el7.src.rpm">
					<filename>NetworkManager-libnm-devel-1:1.52.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="NetworkManager-ovs" epoch="1" version="1.52.2" release="1.el7" arch="x86_64" src="NetworkManager-1.52.2-1.el7.src.rpm">
					<filename>NetworkManager-ovs-1:1.52.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="NetworkManager-ppp" epoch="1" version="1.52.2" release="1.el7" arch="x86_64" src="NetworkManager-1.52.2-1.el7.src.rpm">
					<filename>NetworkManager-ppp-1:1.52.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="NetworkManager-team" epoch="1" version="1.52.2" release="1.el7" arch="x86_64" src="NetworkManager-1.52.2-1.el7.src.rpm">
					<filename>NetworkManager-team-1:1.52.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="NetworkManager-tui" epoch="1" version="1.52.2" release="1.el7" arch="x86_64" src="NetworkManager-1.52.2-1.el7.src.rpm">
					<filename>NetworkManager-tui-1:1.52.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="NetworkManager-wifi" epoch="1" version="1.52.2" release="1.el7" arch="x86_64" src="NetworkManager-1.52.2-1.el7.src.rpm">
					<filename>NetworkManager-wifi-1:1.52.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="NetworkManager-wwan" epoch="1" version="1.52.2" release="1.el7" arch="x86_64" src="NetworkManager-1.52.2-1.el7.src.rpm">
					<filename>NetworkManager-wwan-1:1.52.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="NetworkManager-config-server" epoch="1" version="1.52.2" release="1.el7" arch="noarch" src="NetworkManager-1.52.2-1.el7.src.rpm">
					<filename>NetworkManager-config-server-1:1.52.2-1.el7.noarch.rpm</filename>
				</package>
				<package name="NetworkManager-dispatcher-routing-rules" epoch="1" version="1.52.2" release="1.el7" arch="noarch" src="NetworkManager-1.52.2-1.el7.src.rpm">
					<filename>NetworkManager-dispatcher-routing-rules-1:1.52.2-1.el7.noarch.rpm</filename>
				</package>
				<package name="NetworkManager-initscripts-updown" epoch="1" version="1.52.2" release="1.el7" arch="noarch" src="NetworkManager-1.52.2-1.el7.src.rpm">
					<filename>NetworkManager-initscripts-updown-1:1.52.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260327-73-0012</id>
		<issued date="2026-03-27" />
		<updated date="2026-03-27" />
		<title>Уязвимость go-git </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в go-git</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-go-git-cve-2026-25934-7.3/</description>
               <solution>Установить обновление для пакета(ов) go-git
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-go-git-cve-2026-25934-7.3/" type="self" id="ROS-20260327-73-0012" title="ROS-20260327-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25934" type="cve" id="CVE-2026-25934" title="CVE-2026-25934" />
			<reference href="https://bdu.fstec.ru/vul/2026-05592" type="self" id="BDU:2026-05592" title="BDU:2026-05592" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="go-git" epoch="0" version="5.16.5" release="1.el7" arch="x86_64" src="go-git-5.16.5-1.el7.src.rpm">
					<filename>go-git-0:5.16.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-gopkg-src-d-git-5-devel" epoch="0" version="5.16.5" release="1.el7" arch="noarch" src="go-git-5.16.5-1.el7.src.rpm">
					<filename>golang-gopkg-src-d-git-5-devel-0:5.16.5-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260327-73-0013</id>
		<issued date="2026-03-27" />
		<updated date="2026-03-27" />
		<title>Уязвимость opentelemetry-collector-contrib </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в opentelemetry-collector-contrib</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opentelemetry-collector-contrib-cve-2025-68156-7.3/</description>
               <solution>Установить обновление для пакета(ов) opentelemetry-collector-contrib
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opentelemetry-collector-contrib-cve-2025-68156-7.3/" type="self" id="ROS-20260327-73-0013" title="ROS-20260327-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68156" type="cve" id="CVE-2025-68156" title="CVE-2025-68156" />
			<reference href="https://bdu.fstec.ru/vul/2026-05696" type="self" id="BDU:2026-05696" title="BDU:2026-05696" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="opentelemetry-collector-contrib" epoch="0" version="0.146.0" release="1.el7" arch="x86_64" src="opentelemetry-collector-contrib-0.146.0-1.el7.src.rpm">
					<filename>opentelemetry-collector-contrib-0:0.146.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260327-73-0014</id>
		<issued date="2026-03-27" />
		<updated date="2026-03-27" />
		<title>Уязвимость opentelemetry-collector-contrib </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в opentelemetry-collector-contrib</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opentelemetry-collector-contrib-cve-2026-26958-7.3/</description>
               <solution>Установить обновление для пакета(ов) opentelemetry-collector-contrib
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-opentelemetry-collector-contrib-cve-2026-26958-7.3/" type="self" id="ROS-20260327-73-0014" title="ROS-20260327-73-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26958" type="cve" id="CVE-2026-26958" title="CVE-2026-26958" />
			<reference href="https://bdu.fstec.ru/vul/2026-05703" type="self" id="BDU:2026-05703" title="BDU:2026-05703" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="opentelemetry-collector-contrib" epoch="0" version="0.146.0" release="1.el7" arch="x86_64" src="opentelemetry-collector-contrib-0.146.0-1.el7.src.rpm">
					<filename>opentelemetry-collector-contrib-0:0.146.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260327-73-0015</id>
		<issued date="2026-03-27" />
		<updated date="2026-03-27" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2026-27142-7.3/</description>
               <solution>Установить обновление для пакета(ов) golang
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2026-27142-7.3/" type="self" id="ROS-20260327-73-0015" title="ROS-20260327-73-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27142" type="cve" id="CVE-2026-27142" title="CVE-2026-27142" />
			<reference href="https://bdu.fstec.ru/vul/2026-04129" type="self" id="BDU:2026-04129" title="BDU:2026-04129" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.25.8" release="1.el7" arch="x86_64" src="golang-1.25.8-1.el7.src.rpm">
					<filename>golang-0:1.25.8-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.25.8" release="1.el7" arch="x86_64" src="golang-1.25.8-1.el7.src.rpm">
					<filename>golang-bin-0:1.25.8-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.25.8" release="1.el7" arch="x86_64" src="golang-1.25.8-1.el7.src.rpm">
					<filename>golang-shared-0:1.25.8-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-docs" epoch="0" version="1.25.8" release="1.el7" arch="noarch" src="golang-1.25.8-1.el7.src.rpm">
					<filename>golang-docs-0:1.25.8-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-misc" epoch="0" version="1.25.8" release="1.el7" arch="noarch" src="golang-1.25.8-1.el7.src.rpm">
					<filename>golang-misc-0:1.25.8-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-src" epoch="0" version="1.25.8" release="1.el7" arch="noarch" src="golang-1.25.8-1.el7.src.rpm">
					<filename>golang-src-0:1.25.8-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-tests" epoch="0" version="1.25.8" release="1.el7" arch="noarch" src="golang-1.25.8-1.el7.src.rpm">
					<filename>golang-tests-0:1.25.8-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260327-73-0016</id>
		<issued date="2026-03-27" />
		<updated date="2026-03-27" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2026-25679-7.3/</description>
               <solution>Установить обновление для пакета(ов) golang
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2026-25679-7.3/" type="self" id="ROS-20260327-73-0016" title="ROS-20260327-73-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25679" type="cve" id="CVE-2026-25679" title="CVE-2026-25679" />
			<reference href="https://bdu.fstec.ru/vul/2026-04127" type="self" id="BDU:2026-04127" title="BDU:2026-04127" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.25.8" release="1.el7" arch="x86_64" src="golang-1.25.8-1.el7.src.rpm">
					<filename>golang-0:1.25.8-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.25.8" release="1.el7" arch="x86_64" src="golang-1.25.8-1.el7.src.rpm">
					<filename>golang-bin-0:1.25.8-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.25.8" release="1.el7" arch="x86_64" src="golang-1.25.8-1.el7.src.rpm">
					<filename>golang-shared-0:1.25.8-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-docs" epoch="0" version="1.25.8" release="1.el7" arch="noarch" src="golang-1.25.8-1.el7.src.rpm">
					<filename>golang-docs-0:1.25.8-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-misc" epoch="0" version="1.25.8" release="1.el7" arch="noarch" src="golang-1.25.8-1.el7.src.rpm">
					<filename>golang-misc-0:1.25.8-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-src" epoch="0" version="1.25.8" release="1.el7" arch="noarch" src="golang-1.25.8-1.el7.src.rpm">
					<filename>golang-src-0:1.25.8-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-tests" epoch="0" version="1.25.8" release="1.el7" arch="noarch" src="golang-1.25.8-1.el7.src.rpm">
					<filename>golang-tests-0:1.25.8-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260327-73-0017</id>
		<issued date="2026-03-27" />
		<updated date="2026-03-27" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2026-27139-7.3/</description>
               <solution>Установить обновление для пакета(ов) golang
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2026-27139-7.3/" type="self" id="ROS-20260327-73-0017" title="ROS-20260327-73-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27139" type="cve" id="CVE-2026-27139" title="CVE-2026-27139" />
			<reference href="https://bdu.fstec.ru/vul/2026-04122" type="self" id="BDU:2026-04122" title="BDU:2026-04122" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.25.8" release="1.el7" arch="x86_64" src="golang-1.25.8-1.el7.src.rpm">
					<filename>golang-0:1.25.8-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.25.8" release="1.el7" arch="x86_64" src="golang-1.25.8-1.el7.src.rpm">
					<filename>golang-bin-0:1.25.8-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.25.8" release="1.el7" arch="x86_64" src="golang-1.25.8-1.el7.src.rpm">
					<filename>golang-shared-0:1.25.8-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-docs" epoch="0" version="1.25.8" release="1.el7" arch="noarch" src="golang-1.25.8-1.el7.src.rpm">
					<filename>golang-docs-0:1.25.8-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-misc" epoch="0" version="1.25.8" release="1.el7" arch="noarch" src="golang-1.25.8-1.el7.src.rpm">
					<filename>golang-misc-0:1.25.8-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-src" epoch="0" version="1.25.8" release="1.el7" arch="noarch" src="golang-1.25.8-1.el7.src.rpm">
					<filename>golang-src-0:1.25.8-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-tests" epoch="0" version="1.25.8" release="1.el7" arch="noarch" src="golang-1.25.8-1.el7.src.rpm">
					<filename>golang-tests-0:1.25.8-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260330-73-0001</id>
		<issued date="2026-03-30" />
		<updated date="2026-03-30" />
		<title>Уязвимость VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2025-53026-7.3/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2025-53026-7.3/" type="self" id="ROS-20260330-73-0001" title="ROS-20260330-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53026" type="cve" id="CVE-2025-53026" title="CVE-2025-53026" />
			<reference href="https://bdu.fstec.ru/vul/2025-08708" type="self" id="BDU:2025-08708" title="BDU:2025-08708" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox" epoch="0" version="7.1.12" release="1.el7" arch="x86_64" src="VirtualBox-7.1.12-1.el7.src.rpm">
					<filename>VirtualBox-0:7.1.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-devel" epoch="0" version="7.1.12" release="1.el7" arch="x86_64" src="VirtualBox-7.1.12-1.el7.src.rpm">
					<filename>VirtualBox-devel-0:7.1.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-server" epoch="0" version="7.1.12" release="1.el7" arch="x86_64" src="VirtualBox-7.1.12-1.el7.src.rpm">
					<filename>VirtualBox-server-0:7.1.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-vnc" epoch="0" version="7.1.12" release="1.el7" arch="x86_64" src="VirtualBox-7.1.12-1.el7.src.rpm">
					<filename>VirtualBox-vnc-0:7.1.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-webservice" epoch="0" version="7.1.12" release="1.el7" arch="x86_64" src="VirtualBox-7.1.12-1.el7.src.rpm">
					<filename>VirtualBox-webservice-0:7.1.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-VirtualBox" epoch="0" version="7.1.12" release="1.el7" arch="x86_64" src="VirtualBox-7.1.12-1.el7.src.rpm">
					<filename>python3-VirtualBox-0:7.1.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmodsrc" epoch="0" version="7.1.12" release="1.el7" arch="noarch" src="VirtualBox-7.1.12-1.el7.src.rpm">
					<filename>VirtualBox-kmodsrc-0:7.1.12-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260330-73-0002</id>
		<issued date="2026-03-30" />
		<updated date="2026-03-30" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38694-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38694-7.3/" type="self" id="ROS-20260330-73-0002" title="ROS-20260330-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38694" type="cve" id="CVE-2025-38694" title="CVE-2025-38694" />
			<reference href="https://bdu.fstec.ru/vul/2025-15760" type="self" id="BDU:2025-15760" title="BDU:2025-15760" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260331-73-0001</id>
		<issued date="2026-03-31" />
		<updated date="2026-03-31" />
		<title>Уязвимость python-setuptools </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-setuptools</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-setuptools-cve-2026-24049-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-setuptools
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-setuptools-cve-2026-24049-7.3/" type="self" id="ROS-20260331-73-0001" title="ROS-20260331-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24049" type="cve" id="CVE-2026-24049" title="CVE-2026-24049" />
			<reference href="https://bdu.fstec.ru/vul/2026-03593" type="self" id="BDU:2026-03593" title="BDU:2026-03593" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python-setuptools-wheel" epoch="0" version="75.3.2" release="3.el7" arch="noarch" src="python-setuptools-75.3.2-3.el7.src.rpm">
					<filename>python-setuptools-wheel-0:75.3.2-3.el7.noarch.rpm</filename>
				</package>
				<package name="python3-setuptools" epoch="0" version="75.3.2" release="3.el7" arch="noarch" src="python-setuptools-75.3.2-3.el7.src.rpm">
					<filename>python3-setuptools-0:75.3.2-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0001</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость roundcubemail </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в roundcubemail</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-roundcubemail-cve-2025-68460-7.3/</description>
               <solution>Установить обновление для пакета(ов) roundcubemail
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-roundcubemail-cve-2025-68460-7.3/" type="self" id="ROS-20260401-73-0001" title="ROS-20260401-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68460" type="cve" id="CVE-2025-68460" title="CVE-2025-68460" />
			<reference href="https://bdu.fstec.ru/vul/2025-16316" type="self" id="BDU:2025-16316" title="BDU:2025-16316" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="roundcubemail" epoch="0" version="1.5.13" release="1.el7" arch="noarch" src="roundcubemail-1.5.13-1.el7.src.rpm">
					<filename>roundcubemail-0:1.5.13-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0002</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость roundcubemail </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в roundcubemail</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-roundcubemail-cve-2025-68461-7.3/</description>
               <solution>Установить обновление для пакета(ов) roundcubemail
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-roundcubemail-cve-2025-68461-7.3/" type="self" id="ROS-20260401-73-0002" title="ROS-20260401-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68461" type="cve" id="CVE-2025-68461" title="CVE-2025-68461" />
			<reference href="https://bdu.fstec.ru/vul/2026-03414" type="self" id="BDU:2026-03414" title="BDU:2026-03414" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="roundcubemail" epoch="0" version="1.5.13" release="1.el7" arch="noarch" src="roundcubemail-1.5.13-1.el7.src.rpm">
					<filename>roundcubemail-0:1.5.13-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0003</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libpng</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng-cve-2026-22801-7.3/</description>
               <solution>Установить обновление для пакета(ов) libpng
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng-cve-2026-22801-7.3/" type="self" id="ROS-20260401-73-0003" title="ROS-20260401-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22801" type="cve" id="CVE-2026-22801" title="CVE-2026-22801" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libpng" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng-devel" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-devel-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng-static" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-static-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng-tools" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-tools-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0004</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng12 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libpng12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng12-cve-2026-22801-7.3/</description>
               <solution>Установить обновление для пакета(ов) libpng12
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng12-cve-2026-22801-7.3/" type="self" id="ROS-20260401-73-0004" title="ROS-20260401-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22801" type="cve" id="CVE-2026-22801" title="CVE-2026-22801" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libpng12" epoch="0" version="1.2.57" release="21.el7" arch="x86_64" src="libpng12-1.2.57-21.el7.src.rpm">
					<filename>libpng12-0:1.2.57-21.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng12-devel" epoch="0" version="1.2.57" release="21.el7" arch="x86_64" src="libpng12-1.2.57-21.el7.src.rpm">
					<filename>libpng12-devel-0:1.2.57-21.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0005</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng15 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libpng15</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng15-cve-2026-22801-7.3/</description>
               <solution>Установить обновление для пакета(ов) libpng15
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng15-cve-2026-22801-7.3/" type="self" id="ROS-20260401-73-0005" title="ROS-20260401-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22801" type="cve" id="CVE-2026-22801" title="CVE-2026-22801" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libpng15" epoch="0" version="1.5.30" release="19.el7" arch="x86_64" src="libpng15-1.5.30-19.el7.src.rpm">
					<filename>libpng15-0:1.5.30-19.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0006</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libpng</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng-cve-2025-66293-7.3/</description>
               <solution>Установить обновление для пакета(ов) libpng
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng-cve-2025-66293-7.3/" type="self" id="ROS-20260401-73-0006" title="ROS-20260401-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66293" type="cve" id="CVE-2025-66293" title="CVE-2025-66293" />
			<reference href="https://bdu.fstec.ru/vul/2025-15390" type="self" id="BDU:2025-15390" title="BDU:2025-15390" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libpng" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng-devel" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-devel-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng-static" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-static-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng-tools" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-tools-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0007</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng12 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libpng12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng12-cve-2025-66293-7.3/</description>
               <solution>Установить обновление для пакета(ов) libpng12
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng12-cve-2025-66293-7.3/" type="self" id="ROS-20260401-73-0007" title="ROS-20260401-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66293" type="cve" id="CVE-2025-66293" title="CVE-2025-66293" />
			<reference href="https://bdu.fstec.ru/vul/2025-15390" type="self" id="BDU:2025-15390" title="BDU:2025-15390" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libpng12" epoch="0" version="1.2.57" release="21.el7" arch="x86_64" src="libpng12-1.2.57-21.el7.src.rpm">
					<filename>libpng12-0:1.2.57-21.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng12-devel" epoch="0" version="1.2.57" release="21.el7" arch="x86_64" src="libpng12-1.2.57-21.el7.src.rpm">
					<filename>libpng12-devel-0:1.2.57-21.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0008</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng15 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libpng15</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng15-cve-2025-66293-7.3/</description>
               <solution>Установить обновление для пакета(ов) libpng15
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng15-cve-2025-66293-7.3/" type="self" id="ROS-20260401-73-0008" title="ROS-20260401-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66293" type="cve" id="CVE-2025-66293" title="CVE-2025-66293" />
			<reference href="https://bdu.fstec.ru/vul/2025-15390" type="self" id="BDU:2025-15390" title="BDU:2025-15390" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libpng15" epoch="0" version="1.5.30" release="19.el7" arch="x86_64" src="libpng15-1.5.30-19.el7.src.rpm">
					<filename>libpng15-0:1.5.30-19.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0009</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libpng</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng-cve-2026-22695-7.3/</description>
               <solution>Установить обновление для пакета(ов) libpng
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng-cve-2026-22695-7.3/" type="self" id="ROS-20260401-73-0009" title="ROS-20260401-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22695" type="cve" id="CVE-2026-22695" title="CVE-2026-22695" />
			<reference href="https://bdu.fstec.ru/vul/2026-01048" type="self" id="BDU:2026-01048" title="BDU:2026-01048" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libpng" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng-devel" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-devel-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng-static" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-static-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng-tools" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-tools-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0010</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng12 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libpng12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng12-cve-2026-22695-7.3/</description>
               <solution>Установить обновление для пакета(ов) libpng12
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng12-cve-2026-22695-7.3/" type="self" id="ROS-20260401-73-0010" title="ROS-20260401-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22695" type="cve" id="CVE-2026-22695" title="CVE-2026-22695" />
			<reference href="https://bdu.fstec.ru/vul/2026-01048" type="self" id="BDU:2026-01048" title="BDU:2026-01048" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libpng12" epoch="0" version="1.2.57" release="21.el7" arch="x86_64" src="libpng12-1.2.57-21.el7.src.rpm">
					<filename>libpng12-0:1.2.57-21.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng12-devel" epoch="0" version="1.2.57" release="21.el7" arch="x86_64" src="libpng12-1.2.57-21.el7.src.rpm">
					<filename>libpng12-devel-0:1.2.57-21.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0011</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng15 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libpng15</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng15-cve-2026-22695-7.3/</description>
               <solution>Установить обновление для пакета(ов) libpng15
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng15-cve-2026-22695-7.3/" type="self" id="ROS-20260401-73-0011" title="ROS-20260401-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22695" type="cve" id="CVE-2026-22695" title="CVE-2026-22695" />
			<reference href="https://bdu.fstec.ru/vul/2026-01048" type="self" id="BDU:2026-01048" title="BDU:2026-01048" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libpng15" epoch="0" version="1.5.30" release="19.el7" arch="x86_64" src="libpng15-1.5.30-19.el7.src.rpm">
					<filename>libpng15-0:1.5.30-19.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0012</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libpng</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng-cve-2025-65018-7.3/</description>
               <solution>Установить обновление для пакета(ов) libpng
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng-cve-2025-65018-7.3/" type="self" id="ROS-20260401-73-0012" title="ROS-20260401-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65018" type="cve" id="CVE-2025-65018" title="CVE-2025-65018" />
			<reference href="https://bdu.fstec.ru/vul/2025-14613" type="self" id="BDU:2025-14613" title="BDU:2025-14613" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libpng" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng-devel" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-devel-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng-static" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-static-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng-tools" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-tools-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0013</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng12 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libpng12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng12-cve-2025-65018-7.3/</description>
               <solution>Установить обновление для пакета(ов) libpng12
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng12-cve-2025-65018-7.3/" type="self" id="ROS-20260401-73-0013" title="ROS-20260401-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65018" type="cve" id="CVE-2025-65018" title="CVE-2025-65018" />
			<reference href="https://bdu.fstec.ru/vul/2025-14613" type="self" id="BDU:2025-14613" title="BDU:2025-14613" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libpng12" epoch="0" version="1.2.57" release="21.el7" arch="x86_64" src="libpng12-1.2.57-21.el7.src.rpm">
					<filename>libpng12-0:1.2.57-21.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng12-devel" epoch="0" version="1.2.57" release="21.el7" arch="x86_64" src="libpng12-1.2.57-21.el7.src.rpm">
					<filename>libpng12-devel-0:1.2.57-21.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0014</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng15 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libpng15</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng15-cve-2025-65018-7.3/</description>
               <solution>Установить обновление для пакета(ов) libpng15
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng15-cve-2025-65018-7.3/" type="self" id="ROS-20260401-73-0014" title="ROS-20260401-73-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65018" type="cve" id="CVE-2025-65018" title="CVE-2025-65018" />
			<reference href="https://bdu.fstec.ru/vul/2025-14613" type="self" id="BDU:2025-14613" title="BDU:2025-14613" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libpng15" epoch="0" version="1.5.30" release="19.el7" arch="x86_64" src="libpng15-1.5.30-19.el7.src.rpm">
					<filename>libpng15-0:1.5.30-19.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0015</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libpng</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng-cve-2025-64505-7.3/</description>
               <solution>Установить обновление для пакета(ов) libpng
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng-cve-2025-64505-7.3/" type="self" id="ROS-20260401-73-0015" title="ROS-20260401-73-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64505" type="cve" id="CVE-2025-64505" title="CVE-2025-64505" />
			<reference href="https://bdu.fstec.ru/vul/2026-02923" type="self" id="BDU:2026-02923" title="BDU:2026-02923" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libpng" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng-devel" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-devel-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng-static" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-static-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng-tools" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-tools-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0016</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng12 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libpng12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng12-cve-2025-64505-7.3/</description>
               <solution>Установить обновление для пакета(ов) libpng12
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng12-cve-2025-64505-7.3/" type="self" id="ROS-20260401-73-0016" title="ROS-20260401-73-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64505" type="cve" id="CVE-2025-64505" title="CVE-2025-64505" />
			<reference href="https://bdu.fstec.ru/vul/2026-02923" type="self" id="BDU:2026-02923" title="BDU:2026-02923" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libpng12" epoch="0" version="1.2.57" release="21.el7" arch="x86_64" src="libpng12-1.2.57-21.el7.src.rpm">
					<filename>libpng12-0:1.2.57-21.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng12-devel" epoch="0" version="1.2.57" release="21.el7" arch="x86_64" src="libpng12-1.2.57-21.el7.src.rpm">
					<filename>libpng12-devel-0:1.2.57-21.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0017</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng15 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libpng15</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng15-cve-2025-64505-7.3/</description>
               <solution>Установить обновление для пакета(ов) libpng15
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng15-cve-2025-64505-7.3/" type="self" id="ROS-20260401-73-0017" title="ROS-20260401-73-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64505" type="cve" id="CVE-2025-64505" title="CVE-2025-64505" />
			<reference href="https://bdu.fstec.ru/vul/2026-02923" type="self" id="BDU:2026-02923" title="BDU:2026-02923" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libpng15" epoch="0" version="1.5.30" release="19.el7" arch="x86_64" src="libpng15-1.5.30-19.el7.src.rpm">
					<filename>libpng15-0:1.5.30-19.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0018</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libpng</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng-cve-2025-64720-7.3/</description>
               <solution>Установить обновление для пакета(ов) libpng
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng-cve-2025-64720-7.3/" type="self" id="ROS-20260401-73-0018" title="ROS-20260401-73-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64720" type="cve" id="CVE-2025-64720" title="CVE-2025-64720" />
			<reference href="https://bdu.fstec.ru/vul/2026-02925" type="self" id="BDU:2026-02925" title="BDU:2026-02925" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libpng" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng-devel" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-devel-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng-static" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-static-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng-tools" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-tools-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0019</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng12 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libpng12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng12-cve-2025-64720-7.3/</description>
               <solution>Установить обновление для пакета(ов) libpng12
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng12-cve-2025-64720-7.3/" type="self" id="ROS-20260401-73-0019" title="ROS-20260401-73-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64720" type="cve" id="CVE-2025-64720" title="CVE-2025-64720" />
			<reference href="https://bdu.fstec.ru/vul/2026-02925" type="self" id="BDU:2026-02925" title="BDU:2026-02925" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libpng12" epoch="0" version="1.2.57" release="21.el7" arch="x86_64" src="libpng12-1.2.57-21.el7.src.rpm">
					<filename>libpng12-0:1.2.57-21.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng12-devel" epoch="0" version="1.2.57" release="21.el7" arch="x86_64" src="libpng12-1.2.57-21.el7.src.rpm">
					<filename>libpng12-devel-0:1.2.57-21.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0020</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng15 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libpng15</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng15-cve-2025-64720-7.3/</description>
               <solution>Установить обновление для пакета(ов) libpng15
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng15-cve-2025-64720-7.3/" type="self" id="ROS-20260401-73-0020" title="ROS-20260401-73-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64720" type="cve" id="CVE-2025-64720" title="CVE-2025-64720" />
			<reference href="https://bdu.fstec.ru/vul/2026-02925" type="self" id="BDU:2026-02925" title="BDU:2026-02925" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libpng15" epoch="0" version="1.5.30" release="19.el7" arch="x86_64" src="libpng15-1.5.30-19.el7.src.rpm">
					<filename>libpng15-0:1.5.30-19.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0021</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libpng</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng-cve-2025-64506-7.3/</description>
               <solution>Установить обновление для пакета(ов) libpng
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng-cve-2025-64506-7.3/" type="self" id="ROS-20260401-73-0021" title="ROS-20260401-73-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64506" type="cve" id="CVE-2025-64506" title="CVE-2025-64506" />
			<reference href="https://bdu.fstec.ru/vul/2026-02924" type="self" id="BDU:2026-02924" title="BDU:2026-02924" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libpng" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng-devel" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-devel-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng-static" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-static-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng-tools" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-tools-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0022</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng12 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libpng12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng12-cve-2025-64506-7.3/</description>
               <solution>Установить обновление для пакета(ов) libpng12
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng12-cve-2025-64506-7.3/" type="self" id="ROS-20260401-73-0022" title="ROS-20260401-73-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64506" type="cve" id="CVE-2025-64506" title="CVE-2025-64506" />
			<reference href="https://bdu.fstec.ru/vul/2026-02924" type="self" id="BDU:2026-02924" title="BDU:2026-02924" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libpng12" epoch="0" version="1.2.57" release="21.el7" arch="x86_64" src="libpng12-1.2.57-21.el7.src.rpm">
					<filename>libpng12-0:1.2.57-21.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng12-devel" epoch="0" version="1.2.57" release="21.el7" arch="x86_64" src="libpng12-1.2.57-21.el7.src.rpm">
					<filename>libpng12-devel-0:1.2.57-21.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0023</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng15 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libpng15</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng15-cve-2025-64506-7.3/</description>
               <solution>Установить обновление для пакета(ов) libpng15
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng15-cve-2025-64506-7.3/" type="self" id="ROS-20260401-73-0023" title="ROS-20260401-73-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64506" type="cve" id="CVE-2025-64506" title="CVE-2025-64506" />
			<reference href="https://bdu.fstec.ru/vul/2026-02924" type="self" id="BDU:2026-02924" title="BDU:2026-02924" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libpng15" epoch="0" version="1.5.30" release="19.el7" arch="x86_64" src="libpng15-1.5.30-19.el7.src.rpm">
					<filename>libpng15-0:1.5.30-19.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0024</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libpng</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng-cve-2026-25646-7.3/</description>
               <solution>Установить обновление для пакета(ов) libpng
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng-cve-2026-25646-7.3/" type="self" id="ROS-20260401-73-0024" title="ROS-20260401-73-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25646" type="cve" id="CVE-2026-25646" title="CVE-2026-25646" />
			<reference href="https://bdu.fstec.ru/vul/2026-01774" type="self" id="BDU:2026-01774" title="BDU:2026-01774" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libpng" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng-devel" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-devel-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng-static" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-static-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng-tools" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-tools-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0025</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng12 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libpng12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng12-cve-2026-25646-7.3/</description>
               <solution>Установить обновление для пакета(ов) libpng12
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng12-cve-2026-25646-7.3/" type="self" id="ROS-20260401-73-0025" title="ROS-20260401-73-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25646" type="cve" id="CVE-2026-25646" title="CVE-2026-25646" />
			<reference href="https://bdu.fstec.ru/vul/2026-01774" type="self" id="BDU:2026-01774" title="BDU:2026-01774" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libpng12" epoch="0" version="1.2.57" release="21.el7" arch="x86_64" src="libpng12-1.2.57-21.el7.src.rpm">
					<filename>libpng12-0:1.2.57-21.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng12-devel" epoch="0" version="1.2.57" release="21.el7" arch="x86_64" src="libpng12-1.2.57-21.el7.src.rpm">
					<filename>libpng12-devel-0:1.2.57-21.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0026</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng15 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libpng15</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng15-cve-2026-25646-7.3/</description>
               <solution>Установить обновление для пакета(ов) libpng15
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng15-cve-2026-25646-7.3/" type="self" id="ROS-20260401-73-0026" title="ROS-20260401-73-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25646" type="cve" id="CVE-2026-25646" title="CVE-2026-25646" />
			<reference href="https://bdu.fstec.ru/vul/2026-01774" type="self" id="BDU:2026-01774" title="BDU:2026-01774" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libpng15" epoch="0" version="1.5.30" release="19.el7" arch="x86_64" src="libpng15-1.5.30-19.el7.src.rpm">
					<filename>libpng15-0:1.5.30-19.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0027</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libpng</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng-cve-2025-28164-7.3/</description>
               <solution>Установить обновление для пакета(ов) libpng
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng-cve-2025-28164-7.3/" type="self" id="ROS-20260401-73-0027" title="ROS-20260401-73-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-28164" type="cve" id="CVE-2025-28164" title="CVE-2025-28164" />
			<reference href="https://bdu.fstec.ru/vul/2026-05684" type="self" id="BDU:2026-05684" title="BDU:2026-05684" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libpng" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng-devel" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-devel-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng-static" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-static-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng-tools" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-tools-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0028</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng12 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libpng12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng12-cve-2025-28164-7.3/</description>
               <solution>Установить обновление для пакета(ов) libpng12
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng12-cve-2025-28164-7.3/" type="self" id="ROS-20260401-73-0028" title="ROS-20260401-73-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-28164" type="cve" id="CVE-2025-28164" title="CVE-2025-28164" />
			<reference href="https://bdu.fstec.ru/vul/2026-05684" type="self" id="BDU:2026-05684" title="BDU:2026-05684" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libpng12" epoch="0" version="1.2.57" release="21.el7" arch="x86_64" src="libpng12-1.2.57-21.el7.src.rpm">
					<filename>libpng12-0:1.2.57-21.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng12-devel" epoch="0" version="1.2.57" release="21.el7" arch="x86_64" src="libpng12-1.2.57-21.el7.src.rpm">
					<filename>libpng12-devel-0:1.2.57-21.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0029</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng15 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libpng15</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng15-cve-2025-28164-7.3/</description>
               <solution>Установить обновление для пакета(ов) libpng15
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng15-cve-2025-28164-7.3/" type="self" id="ROS-20260401-73-0029" title="ROS-20260401-73-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-28164" type="cve" id="CVE-2025-28164" title="CVE-2025-28164" />
			<reference href="https://bdu.fstec.ru/vul/2026-05684" type="self" id="BDU:2026-05684" title="BDU:2026-05684" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libpng15" epoch="0" version="1.5.30" release="19.el7" arch="x86_64" src="libpng15-1.5.30-19.el7.src.rpm">
					<filename>libpng15-0:1.5.30-19.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0030</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libpng</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng-cve-2025-28162-7.3/</description>
               <solution>Установить обновление для пакета(ов) libpng
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng-cve-2025-28162-7.3/" type="self" id="ROS-20260401-73-0030" title="ROS-20260401-73-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-28162" type="cve" id="CVE-2025-28162" title="CVE-2025-28162" />
			<reference href="https://bdu.fstec.ru/vul/2026-05685" type="self" id="BDU:2026-05685" title="BDU:2026-05685" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libpng" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng-devel" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-devel-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng-static" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-static-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng-tools" epoch="2" version="1.6.43" release="2.el7" arch="x86_64" src="libpng-1.6.43-2.el7.src.rpm">
					<filename>libpng-tools-2:1.6.43-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0031</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng12 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libpng12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng12-cve-2025-28162-7.3/</description>
               <solution>Установить обновление для пакета(ов) libpng12
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng12-cve-2025-28162-7.3/" type="self" id="ROS-20260401-73-0031" title="ROS-20260401-73-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-28162" type="cve" id="CVE-2025-28162" title="CVE-2025-28162" />
			<reference href="https://bdu.fstec.ru/vul/2026-05685" type="self" id="BDU:2026-05685" title="BDU:2026-05685" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libpng12" epoch="0" version="1.2.57" release="21.el7" arch="x86_64" src="libpng12-1.2.57-21.el7.src.rpm">
					<filename>libpng12-0:1.2.57-21.el7.x86_64.rpm</filename>
				</package>
				<package name="libpng12-devel" epoch="0" version="1.2.57" release="21.el7" arch="x86_64" src="libpng12-1.2.57-21.el7.src.rpm">
					<filename>libpng12-devel-0:1.2.57-21.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0032</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng15 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libpng15</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng15-cve-2025-28162-7.3/</description>
               <solution>Установить обновление для пакета(ов) libpng15
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libpng15-cve-2025-28162-7.3/" type="self" id="ROS-20260401-73-0032" title="ROS-20260401-73-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-28162" type="cve" id="CVE-2025-28162" title="CVE-2025-28162" />
			<reference href="https://bdu.fstec.ru/vul/2026-05685" type="self" id="BDU:2026-05685" title="BDU:2026-05685" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libpng15" epoch="0" version="1.5.30" release="19.el7" arch="x86_64" src="libpng15-1.5.30-19.el7.src.rpm">
					<filename>libpng15-0:1.5.30-19.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0033</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость nodejs </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nodejs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-cve-2025-59466-7.3/</description>
               <solution>Установить обновление для пакета(ов) nodejs
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-cve-2025-59466-7.3/" type="self" id="ROS-20260401-73-0033" title="ROS-20260401-73-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59466" type="cve" id="CVE-2025-59466" title="CVE-2025-59466" />
			<reference href="https://bdu.fstec.ru/vul/2026-00456" type="self" id="BDU:2026-00456" title="BDU:2026-00456" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs" epoch="1" version="22.22.0" release="1.el7" arch="x86_64" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>nodejs-1:22.22.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-devel" epoch="1" version="22.22.0" release="1.el7" arch="x86_64" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>nodejs-devel-1:22.22.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-full-i18n" epoch="1" version="22.22.0" release="1.el7" arch="x86_64" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>nodejs-full-i18n-1:22.22.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-libs" epoch="1" version="22.22.0" release="1.el7" arch="x86_64" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>nodejs-libs-1:22.22.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-npm" epoch="1" version="10.9.4" release="1.22.22.0.1.el7" arch="x86_64" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>nodejs-npm-1:10.9.4-1.22.22.0.1.el7.x86_64.rpm</filename>
				</package>
				<package name="v8-12.4-devel" epoch="3" version="12.4.254.21" release="1.22.22.0.1.el7" arch="x86_64" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>v8-12.4-devel-3:12.4.254.21-1.22.22.0.1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-docs" epoch="1" version="22.22.0" release="1.el7" arch="noarch" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>nodejs-docs-1:22.22.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0034</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость nodejs20 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nodejs20</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs20-cve-2025-59466-7.3/</description>
               <solution>Установить обновление для пакета(ов) nodejs20
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs20-cve-2025-59466-7.3/" type="self" id="ROS-20260401-73-0034" title="ROS-20260401-73-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59466" type="cve" id="CVE-2025-59466" title="CVE-2025-59466" />
			<reference href="https://bdu.fstec.ru/vul/2026-00456" type="self" id="BDU:2026-00456" title="BDU:2026-00456" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs20" epoch="1" version="20.20.0" release="1.el7" arch="x86_64" src="nodejs20-20.20.0-1.el7.src.rpm">
					<filename>nodejs20-1:20.20.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs20-devel" epoch="1" version="20.20.0" release="1.el7" arch="x86_64" src="nodejs20-20.20.0-1.el7.src.rpm">
					<filename>nodejs20-devel-1:20.20.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs20-full-i18n" epoch="1" version="20.20.0" release="1.el7" arch="x86_64" src="nodejs20-20.20.0-1.el7.src.rpm">
					<filename>nodejs20-full-i18n-1:20.20.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs20-libs" epoch="1" version="20.20.0" release="1.el7" arch="x86_64" src="nodejs20-20.20.0-1.el7.src.rpm">
					<filename>nodejs20-libs-1:20.20.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs20-npm" epoch="1" version="10.8.2" release="1.20.20.0.1.el7" arch="x86_64" src="nodejs20-20.20.0-1.el7.src.rpm">
					<filename>nodejs20-npm-1:10.8.2-1.20.20.0.1.el7.x86_64.rpm</filename>
				</package>
				<package name="v8-11.3-devel" epoch="3" version="11.3.244.8" release="1.20.20.0.1.el7" arch="x86_64" src="nodejs20-20.20.0-1.el7.src.rpm">
					<filename>v8-11.3-devel-3:11.3.244.8-1.20.20.0.1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs20-docs" epoch="1" version="20.20.0" release="1.el7" arch="noarch" src="nodejs20-20.20.0-1.el7.src.rpm">
					<filename>nodejs20-docs-1:20.20.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0035</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость nodejs </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nodejs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-cve-2025-59465-7.3/</description>
               <solution>Установить обновление для пакета(ов) nodejs
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-cve-2025-59465-7.3/" type="self" id="ROS-20260401-73-0035" title="ROS-20260401-73-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59465" type="cve" id="CVE-2025-59465" title="CVE-2025-59465" />
			<reference href="https://bdu.fstec.ru/vul/2026-00547" type="self" id="BDU:2026-00547" title="BDU:2026-00547" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs" epoch="1" version="22.22.0" release="1.el7" arch="x86_64" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>nodejs-1:22.22.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-devel" epoch="1" version="22.22.0" release="1.el7" arch="x86_64" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>nodejs-devel-1:22.22.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-full-i18n" epoch="1" version="22.22.0" release="1.el7" arch="x86_64" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>nodejs-full-i18n-1:22.22.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-libs" epoch="1" version="22.22.0" release="1.el7" arch="x86_64" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>nodejs-libs-1:22.22.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-npm" epoch="1" version="10.9.4" release="1.22.22.0.1.el7" arch="x86_64" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>nodejs-npm-1:10.9.4-1.22.22.0.1.el7.x86_64.rpm</filename>
				</package>
				<package name="v8-12.4-devel" epoch="3" version="12.4.254.21" release="1.22.22.0.1.el7" arch="x86_64" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>v8-12.4-devel-3:12.4.254.21-1.22.22.0.1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-docs" epoch="1" version="22.22.0" release="1.el7" arch="noarch" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>nodejs-docs-1:22.22.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0036</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость nodejs20 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nodejs20</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs20-cve-2025-59465-7.3/</description>
               <solution>Установить обновление для пакета(ов) nodejs20
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs20-cve-2025-59465-7.3/" type="self" id="ROS-20260401-73-0036" title="ROS-20260401-73-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59465" type="cve" id="CVE-2025-59465" title="CVE-2025-59465" />
			<reference href="https://bdu.fstec.ru/vul/2026-00547" type="self" id="BDU:2026-00547" title="BDU:2026-00547" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs20" epoch="1" version="20.20.0" release="1.el7" arch="x86_64" src="nodejs20-20.20.0-1.el7.src.rpm">
					<filename>nodejs20-1:20.20.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs20-devel" epoch="1" version="20.20.0" release="1.el7" arch="x86_64" src="nodejs20-20.20.0-1.el7.src.rpm">
					<filename>nodejs20-devel-1:20.20.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs20-full-i18n" epoch="1" version="20.20.0" release="1.el7" arch="x86_64" src="nodejs20-20.20.0-1.el7.src.rpm">
					<filename>nodejs20-full-i18n-1:20.20.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs20-libs" epoch="1" version="20.20.0" release="1.el7" arch="x86_64" src="nodejs20-20.20.0-1.el7.src.rpm">
					<filename>nodejs20-libs-1:20.20.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs20-npm" epoch="1" version="10.8.2" release="1.20.20.0.1.el7" arch="x86_64" src="nodejs20-20.20.0-1.el7.src.rpm">
					<filename>nodejs20-npm-1:10.8.2-1.20.20.0.1.el7.x86_64.rpm</filename>
				</package>
				<package name="v8-11.3-devel" epoch="3" version="11.3.244.8" release="1.20.20.0.1.el7" arch="x86_64" src="nodejs20-20.20.0-1.el7.src.rpm">
					<filename>v8-11.3-devel-3:11.3.244.8-1.20.20.0.1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs20-docs" epoch="1" version="20.20.0" release="1.el7" arch="noarch" src="nodejs20-20.20.0-1.el7.src.rpm">
					<filename>nodejs20-docs-1:20.20.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0037</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость vlc </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в vlc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vlc-cve-2025-51602-7.3/</description>
               <solution>Установить обновление для пакета(ов) vlc
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-vlc-cve-2025-51602-7.3/" type="self" id="ROS-20260401-73-0037" title="ROS-20260401-73-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-51602" type="cve" id="CVE-2025-51602" title="CVE-2025-51602" />
			<reference href="https://bdu.fstec.ru/vul/2026-05694" type="self" id="BDU:2026-05694" title="BDU:2026-05694" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="vlc" epoch="0" version="3.0.22" release="1.el7.3" arch="x86_64" src="vlc-3.0.22-1.el7.3.src.rpm">
					<filename>vlc-0:3.0.22-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="vlc-core" epoch="0" version="3.0.22" release="1.el7.3" arch="x86_64" src="vlc-3.0.22-1.el7.3.src.rpm">
					<filename>vlc-core-0:3.0.22-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="vlc-devel" epoch="0" version="3.0.22" release="1.el7.3" arch="x86_64" src="vlc-3.0.22-1.el7.3.src.rpm">
					<filename>vlc-devel-0:3.0.22-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="vlc-extras" epoch="0" version="3.0.22" release="1.el7.3" arch="x86_64" src="vlc-3.0.22-1.el7.3.src.rpm">
					<filename>vlc-extras-0:3.0.22-1.el7.3.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0038</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость webmin </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в webmin</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-webmin-cve-2025-67738-7.3/</description>
               <solution>Установить обновление для пакета(ов) webmin
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-webmin-cve-2025-67738-7.3/" type="self" id="ROS-20260401-73-0038" title="ROS-20260401-73-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67738" type="cve" id="CVE-2025-67738" title="CVE-2025-67738" />
			<reference href="https://bdu.fstec.ru/vul/2026-05707" type="self" id="BDU:2026-05707" title="BDU:2026-05707" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="webmin" epoch="0" version="2.621" release="1.el7" arch="noarch" src="webmin-2.621-1.el7.src.rpm">
					<filename>webmin-0:2.621-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0039</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость mongo-c-driver </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mongo-c-driver</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongo-c-driver-cve-2025-14911-7.3/</description>
               <solution>Установить обновление для пакета(ов) mongo-c-driver
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongo-c-driver-cve-2025-14911-7.3/" type="self" id="ROS-20260401-73-0039" title="ROS-20260401-73-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14911" type="cve" id="CVE-2025-14911" title="CVE-2025-14911" />
			<reference href="https://bdu.fstec.ru/vul/2026-05689" type="self" id="BDU:2026-05689" title="BDU:2026-05689" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libbson" epoch="0" version="2.2.2" release="2.el7" arch="x86_64" src="mongo-c-driver-2.2.2-2.el7.src.rpm">
					<filename>libbson-0:2.2.2-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libbson-devel" epoch="0" version="2.2.2" release="2.el7" arch="x86_64" src="mongo-c-driver-2.2.2-2.el7.src.rpm">
					<filename>libbson-devel-0:2.2.2-2.el7.x86_64.rpm</filename>
				</package>
				<package name="mongo-c-driver" epoch="0" version="2.2.2" release="2.el7" arch="x86_64" src="mongo-c-driver-2.2.2-2.el7.src.rpm">
					<filename>mongo-c-driver-0:2.2.2-2.el7.x86_64.rpm</filename>
				</package>
				<package name="mongo-c-driver-devel" epoch="0" version="2.2.2" release="2.el7" arch="x86_64" src="mongo-c-driver-2.2.2-2.el7.src.rpm">
					<filename>mongo-c-driver-devel-0:2.2.2-2.el7.x86_64.rpm</filename>
				</package>
				<package name="mongo-c-driver-libs" epoch="0" version="2.2.2" release="2.el7" arch="x86_64" src="mongo-c-driver-2.2.2-2.el7.src.rpm">
					<filename>mongo-c-driver-libs-0:2.2.2-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0040</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость golang-x-net </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang-x-net</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-x-net-cve-2025-47911-7.3/</description>
               <solution>Установить обновление для пакета(ов) golang-x-net
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-x-net-cve-2025-47911-7.3/" type="self" id="ROS-20260401-73-0040" title="ROS-20260401-73-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47911" type="cve" id="CVE-2025-47911" title="CVE-2025-47911" />
			<reference href="https://bdu.fstec.ru/vul/2026-05687" type="self" id="BDU:2026-05687" title="BDU:2026-05687" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang-x-net-devel" epoch="0" version="0.45.0" release="1.el7" arch="noarch" src="golang-x-net-0.45.0-1.el7.src.rpm">
					<filename>golang-x-net-devel-0:0.45.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0041</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость golang-x-net </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang-x-net</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-x-net-cve-2025-58190-7.3/</description>
               <solution>Установить обновление для пакета(ов) golang-x-net
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-x-net-cve-2025-58190-7.3/" type="self" id="ROS-20260401-73-0041" title="ROS-20260401-73-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58190" type="cve" id="CVE-2025-58190" title="CVE-2025-58190" />
			<reference href="https://bdu.fstec.ru/vul/2026-05686" type="self" id="BDU:2026-05686" title="BDU:2026-05686" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang-x-net-devel" epoch="0" version="0.45.0" release="1.el7" arch="noarch" src="golang-x-net-0.45.0-1.el7.src.rpm">
					<filename>golang-x-net-devel-0:0.45.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0042</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость golang-x-net </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang-x-net</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-x-net-cve-2026-27141-7.3/</description>
               <solution>Установить обновление для пакета(ов) golang-x-net
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-x-net-cve-2026-27141-7.3/" type="self" id="ROS-20260401-73-0042" title="ROS-20260401-73-0042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27141" type="cve" id="CVE-2026-27141" title="CVE-2026-27141" />
			<reference href="https://bdu.fstec.ru/vul/2026-04597" type="self" id="BDU:2026-04597" title="BDU:2026-04597" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang-x-net-devel" epoch="0" version="0.45.0" release="1.el7" arch="noarch" src="golang-x-net-0.45.0-1.el7.src.rpm">
					<filename>golang-x-net-devel-0:0.45.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0043</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость pdns-recursor </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в pdns-recursor</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pdns-recursor-cve-2026-0398-7.3/</description>
               <solution>Установить обновление для пакета(ов) pdns-recursor
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pdns-recursor-cve-2026-0398-7.3/" type="self" id="ROS-20260401-73-0043" title="ROS-20260401-73-0043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0398" type="cve" id="CVE-2026-0398" title="CVE-2026-0398" />
			<reference href="https://bdu.fstec.ru/vul/2026-05708" type="self" id="BDU:2026-05708" title="BDU:2026-05708" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pdns-recursor" epoch="0" version="5.3.5" release="1.el7" arch="x86_64" src="pdns-recursor-5.3.5-1.el7.src.rpm">
					<filename>pdns-recursor-0:5.3.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0044</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость salt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в salt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-salt-cve-2025-62348-7.3/</description>
               <solution>Установить обновление для пакета(ов) salt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-salt-cve-2025-62348-7.3/" type="self" id="ROS-20260401-73-0044" title="ROS-20260401-73-0044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62348" type="cve" id="CVE-2025-62348" title="CVE-2025-62348" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="salt" epoch="0" version="3007.11" release="1.el7" arch="noarch" src="salt-3007.11-1.el7.src.rpm">
					<filename>salt-0:3007.11-1.el7.noarch.rpm</filename>
				</package>
				<package name="salt-api" epoch="0" version="3007.11" release="1.el7" arch="noarch" src="salt-3007.11-1.el7.src.rpm">
					<filename>salt-api-0:3007.11-1.el7.noarch.rpm</filename>
				</package>
				<package name="salt-cloud" epoch="0" version="3007.11" release="1.el7" arch="noarch" src="salt-3007.11-1.el7.src.rpm">
					<filename>salt-cloud-0:3007.11-1.el7.noarch.rpm</filename>
				</package>
				<package name="salt-master" epoch="0" version="3007.11" release="1.el7" arch="noarch" src="salt-3007.11-1.el7.src.rpm">
					<filename>salt-master-0:3007.11-1.el7.noarch.rpm</filename>
				</package>
				<package name="salt-minion" epoch="0" version="3007.11" release="1.el7" arch="noarch" src="salt-3007.11-1.el7.src.rpm">
					<filename>salt-minion-0:3007.11-1.el7.noarch.rpm</filename>
				</package>
				<package name="salt-ssh" epoch="0" version="3007.11" release="1.el7" arch="noarch" src="salt-3007.11-1.el7.src.rpm">
					<filename>salt-ssh-0:3007.11-1.el7.noarch.rpm</filename>
				</package>
				<package name="salt-syndic" epoch="0" version="3007.11" release="1.el7" arch="noarch" src="salt-3007.11-1.el7.src.rpm">
					<filename>salt-syndic-0:3007.11-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0045</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость salt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в salt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-salt-cve-2025-62349-7.3/</description>
               <solution>Установить обновление для пакета(ов) salt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-salt-cve-2025-62349-7.3/" type="self" id="ROS-20260401-73-0045" title="ROS-20260401-73-0045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62349" type="cve" id="CVE-2025-62349" title="CVE-2025-62349" />
			<reference href="https://bdu.fstec.ru/vul/2026-05706" type="self" id="BDU:2026-05706" title="BDU:2026-05706" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="salt" epoch="0" version="3007.11" release="1.el7" arch="noarch" src="salt-3007.11-1.el7.src.rpm">
					<filename>salt-0:3007.11-1.el7.noarch.rpm</filename>
				</package>
				<package name="salt-api" epoch="0" version="3007.11" release="1.el7" arch="noarch" src="salt-3007.11-1.el7.src.rpm">
					<filename>salt-api-0:3007.11-1.el7.noarch.rpm</filename>
				</package>
				<package name="salt-cloud" epoch="0" version="3007.11" release="1.el7" arch="noarch" src="salt-3007.11-1.el7.src.rpm">
					<filename>salt-cloud-0:3007.11-1.el7.noarch.rpm</filename>
				</package>
				<package name="salt-master" epoch="0" version="3007.11" release="1.el7" arch="noarch" src="salt-3007.11-1.el7.src.rpm">
					<filename>salt-master-0:3007.11-1.el7.noarch.rpm</filename>
				</package>
				<package name="salt-minion" epoch="0" version="3007.11" release="1.el7" arch="noarch" src="salt-3007.11-1.el7.src.rpm">
					<filename>salt-minion-0:3007.11-1.el7.noarch.rpm</filename>
				</package>
				<package name="salt-ssh" epoch="0" version="3007.11" release="1.el7" arch="noarch" src="salt-3007.11-1.el7.src.rpm">
					<filename>salt-ssh-0:3007.11-1.el7.noarch.rpm</filename>
				</package>
				<package name="salt-syndic" epoch="0" version="3007.11" release="1.el7" arch="noarch" src="salt-3007.11-1.el7.src.rpm">
					<filename>salt-syndic-0:3007.11-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0046</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость python-waitress </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-waitress</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-waitress-cve-2022-24761-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-waitress
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-waitress-cve-2022-24761-7.3/" type="self" id="ROS-20260401-73-0046" title="ROS-20260401-73-0046" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24761" type="cve" id="CVE-2022-24761" title="CVE-2022-24761" />
			<reference href="https://bdu.fstec.ru/vul/2022-05762" type="self" id="BDU:2022-05762" title="BDU:2022-05762" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-waitress" epoch="0" version="1.4.4" release="2.el7" arch="noarch" src="python-waitress-1.4.4-2.el7.src.rpm">
					<filename>python3-waitress-0:1.4.4-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0047</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость cflow </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в cflow</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cflow-cve-2023-2789-7.3/</description>
               <solution>Установить обновление для пакета(ов) cflow
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-cflow-cve-2023-2789-7.3/" type="self" id="ROS-20260401-73-0047" title="ROS-20260401-73-0047" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2789" type="cve" id="CVE-2023-2789" title="CVE-2023-2789" />
			<reference href="https://bdu.fstec.ru/vul/2026-05688" type="self" id="BDU:2026-05688" title="BDU:2026-05688" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="cflow" epoch="0" version="1.8" release="1.el7" arch="x86_64" src="cflow-1.8-1.el7.src.rpm">
					<filename>cflow-0:1.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0048</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость zabbix-lts </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в zabbix-lts</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix-lts-cve-2026-23925-7.3/</description>
               <solution>Установить обновление для пакета(ов) zabbix-lts
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix-lts-cve-2026-23925-7.3/" type="self" id="ROS-20260401-73-0048" title="ROS-20260401-73-0048" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23925" type="cve" id="CVE-2026-23925" title="CVE-2026-23925" />
			<reference href="https://bdu.fstec.ru/vul/2026-05709" type="self" id="BDU:2026-05709" title="BDU:2026-05709" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix-lts-agent" epoch="1" version="6.0.42" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-agent-1:6.0.42-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-agent2" epoch="1" version="6.0.42" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-agent2-1:6.0.42-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-get" epoch="1" version="6.0.42" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-get-1:6.0.42-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway" epoch="1" version="6.0.42" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-java-gateway-1:6.0.42-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway-openjdk11" epoch="1" version="6.0.42" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-java-gateway-openjdk11-1:6.0.42-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway-openjdk17" epoch="1" version="6.0.42" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-java-gateway-openjdk17-1:6.0.42-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway-openjdk21" epoch="1" version="6.0.42" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-java-gateway-openjdk21-1:6.0.42-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-js" epoch="1" version="6.0.42" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-js-1:6.0.42-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-proxy-mysql" epoch="1" version="6.0.42" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-proxy-mysql-1:6.0.42-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-proxy-pgsql" epoch="1" version="6.0.42" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-proxy-pgsql-1:6.0.42-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-proxy-sqlite3" epoch="1" version="6.0.42" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-proxy-sqlite3-1:6.0.42-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-sender" epoch="1" version="6.0.42" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-sender-1:6.0.42-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-server-mysql" epoch="1" version="6.0.42" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-server-mysql-1:6.0.42-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-server-pgsql" epoch="1" version="6.0.42" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-server-pgsql-1:6.0.42-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-web-service" epoch="1" version="6.0.42" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-web-service-1:6.0.42-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-apache-conf" epoch="1" version="6.0.42" release="1.el7" arch="noarch" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-apache-conf-1:6.0.42-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-nginx-conf" epoch="1" version="6.0.42" release="1.el7" arch="noarch" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-nginx-conf-1:6.0.42-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-selinux-policy" epoch="1" version="6.0.42" release="1.el7" arch="noarch" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-selinux-policy-1:6.0.42-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-sql-scripts" epoch="1" version="6.0.42" release="1.el7" arch="noarch" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-sql-scripts-1:6.0.42-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-web" epoch="1" version="6.0.42" release="1.el7" arch="noarch" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-web-1:6.0.42-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-web-deps" epoch="1" version="6.0.42" release="1.el7" arch="noarch" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-web-deps-1:6.0.42-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-web-mysql" epoch="1" version="6.0.42" release="1.el7" arch="noarch" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-web-mysql-1:6.0.42-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-web-pgsql" epoch="1" version="6.0.42" release="1.el7" arch="noarch" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-web-pgsql-1:6.0.42-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-73-0049</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость zabbix7-lts </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в zabbix7-lts</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-lts-cve-2026-23925-7.3/</description>
               <solution>Установить обновление для пакета(ов) zabbix7-lts
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-lts-cve-2026-23925-7.3/" type="self" id="ROS-20260401-73-0049" title="ROS-20260401-73-0049" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23925" type="cve" id="CVE-2026-23925" title="CVE-2026-23925" />
			<reference href="https://bdu.fstec.ru/vul/2026-05709" type="self" id="BDU:2026-05709" title="BDU:2026-05709" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix7-lts-agent" epoch="1" version="7.0.18" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.18-1.el7.src.rpm">
					<filename>zabbix7-lts-agent-1:7.0.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-agent2" epoch="1" version="7.0.18" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.18-1.el7.src.rpm">
					<filename>zabbix7-lts-agent2-1:7.0.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-get" epoch="1" version="7.0.18" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.18-1.el7.src.rpm">
					<filename>zabbix7-lts-get-1:7.0.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-java-gateway" epoch="1" version="7.0.18" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.18-1.el7.src.rpm">
					<filename>zabbix7-lts-java-gateway-1:7.0.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-java-gateway-openjdk11" epoch="1" version="7.0.18" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.18-1.el7.src.rpm">
					<filename>zabbix7-lts-java-gateway-openjdk11-1:7.0.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-java-gateway-openjdk17" epoch="1" version="7.0.18" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.18-1.el7.src.rpm">
					<filename>zabbix7-lts-java-gateway-openjdk17-1:7.0.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-java-gateway-openjdk21" epoch="1" version="7.0.18" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.18-1.el7.src.rpm">
					<filename>zabbix7-lts-java-gateway-openjdk21-1:7.0.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-js" epoch="1" version="7.0.18" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.18-1.el7.src.rpm">
					<filename>zabbix7-lts-js-1:7.0.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-proxy-mysql" epoch="1" version="7.0.18" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.18-1.el7.src.rpm">
					<filename>zabbix7-lts-proxy-mysql-1:7.0.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-proxy-pgsql" epoch="1" version="7.0.18" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.18-1.el7.src.rpm">
					<filename>zabbix7-lts-proxy-pgsql-1:7.0.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-proxy-sqlite3" epoch="1" version="7.0.18" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.18-1.el7.src.rpm">
					<filename>zabbix7-lts-proxy-sqlite3-1:7.0.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-sender" epoch="1" version="7.0.18" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.18-1.el7.src.rpm">
					<filename>zabbix7-lts-sender-1:7.0.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-server-mysql" epoch="1" version="7.0.18" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.18-1.el7.src.rpm">
					<filename>zabbix7-lts-server-mysql-1:7.0.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-server-pgsql" epoch="1" version="7.0.18" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.18-1.el7.src.rpm">
					<filename>zabbix7-lts-server-pgsql-1:7.0.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-web-service" epoch="1" version="7.0.18" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.18-1.el7.src.rpm">
					<filename>zabbix7-lts-web-service-1:7.0.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-apache-conf" epoch="1" version="7.0.18" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.18-1.el7.src.rpm">
					<filename>zabbix7-lts-apache-conf-1:7.0.18-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-nginx-conf" epoch="1" version="7.0.18" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.18-1.el7.src.rpm">
					<filename>zabbix7-lts-nginx-conf-1:7.0.18-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-selinux-policy" epoch="1" version="7.0.18" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.18-1.el7.src.rpm">
					<filename>zabbix7-lts-selinux-policy-1:7.0.18-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-sql-scripts" epoch="1" version="7.0.18" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.18-1.el7.src.rpm">
					<filename>zabbix7-lts-sql-scripts-1:7.0.18-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-web" epoch="1" version="7.0.18" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.18-1.el7.src.rpm">
					<filename>zabbix7-lts-web-1:7.0.18-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-web-deps" epoch="1" version="7.0.18" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.18-1.el7.src.rpm">
					<filename>zabbix7-lts-web-deps-1:7.0.18-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-web-mysql" epoch="1" version="7.0.18" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.18-1.el7.src.rpm">
					<filename>zabbix7-lts-web-mysql-1:7.0.18-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-web-pgsql" epoch="1" version="7.0.18" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.18-1.el7.src.rpm">
					<filename>zabbix7-lts-web-pgsql-1:7.0.18-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0001</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37892-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37892-7.3/" type="self" id="ROS-20260403-73-0001" title="ROS-20260403-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37892" type="cve" id="CVE-2025-37892" title="CVE-2025-37892" />
			<reference href="https://bdu.fstec.ru/vul/2025-11973" type="self" id="BDU:2025-11973" title="BDU:2025-11973" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0002</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37899-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37899-7.3/" type="self" id="ROS-20260403-73-0002" title="ROS-20260403-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37899" type="cve" id="CVE-2025-37899" title="CVE-2025-37899" />
			<reference href="https://bdu.fstec.ru/vul/2025-06026" type="self" id="BDU:2025-06026" title="BDU:2025-06026" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.162" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.162-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0003</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37926-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37926-7.3/" type="self" id="ROS-20260403-73-0003" title="ROS-20260403-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37926" type="cve" id="CVE-2025-37926" title="CVE-2025-37926" />
			<reference href="https://bdu.fstec.ru/vul/2026-02237" type="self" id="BDU:2026-02237" title="BDU:2026-02237" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.162" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.162-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0004</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38022-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38022-7.3/" type="self" id="ROS-20260403-73-0004" title="ROS-20260403-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38022" type="cve" id="CVE-2025-38022" title="CVE-2025-38022" />
			<reference href="https://bdu.fstec.ru/vul/2025-10612" type="self" id="BDU:2025-10612" title="BDU:2025-10612" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.162" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.162-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0005</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38057-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38057-7.3/" type="self" id="ROS-20260403-73-0005" title="ROS-20260403-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38057" type="cve" id="CVE-2025-38057" title="CVE-2025-38057" />
			<reference href="https://bdu.fstec.ru/vul/2026-04400" type="self" id="BDU:2026-04400" title="BDU:2026-04400" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.162" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.162-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0006</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38073-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38073-7.3/" type="self" id="ROS-20260403-73-0006" title="ROS-20260403-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38073" type="cve" id="CVE-2025-38073" title="CVE-2025-38073" />
			<reference href="https://bdu.fstec.ru/vul/2026-04474" type="self" id="BDU:2026-04474" title="BDU:2026-04474" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.162" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.162-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0007</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38094-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38094-7.3/" type="self" id="ROS-20260403-73-0007" title="ROS-20260403-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38094" type="cve" id="CVE-2025-38094" title="CVE-2025-38094" />
			<reference href="https://bdu.fstec.ru/vul/2025-09017" type="self" id="BDU:2025-09017" title="BDU:2025-09017" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0008</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38650-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38650-7.3/" type="self" id="ROS-20260403-73-0008" title="ROS-20260403-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38650" type="cve" id="CVE-2025-38650" title="CVE-2025-38650" />
			<reference href="https://bdu.fstec.ru/vul/2025-15183" type="self" id="BDU:2025-15183" title="BDU:2025-15183" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0009</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38652-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38652-7.3/" type="self" id="ROS-20260403-73-0009" title="ROS-20260403-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38652" type="cve" id="CVE-2025-38652" title="CVE-2025-38652" />
			<reference href="https://bdu.fstec.ru/vul/2025-15776" type="self" id="BDU:2025-15776" title="BDU:2025-15776" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0010</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38653-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38653-7.3/" type="self" id="ROS-20260403-73-0010" title="ROS-20260403-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38653" type="cve" id="CVE-2025-38653" title="CVE-2025-38653" />
			<reference href="https://bdu.fstec.ru/vul/2025-15184" type="self" id="BDU:2025-15184" title="BDU:2025-15184" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0011</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38663-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38663-7.3/" type="self" id="ROS-20260403-73-0011" title="ROS-20260403-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38663" type="cve" id="CVE-2025-38663" title="CVE-2025-38663" />
			<reference href="https://bdu.fstec.ru/vul/2025-15022" type="self" id="BDU:2025-15022" title="BDU:2025-15022" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0012</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38664-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38664-7.3/" type="self" id="ROS-20260403-73-0012" title="ROS-20260403-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38664" type="cve" id="CVE-2025-38664" title="CVE-2025-38664" />
			<reference href="https://bdu.fstec.ru/vul/2025-15773" type="self" id="BDU:2025-15773" title="BDU:2025-15773" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0013</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38665-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38665-7.3/" type="self" id="ROS-20260403-73-0013" title="ROS-20260403-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38665" type="cve" id="CVE-2025-38665" title="CVE-2025-38665" />
			<reference href="https://bdu.fstec.ru/vul/2025-15772" type="self" id="BDU:2025-15772" title="BDU:2025-15772" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0014</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38668-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38668-7.3/" type="self" id="ROS-20260403-73-0014" title="ROS-20260403-73-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38668" type="cve" id="CVE-2025-38668" title="CVE-2025-38668" />
			<reference href="https://bdu.fstec.ru/vul/2025-15771" type="self" id="BDU:2025-15771" title="BDU:2025-15771" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0015</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38670-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38670-7.3/" type="self" id="ROS-20260403-73-0015" title="ROS-20260403-73-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38670" type="cve" id="CVE-2025-38670" title="CVE-2025-38670" />
			<reference href="https://bdu.fstec.ru/vul/2025-15770" type="self" id="BDU:2025-15770" title="BDU:2025-15770" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0016</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38671-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38671-7.3/" type="self" id="ROS-20260403-73-0016" title="ROS-20260403-73-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38671" type="cve" id="CVE-2025-38671" title="CVE-2025-38671" />
			<reference href="https://bdu.fstec.ru/vul/2025-15769" type="self" id="BDU:2025-15769" title="BDU:2025-15769" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0017</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38676-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38676-7.3/" type="self" id="ROS-20260403-73-0017" title="ROS-20260403-73-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38676" type="cve" id="CVE-2025-38676" title="CVE-2025-38676" />
			<reference href="https://bdu.fstec.ru/vul/2025-15023" type="self" id="BDU:2025-15023" title="BDU:2025-15023" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0018</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58240-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2024-58240-7.3/" type="self" id="ROS-20260403-73-0018" title="ROS-20260403-73-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58240" type="cve" id="CVE-2024-58240" title="CVE-2024-58240" />
			<reference href="https://bdu.fstec.ru/vul/2025-15231" type="self" id="BDU:2025-15231" title="BDU:2025-15231" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0019</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38677-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38677-7.3/" type="self" id="ROS-20260403-73-0019" title="ROS-20260403-73-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38677" type="cve" id="CVE-2025-38677" title="CVE-2025-38677" />
			<reference href="https://bdu.fstec.ru/vul/2025-15767" type="self" id="BDU:2025-15767" title="BDU:2025-15767" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0020</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38678-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38678-7.3/" type="self" id="ROS-20260403-73-0020" title="ROS-20260403-73-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38678" type="cve" id="CVE-2025-38678" title="CVE-2025-38678" />
			<reference href="https://bdu.fstec.ru/vul/2025-15551" type="self" id="BDU:2025-15551" title="BDU:2025-15551" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.162" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.162-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0021</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38679-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38679-7.3/" type="self" id="ROS-20260403-73-0021" title="ROS-20260403-73-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38679" type="cve" id="CVE-2025-38679" title="CVE-2025-38679" />
			<reference href="https://bdu.fstec.ru/vul/2025-15766" type="self" id="BDU:2025-15766" title="BDU:2025-15766" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0022</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38680-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38680-7.3/" type="self" id="ROS-20260403-73-0022" title="ROS-20260403-73-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38680" type="cve" id="CVE-2025-38680" title="CVE-2025-38680" />
			<reference href="https://bdu.fstec.ru/vul/2025-15765" type="self" id="BDU:2025-15765" title="BDU:2025-15765" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0023</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38681-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38681-7.3/" type="self" id="ROS-20260403-73-0023" title="ROS-20260403-73-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38681" type="cve" id="CVE-2025-38681" title="CVE-2025-38681" />
			<reference href="https://bdu.fstec.ru/vul/2025-15764" type="self" id="BDU:2025-15764" title="BDU:2025-15764" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0024</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38683-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38683-7.3/" type="self" id="ROS-20260403-73-0024" title="ROS-20260403-73-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38683" type="cve" id="CVE-2025-38683" title="CVE-2025-38683" />
			<reference href="https://bdu.fstec.ru/vul/2025-15763" type="self" id="BDU:2025-15763" title="BDU:2025-15763" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0025</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38684-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38684-7.3/" type="self" id="ROS-20260403-73-0025" title="ROS-20260403-73-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38684" type="cve" id="CVE-2025-38684" title="CVE-2025-38684" />
			<reference href="https://bdu.fstec.ru/vul/2025-15762" type="self" id="BDU:2025-15762" title="BDU:2025-15762" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0026</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38685-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38685-7.3/" type="self" id="ROS-20260403-73-0026" title="ROS-20260403-73-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38685" type="cve" id="CVE-2025-38685" title="CVE-2025-38685" />
			<reference href="https://bdu.fstec.ru/vul/2025-15024" type="self" id="BDU:2025-15024" title="BDU:2025-15024" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0027</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38687-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38687-7.3/" type="self" id="ROS-20260403-73-0027" title="ROS-20260403-73-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38687" type="cve" id="CVE-2025-38687" title="CVE-2025-38687" />
			<reference href="https://bdu.fstec.ru/vul/2025-15187" type="self" id="BDU:2025-15187" title="BDU:2025-15187" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0028</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38691-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38691-7.3/" type="self" id="ROS-20260403-73-0028" title="ROS-20260403-73-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38691" type="cve" id="CVE-2025-38691" title="CVE-2025-38691" />
			<reference href="https://bdu.fstec.ru/vul/2025-15025" type="self" id="BDU:2025-15025" title="BDU:2025-15025" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0029</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38693-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38693-7.3/" type="self" id="ROS-20260403-73-0029" title="ROS-20260403-73-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38693" type="cve" id="CVE-2025-38693" title="CVE-2025-38693" />
			<reference href="https://bdu.fstec.ru/vul/2025-15761" type="self" id="BDU:2025-15761" title="BDU:2025-15761" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0030</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38695-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38695-7.3/" type="self" id="ROS-20260403-73-0030" title="ROS-20260403-73-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38695" type="cve" id="CVE-2025-38695" title="CVE-2025-38695" />
			<reference href="https://bdu.fstec.ru/vul/2025-15759" type="self" id="BDU:2025-15759" title="BDU:2025-15759" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0031</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38696-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38696-7.3/" type="self" id="ROS-20260403-73-0031" title="ROS-20260403-73-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38696" type="cve" id="CVE-2025-38696" title="CVE-2025-38696" />
			<reference href="https://bdu.fstec.ru/vul/2025-15758" type="self" id="BDU:2025-15758" title="BDU:2025-15758" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0032</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38697-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38697-7.3/" type="self" id="ROS-20260403-73-0032" title="ROS-20260403-73-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38697" type="cve" id="CVE-2025-38697" title="CVE-2025-38697" />
			<reference href="https://bdu.fstec.ru/vul/2025-15757" type="self" id="BDU:2025-15757" title="BDU:2025-15757" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0033</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38698-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38698-7.3/" type="self" id="ROS-20260403-73-0033" title="ROS-20260403-73-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38698" type="cve" id="CVE-2025-38698" title="CVE-2025-38698" />
			<reference href="https://bdu.fstec.ru/vul/2025-15548" type="self" id="BDU:2025-15548" title="BDU:2025-15548" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0034</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38699-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38699-7.3/" type="self" id="ROS-20260403-73-0034" title="ROS-20260403-73-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38699" type="cve" id="CVE-2025-38699" title="CVE-2025-38699" />
			<reference href="https://bdu.fstec.ru/vul/2025-15756" type="self" id="BDU:2025-15756" title="BDU:2025-15756" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0035</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38700-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38700-7.3/" type="self" id="ROS-20260403-73-0035" title="ROS-20260403-73-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38700" type="cve" id="CVE-2025-38700" title="CVE-2025-38700" />
			<reference href="https://bdu.fstec.ru/vul/2025-15755" type="self" id="BDU:2025-15755" title="BDU:2025-15755" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0036</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38701-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38701-7.3/" type="self" id="ROS-20260403-73-0036" title="ROS-20260403-73-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38701" type="cve" id="CVE-2025-38701" title="CVE-2025-38701" />
			<reference href="https://bdu.fstec.ru/vul/2025-15547" type="self" id="BDU:2025-15547" title="BDU:2025-15547" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0037</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38702-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38702-7.3/" type="self" id="ROS-20260403-73-0037" title="ROS-20260403-73-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38702" type="cve" id="CVE-2025-38702" title="CVE-2025-38702" />
			<reference href="https://bdu.fstec.ru/vul/2025-15026" type="self" id="BDU:2025-15026" title="BDU:2025-15026" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0038</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38706-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38706-7.3/" type="self" id="ROS-20260403-73-0038" title="ROS-20260403-73-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38706" type="cve" id="CVE-2025-38706" title="CVE-2025-38706" />
			<reference href="https://bdu.fstec.ru/vul/2025-15753" type="self" id="BDU:2025-15753" title="BDU:2025-15753" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0039</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38707-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38707-7.3/" type="self" id="ROS-20260403-73-0039" title="ROS-20260403-73-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38707" type="cve" id="CVE-2025-38707" title="CVE-2025-38707" />
			<reference href="https://bdu.fstec.ru/vul/2025-15185" type="self" id="BDU:2025-15185" title="BDU:2025-15185" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0040</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38708-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38708-7.3/" type="self" id="ROS-20260403-73-0040" title="ROS-20260403-73-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38708" type="cve" id="CVE-2025-38708" title="CVE-2025-38708" />
			<reference href="https://bdu.fstec.ru/vul/2025-15188" type="self" id="BDU:2025-15188" title="BDU:2025-15188" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-73-0041</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38711-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38711-7.3/" type="self" id="ROS-20260403-73-0041" title="ROS-20260403-73-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38711" type="cve" id="CVE-2025-38711" title="CVE-2025-38711" />
			<reference href="https://bdu.fstec.ru/vul/2025-15027" type="self" id="BDU:2025-15027" title="BDU:2025-15027" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260406-73-0001</id>
		<issued date="2026-04-06" />
		<updated date="2026-04-06" />
		<title>Уязвимость nginx </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в nginx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nginx-cve-2025-53859-7.3/</description>
               <solution>Установить обновление для пакета(ов) nginx
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nginx-cve-2025-53859-7.3/" type="self" id="ROS-20260406-73-0001" title="ROS-20260406-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53859" type="cve" id="CVE-2025-53859" title="CVE-2025-53859" />
			<reference href="https://bdu.fstec.ru/vul/2025-16019" type="self" id="BDU:2025-16019" title="BDU:2025-16019" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nginx" epoch="1" version="1.28.2" release="1.el7" arch="x86_64" src="nginx-1.28.2-1.el7.src.rpm">
					<filename>nginx-1:1.28.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-core" epoch="1" version="1.28.2" release="1.el7" arch="x86_64" src="nginx-1.28.2-1.el7.src.rpm">
					<filename>nginx-core-1:1.28.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-devel" epoch="1" version="1.28.2" release="1.el7" arch="x86_64" src="nginx-1.28.2-1.el7.src.rpm">
					<filename>nginx-mod-devel-1:1.28.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-geoip" epoch="1" version="1.28.2" release="1.el7" arch="x86_64" src="nginx-1.28.2-1.el7.src.rpm">
					<filename>nginx-mod-http-geoip-1:1.28.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-image-filter" epoch="1" version="1.28.2" release="1.el7" arch="x86_64" src="nginx-1.28.2-1.el7.src.rpm">
					<filename>nginx-mod-http-image-filter-1:1.28.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-perl" epoch="1" version="1.28.2" release="1.el7" arch="x86_64" src="nginx-1.28.2-1.el7.src.rpm">
					<filename>nginx-mod-http-perl-1:1.28.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-push-stream" epoch="1" version="1.28.2" release="1.el7" arch="x86_64" src="nginx-1.28.2-1.el7.src.rpm">
					<filename>nginx-mod-http-push-stream-1:1.28.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-xslt-filter" epoch="1" version="1.28.2" release="1.el7" arch="x86_64" src="nginx-1.28.2-1.el7.src.rpm">
					<filename>nginx-mod-http-xslt-filter-1:1.28.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-mail" epoch="1" version="1.28.2" release="1.el7" arch="x86_64" src="nginx-1.28.2-1.el7.src.rpm">
					<filename>nginx-mod-mail-1:1.28.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-stream" epoch="1" version="1.28.2" release="1.el7" arch="x86_64" src="nginx-1.28.2-1.el7.src.rpm">
					<filename>nginx-mod-stream-1:1.28.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-all-modules" epoch="1" version="1.28.2" release="1.el7" arch="noarch" src="nginx-1.28.2-1.el7.src.rpm">
					<filename>nginx-all-modules-1:1.28.2-1.el7.noarch.rpm</filename>
				</package>
				<package name="nginx-filesystem" epoch="1" version="1.28.2" release="1.el7" arch="noarch" src="nginx-1.28.2-1.el7.src.rpm">
					<filename>nginx-filesystem-1:1.28.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0001</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22083-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22083-7.3/" type="self" id="ROS-20260407-73-0001" title="ROS-20260407-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22083" type="cve" id="CVE-2025-22083" title="CVE-2025-22083" />
			<reference href="https://bdu.fstec.ru/vul/2026-02547" type="self" id="BDU:2026-02547" title="BDU:2026-02547" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.162" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.162-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0002</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22090-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22090-7.3/" type="self" id="ROS-20260407-73-0002" title="ROS-20260407-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22090" type="cve" id="CVE-2025-22090" title="CVE-2025-22090" />
			<reference href="https://bdu.fstec.ru/vul/2026-01403" type="self" id="BDU:2026-01403" title="BDU:2026-01403" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.162" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.162-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0003</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22107-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22107-7.3/" type="self" id="ROS-20260407-73-0003" title="ROS-20260407-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22107" type="cve" id="CVE-2025-22107" title="CVE-2025-22107" />
			<reference href="https://bdu.fstec.ru/vul/2026-01500" type="self" id="BDU:2026-01500" title="BDU:2026-01500" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.162" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.162-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0004</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22111-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22111-7.3/" type="self" id="ROS-20260407-73-0004" title="ROS-20260407-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22111" type="cve" id="CVE-2025-22111" title="CVE-2025-22111" />
			<reference href="https://bdu.fstec.ru/vul/2026-01402" type="self" id="BDU:2026-01402" title="BDU:2026-01402" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.162" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.162-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0005</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22121-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-22121-7.3/" type="self" id="ROS-20260407-73-0005" title="ROS-20260407-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22121" type="cve" id="CVE-2025-22121" title="CVE-2025-22121" />
			<reference href="https://bdu.fstec.ru/vul/2026-01527" type="self" id="BDU:2026-01527" title="BDU:2026-01527" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.162" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.162-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0006</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38104-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38104-7.3/" type="self" id="ROS-20260407-73-0006" title="ROS-20260407-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38104" type="cve" id="CVE-2025-38104" title="CVE-2025-38104" />
			<reference href="https://bdu.fstec.ru/vul/2026-05192" type="self" id="BDU:2026-05192" title="BDU:2026-05192" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.162" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.162-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0007</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37803-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37803-7.3/" type="self" id="ROS-20260407-73-0007" title="ROS-20260407-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37803" type="cve" id="CVE-2025-37803" title="CVE-2025-37803" />
			<reference href="https://bdu.fstec.ru/vul/2025-10604" type="self" id="BDU:2025-10604" title="BDU:2025-10604" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0008</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37890-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-37890-7.3/" type="self" id="ROS-20260407-73-0008" title="ROS-20260407-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37890" type="cve" id="CVE-2025-37890" title="CVE-2025-37890" />
			<reference href="https://bdu.fstec.ru/vul/2025-06490" type="self" id="BDU:2025-06490" title="BDU:2025-06490" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.143" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.143-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.143" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.143-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.143-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0009</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38666-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38666-7.3/" type="self" id="ROS-20260407-73-0009" title="ROS-20260407-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38666" type="cve" id="CVE-2025-38666" title="CVE-2025-38666" />
			<reference href="https://bdu.fstec.ru/vul/2025-15186" type="self" id="BDU:2025-15186" title="BDU:2025-15186" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0010</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38712-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38712-7.3/" type="self" id="ROS-20260407-73-0010" title="ROS-20260407-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38712" type="cve" id="CVE-2025-38712" title="CVE-2025-38712" />
			<reference href="https://bdu.fstec.ru/vul/2025-15752" type="self" id="BDU:2025-15752" title="BDU:2025-15752" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0011</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38713-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38713-7.3/" type="self" id="ROS-20260407-73-0011" title="ROS-20260407-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38713" type="cve" id="CVE-2025-38713" title="CVE-2025-38713" />
			<reference href="https://bdu.fstec.ru/vul/2025-15660" type="self" id="BDU:2025-15660" title="BDU:2025-15660" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0012</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38714-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38714-7.3/" type="self" id="ROS-20260407-73-0012" title="ROS-20260407-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38714" type="cve" id="CVE-2025-38714" title="CVE-2025-38714" />
			<reference href="https://bdu.fstec.ru/vul/2025-15659" type="self" id="BDU:2025-15659" title="BDU:2025-15659" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0013</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38715-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38715-7.3/" type="self" id="ROS-20260407-73-0013" title="ROS-20260407-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38715" type="cve" id="CVE-2025-38715" title="CVE-2025-38715" />
			<reference href="https://bdu.fstec.ru/vul/2025-15751" type="self" id="BDU:2025-15751" title="BDU:2025-15751" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0014</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38718-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38718-7.3/" type="self" id="ROS-20260407-73-0014" title="ROS-20260407-73-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38718" type="cve" id="CVE-2025-38718" title="CVE-2025-38718" />
			<reference href="https://bdu.fstec.ru/vul/2026-03072" type="self" id="BDU:2026-03072" title="BDU:2026-03072" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.162" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.162-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0015</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38721-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38721-7.3/" type="self" id="ROS-20260407-73-0015" title="ROS-20260407-73-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38721" type="cve" id="CVE-2025-38721" title="CVE-2025-38721" />
			<reference href="https://bdu.fstec.ru/vul/2025-15750" type="self" id="BDU:2025-15750" title="BDU:2025-15750" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0016</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38723-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38723-7.3/" type="self" id="ROS-20260407-73-0016" title="ROS-20260407-73-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38723" type="cve" id="CVE-2025-38723" title="CVE-2025-38723" />
			<reference href="https://bdu.fstec.ru/vul/2025-15189" type="self" id="BDU:2025-15189" title="BDU:2025-15189" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0017</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38724-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38724-7.3/" type="self" id="ROS-20260407-73-0017" title="ROS-20260407-73-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38724" type="cve" id="CVE-2025-38724" title="CVE-2025-38724" />
			<reference href="https://bdu.fstec.ru/vul/2025-15749" type="self" id="BDU:2025-15749" title="BDU:2025-15749" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0018</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38725-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38725-7.3/" type="self" id="ROS-20260407-73-0018" title="ROS-20260407-73-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38725" type="cve" id="CVE-2025-38725" title="CVE-2025-38725" />
			<reference href="https://bdu.fstec.ru/vul/2025-15748" type="self" id="BDU:2025-15748" title="BDU:2025-15748" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0019</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38727-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38727-7.3/" type="self" id="ROS-20260407-73-0019" title="ROS-20260407-73-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38727" type="cve" id="CVE-2025-38727" title="CVE-2025-38727" />
			<reference href="https://bdu.fstec.ru/vul/2025-15746" type="self" id="BDU:2025-15746" title="BDU:2025-15746" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0020</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38728-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38728-7.3/" type="self" id="ROS-20260407-73-0020" title="ROS-20260407-73-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38728" type="cve" id="CVE-2025-38728" title="CVE-2025-38728" />
			<reference href="https://bdu.fstec.ru/vul/2025-15745" type="self" id="BDU:2025-15745" title="BDU:2025-15745" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0021</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38729-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38729-7.3/" type="self" id="ROS-20260407-73-0021" title="ROS-20260407-73-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38729" type="cve" id="CVE-2025-38729" title="CVE-2025-38729" />
			<reference href="https://bdu.fstec.ru/vul/2025-15744" type="self" id="BDU:2025-15744" title="BDU:2025-15744" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0022</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38732-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38732-7.3/" type="self" id="ROS-20260407-73-0022" title="ROS-20260407-73-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38732" type="cve" id="CVE-2025-38732" title="CVE-2025-38732" />
			<reference href="https://bdu.fstec.ru/vul/2025-15743" type="self" id="BDU:2025-15743" title="BDU:2025-15743" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0023</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38735-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-38735-7.3/" type="self" id="ROS-20260407-73-0023" title="ROS-20260407-73-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38735" type="cve" id="CVE-2025-38735" title="CVE-2025-38735" />
			<reference href="https://bdu.fstec.ru/vul/2025-15546" type="self" id="BDU:2025-15546" title="BDU:2025-15546" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0024</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39673-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39673-7.3/" type="self" id="ROS-20260407-73-0024" title="ROS-20260407-73-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39673" type="cve" id="CVE-2025-39673" title="CVE-2025-39673" />
			<reference href="https://bdu.fstec.ru/vul/2025-15741" type="self" id="BDU:2025-15741" title="BDU:2025-15741" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0025</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39675-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39675-7.3/" type="self" id="ROS-20260407-73-0025" title="ROS-20260407-73-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39675" type="cve" id="CVE-2025-39675" title="CVE-2025-39675" />
			<reference href="https://bdu.fstec.ru/vul/2025-15740" type="self" id="BDU:2025-15740" title="BDU:2025-15740" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0026</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39676-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39676-7.3/" type="self" id="ROS-20260407-73-0026" title="ROS-20260407-73-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39676" type="cve" id="CVE-2025-39676" title="CVE-2025-39676" />
			<reference href="https://bdu.fstec.ru/vul/2025-15739" type="self" id="BDU:2025-15739" title="BDU:2025-15739" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0027</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39681-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39681-7.3/" type="self" id="ROS-20260407-73-0027" title="ROS-20260407-73-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39681" type="cve" id="CVE-2025-39681" title="CVE-2025-39681" />
			<reference href="https://bdu.fstec.ru/vul/2025-15028" type="self" id="BDU:2025-15028" title="BDU:2025-15028" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0028</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39683-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39683-7.3/" type="self" id="ROS-20260407-73-0028" title="ROS-20260407-73-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39683" type="cve" id="CVE-2025-39683" title="CVE-2025-39683" />
			<reference href="https://bdu.fstec.ru/vul/2025-15733" type="self" id="BDU:2025-15733" title="BDU:2025-15733" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0029</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39684-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39684-7.3/" type="self" id="ROS-20260407-73-0029" title="ROS-20260407-73-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39684" type="cve" id="CVE-2025-39684" title="CVE-2025-39684" />
			<reference href="https://bdu.fstec.ru/vul/2025-15192" type="self" id="BDU:2025-15192" title="BDU:2025-15192" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0030</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39685-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39685-7.3/" type="self" id="ROS-20260407-73-0030" title="ROS-20260407-73-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39685" type="cve" id="CVE-2025-39685" title="CVE-2025-39685" />
			<reference href="https://bdu.fstec.ru/vul/2025-15732" type="self" id="BDU:2025-15732" title="BDU:2025-15732" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0031</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39686-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39686-7.3/" type="self" id="ROS-20260407-73-0031" title="ROS-20260407-73-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39686" type="cve" id="CVE-2025-39686" title="CVE-2025-39686" />
			<reference href="https://bdu.fstec.ru/vul/2025-15731" type="self" id="BDU:2025-15731" title="BDU:2025-15731" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0032</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39687-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39687-7.3/" type="self" id="ROS-20260407-73-0032" title="ROS-20260407-73-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39687" type="cve" id="CVE-2025-39687" title="CVE-2025-39687" />
			<reference href="https://bdu.fstec.ru/vul/2025-15193" type="self" id="BDU:2025-15193" title="BDU:2025-15193" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0033</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39689-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39689-7.3/" type="self" id="ROS-20260407-73-0033" title="ROS-20260407-73-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39689" type="cve" id="CVE-2025-39689" title="CVE-2025-39689" />
			<reference href="https://bdu.fstec.ru/vul/2025-15194" type="self" id="BDU:2025-15194" title="BDU:2025-15194" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0034</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39691-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39691-7.3/" type="self" id="ROS-20260407-73-0034" title="ROS-20260407-73-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39691" type="cve" id="CVE-2025-39691" title="CVE-2025-39691" />
			<reference href="https://bdu.fstec.ru/vul/2025-15196" type="self" id="BDU:2025-15196" title="BDU:2025-15196" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0035</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39692-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39692-7.3/" type="self" id="ROS-20260407-73-0035" title="ROS-20260407-73-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39692" type="cve" id="CVE-2025-39692" title="CVE-2025-39692" />
			<reference href="https://bdu.fstec.ru/vul/2025-15730" type="self" id="BDU:2025-15730" title="BDU:2025-15730" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0036</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39693-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39693-7.3/" type="self" id="ROS-20260407-73-0036" title="ROS-20260407-73-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39693" type="cve" id="CVE-2025-39693" title="CVE-2025-39693" />
			<reference href="https://bdu.fstec.ru/vul/2025-15729" type="self" id="BDU:2025-15729" title="BDU:2025-15729" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0037</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39694-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39694-7.3/" type="self" id="ROS-20260407-73-0037" title="ROS-20260407-73-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39694" type="cve" id="CVE-2025-39694" title="CVE-2025-39694" />
			<reference href="https://bdu.fstec.ru/vul/2025-15728" type="self" id="BDU:2025-15728" title="BDU:2025-15728" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0038</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39697-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39697-7.3/" type="self" id="ROS-20260407-73-0038" title="ROS-20260407-73-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39697" type="cve" id="CVE-2025-39697" title="CVE-2025-39697" />
			<reference href="https://bdu.fstec.ru/vul/2025-15724" type="self" id="BDU:2025-15724" title="BDU:2025-15724" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0039</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39701-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39701-7.3/" type="self" id="ROS-20260407-73-0039" title="ROS-20260407-73-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39701" type="cve" id="CVE-2025-39701" title="CVE-2025-39701" />
			<reference href="https://bdu.fstec.ru/vul/2025-15717" type="self" id="BDU:2025-15717" title="BDU:2025-15717" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0040</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39702-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39702-7.3/" type="self" id="ROS-20260407-73-0040" title="ROS-20260407-73-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39702" type="cve" id="CVE-2025-39702" title="CVE-2025-39702" />
			<reference href="https://bdu.fstec.ru/vul/2025-15716" type="self" id="BDU:2025-15716" title="BDU:2025-15716" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-73-0041</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость nginx </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nginx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nginx-cve-2026-1642-7.3/</description>
               <solution>Установить обновление для пакета(ов) nginx
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nginx-cve-2026-1642-7.3/" type="self" id="ROS-20260407-73-0041" title="ROS-20260407-73-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1642" type="cve" id="CVE-2026-1642" title="CVE-2026-1642" />
			<reference href="https://bdu.fstec.ru/vul/2026-03559" type="self" id="BDU:2026-03559" title="BDU:2026-03559" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nginx" epoch="1" version="1.28.2" release="1.el7" arch="x86_64" src="nginx-1.28.2-1.el7.src.rpm">
					<filename>nginx-1:1.28.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-core" epoch="1" version="1.28.2" release="1.el7" arch="x86_64" src="nginx-1.28.2-1.el7.src.rpm">
					<filename>nginx-core-1:1.28.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-devel" epoch="1" version="1.28.2" release="1.el7" arch="x86_64" src="nginx-1.28.2-1.el7.src.rpm">
					<filename>nginx-mod-devel-1:1.28.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-geoip" epoch="1" version="1.28.2" release="1.el7" arch="x86_64" src="nginx-1.28.2-1.el7.src.rpm">
					<filename>nginx-mod-http-geoip-1:1.28.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-image-filter" epoch="1" version="1.28.2" release="1.el7" arch="x86_64" src="nginx-1.28.2-1.el7.src.rpm">
					<filename>nginx-mod-http-image-filter-1:1.28.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-perl" epoch="1" version="1.28.2" release="1.el7" arch="x86_64" src="nginx-1.28.2-1.el7.src.rpm">
					<filename>nginx-mod-http-perl-1:1.28.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-push-stream" epoch="1" version="1.28.2" release="1.el7" arch="x86_64" src="nginx-1.28.2-1.el7.src.rpm">
					<filename>nginx-mod-http-push-stream-1:1.28.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-xslt-filter" epoch="1" version="1.28.2" release="1.el7" arch="x86_64" src="nginx-1.28.2-1.el7.src.rpm">
					<filename>nginx-mod-http-xslt-filter-1:1.28.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-mail" epoch="1" version="1.28.2" release="1.el7" arch="x86_64" src="nginx-1.28.2-1.el7.src.rpm">
					<filename>nginx-mod-mail-1:1.28.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-stream" epoch="1" version="1.28.2" release="1.el7" arch="x86_64" src="nginx-1.28.2-1.el7.src.rpm">
					<filename>nginx-mod-stream-1:1.28.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-all-modules" epoch="1" version="1.28.2" release="1.el7" arch="noarch" src="nginx-1.28.2-1.el7.src.rpm">
					<filename>nginx-all-modules-1:1.28.2-1.el7.noarch.rpm</filename>
				</package>
				<package name="nginx-filesystem" epoch="1" version="1.28.2" release="1.el7" arch="noarch" src="nginx-1.28.2-1.el7.src.rpm">
					<filename>nginx-filesystem-1:1.28.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-73-0001</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39718-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39718-7.3/" type="self" id="ROS-20260408-73-0001" title="ROS-20260408-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39718" type="cve" id="CVE-2025-39718" title="CVE-2025-39718" />
			<reference href="https://bdu.fstec.ru/vul/2025-15002" type="self" id="BDU:2025-15002" title="BDU:2025-15002" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-73-0002</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39719-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39719-7.3/" type="self" id="ROS-20260408-73-0002" title="ROS-20260408-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39719" type="cve" id="CVE-2025-39719" title="CVE-2025-39719" />
			<reference href="https://bdu.fstec.ru/vul/2025-15711" type="self" id="BDU:2025-15711" title="BDU:2025-15711" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-73-0003</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39721-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39721-7.3/" type="self" id="ROS-20260408-73-0003" title="ROS-20260408-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39721" type="cve" id="CVE-2025-39721" title="CVE-2025-39721" />
			<reference href="https://bdu.fstec.ru/vul/2026-02859" type="self" id="BDU:2026-02859" title="BDU:2026-02859" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.162" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.162-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.162" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.162-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.162-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-73-0004</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39724-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39724-7.3/" type="self" id="ROS-20260408-73-0004" title="ROS-20260408-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39724" type="cve" id="CVE-2025-39724" title="CVE-2025-39724" />
			<reference href="https://bdu.fstec.ru/vul/2025-15708" type="self" id="BDU:2025-15708" title="BDU:2025-15708" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-73-0005</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39730-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39730-7.3/" type="self" id="ROS-20260408-73-0005" title="ROS-20260408-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39730" type="cve" id="CVE-2025-39730" title="CVE-2025-39730" />
			<reference href="https://bdu.fstec.ru/vul/2025-15706" type="self" id="BDU:2025-15706" title="BDU:2025-15706" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-73-0006</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39731-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39731-7.3/" type="self" id="ROS-20260408-73-0006" title="ROS-20260408-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39731" type="cve" id="CVE-2025-39731" title="CVE-2025-39731" />
			<reference href="https://bdu.fstec.ru/vul/2025-15705" type="self" id="BDU:2025-15705" title="BDU:2025-15705" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-73-0007</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39734-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39734-7.3/" type="self" id="ROS-20260408-73-0007" title="ROS-20260408-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39734" type="cve" id="CVE-2025-39734" title="CVE-2025-39734" />
			<reference href="https://bdu.fstec.ru/vul/2025-15000" type="self" id="BDU:2025-15000" title="BDU:2025-15000" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.148" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.148-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.148" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.148-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.148-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-73-0008</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39736-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39736-7.3/" type="self" id="ROS-20260408-73-0008" title="ROS-20260408-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39736" type="cve" id="CVE-2025-39736" title="CVE-2025-39736" />
			<reference href="https://bdu.fstec.ru/vul/2025-14999" type="self" id="BDU:2025-14999" title="BDU:2025-14999" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-73-0009</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39737-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39737-7.3/" type="self" id="ROS-20260408-73-0009" title="ROS-20260408-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39737" type="cve" id="CVE-2025-39737" title="CVE-2025-39737" />
			<reference href="https://bdu.fstec.ru/vul/2025-15704" type="self" id="BDU:2025-15704" title="BDU:2025-15704" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-73-0010</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39742-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39742-7.3/" type="self" id="ROS-20260408-73-0010" title="ROS-20260408-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39742" type="cve" id="CVE-2025-39742" title="CVE-2025-39742" />
			<reference href="https://bdu.fstec.ru/vul/2025-14997" type="self" id="BDU:2025-14997" title="BDU:2025-14997" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-73-0011</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39743-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39743-7.3/" type="self" id="ROS-20260408-73-0011" title="ROS-20260408-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39743" type="cve" id="CVE-2025-39743" title="CVE-2025-39743" />
			<reference href="https://bdu.fstec.ru/vul/2025-15702" type="self" id="BDU:2025-15702" title="BDU:2025-15702" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-73-0012</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39749-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39749-7.3/" type="self" id="ROS-20260408-73-0012" title="ROS-20260408-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39749" type="cve" id="CVE-2025-39749" title="CVE-2025-39749" />
			<reference href="https://bdu.fstec.ru/vul/2025-15701" type="self" id="BDU:2025-15701" title="BDU:2025-15701" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-73-0013</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39751-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39751-7.3/" type="self" id="ROS-20260408-73-0013" title="ROS-20260408-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39751" type="cve" id="CVE-2025-39751" title="CVE-2025-39751" />
			<reference href="https://bdu.fstec.ru/vul/2025-16080" type="self" id="BDU:2025-16080" title="BDU:2025-16080" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-73-0014</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39752-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39752-7.3/" type="self" id="ROS-20260408-73-0014" title="ROS-20260408-73-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39752" type="cve" id="CVE-2025-39752" title="CVE-2025-39752" />
			<reference href="https://bdu.fstec.ru/vul/2025-16060" type="self" id="BDU:2025-16060" title="BDU:2025-16060" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-73-0015</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39756-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39756-7.3/" type="self" id="ROS-20260408-73-0015" title="ROS-20260408-73-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39756" type="cve" id="CVE-2025-39756" title="CVE-2025-39756" />
			<reference href="https://bdu.fstec.ru/vul/2025-15211" type="self" id="BDU:2025-15211" title="BDU:2025-15211" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-73-0016</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39757-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39757-7.3/" type="self" id="ROS-20260408-73-0016" title="ROS-20260408-73-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39757" type="cve" id="CVE-2025-39757" title="CVE-2025-39757" />
			<reference href="https://bdu.fstec.ru/vul/2025-15543" type="self" id="BDU:2025-15543" title="BDU:2025-15543" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-73-0017</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39759-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39759-7.3/" type="self" id="ROS-20260408-73-0017" title="ROS-20260408-73-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39759" type="cve" id="CVE-2025-39759" title="CVE-2025-39759" />
			<reference href="https://bdu.fstec.ru/vul/2025-15212" type="self" id="BDU:2025-15212" title="BDU:2025-15212" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-73-0018</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39760-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39760-7.3/" type="self" id="ROS-20260408-73-0018" title="ROS-20260408-73-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39760" type="cve" id="CVE-2025-39760" title="CVE-2025-39760" />
			<reference href="https://bdu.fstec.ru/vul/2025-15213" type="self" id="BDU:2025-15213" title="BDU:2025-15213" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-73-0019</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39766-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39766-7.3/" type="self" id="ROS-20260408-73-0019" title="ROS-20260408-73-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39766" type="cve" id="CVE-2025-39766" title="CVE-2025-39766" />
			<reference href="https://bdu.fstec.ru/vul/2025-15696" type="self" id="BDU:2025-15696" title="BDU:2025-15696" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-73-0020</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39770-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39770-7.3/" type="self" id="ROS-20260408-73-0020" title="ROS-20260408-73-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39770" type="cve" id="CVE-2025-39770" title="CVE-2025-39770" />
			<reference href="https://bdu.fstec.ru/vul/2025-15830" type="self" id="BDU:2025-15830" title="BDU:2025-15830" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-73-0021</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39772-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39772-7.3/" type="self" id="ROS-20260408-73-0021" title="ROS-20260408-73-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39772" type="cve" id="CVE-2025-39772" title="CVE-2025-39772" />
			<reference href="https://bdu.fstec.ru/vul/2025-15695" type="self" id="BDU:2025-15695" title="BDU:2025-15695" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-73-0022</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39773-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39773-7.3/" type="self" id="ROS-20260408-73-0022" title="ROS-20260408-73-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39773" type="cve" id="CVE-2025-39773" title="CVE-2025-39773" />
			<reference href="https://bdu.fstec.ru/vul/2025-15694" type="self" id="BDU:2025-15694" title="BDU:2025-15694" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-73-0023</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39776-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39776-7.3/" type="self" id="ROS-20260408-73-0023" title="ROS-20260408-73-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39776" type="cve" id="CVE-2025-39776" title="CVE-2025-39776" />
			<reference href="https://bdu.fstec.ru/vul/2025-15693" type="self" id="BDU:2025-15693" title="BDU:2025-15693" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-73-0024</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39782-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39782-7.3/" type="self" id="ROS-20260408-73-0024" title="ROS-20260408-73-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39782" type="cve" id="CVE-2025-39782" title="CVE-2025-39782" />
			<reference href="https://bdu.fstec.ru/vul/2025-15220" type="self" id="BDU:2025-15220" title="BDU:2025-15220" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-73-0025</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39783-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39783-7.3/" type="self" id="ROS-20260408-73-0025" title="ROS-20260408-73-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39783" type="cve" id="CVE-2025-39783" title="CVE-2025-39783" />
			<reference href="https://bdu.fstec.ru/vul/2025-15223" type="self" id="BDU:2025-15223" title="BDU:2025-15223" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-73-0026</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39787-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39787-7.3/" type="self" id="ROS-20260408-73-0026" title="ROS-20260408-73-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39787" type="cve" id="CVE-2025-39787" title="CVE-2025-39787" />
			<reference href="https://bdu.fstec.ru/vul/2025-15226" type="self" id="BDU:2025-15226" title="BDU:2025-15226" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-73-0027</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39788-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39788-7.3/" type="self" id="ROS-20260408-73-0027" title="ROS-20260408-73-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39788" type="cve" id="CVE-2025-39788" title="CVE-2025-39788" />
			<reference href="https://bdu.fstec.ru/vul/2025-15692" type="self" id="BDU:2025-15692" title="BDU:2025-15692" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-73-0028</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39790-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39790-7.3/" type="self" id="ROS-20260408-73-0028" title="ROS-20260408-73-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39790" type="cve" id="CVE-2025-39790" title="CVE-2025-39790" />
			<reference href="https://bdu.fstec.ru/vul/2025-15690" type="self" id="BDU:2025-15690" title="BDU:2025-15690" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-73-0029</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39794-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39794-7.3/" type="self" id="ROS-20260408-73-0029" title="ROS-20260408-73-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39794" type="cve" id="CVE-2025-39794" title="CVE-2025-39794" />
			<reference href="https://bdu.fstec.ru/vul/2025-16059" type="self" id="BDU:2025-16059" title="BDU:2025-16059" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-73-0030</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39795-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39795-7.3/" type="self" id="ROS-20260408-73-0030" title="ROS-20260408-73-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39795" type="cve" id="CVE-2025-39795" title="CVE-2025-39795" />
			<reference href="https://bdu.fstec.ru/vul/2025-15240" type="self" id="BDU:2025-15240" title="BDU:2025-15240" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-73-0031</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39798-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39798-7.3/" type="self" id="ROS-20260408-73-0031" title="ROS-20260408-73-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39798" type="cve" id="CVE-2025-39798" title="CVE-2025-39798" />
			<reference href="https://bdu.fstec.ru/vul/2025-15688" type="self" id="BDU:2025-15688" title="BDU:2025-15688" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-73-0032</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39800-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39800-7.3/" type="self" id="ROS-20260408-73-0032" title="ROS-20260408-73-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39800" type="cve" id="CVE-2025-39800" title="CVE-2025-39800" />
			<reference href="https://bdu.fstec.ru/vul/2025-15248" type="self" id="BDU:2025-15248" title="BDU:2025-15248" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-73-0033</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39801-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2025-39801-7.3/" type="self" id="ROS-20260408-73-0033" title="ROS-20260408-73-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39801" type="cve" id="CVE-2025-39801" title="CVE-2025-39801" />
			<reference href="https://bdu.fstec.ru/vul/2025-15687" type="self" id="BDU:2025-15687" title="BDU:2025-15687" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.158" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.158-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.158" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.158-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.158-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260410-73-0001</id>
		<issued date="2026-04-10" />
		<updated date="2026-04-10" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-0903-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-0903-7.3/" type="self" id="ROS-20260410-73-0001" title="ROS-20260410-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0903" type="cve" id="CVE-2026-0903" title="CVE-2026-0903" />
			<reference href="https://bdu.fstec.ru/vul/2026-00461" type="self" id="BDU:2026-00461" title="BDU:2026-00461" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="144.0.7559.109" release="1.el7" arch="x86_64" src="chromium-144.0.7559.109-1.el7.src.rpm">
					<filename>chromedriver-0:144.0.7559.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="144.0.7559.109" release="1.el7" arch="x86_64" src="chromium-144.0.7559.109-1.el7.src.rpm">
					<filename>chromium-0:144.0.7559.109-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="144.0.7559.109" release="1.el7" arch="x86_64" src="chromium-144.0.7559.109-1.el7.src.rpm">
					<filename>chromium-common-0:144.0.7559.109-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260410-73-0002</id>
		<issued date="2026-04-10" />
		<updated date="2026-04-10" />
		<title>Уязвимость nodejs </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nodejs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-cve-2025-55131-7.3/</description>
               <solution>Установить обновление для пакета(ов) nodejs
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-cve-2025-55131-7.3/" type="self" id="ROS-20260410-73-0002" title="ROS-20260410-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55131" type="cve" id="CVE-2025-55131" title="CVE-2025-55131" />
			<reference href="https://bdu.fstec.ru/vul/2026-00546" type="self" id="BDU:2026-00546" title="BDU:2026-00546" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs" epoch="1" version="22.22.0" release="1.el7" arch="x86_64" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>nodejs-1:22.22.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-devel" epoch="1" version="22.22.0" release="1.el7" arch="x86_64" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>nodejs-devel-1:22.22.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-full-i18n" epoch="1" version="22.22.0" release="1.el7" arch="x86_64" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>nodejs-full-i18n-1:22.22.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-libs" epoch="1" version="22.22.0" release="1.el7" arch="x86_64" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>nodejs-libs-1:22.22.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-npm" epoch="1" version="10.9.4" release="1.22.22.0.1.el7" arch="x86_64" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>nodejs-npm-1:10.9.4-1.22.22.0.1.el7.x86_64.rpm</filename>
				</package>
				<package name="v8-12.4-devel" epoch="3" version="12.4.254.21" release="1.22.22.0.1.el7" arch="x86_64" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>v8-12.4-devel-3:12.4.254.21-1.22.22.0.1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-docs" epoch="1" version="22.22.0" release="1.el7" arch="noarch" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>nodejs-docs-1:22.22.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260410-73-0003</id>
		<issued date="2026-04-10" />
		<updated date="2026-04-10" />
		<title>Уязвимость nodejs20 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nodejs20</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs20-cve-2025-55131-7.3/</description>
               <solution>Установить обновление для пакета(ов) nodejs20
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs20-cve-2025-55131-7.3/" type="self" id="ROS-20260410-73-0003" title="ROS-20260410-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55131" type="cve" id="CVE-2025-55131" title="CVE-2025-55131" />
			<reference href="https://bdu.fstec.ru/vul/2026-00546" type="self" id="BDU:2026-00546" title="BDU:2026-00546" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs20" epoch="1" version="20.20.0" release="1.el7" arch="x86_64" src="nodejs20-20.20.0-1.el7.src.rpm">
					<filename>nodejs20-1:20.20.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs20-devel" epoch="1" version="20.20.0" release="1.el7" arch="x86_64" src="nodejs20-20.20.0-1.el7.src.rpm">
					<filename>nodejs20-devel-1:20.20.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs20-full-i18n" epoch="1" version="20.20.0" release="1.el7" arch="x86_64" src="nodejs20-20.20.0-1.el7.src.rpm">
					<filename>nodejs20-full-i18n-1:20.20.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs20-libs" epoch="1" version="20.20.0" release="1.el7" arch="x86_64" src="nodejs20-20.20.0-1.el7.src.rpm">
					<filename>nodejs20-libs-1:20.20.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs20-npm" epoch="1" version="10.8.2" release="1.20.20.0.1.el7" arch="x86_64" src="nodejs20-20.20.0-1.el7.src.rpm">
					<filename>nodejs20-npm-1:10.8.2-1.20.20.0.1.el7.x86_64.rpm</filename>
				</package>
				<package name="v8-11.3-devel" epoch="3" version="11.3.244.8" release="1.20.20.0.1.el7" arch="x86_64" src="nodejs20-20.20.0-1.el7.src.rpm">
					<filename>v8-11.3-devel-3:11.3.244.8-1.20.20.0.1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs20-docs" epoch="1" version="20.20.0" release="1.el7" arch="noarch" src="nodejs20-20.20.0-1.el7.src.rpm">
					<filename>nodejs20-docs-1:20.20.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260410-73-0004</id>
		<issued date="2026-04-10" />
		<updated date="2026-04-10" />
		<title>Уязвимость nodejs </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nodejs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-cve-2025-55130-7.3/</description>
               <solution>Установить обновление для пакета(ов) nodejs
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-cve-2025-55130-7.3/" type="self" id="ROS-20260410-73-0004" title="ROS-20260410-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55130" type="cve" id="CVE-2025-55130" title="CVE-2025-55130" />
			<reference href="https://bdu.fstec.ru/vul/2026-00545" type="self" id="BDU:2026-00545" title="BDU:2026-00545" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs" epoch="1" version="22.22.0" release="1.el7" arch="x86_64" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>nodejs-1:22.22.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-devel" epoch="1" version="22.22.0" release="1.el7" arch="x86_64" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>nodejs-devel-1:22.22.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-full-i18n" epoch="1" version="22.22.0" release="1.el7" arch="x86_64" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>nodejs-full-i18n-1:22.22.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-libs" epoch="1" version="22.22.0" release="1.el7" arch="x86_64" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>nodejs-libs-1:22.22.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-npm" epoch="1" version="10.9.4" release="1.22.22.0.1.el7" arch="x86_64" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>nodejs-npm-1:10.9.4-1.22.22.0.1.el7.x86_64.rpm</filename>
				</package>
				<package name="v8-12.4-devel" epoch="3" version="12.4.254.21" release="1.22.22.0.1.el7" arch="x86_64" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>v8-12.4-devel-3:12.4.254.21-1.22.22.0.1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-docs" epoch="1" version="22.22.0" release="1.el7" arch="noarch" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>nodejs-docs-1:22.22.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260410-73-0005</id>
		<issued date="2026-04-10" />
		<updated date="2026-04-10" />
		<title>Уязвимость nodejs20 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nodejs20</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs20-cve-2025-55130-7.3/</description>
               <solution>Установить обновление для пакета(ов) nodejs20
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs20-cve-2025-55130-7.3/" type="self" id="ROS-20260410-73-0005" title="ROS-20260410-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55130" type="cve" id="CVE-2025-55130" title="CVE-2025-55130" />
			<reference href="https://bdu.fstec.ru/vul/2026-00545" type="self" id="BDU:2026-00545" title="BDU:2026-00545" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs20" epoch="1" version="20.20.0" release="1.el7" arch="x86_64" src="nodejs20-20.20.0-1.el7.src.rpm">
					<filename>nodejs20-1:20.20.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs20-devel" epoch="1" version="20.20.0" release="1.el7" arch="x86_64" src="nodejs20-20.20.0-1.el7.src.rpm">
					<filename>nodejs20-devel-1:20.20.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs20-full-i18n" epoch="1" version="20.20.0" release="1.el7" arch="x86_64" src="nodejs20-20.20.0-1.el7.src.rpm">
					<filename>nodejs20-full-i18n-1:20.20.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs20-libs" epoch="1" version="20.20.0" release="1.el7" arch="x86_64" src="nodejs20-20.20.0-1.el7.src.rpm">
					<filename>nodejs20-libs-1:20.20.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs20-npm" epoch="1" version="10.8.2" release="1.20.20.0.1.el7" arch="x86_64" src="nodejs20-20.20.0-1.el7.src.rpm">
					<filename>nodejs20-npm-1:10.8.2-1.20.20.0.1.el7.x86_64.rpm</filename>
				</package>
				<package name="v8-11.3-devel" epoch="3" version="11.3.244.8" release="1.20.20.0.1.el7" arch="x86_64" src="nodejs20-20.20.0-1.el7.src.rpm">
					<filename>v8-11.3-devel-3:11.3.244.8-1.20.20.0.1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs20-docs" epoch="1" version="20.20.0" release="1.el7" arch="noarch" src="nodejs20-20.20.0-1.el7.src.rpm">
					<filename>nodejs20-docs-1:20.20.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260410-73-0006</id>
		<issued date="2026-04-10" />
		<updated date="2026-04-10" />
		<title>Уязвимость xrdp </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в xrdp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-xrdp-cve-2025-68670-7.3/</description>
               <solution>Установить обновление для пакета(ов) xrdp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-xrdp-cve-2025-68670-7.3/" type="self" id="ROS-20260410-73-0006" title="ROS-20260410-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68670" type="cve" id="CVE-2025-68670" title="CVE-2025-68670" />
			<reference href="https://bdu.fstec.ru/vul/2026-00962" type="self" id="BDU:2026-00962" title="BDU:2026-00962" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="xrdp" epoch="1" version="0.10.4.1" release="3.el7" arch="x86_64" src="xrdp-0.10.4.1-3.el7.src.rpm">
					<filename>xrdp-1:0.10.4.1-3.el7.x86_64.rpm</filename>
				</package>
				<package name="xrdp-devel" epoch="1" version="0.10.4.1" release="3.el7" arch="x86_64" src="xrdp-0.10.4.1-3.el7.src.rpm">
					<filename>xrdp-devel-1:0.10.4.1-3.el7.x86_64.rpm</filename>
				</package>
				<package name="xrdp-selinux" epoch="1" version="0.10.4.1" release="3.el7" arch="noarch" src="xrdp-0.10.4.1-3.el7.src.rpm">
					<filename>xrdp-selinux-1:0.10.4.1-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260410-73-0007</id>
		<issued date="2026-04-10" />
		<updated date="2026-04-10" />
		<title>Уязвимость libssh </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libssh</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libssh-cve-2026-3731-7.3/</description>
               <solution>Установить обновление для пакета(ов) libssh
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libssh-cve-2026-3731-7.3/" type="self" id="ROS-20260410-73-0007" title="ROS-20260410-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3731" type="cve" id="CVE-2026-3731" title="CVE-2026-3731" />
			<reference href="https://bdu.fstec.ru/vul/2026-06714" type="self" id="BDU:2026-06714" title="BDU:2026-06714" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libssh" epoch="0" version="0.11.4" release="1.el7" arch="x86_64" src="libssh-0.11.4-1.el7.src.rpm">
					<filename>libssh-0:0.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libssh-devel" epoch="0" version="0.11.4" release="1.el7" arch="x86_64" src="libssh-0.11.4-1.el7.src.rpm">
					<filename>libssh-devel-0:0.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libssh-config" epoch="0" version="0.11.4" release="1.el7" arch="noarch" src="libssh-0.11.4-1.el7.src.rpm">
					<filename>libssh-config-0:0.11.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260410-73-0008</id>
		<issued date="2026-04-10" />
		<updated date="2026-04-10" />
		<title>Уязвимость libssh </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в libssh</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libssh-cve-2026-0964-7.3/</description>
               <solution>Установить обновление для пакета(ов) libssh
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libssh-cve-2026-0964-7.3/" type="self" id="ROS-20260410-73-0008" title="ROS-20260410-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0964" type="cve" id="CVE-2026-0964" title="CVE-2026-0964" />
			<reference href="https://bdu.fstec.ru/vul/2026-05141" type="self" id="BDU:2026-05141" title="BDU:2026-05141" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libssh" epoch="0" version="0.11.4" release="1.el7" arch="x86_64" src="libssh-0.11.4-1.el7.src.rpm">
					<filename>libssh-0:0.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libssh-devel" epoch="0" version="0.11.4" release="1.el7" arch="x86_64" src="libssh-0.11.4-1.el7.src.rpm">
					<filename>libssh-devel-0:0.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libssh-config" epoch="0" version="0.11.4" release="1.el7" arch="noarch" src="libssh-0.11.4-1.el7.src.rpm">
					<filename>libssh-config-0:0.11.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260410-73-0009</id>
		<issued date="2026-04-10" />
		<updated date="2026-04-10" />
		<title>Уязвимость libssh </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в libssh</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libssh-cve-2026-0965-7.3/</description>
               <solution>Установить обновление для пакета(ов) libssh
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libssh-cve-2026-0965-7.3/" type="self" id="ROS-20260410-73-0009" title="ROS-20260410-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0965" type="cve" id="CVE-2026-0965" title="CVE-2026-0965" />
			<reference href="https://bdu.fstec.ru/vul/2026-05147" type="self" id="BDU:2026-05147" title="BDU:2026-05147" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libssh" epoch="0" version="0.11.4" release="1.el7" arch="x86_64" src="libssh-0.11.4-1.el7.src.rpm">
					<filename>libssh-0:0.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libssh-devel" epoch="0" version="0.11.4" release="1.el7" arch="x86_64" src="libssh-0.11.4-1.el7.src.rpm">
					<filename>libssh-devel-0:0.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libssh-config" epoch="0" version="0.11.4" release="1.el7" arch="noarch" src="libssh-0.11.4-1.el7.src.rpm">
					<filename>libssh-config-0:0.11.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260410-73-0010</id>
		<issued date="2026-04-10" />
		<updated date="2026-04-10" />
		<title>Уязвимость libssh </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в libssh</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libssh-cve-2026-0966-7.3/</description>
               <solution>Установить обновление для пакета(ов) libssh
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libssh-cve-2026-0966-7.3/" type="self" id="ROS-20260410-73-0010" title="ROS-20260410-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0966" type="cve" id="CVE-2026-0966" title="CVE-2026-0966" />
			<reference href="https://bdu.fstec.ru/vul/2026-05142" type="self" id="BDU:2026-05142" title="BDU:2026-05142" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libssh" epoch="0" version="0.11.4" release="1.el7" arch="x86_64" src="libssh-0.11.4-1.el7.src.rpm">
					<filename>libssh-0:0.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libssh-devel" epoch="0" version="0.11.4" release="1.el7" arch="x86_64" src="libssh-0.11.4-1.el7.src.rpm">
					<filename>libssh-devel-0:0.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libssh-config" epoch="0" version="0.11.4" release="1.el7" arch="noarch" src="libssh-0.11.4-1.el7.src.rpm">
					<filename>libssh-config-0:0.11.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260410-73-0011</id>
		<issued date="2026-04-10" />
		<updated date="2026-04-10" />
		<title>Уязвимость libssh </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libssh</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libssh-cve-2026-0967-7.3/</description>
               <solution>Установить обновление для пакета(ов) libssh
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libssh-cve-2026-0967-7.3/" type="self" id="ROS-20260410-73-0011" title="ROS-20260410-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0967" type="cve" id="CVE-2026-0967" title="CVE-2026-0967" />
			<reference href="https://bdu.fstec.ru/vul/2026-05144" type="self" id="BDU:2026-05144" title="BDU:2026-05144" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libssh" epoch="0" version="0.11.4" release="1.el7" arch="x86_64" src="libssh-0.11.4-1.el7.src.rpm">
					<filename>libssh-0:0.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libssh-devel" epoch="0" version="0.11.4" release="1.el7" arch="x86_64" src="libssh-0.11.4-1.el7.src.rpm">
					<filename>libssh-devel-0:0.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libssh-config" epoch="0" version="0.11.4" release="1.el7" arch="noarch" src="libssh-0.11.4-1.el7.src.rpm">
					<filename>libssh-config-0:0.11.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260410-73-0012</id>
		<issued date="2026-04-10" />
		<updated date="2026-04-10" />
		<title>Уязвимость libssh </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в libssh</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libssh-cve-2026-0968-7.3/</description>
               <solution>Установить обновление для пакета(ов) libssh
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libssh-cve-2026-0968-7.3/" type="self" id="ROS-20260410-73-0012" title="ROS-20260410-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0968" type="cve" id="CVE-2026-0968" title="CVE-2026-0968" />
			<reference href="https://bdu.fstec.ru/vul/2026-05143" type="self" id="BDU:2026-05143" title="BDU:2026-05143" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libssh" epoch="0" version="0.11.4" release="1.el7" arch="x86_64" src="libssh-0.11.4-1.el7.src.rpm">
					<filename>libssh-0:0.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libssh-devel" epoch="0" version="0.11.4" release="1.el7" arch="x86_64" src="libssh-0.11.4-1.el7.src.rpm">
					<filename>libssh-devel-0:0.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libssh-config" epoch="0" version="0.11.4" release="1.el7" arch="noarch" src="libssh-0.11.4-1.el7.src.rpm">
					<filename>libssh-config-0:0.11.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260410-73-0013</id>
		<issued date="2026-04-10" />
		<updated date="2026-04-10" />
		<title>Уязвимость curl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2025-14017-7.3/</description>
               <solution>Установить обновление для пакета(ов) curl
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2025-14017-7.3/" type="self" id="ROS-20260410-73-0013" title="ROS-20260410-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14017" type="cve" id="CVE-2025-14017" title="CVE-2025-14017" />
			<reference href="https://bdu.fstec.ru/vul/2026-05122" type="self" id="BDU:2026-05122" title="BDU:2026-05122" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="curl" epoch="0" version="7.86.0" release="10.el7" arch="x86_64" src="curl-7.86.0-10.el7.src.rpm">
					<filename>curl-0:7.86.0-10.el7.x86_64.rpm</filename>
				</package>
				<package name="libcurl" epoch="0" version="7.86.0" release="10.el7" arch="x86_64" src="curl-7.86.0-10.el7.src.rpm">
					<filename>libcurl-0:7.86.0-10.el7.x86_64.rpm</filename>
				</package>
				<package name="libcurl-devel" epoch="0" version="7.86.0" release="10.el7" arch="x86_64" src="curl-7.86.0-10.el7.src.rpm">
					<filename>libcurl-devel-0:7.86.0-10.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260410-73-0014</id>
		<issued date="2026-04-10" />
		<updated date="2026-04-10" />
		<title>Уязвимость curl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2026-3783-7.3/</description>
               <solution>Установить обновление для пакета(ов) curl
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2026-3783-7.3/" type="self" id="ROS-20260410-73-0014" title="ROS-20260410-73-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3783" type="cve" id="CVE-2026-3783" title="CVE-2026-3783" />
			<reference href="https://bdu.fstec.ru/vul/2026-04361" type="self" id="BDU:2026-04361" title="BDU:2026-04361" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="curl" epoch="0" version="7.86.0" release="10.el7" arch="x86_64" src="curl-7.86.0-10.el7.src.rpm">
					<filename>curl-0:7.86.0-10.el7.x86_64.rpm</filename>
				</package>
				<package name="libcurl" epoch="0" version="7.86.0" release="10.el7" arch="x86_64" src="curl-7.86.0-10.el7.src.rpm">
					<filename>libcurl-0:7.86.0-10.el7.x86_64.rpm</filename>
				</package>
				<package name="libcurl-devel" epoch="0" version="7.86.0" release="10.el7" arch="x86_64" src="curl-7.86.0-10.el7.src.rpm">
					<filename>libcurl-devel-0:7.86.0-10.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260410-73-0015</id>
		<issued date="2026-04-10" />
		<updated date="2026-04-10" />
		<title>Уязвимость curl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2026-3784-7.3/</description>
               <solution>Установить обновление для пакета(ов) curl
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2026-3784-7.3/" type="self" id="ROS-20260410-73-0015" title="ROS-20260410-73-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3784" type="cve" id="CVE-2026-3784" title="CVE-2026-3784" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="curl" epoch="0" version="7.86.0" release="10.el7" arch="x86_64" src="curl-7.86.0-10.el7.src.rpm">
					<filename>curl-0:7.86.0-10.el7.x86_64.rpm</filename>
				</package>
				<package name="libcurl" epoch="0" version="7.86.0" release="10.el7" arch="x86_64" src="curl-7.86.0-10.el7.src.rpm">
					<filename>libcurl-0:7.86.0-10.el7.x86_64.rpm</filename>
				</package>
				<package name="libcurl-devel" epoch="0" version="7.86.0" release="10.el7" arch="x86_64" src="curl-7.86.0-10.el7.src.rpm">
					<filename>libcurl-devel-0:7.86.0-10.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260410-73-0016</id>
		<issued date="2026-04-10" />
		<updated date="2026-04-10" />
		<title>Уязвимость curl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2026-1965-7.3/</description>
               <solution>Установить обновление для пакета(ов) curl
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-curl-cve-2026-1965-7.3/" type="self" id="ROS-20260410-73-0016" title="ROS-20260410-73-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1965" type="cve" id="CVE-2026-1965" title="CVE-2026-1965" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="curl" epoch="0" version="7.86.0" release="10.el7" arch="x86_64" src="curl-7.86.0-10.el7.src.rpm">
					<filename>curl-0:7.86.0-10.el7.x86_64.rpm</filename>
				</package>
				<package name="libcurl" epoch="0" version="7.86.0" release="10.el7" arch="x86_64" src="curl-7.86.0-10.el7.src.rpm">
					<filename>libcurl-0:7.86.0-10.el7.x86_64.rpm</filename>
				</package>
				<package name="libcurl-devel" epoch="0" version="7.86.0" release="10.el7" arch="x86_64" src="curl-7.86.0-10.el7.src.rpm">
					<filename>libcurl-devel-0:7.86.0-10.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260410-73-0017</id>
		<issued date="2026-04-10" />
		<updated date="2026-04-10" />
		<title>Уязвимость expat </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в expat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-expat-cve-2026-32776-7.3/</description>
               <solution>Установить обновление для пакета(ов) expat
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-expat-cve-2026-32776-7.3/" type="self" id="ROS-20260410-73-0017" title="ROS-20260410-73-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32776" type="cve" id="CVE-2026-32776" title="CVE-2026-32776" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="expat" epoch="0" version="2.7.5" release="1.el7" arch="x86_64" src="expat-2.7.5-1.el7.src.rpm">
					<filename>expat-0:2.7.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="expat-devel" epoch="0" version="2.7.5" release="1.el7" arch="x86_64" src="expat-2.7.5-1.el7.src.rpm">
					<filename>expat-devel-0:2.7.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="expat-static" epoch="0" version="2.7.5" release="1.el7" arch="x86_64" src="expat-2.7.5-1.el7.src.rpm">
					<filename>expat-static-0:2.7.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260410-73-0018</id>
		<issued date="2026-04-10" />
		<updated date="2026-04-10" />
		<title>Уязвимость expat </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в expat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-expat-cve-2026-32777-7.3/</description>
               <solution>Установить обновление для пакета(ов) expat
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-expat-cve-2026-32777-7.3/" type="self" id="ROS-20260410-73-0018" title="ROS-20260410-73-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32777" type="cve" id="CVE-2026-32777" title="CVE-2026-32777" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="expat" epoch="0" version="2.7.5" release="1.el7" arch="x86_64" src="expat-2.7.5-1.el7.src.rpm">
					<filename>expat-0:2.7.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="expat-devel" epoch="0" version="2.7.5" release="1.el7" arch="x86_64" src="expat-2.7.5-1.el7.src.rpm">
					<filename>expat-devel-0:2.7.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="expat-static" epoch="0" version="2.7.5" release="1.el7" arch="x86_64" src="expat-2.7.5-1.el7.src.rpm">
					<filename>expat-static-0:2.7.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260410-73-0019</id>
		<issued date="2026-04-10" />
		<updated date="2026-04-10" />
		<title>Уязвимость expat </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в expat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-expat-cve-2026-32778-7.3/</description>
               <solution>Установить обновление для пакета(ов) expat
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-expat-cve-2026-32778-7.3/" type="self" id="ROS-20260410-73-0019" title="ROS-20260410-73-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32778" type="cve" id="CVE-2026-32778" title="CVE-2026-32778" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="expat" epoch="0" version="2.7.5" release="1.el7" arch="x86_64" src="expat-2.7.5-1.el7.src.rpm">
					<filename>expat-0:2.7.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="expat-devel" epoch="0" version="2.7.5" release="1.el7" arch="x86_64" src="expat-2.7.5-1.el7.src.rpm">
					<filename>expat-devel-0:2.7.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="expat-static" epoch="0" version="2.7.5" release="1.el7" arch="x86_64" src="expat-2.7.5-1.el7.src.rpm">
					<filename>expat-static-0:2.7.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0001</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53152-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53152-7.3/" type="self" id="ROS-20260414-73-0001" title="ROS-20260414-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53152" type="cve" id="CVE-2023-53152" title="CVE-2023-53152" />
			<reference href="https://bdu.fstec.ru/vul/2026-05867" type="self" id="BDU:2026-05867" title="BDU:2026-05867" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>perf-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.52" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.52-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0002</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53165-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53165-7.3/" type="self" id="ROS-20260414-73-0002" title="ROS-20260414-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53165" type="cve" id="CVE-2023-53165" title="CVE-2023-53165" />
			<reference href="https://bdu.fstec.ru/vul/2026-05988" type="self" id="BDU:2026-05988" title="BDU:2026-05988" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.44" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.44-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0003</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53166-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53166-7.3/" type="self" id="ROS-20260414-73-0003" title="ROS-20260414-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53166" type="cve" id="CVE-2023-53166" title="CVE-2023-53166" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0004</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53167-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53167-7.3/" type="self" id="ROS-20260414-73-0004" title="ROS-20260414-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53167" type="cve" id="CVE-2023-53167" title="CVE-2023-53167" />
			<reference href="https://bdu.fstec.ru/vul/2026-05739" type="self" id="BDU:2026-05739" title="BDU:2026-05739" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.44" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.44-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0005</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53168-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53168-7.3/" type="self" id="ROS-20260414-73-0005" title="ROS-20260414-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53168" type="cve" id="CVE-2023-53168" title="CVE-2023-53168" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0006</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53169-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53169-7.3/" type="self" id="ROS-20260414-73-0006" title="ROS-20260414-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53169" type="cve" id="CVE-2023-53169" title="CVE-2023-53169" />
			<reference href="https://bdu.fstec.ru/vul/2026-05935" type="self" id="BDU:2026-05935" title="BDU:2026-05935" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0007</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53174-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53174-7.3/" type="self" id="ROS-20260414-73-0007" title="ROS-20260414-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53174" type="cve" id="CVE-2023-53174" title="CVE-2023-53174" />
			<reference href="https://bdu.fstec.ru/vul/2026-05991" type="self" id="BDU:2026-05991" title="BDU:2026-05991" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>perf-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.52" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.52-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0008</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53175-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53175-7.3/" type="self" id="ROS-20260414-73-0008" title="ROS-20260414-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53175" type="cve" id="CVE-2023-53175" title="CVE-2023-53175" />
			<reference href="https://bdu.fstec.ru/vul/2026-05992" type="self" id="BDU:2026-05992" title="BDU:2026-05992" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.94" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.94-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0009</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53176-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53176-7.3/" type="self" id="ROS-20260414-73-0009" title="ROS-20260414-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53176" type="cve" id="CVE-2023-53176" title="CVE-2023-53176" />
			<reference href="https://bdu.fstec.ru/vul/2026-05740" type="self" id="BDU:2026-05740" title="BDU:2026-05740" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0010</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53177-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53177-7.3/" type="self" id="ROS-20260414-73-0010" title="ROS-20260414-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53177" type="cve" id="CVE-2023-53177" title="CVE-2023-53177" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.44" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.44-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0011</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53178-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53178-7.3/" type="self" id="ROS-20260414-73-0011" title="ROS-20260414-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53178" type="cve" id="CVE-2023-53178" title="CVE-2023-53178" />
			<reference href="https://bdu.fstec.ru/vul/2026-06094" type="self" id="BDU:2026-06094" title="BDU:2026-06094" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0012</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53179-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53179-7.3/" type="self" id="ROS-20260414-73-0012" title="ROS-20260414-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53179" type="cve" id="CVE-2023-53179" title="CVE-2023-53179" />
			<reference href="https://bdu.fstec.ru/vul/2026-02442" type="self" id="BDU:2026-02442" title="BDU:2026-02442" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.94" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.94-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0013</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53181-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53181-7.3/" type="self" id="ROS-20260414-73-0013" title="ROS-20260414-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53181" type="cve" id="CVE-2023-53181" title="CVE-2023-53181" />
			<reference href="https://bdu.fstec.ru/vul/2026-02040" type="self" id="BDU:2026-02040" title="BDU:2026-02040" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.44" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.44-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0014</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53182-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53182-7.3/" type="self" id="ROS-20260414-73-0014" title="ROS-20260414-73-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53182" type="cve" id="CVE-2023-53182" title="CVE-2023-53182" />
			<reference href="https://bdu.fstec.ru/vul/2026-04622" type="self" id="BDU:2026-04622" title="BDU:2026-04622" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0015</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53183-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53183-7.3/" type="self" id="ROS-20260414-73-0015" title="ROS-20260414-73-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53183" type="cve" id="CVE-2023-53183" title="CVE-2023-53183" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>perf-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.52" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.52-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0016</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53185-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53185-7.3/" type="self" id="ROS-20260414-73-0016" title="ROS-20260414-73-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53185" type="cve" id="CVE-2023-53185" title="CVE-2023-53185" />
			<reference href="https://bdu.fstec.ru/vul/2026-05868" type="self" id="BDU:2026-05868" title="BDU:2026-05868" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.44" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.44-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0017</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53186-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53186-7.3/" type="self" id="ROS-20260414-73-0017" title="ROS-20260414-73-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53186" type="cve" id="CVE-2023-53186" title="CVE-2023-53186" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0018</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53188-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53188-7.3/" type="self" id="ROS-20260414-73-0018" title="ROS-20260414-73-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53188" type="cve" id="CVE-2023-53188" title="CVE-2023-53188" />
			<reference href="https://bdu.fstec.ru/vul/2026-05936" type="self" id="BDU:2026-05936" title="BDU:2026-05936" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0019</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53189-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53189-7.3/" type="self" id="ROS-20260414-73-0019" title="ROS-20260414-73-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53189" type="cve" id="CVE-2023-53189" title="CVE-2023-53189" />
			<reference href="https://bdu.fstec.ru/vul/2026-05995" type="self" id="BDU:2026-05995" title="BDU:2026-05995" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.44" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.44-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0020</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53192-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53192-7.3/" type="self" id="ROS-20260414-73-0020" title="ROS-20260414-73-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53192" type="cve" id="CVE-2023-53192" title="CVE-2023-53192" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>perf-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.52" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.52-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0021</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53194-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53194-7.3/" type="self" id="ROS-20260414-73-0021" title="ROS-20260414-73-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53194" type="cve" id="CVE-2023-53194" title="CVE-2023-53194" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.94" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.94-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0022</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53195-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53195-7.3/" type="self" id="ROS-20260414-73-0022" title="ROS-20260414-73-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53195" type="cve" id="CVE-2023-53195" title="CVE-2023-53195" />
			<reference href="https://bdu.fstec.ru/vul/2026-05997" type="self" id="BDU:2026-05997" title="BDU:2026-05997" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.44" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.44-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0023</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53196-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53196-7.3/" type="self" id="ROS-20260414-73-0023" title="ROS-20260414-73-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53196" type="cve" id="CVE-2023-53196" title="CVE-2023-53196" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.44" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.44-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0024</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53198-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53198-7.3/" type="self" id="ROS-20260414-73-0024" title="ROS-20260414-73-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53198" type="cve" id="CVE-2023-53198" title="CVE-2023-53198" />
			<reference href="https://bdu.fstec.ru/vul/2026-05938" type="self" id="BDU:2026-05938" title="BDU:2026-05938" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0025</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53201-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53201-7.3/" type="self" id="ROS-20260414-73-0025" title="ROS-20260414-73-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53201" type="cve" id="CVE-2023-53201" title="CVE-2023-53201" />
			<reference href="https://bdu.fstec.ru/vul/2026-05870" type="self" id="BDU:2026-05870" title="BDU:2026-05870" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.44" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.44-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0026</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53204-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53204-7.3/" type="self" id="ROS-20260414-73-0026" title="ROS-20260414-73-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53204" type="cve" id="CVE-2023-53204" title="CVE-2023-53204" />
			<reference href="https://bdu.fstec.ru/vul/2026-05871" type="self" id="BDU:2026-05871" title="BDU:2026-05871" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.94" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.94-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0027</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53205-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53205-7.3/" type="self" id="ROS-20260414-73-0027" title="ROS-20260414-73-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53205" type="cve" id="CVE-2023-53205" title="CVE-2023-53205" />
			<reference href="https://bdu.fstec.ru/vul/2026-05872" type="self" id="BDU:2026-05872" title="BDU:2026-05872" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.44" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.44-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0028</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53207-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53207-7.3/" type="self" id="ROS-20260414-73-0028" title="ROS-20260414-73-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53207" type="cve" id="CVE-2023-53207" title="CVE-2023-53207" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.44" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.44-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0029</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53208-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53208-7.3/" type="self" id="ROS-20260414-73-0029" title="ROS-20260414-73-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53208" type="cve" id="CVE-2023-53208" title="CVE-2023-53208" />
			<reference href="https://bdu.fstec.ru/vul/2026-02047" type="self" id="BDU:2026-02047" title="BDU:2026-02047" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.94" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.94-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0030</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53209-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53209-7.3/" type="self" id="ROS-20260414-73-0030" title="ROS-20260414-73-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53209" type="cve" id="CVE-2023-53209" title="CVE-2023-53209" />
			<reference href="https://bdu.fstec.ru/vul/2026-04621" type="self" id="BDU:2026-04621" title="BDU:2026-04621" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.44" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.44-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0031</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53210-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53210-7.3/" type="self" id="ROS-20260414-73-0031" title="ROS-20260414-73-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53210" type="cve" id="CVE-2023-53210" title="CVE-2023-53210" />
			<reference href="https://bdu.fstec.ru/vul/2026-02053" type="self" id="BDU:2026-02053" title="BDU:2026-02053" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.94" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.94-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0032</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53213-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53213-7.3/" type="self" id="ROS-20260414-73-0032" title="ROS-20260414-73-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53213" type="cve" id="CVE-2023-53213" title="CVE-2023-53213" />
			<reference href="https://bdu.fstec.ru/vul/2026-02261" type="self" id="BDU:2026-02261" title="BDU:2026-02261" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0033</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53215-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53215-7.3/" type="self" id="ROS-20260414-73-0033" title="ROS-20260414-73-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53215" type="cve" id="CVE-2023-53215" title="CVE-2023-53215" />
			<reference href="https://bdu.fstec.ru/vul/2026-02188" type="self" id="BDU:2026-02188" title="BDU:2026-02188" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.44" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.44-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0034</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53217-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53217-7.3/" type="self" id="ROS-20260414-73-0034" title="ROS-20260414-73-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53217" type="cve" id="CVE-2023-53217" title="CVE-2023-53217" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0035</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53219-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53219-7.3/" type="self" id="ROS-20260414-73-0035" title="ROS-20260414-73-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53219" type="cve" id="CVE-2023-53219" title="CVE-2023-53219" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0036</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53220-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53220-7.3/" type="self" id="ROS-20260414-73-0036" title="ROS-20260414-73-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53220" type="cve" id="CVE-2023-53220" title="CVE-2023-53220" />
			<reference href="https://bdu.fstec.ru/vul/2026-04620" type="self" id="BDU:2026-04620" title="BDU:2026-04620" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.94" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.94-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0037</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53221-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53221-7.3/" type="self" id="ROS-20260414-73-0037" title="ROS-20260414-73-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53221" type="cve" id="CVE-2023-53221" title="CVE-2023-53221" />
			<reference href="https://bdu.fstec.ru/vul/2026-05875" type="self" id="BDU:2026-05875" title="BDU:2026-05875" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.44" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.44-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0038</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53222-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53222-7.3/" type="self" id="ROS-20260414-73-0038" title="ROS-20260414-73-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53222" type="cve" id="CVE-2023-53222" title="CVE-2023-53222" />
			<reference href="https://bdu.fstec.ru/vul/2026-02264" type="self" id="BDU:2026-02264" title="BDU:2026-02264" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.44" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.44-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0039</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53225-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53225-7.3/" type="self" id="ROS-20260414-73-0039" title="ROS-20260414-73-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53225" type="cve" id="CVE-2023-53225" title="CVE-2023-53225" />
			<reference href="https://bdu.fstec.ru/vul/2026-05876" type="self" id="BDU:2026-05876" title="BDU:2026-05876" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0040</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53226-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53226-7.3/" type="self" id="ROS-20260414-73-0040" title="ROS-20260414-73-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53226" type="cve" id="CVE-2023-53226" title="CVE-2023-53226" />
			<reference href="https://bdu.fstec.ru/vul/2026-05877" type="self" id="BDU:2026-05877" title="BDU:2026-05877" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.94" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.94-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0041</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53229-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53229-7.3/" type="self" id="ROS-20260414-73-0041" title="ROS-20260414-73-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53229" type="cve" id="CVE-2023-53229" title="CVE-2023-53229" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0042</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53230-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53230-7.3/" type="self" id="ROS-20260414-73-0042" title="ROS-20260414-73-0042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53230" type="cve" id="CVE-2023-53230" title="CVE-2023-53230" />
			<reference href="https://bdu.fstec.ru/vul/2026-04617" type="self" id="BDU:2026-04617" title="BDU:2026-04617" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>perf-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.52" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.52-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0043</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53232-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53232-7.3/" type="self" id="ROS-20260414-73-0043" title="ROS-20260414-73-0043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53232" type="cve" id="CVE-2023-53232" title="CVE-2023-53232" />
			<reference href="https://bdu.fstec.ru/vul/2026-03587" type="self" id="BDU:2026-03587" title="BDU:2026-03587" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0044</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53233-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53233-7.3/" type="self" id="ROS-20260414-73-0044" title="ROS-20260414-73-0044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53233" type="cve" id="CVE-2023-53233" title="CVE-2023-53233" />
			<reference href="https://bdu.fstec.ru/vul/2026-03805" type="self" id="BDU:2026-03805" title="BDU:2026-03805" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0045</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53238-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53238-7.3/" type="self" id="ROS-20260414-73-0045" title="ROS-20260414-73-0045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53238" type="cve" id="CVE-2023-53238" title="CVE-2023-53238" />
			<reference href="https://bdu.fstec.ru/vul/2026-03804" type="self" id="BDU:2026-03804" title="BDU:2026-03804" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.44" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.44-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0046</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53241-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53241-7.3/" type="self" id="ROS-20260414-73-0046" title="ROS-20260414-73-0046" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53241" type="cve" id="CVE-2023-53241" title="CVE-2023-53241" />
			<reference href="https://bdu.fstec.ru/vul/2026-05879" type="self" id="BDU:2026-05879" title="BDU:2026-05879" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0047</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53243-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53243-7.3/" type="self" id="ROS-20260414-73-0047" title="ROS-20260414-73-0047" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53243" type="cve" id="CVE-2023-53243" title="CVE-2023-53243" />
			<reference href="https://bdu.fstec.ru/vul/2026-03954" type="self" id="BDU:2026-03954" title="BDU:2026-03954" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.44" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.44-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0048</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53244-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53244-7.3/" type="self" id="ROS-20260414-73-0048" title="ROS-20260414-73-0048" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53244" type="cve" id="CVE-2023-53244" title="CVE-2023-53244" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0049</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53245-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53245-7.3/" type="self" id="ROS-20260414-73-0049" title="ROS-20260414-73-0049" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53245" type="cve" id="CVE-2023-53245" title="CVE-2023-53245" />
			<reference href="https://bdu.fstec.ru/vul/2026-03955" type="self" id="BDU:2026-03955" title="BDU:2026-03955" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>perf-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.52" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.52-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0050</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53246-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53246-7.3/" type="self" id="ROS-20260414-73-0050" title="ROS-20260414-73-0050" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53246" type="cve" id="CVE-2023-53246" title="CVE-2023-53246" />
			<reference href="https://bdu.fstec.ru/vul/2026-05880" type="self" id="BDU:2026-05880" title="BDU:2026-05880" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0051</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53247-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53247-7.3/" type="self" id="ROS-20260414-73-0051" title="ROS-20260414-73-0051" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53247" type="cve" id="CVE-2023-53247" title="CVE-2023-53247" />
			<reference href="https://bdu.fstec.ru/vul/2026-04616" type="self" id="BDU:2026-04616" title="BDU:2026-04616" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.44" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.44-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0052</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53248-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53248-7.3/" type="self" id="ROS-20260414-73-0052" title="ROS-20260414-73-0052" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53248" type="cve" id="CVE-2023-53248" title="CVE-2023-53248" />
			<reference href="https://bdu.fstec.ru/vul/2026-05881" type="self" id="BDU:2026-05881" title="BDU:2026-05881" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>perf-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.52" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.52-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.52" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.52-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.52-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0053</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53249-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53249-7.3/" type="self" id="ROS-20260414-73-0053" title="ROS-20260414-73-0053" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53249" type="cve" id="CVE-2023-53249" title="CVE-2023-53249" />
			<reference href="https://bdu.fstec.ru/vul/2026-03889" type="self" id="BDU:2026-03889" title="BDU:2026-03889" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.44" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.44-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0054</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53251-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53251-7.3/" type="self" id="ROS-20260414-73-0054" title="ROS-20260414-73-0054" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53251" type="cve" id="CVE-2023-53251" title="CVE-2023-53251" />
			<reference href="https://bdu.fstec.ru/vul/2026-02278" type="self" id="BDU:2026-02278" title="BDU:2026-02278" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.44" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.44-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0055</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53252-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53252-7.3/" type="self" id="ROS-20260414-73-0055" title="ROS-20260414-73-0055" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53252" type="cve" id="CVE-2023-53252" title="CVE-2023-53252" />
			<reference href="https://bdu.fstec.ru/vul/2026-05882" type="self" id="BDU:2026-05882" title="BDU:2026-05882" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.44" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.44-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0056</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53255-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53255-7.3/" type="self" id="ROS-20260414-73-0056" title="ROS-20260414-73-0056" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53255" type="cve" id="CVE-2023-53255" title="CVE-2023-53255" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.44" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.44-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0057</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53256-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53256-7.3/" type="self" id="ROS-20260414-73-0057" title="ROS-20260414-73-0057" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53256" type="cve" id="CVE-2023-53256" title="CVE-2023-53256" />
			<reference href="https://bdu.fstec.ru/vul/2026-05884" type="self" id="BDU:2026-05884" title="BDU:2026-05884" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0058</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53257-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53257-7.3/" type="self" id="ROS-20260414-73-0058" title="ROS-20260414-73-0058" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53257" type="cve" id="CVE-2023-53257" title="CVE-2023-53257" />
			<reference href="https://bdu.fstec.ru/vul/2026-02189" type="self" id="BDU:2026-02189" title="BDU:2026-02189" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.94" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.94-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.94" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.94-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.94-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0059</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53258-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53258-7.3/" type="self" id="ROS-20260414-73-0059" title="ROS-20260414-73-0059" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53258" type="cve" id="CVE-2023-53258" title="CVE-2023-53258" />
			<reference href="https://bdu.fstec.ru/vul/2026-05885" type="self" id="BDU:2026-05885" title="BDU:2026-05885" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.44" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.44-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0060</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53260-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53260-7.3/" type="self" id="ROS-20260414-73-0060" title="ROS-20260414-73-0060" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53260" type="cve" id="CVE-2023-53260" title="CVE-2023-53260" />
			<reference href="https://bdu.fstec.ru/vul/2026-02041" type="self" id="BDU:2026-02041" title="BDU:2026-02041" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.44" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.44-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.44" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.44-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.44-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260414-73-0061</id>
		<issued date="2026-04-14" />
		<updated date="2026-04-14" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53262-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2023-53262-7.3/" type="self" id="ROS-20260414-73-0061" title="ROS-20260414-73-0061" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53262" type="cve" id="CVE-2023-53262" title="CVE-2023-53262" />
			<reference href="https://bdu.fstec.ru/vul/2026-03309" type="self" id="BDU:2026-03309" title="BDU:2026-03309" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.38" release="2.el7.3" arch="x86_64" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.38-2.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.38" release="2.el7.3" arch="noarch" src="kernel-lt-6.1.38-2.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.38-2.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0001</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость frr </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в frr</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-frr-cve-2025-61100-7.3/</description>
               <solution>Установить обновление для пакета(ов) frr
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-frr-cve-2025-61100-7.3/" type="self" id="ROS-20260417-73-0001" title="ROS-20260417-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61100" type="cve" id="CVE-2025-61100" title="CVE-2025-61100" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="frr" epoch="0" version="10.5.3" release="1.el7" arch="x86_64" src="frr-10.5.3-1.el7.src.rpm">
					<filename>frr-0:10.5.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="frr-rpki-rtrlib" epoch="0" version="10.5.3" release="1.el7" arch="x86_64" src="frr-10.5.3-1.el7.src.rpm">
					<filename>frr-rpki-rtrlib-0:10.5.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="frr-headers" epoch="0" version="10.5.3" release="1.el7" arch="noarch" src="frr-10.5.3-1.el7.src.rpm">
					<filename>frr-headers-0:10.5.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0002</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость frr </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в frr</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-frr-cve-2025-61107-7.3/</description>
               <solution>Установить обновление для пакета(ов) frr
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-frr-cve-2025-61107-7.3/" type="self" id="ROS-20260417-73-0002" title="ROS-20260417-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61107" type="cve" id="CVE-2025-61107" title="CVE-2025-61107" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="frr" epoch="0" version="10.5.3" release="1.el7" arch="x86_64" src="frr-10.5.3-1.el7.src.rpm">
					<filename>frr-0:10.5.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="frr-rpki-rtrlib" epoch="0" version="10.5.3" release="1.el7" arch="x86_64" src="frr-10.5.3-1.el7.src.rpm">
					<filename>frr-rpki-rtrlib-0:10.5.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="frr-headers" epoch="0" version="10.5.3" release="1.el7" arch="noarch" src="frr-10.5.3-1.el7.src.rpm">
					<filename>frr-headers-0:10.5.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0003</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость frr </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в frr</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-frr-cve-2025-61106-7.3/</description>
               <solution>Установить обновление для пакета(ов) frr
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-frr-cve-2025-61106-7.3/" type="self" id="ROS-20260417-73-0003" title="ROS-20260417-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61106" type="cve" id="CVE-2025-61106" title="CVE-2025-61106" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="frr" epoch="0" version="10.5.3" release="1.el7" arch="x86_64" src="frr-10.5.3-1.el7.src.rpm">
					<filename>frr-0:10.5.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="frr-rpki-rtrlib" epoch="0" version="10.5.3" release="1.el7" arch="x86_64" src="frr-10.5.3-1.el7.src.rpm">
					<filename>frr-rpki-rtrlib-0:10.5.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="frr-headers" epoch="0" version="10.5.3" release="1.el7" arch="noarch" src="frr-10.5.3-1.el7.src.rpm">
					<filename>frr-headers-0:10.5.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0004</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость frr </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в frr</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-frr-cve-2025-61105-7.3/</description>
               <solution>Установить обновление для пакета(ов) frr
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-frr-cve-2025-61105-7.3/" type="self" id="ROS-20260417-73-0004" title="ROS-20260417-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61105" type="cve" id="CVE-2025-61105" title="CVE-2025-61105" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="frr" epoch="0" version="10.5.3" release="1.el7" arch="x86_64" src="frr-10.5.3-1.el7.src.rpm">
					<filename>frr-0:10.5.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="frr-rpki-rtrlib" epoch="0" version="10.5.3" release="1.el7" arch="x86_64" src="frr-10.5.3-1.el7.src.rpm">
					<filename>frr-rpki-rtrlib-0:10.5.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="frr-headers" epoch="0" version="10.5.3" release="1.el7" arch="noarch" src="frr-10.5.3-1.el7.src.rpm">
					<filename>frr-headers-0:10.5.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0005</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость frr </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в frr</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-frr-cve-2025-61104-7.3/</description>
               <solution>Установить обновление для пакета(ов) frr
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-frr-cve-2025-61104-7.3/" type="self" id="ROS-20260417-73-0005" title="ROS-20260417-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61104" type="cve" id="CVE-2025-61104" title="CVE-2025-61104" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="frr" epoch="0" version="10.5.3" release="1.el7" arch="x86_64" src="frr-10.5.3-1.el7.src.rpm">
					<filename>frr-0:10.5.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="frr-rpki-rtrlib" epoch="0" version="10.5.3" release="1.el7" arch="x86_64" src="frr-10.5.3-1.el7.src.rpm">
					<filename>frr-rpki-rtrlib-0:10.5.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="frr-headers" epoch="0" version="10.5.3" release="1.el7" arch="noarch" src="frr-10.5.3-1.el7.src.rpm">
					<filename>frr-headers-0:10.5.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0006</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость frr </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в frr</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-frr-cve-2025-61103-7.3/</description>
               <solution>Установить обновление для пакета(ов) frr
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-frr-cve-2025-61103-7.3/" type="self" id="ROS-20260417-73-0006" title="ROS-20260417-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61103" type="cve" id="CVE-2025-61103" title="CVE-2025-61103" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="frr" epoch="0" version="10.5.3" release="1.el7" arch="x86_64" src="frr-10.5.3-1.el7.src.rpm">
					<filename>frr-0:10.5.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="frr-rpki-rtrlib" epoch="0" version="10.5.3" release="1.el7" arch="x86_64" src="frr-10.5.3-1.el7.src.rpm">
					<filename>frr-rpki-rtrlib-0:10.5.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="frr-headers" epoch="0" version="10.5.3" release="1.el7" arch="noarch" src="frr-10.5.3-1.el7.src.rpm">
					<filename>frr-headers-0:10.5.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0007</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость frr </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в frr</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-frr-cve-2025-61102-7.3/</description>
               <solution>Установить обновление для пакета(ов) frr
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-frr-cve-2025-61102-7.3/" type="self" id="ROS-20260417-73-0007" title="ROS-20260417-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61102" type="cve" id="CVE-2025-61102" title="CVE-2025-61102" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="frr" epoch="0" version="10.5.3" release="1.el7" arch="x86_64" src="frr-10.5.3-1.el7.src.rpm">
					<filename>frr-0:10.5.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="frr-rpki-rtrlib" epoch="0" version="10.5.3" release="1.el7" arch="x86_64" src="frr-10.5.3-1.el7.src.rpm">
					<filename>frr-rpki-rtrlib-0:10.5.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="frr-headers" epoch="0" version="10.5.3" release="1.el7" arch="noarch" src="frr-10.5.3-1.el7.src.rpm">
					<filename>frr-headers-0:10.5.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0008</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость frr </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в frr</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-frr-cve-2025-61101-7.3/</description>
               <solution>Установить обновление для пакета(ов) frr
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-frr-cve-2025-61101-7.3/" type="self" id="ROS-20260417-73-0008" title="ROS-20260417-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61101" type="cve" id="CVE-2025-61101" title="CVE-2025-61101" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="frr" epoch="0" version="10.5.3" release="1.el7" arch="x86_64" src="frr-10.5.3-1.el7.src.rpm">
					<filename>frr-0:10.5.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="frr-rpki-rtrlib" epoch="0" version="10.5.3" release="1.el7" arch="x86_64" src="frr-10.5.3-1.el7.src.rpm">
					<filename>frr-rpki-rtrlib-0:10.5.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="frr-headers" epoch="0" version="10.5.3" release="1.el7" arch="noarch" src="frr-10.5.3-1.el7.src.rpm">
					<filename>frr-headers-0:10.5.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0009</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость glpi-plugin-mreporting </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в glpi-plugin-mreporting</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-plugin-mreporting-cve-2026-22821-7.3/</description>
               <solution>Установить обновление для пакета(ов) glpi-plugin-mreporting
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-plugin-mreporting-cve-2026-22821-7.3/" type="self" id="ROS-20260417-73-0009" title="ROS-20260417-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22821" type="cve" id="CVE-2026-22821" title="CVE-2026-22821" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi-plugin-mreporting" epoch="0" version="1.9.4" release="1.el7" arch="noarch" src="glpi-plugin-mreporting-1.9.4-1.el7.src.rpm">
					<filename>glpi-plugin-mreporting-0:1.9.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0010</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость pdns-recursor </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в pdns-recursor</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pdns-recursor-cve-2026-24027-7.3/</description>
               <solution>Установить обновление для пакета(ов) pdns-recursor
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-pdns-recursor-cve-2026-24027-7.3/" type="self" id="ROS-20260417-73-0010" title="ROS-20260417-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24027" type="cve" id="CVE-2026-24027" title="CVE-2026-24027" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="pdns-recursor" epoch="0" version="5.3.5" release="1.el7" arch="x86_64" src="pdns-recursor-5.3.5-1.el7.src.rpm">
					<filename>pdns-recursor-0:5.3.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0011</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2026-2447-7.3/</description>
               <solution>Установить обновление для пакета(ов) firefox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2026-2447-7.3/" type="self" id="ROS-20260417-73-0011" title="ROS-20260417-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2447" type="cve" id="CVE-2026-2447" title="CVE-2026-2447" />
			<reference href="https://bdu.fstec.ru/vul/2026-02014" type="self" id="BDU:2026-02014" title="BDU:2026-02014" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="140.8.0" release="1.el7" arch="x86_64" src="firefox-140.8.0-1.el7.src.rpm">
					<filename>firefox-0:140.8.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0012</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость thunderbird </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в thunderbird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-thunderbird-cve-2026-2447-7.3/</description>
               <solution>Установить обновление для пакета(ов) thunderbird
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-thunderbird-cve-2026-2447-7.3/" type="self" id="ROS-20260417-73-0012" title="ROS-20260417-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2447" type="cve" id="CVE-2026-2447" title="CVE-2026-2447" />
			<reference href="https://bdu.fstec.ru/vul/2026-02014" type="self" id="BDU:2026-02014" title="BDU:2026-02014" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="thunderbird" epoch="0" version="140.8.0" release="1.el7" arch="x86_64" src="thunderbird-140.8.0-1.el7.src.rpm">
					<filename>thunderbird-0:140.8.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0013</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость python-pip </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в python-pip</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pip-cve-2026-1703-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-pip
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pip-cve-2026-1703-7.3/" type="self" id="ROS-20260417-73-0013" title="ROS-20260417-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1703" type="cve" id="CVE-2026-1703" title="CVE-2026-1703" />
			<reference href="https://bdu.fstec.ru/vul/2026-01708" type="self" id="BDU:2026-01708" title="BDU:2026-01708" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python-pip-doc" epoch="0" version="20.2.2" release="4.el7" arch="noarch" src="python-pip-20.2.2-4.el7.src.rpm">
					<filename>python-pip-doc-0:20.2.2-4.el7.noarch.rpm</filename>
				</package>
				<package name="python-pip-wheel" epoch="0" version="20.2.2" release="4.el7" arch="noarch" src="python-pip-20.2.2-4.el7.src.rpm">
					<filename>python-pip-wheel-0:20.2.2-4.el7.noarch.rpm</filename>
				</package>
				<package name="python2-pip" epoch="0" version="20.2.2" release="4.el7" arch="noarch" src="python-pip-20.2.2-4.el7.src.rpm">
					<filename>python2-pip-0:20.2.2-4.el7.noarch.rpm</filename>
				</package>
				<package name="python3-pip" epoch="0" version="20.2.2" release="4.el7" arch="noarch" src="python-pip-20.2.2-4.el7.src.rpm">
					<filename>python3-pip-0:20.2.2-4.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0014</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость python-PyPDF2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-PyPDF2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pypdf2-cve-2026-27026-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-PyPDF2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pypdf2-cve-2026-27026-7.3/" type="self" id="ROS-20260417-73-0014" title="ROS-20260417-73-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27026" type="cve" id="CVE-2026-27026" title="CVE-2026-27026" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-PyPDF2" epoch="0" version="6.7.4" release="2.el7" arch="noarch" src="python-PyPDF2-6.7.4-2.el7.src.rpm">
					<filename>python3-PyPDF2-0:6.7.4-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0015</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость python-PyPDF2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-PyPDF2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pypdf2-cve-2026-27025-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-PyPDF2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pypdf2-cve-2026-27025-7.3/" type="self" id="ROS-20260417-73-0015" title="ROS-20260417-73-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27025" type="cve" id="CVE-2026-27025" title="CVE-2026-27025" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-PyPDF2" epoch="0" version="6.7.4" release="2.el7" arch="noarch" src="python-PyPDF2-6.7.4-2.el7.src.rpm">
					<filename>python3-PyPDF2-0:6.7.4-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0016</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость python-PyPDF2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-PyPDF2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pypdf2-cve-2026-27024-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-PyPDF2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pypdf2-cve-2026-27024-7.3/" type="self" id="ROS-20260417-73-0016" title="ROS-20260417-73-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27024" type="cve" id="CVE-2026-27024" title="CVE-2026-27024" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-PyPDF2" epoch="0" version="6.7.4" release="2.el7" arch="noarch" src="python-PyPDF2-6.7.4-2.el7.src.rpm">
					<filename>python3-PyPDF2-0:6.7.4-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0017</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость python-PyPDF2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-PyPDF2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pypdf2-cve-2026-27628-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-PyPDF2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pypdf2-cve-2026-27628-7.3/" type="self" id="ROS-20260417-73-0017" title="ROS-20260417-73-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27628" type="cve" id="CVE-2026-27628" title="CVE-2026-27628" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-PyPDF2" epoch="0" version="6.7.4" release="2.el7" arch="noarch" src="python-PyPDF2-6.7.4-2.el7.src.rpm">
					<filename>python3-PyPDF2-0:6.7.4-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0018</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость python-PyPDF2 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-PyPDF2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pypdf2-cve-2026-27888-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-PyPDF2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pypdf2-cve-2026-27888-7.3/" type="self" id="ROS-20260417-73-0018" title="ROS-20260417-73-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27888" type="cve" id="CVE-2026-27888" title="CVE-2026-27888" />
			<reference href="https://bdu.fstec.ru/vul/2026-02549" type="self" id="BDU:2026-02549" title="BDU:2026-02549" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-PyPDF2" epoch="0" version="6.7.4" release="2.el7" arch="noarch" src="python-PyPDF2-6.7.4-2.el7.src.rpm">
					<filename>python3-PyPDF2-0:6.7.4-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0019</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость python-PyPDF2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-PyPDF2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pypdf2-cve-2026-28351-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-PyPDF2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pypdf2-cve-2026-28351-7.3/" type="self" id="ROS-20260417-73-0019" title="ROS-20260417-73-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28351" type="cve" id="CVE-2026-28351" title="CVE-2026-28351" />
			<reference href="https://bdu.fstec.ru/vul/2026-02550" type="self" id="BDU:2026-02550" title="BDU:2026-02550" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-PyPDF2" epoch="0" version="6.7.4" release="2.el7" arch="noarch" src="python-PyPDF2-6.7.4-2.el7.src.rpm">
					<filename>python3-PyPDF2-0:6.7.4-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0020</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость python-PyPDF2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-PyPDF2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pypdf2-cve-2022-24859-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-PyPDF2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pypdf2-cve-2022-24859-7.3/" type="self" id="ROS-20260417-73-0020" title="ROS-20260417-73-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24859" type="cve" id="CVE-2022-24859" title="CVE-2022-24859" />
			<reference href="https://bdu.fstec.ru/vul/2023-02632" type="self" id="BDU:2023-02632" title="BDU:2023-02632" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-PyPDF2" epoch="0" version="6.7.4" release="2.el7" arch="noarch" src="python-PyPDF2-6.7.4-2.el7.src.rpm">
					<filename>python3-PyPDF2-0:6.7.4-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0021</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость python-PyPDF2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-PyPDF2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pypdf2-cve-2026-22691-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-PyPDF2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pypdf2-cve-2026-22691-7.3/" type="self" id="ROS-20260417-73-0021" title="ROS-20260417-73-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22691" type="cve" id="CVE-2026-22691" title="CVE-2026-22691" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-PyPDF2" epoch="0" version="6.7.4" release="2.el7" arch="noarch" src="python-PyPDF2-6.7.4-2.el7.src.rpm">
					<filename>python3-PyPDF2-0:6.7.4-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0022</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость python-PyPDF2 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-PyPDF2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pypdf2-cve-2025-66019-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-PyPDF2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pypdf2-cve-2025-66019-7.3/" type="self" id="ROS-20260417-73-0022" title="ROS-20260417-73-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66019" type="cve" id="CVE-2025-66019" title="CVE-2025-66019" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-PyPDF2" epoch="0" version="6.7.4" release="2.el7" arch="noarch" src="python-PyPDF2-6.7.4-2.el7.src.rpm">
					<filename>python3-PyPDF2-0:6.7.4-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0023</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость python-PyPDF2 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-PyPDF2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pypdf2-cve-2025-62707-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-PyPDF2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pypdf2-cve-2025-62707-7.3/" type="self" id="ROS-20260417-73-0023" title="ROS-20260417-73-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62707" type="cve" id="CVE-2025-62707" title="CVE-2025-62707" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-PyPDF2" epoch="0" version="6.7.4" release="2.el7" arch="noarch" src="python-PyPDF2-6.7.4-2.el7.src.rpm">
					<filename>python3-PyPDF2-0:6.7.4-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0024</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость python-PyPDF2 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-PyPDF2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pypdf2-cve-2025-62708-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-PyPDF2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pypdf2-cve-2025-62708-7.3/" type="self" id="ROS-20260417-73-0024" title="ROS-20260417-73-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62708" type="cve" id="CVE-2025-62708" title="CVE-2025-62708" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-PyPDF2" epoch="0" version="6.7.4" release="2.el7" arch="noarch" src="python-PyPDF2-6.7.4-2.el7.src.rpm">
					<filename>python3-PyPDF2-0:6.7.4-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0025</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость python-PyPDF2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-PyPDF2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pypdf2-cve-2026-22690-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-PyPDF2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pypdf2-cve-2026-22690-7.3/" type="self" id="ROS-20260417-73-0025" title="ROS-20260417-73-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22690" type="cve" id="CVE-2026-22690" title="CVE-2026-22690" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-PyPDF2" epoch="0" version="6.7.4" release="2.el7" arch="noarch" src="python-PyPDF2-6.7.4-2.el7.src.rpm">
					<filename>python3-PyPDF2-0:6.7.4-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0026</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость libcroco </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libcroco</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libcroco-cve-2020-12825-7.3/</description>
               <solution>Установить обновление для пакета(ов) libcroco
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libcroco-cve-2020-12825-7.3/" type="self" id="ROS-20260417-73-0026" title="ROS-20260417-73-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12825" type="cve" id="CVE-2020-12825" title="CVE-2020-12825" />
			<reference href="https://bdu.fstec.ru/vul/2023-07618" type="self" id="BDU:2023-07618" title="BDU:2023-07618" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libcroco" epoch="0" version="0.6.13" release="12.el7" arch="x86_64" src="libcroco-0.6.13-12.el7.src.rpm">
					<filename>libcroco-0:0.6.13-12.el7.x86_64.rpm</filename>
				</package>
				<package name="libcroco-devel" epoch="0" version="0.6.13" release="12.el7" arch="x86_64" src="libcroco-0.6.13-12.el7.src.rpm">
					<filename>libcroco-devel-0:0.6.13-12.el7.x86_64.rpm</filename>
				</package>
				<package name="libcroco-doc" epoch="0" version="0.6.13" release="12.el7" arch="noarch" src="libcroco-0.6.13-12.el7.src.rpm">
					<filename>libcroco-doc-0:0.6.13-12.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0027</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость rubygem-rack </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в rubygem-rack</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-rack-cve-2026-25500-7.3/</description>
               <solution>Установить обновление для пакета(ов) rubygem-rack
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-rack-cve-2026-25500-7.3/" type="self" id="ROS-20260417-73-0027" title="ROS-20260417-73-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25500" type="cve" id="CVE-2026-25500" title="CVE-2026-25500" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-rack" epoch="1" version="2.2.22" release="1.el7" arch="noarch" src="rubygem-rack-2.2.22-1.el7.src.rpm">
					<filename>rubygem-rack-1:2.2.22-1.el7.noarch.rpm</filename>
				</package>
				<package name="rubygem-rack-doc" epoch="1" version="2.2.22" release="1.el7" arch="noarch" src="rubygem-rack-2.2.22-1.el7.src.rpm">
					<filename>rubygem-rack-doc-1:2.2.22-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0028</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость rubygem-rack </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в rubygem-rack</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-rack-cve-2026-22860-7.3/</description>
               <solution>Установить обновление для пакета(ов) rubygem-rack
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-rack-cve-2026-22860-7.3/" type="self" id="ROS-20260417-73-0028" title="ROS-20260417-73-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22860" type="cve" id="CVE-2026-22860" title="CVE-2026-22860" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-rack" epoch="1" version="2.2.22" release="1.el7" arch="noarch" src="rubygem-rack-2.2.22-1.el7.src.rpm">
					<filename>rubygem-rack-1:2.2.22-1.el7.noarch.rpm</filename>
				</package>
				<package name="rubygem-rack-doc" epoch="1" version="2.2.22" release="1.el7" arch="noarch" src="rubygem-rack-2.2.22-1.el7.src.rpm">
					<filename>rubygem-rack-doc-1:2.2.22-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0029</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость python-authlib </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-authlib</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-authlib-cve-2026-28490-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-authlib
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-authlib-cve-2026-28490-7.3/" type="self" id="ROS-20260417-73-0029" title="ROS-20260417-73-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28490" type="cve" id="CVE-2026-28490" title="CVE-2026-28490" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-authlib" epoch="0" version="1.3.2" release="3.el7" arch="noarch" src="python-authlib-1.3.2-3.el7.src.rpm">
					<filename>python3-authlib-0:1.3.2-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0030</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость python-authlib </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-authlib</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-authlib-cve-2026-28498-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-authlib
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-authlib-cve-2026-28498-7.3/" type="self" id="ROS-20260417-73-0030" title="ROS-20260417-73-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28498" type="cve" id="CVE-2026-28498" title="CVE-2026-28498" />
			<reference href="https://bdu.fstec.ru/vul/2026-04354" type="self" id="BDU:2026-04354" title="BDU:2026-04354" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-authlib" epoch="0" version="1.3.2" release="3.el7" arch="noarch" src="python-authlib-1.3.2-3.el7.src.rpm">
					<filename>python3-authlib-0:1.3.2-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0031</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость glpi </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2026-25937-7.3/</description>
               <solution>Установить обновление для пакета(ов) glpi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2026-25937-7.3/" type="self" id="ROS-20260417-73-0031" title="ROS-20260417-73-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25937" type="cve" id="CVE-2026-25937" title="CVE-2026-25937" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi" epoch="0" version="11.0.6" release="1.el7" arch="noarch" src="glpi-11.0.6-1.el7.src.rpm">
					<filename>glpi-0:11.0.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="glpi-marketplace" epoch="0" version="11.0.6" release="1.el7" arch="noarch" src="glpi-11.0.6-1.el7.src.rpm">
					<filename>glpi-marketplace-0:11.0.6-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0032</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость nodejs </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в nodejs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-cve-2025-55132-7.3/</description>
               <solution>Установить обновление для пакета(ов) nodejs
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-cve-2025-55132-7.3/" type="self" id="ROS-20260417-73-0032" title="ROS-20260417-73-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55132" type="cve" id="CVE-2025-55132" title="CVE-2025-55132" />
			<reference href="https://bdu.fstec.ru/vul/2026-00544" type="self" id="BDU:2026-00544" title="BDU:2026-00544" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs" epoch="1" version="22.22.0" release="1.el7" arch="x86_64" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>nodejs-1:22.22.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-devel" epoch="1" version="22.22.0" release="1.el7" arch="x86_64" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>nodejs-devel-1:22.22.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-full-i18n" epoch="1" version="22.22.0" release="1.el7" arch="x86_64" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>nodejs-full-i18n-1:22.22.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-libs" epoch="1" version="22.22.0" release="1.el7" arch="x86_64" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>nodejs-libs-1:22.22.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-npm" epoch="1" version="10.9.4" release="1.22.22.0.1.el7" arch="x86_64" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>nodejs-npm-1:10.9.4-1.22.22.0.1.el7.x86_64.rpm</filename>
				</package>
				<package name="v8-12.4-devel" epoch="3" version="12.4.254.21" release="1.22.22.0.1.el7" arch="x86_64" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>v8-12.4-devel-3:12.4.254.21-1.22.22.0.1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-docs" epoch="1" version="22.22.0" release="1.el7" arch="noarch" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>nodejs-docs-1:22.22.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0033</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость nodejs </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nodejs</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-cve-2026-21637-7.3/</description>
               <solution>Установить обновление для пакета(ов) nodejs
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-cve-2026-21637-7.3/" type="self" id="ROS-20260417-73-0033" title="ROS-20260417-73-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21637" type="cve" id="CVE-2026-21637" title="CVE-2026-21637" />
			<reference href="https://bdu.fstec.ru/vul/2026-00548" type="self" id="BDU:2026-00548" title="BDU:2026-00548" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs" epoch="1" version="22.22.0" release="1.el7" arch="x86_64" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>nodejs-1:22.22.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-devel" epoch="1" version="22.22.0" release="1.el7" arch="x86_64" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>nodejs-devel-1:22.22.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-full-i18n" epoch="1" version="22.22.0" release="1.el7" arch="x86_64" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>nodejs-full-i18n-1:22.22.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-libs" epoch="1" version="22.22.0" release="1.el7" arch="x86_64" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>nodejs-libs-1:22.22.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-npm" epoch="1" version="10.9.4" release="1.22.22.0.1.el7" arch="x86_64" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>nodejs-npm-1:10.9.4-1.22.22.0.1.el7.x86_64.rpm</filename>
				</package>
				<package name="v8-12.4-devel" epoch="3" version="12.4.254.21" release="1.22.22.0.1.el7" arch="x86_64" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>v8-12.4-devel-3:12.4.254.21-1.22.22.0.1.el7.x86_64.rpm</filename>
				</package>
				<package name="nodejs-docs" epoch="1" version="22.22.0" release="1.el7" arch="noarch" src="nodejs-22.22.0-1.el7.src.rpm">
					<filename>nodejs-docs-1:22.22.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0034</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость zabbix7-lts </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в zabbix7-lts</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-lts-cve-2026-23921-7.3/</description>
               <solution>Установить обновление для пакета(ов) zabbix7-lts
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-lts-cve-2026-23921-7.3/" type="self" id="ROS-20260417-73-0034" title="ROS-20260417-73-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23921" type="cve" id="CVE-2026-23921" title="CVE-2026-23921" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix7-lts-agent" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-agent-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-agent2" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-agent2-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-get" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-get-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-java-gateway" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-java-gateway-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-java-gateway-openjdk11" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-java-gateway-openjdk11-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-java-gateway-openjdk17" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-java-gateway-openjdk17-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-java-gateway-openjdk21" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-java-gateway-openjdk21-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-js" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-js-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-proxy-mysql" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-proxy-mysql-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-proxy-pgsql" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-proxy-pgsql-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-proxy-sqlite3" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-proxy-sqlite3-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-sender" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-sender-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-server-mysql" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-server-mysql-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-server-pgsql" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-server-pgsql-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-web-service" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-web-service-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-apache-conf" epoch="1" version="7.0.22" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-apache-conf-1:7.0.22-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-nginx-conf" epoch="1" version="7.0.22" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-nginx-conf-1:7.0.22-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-selinux-policy" epoch="1" version="7.0.22" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-selinux-policy-1:7.0.22-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-sql-scripts" epoch="1" version="7.0.22" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-sql-scripts-1:7.0.22-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-web" epoch="1" version="7.0.22" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-web-1:7.0.22-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-web-deps" epoch="1" version="7.0.22" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-web-deps-1:7.0.22-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-web-mysql" epoch="1" version="7.0.22" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-web-mysql-1:7.0.22-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-web-pgsql" epoch="1" version="7.0.22" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-web-pgsql-1:7.0.22-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0035</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость zabbix7.2 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в zabbix7.2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-2-cve-2026-23921-7.3/</description>
               <solution>Установить обновление для пакета(ов) zabbix7.2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-2-cve-2026-23921-7.3/" type="self" id="ROS-20260417-73-0035" title="ROS-20260417-73-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23921" type="cve" id="CVE-2026-23921" title="CVE-2026-23921" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix7.2-agent" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-agent-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-agent2" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-agent2-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-get" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-get-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-java-gateway-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway-openjdk11" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-java-gateway-openjdk11-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway-openjdk17" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-java-gateway-openjdk17-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway-openjdk21" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-java-gateway-openjdk21-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-js" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-js-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-proxy-mysql" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-proxy-mysql-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-proxy-pgsql" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-proxy-pgsql-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-proxy-sqlite3" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-proxy-sqlite3-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-sender" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-sender-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-server-mysql" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-server-mysql-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-server-pgsql" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-server-pgsql-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-web-service" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-web-service-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-apache-conf" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-apache-conf-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-nginx-conf" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-nginx-conf-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-selinux-policy" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-selinux-policy-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-sql-scripts" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-sql-scripts-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-web" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-web-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-web-deps" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-web-deps-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-web-mysql" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-web-mysql-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-web-pgsql" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-web-pgsql-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0036</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость zabbix7.4 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в zabbix7.4</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-4-cve-2026-23921-7.3/</description>
               <solution>Установить обновление для пакета(ов) zabbix7.4
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-4-cve-2026-23921-7.3/" type="self" id="ROS-20260417-73-0036" title="ROS-20260417-73-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23921" type="cve" id="CVE-2026-23921" title="CVE-2026-23921" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix7.4-agent" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-agent-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-agent2" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-agent2-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-get" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-get-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-java-gateway-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway-openjdk11" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-java-gateway-openjdk11-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway-openjdk17" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-java-gateway-openjdk17-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway-openjdk21" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-java-gateway-openjdk21-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-js" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-js-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-proxy-mysql" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-proxy-mysql-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-proxy-pgsql" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-proxy-pgsql-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-proxy-sqlite3" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-proxy-sqlite3-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-sender" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-sender-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-server-mysql" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-server-mysql-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-server-pgsql" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-server-pgsql-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-web-service" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-web-service-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-apache-conf" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-apache-conf-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-nginx-conf" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-nginx-conf-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-selinux-policy" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-selinux-policy-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-sql-scripts" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-sql-scripts-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-web" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-web-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-web-deps" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-web-deps-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-web-mysql" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-web-mysql-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-web-pgsql" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-web-pgsql-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0037</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость zabbix7-lts </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в zabbix7-lts</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-lts-cve-2026-23920-7.3/</description>
               <solution>Установить обновление для пакета(ов) zabbix7-lts
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-lts-cve-2026-23920-7.3/" type="self" id="ROS-20260417-73-0037" title="ROS-20260417-73-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23920" type="cve" id="CVE-2026-23920" title="CVE-2026-23920" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix7-lts-agent" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-agent-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-agent2" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-agent2-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-get" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-get-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-java-gateway" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-java-gateway-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-java-gateway-openjdk11" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-java-gateway-openjdk11-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-java-gateway-openjdk17" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-java-gateway-openjdk17-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-java-gateway-openjdk21" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-java-gateway-openjdk21-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-js" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-js-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-proxy-mysql" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-proxy-mysql-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-proxy-pgsql" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-proxy-pgsql-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-proxy-sqlite3" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-proxy-sqlite3-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-sender" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-sender-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-server-mysql" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-server-mysql-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-server-pgsql" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-server-pgsql-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-web-service" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-web-service-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-apache-conf" epoch="1" version="7.0.22" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-apache-conf-1:7.0.22-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-nginx-conf" epoch="1" version="7.0.22" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-nginx-conf-1:7.0.22-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-selinux-policy" epoch="1" version="7.0.22" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-selinux-policy-1:7.0.22-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-sql-scripts" epoch="1" version="7.0.22" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-sql-scripts-1:7.0.22-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-web" epoch="1" version="7.0.22" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-web-1:7.0.22-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-web-deps" epoch="1" version="7.0.22" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-web-deps-1:7.0.22-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-web-mysql" epoch="1" version="7.0.22" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-web-mysql-1:7.0.22-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-web-pgsql" epoch="1" version="7.0.22" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-web-pgsql-1:7.0.22-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0038</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость zabbix7.2 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в zabbix7.2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-2-cve-2026-23920-7.3/</description>
               <solution>Установить обновление для пакета(ов) zabbix7.2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-2-cve-2026-23920-7.3/" type="self" id="ROS-20260417-73-0038" title="ROS-20260417-73-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23920" type="cve" id="CVE-2026-23920" title="CVE-2026-23920" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix7.2-agent" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-agent-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-agent2" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-agent2-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-get" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-get-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-java-gateway-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway-openjdk11" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-java-gateway-openjdk11-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway-openjdk17" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-java-gateway-openjdk17-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway-openjdk21" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-java-gateway-openjdk21-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-js" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-js-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-proxy-mysql" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-proxy-mysql-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-proxy-pgsql" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-proxy-pgsql-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-proxy-sqlite3" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-proxy-sqlite3-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-sender" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-sender-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-server-mysql" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-server-mysql-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-server-pgsql" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-server-pgsql-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-web-service" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-web-service-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-apache-conf" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-apache-conf-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-nginx-conf" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-nginx-conf-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-selinux-policy" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-selinux-policy-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-sql-scripts" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-sql-scripts-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-web" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-web-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-web-deps" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-web-deps-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-web-mysql" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-web-mysql-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-web-pgsql" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-web-pgsql-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0039</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость zabbix7.4 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в zabbix7.4</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-4-cve-2026-23920-7.3/</description>
               <solution>Установить обновление для пакета(ов) zabbix7.4
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-4-cve-2026-23920-7.3/" type="self" id="ROS-20260417-73-0039" title="ROS-20260417-73-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23920" type="cve" id="CVE-2026-23920" title="CVE-2026-23920" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix7.4-agent" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-agent-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-agent2" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-agent2-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-get" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-get-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-java-gateway-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway-openjdk11" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-java-gateway-openjdk11-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway-openjdk17" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-java-gateway-openjdk17-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway-openjdk21" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-java-gateway-openjdk21-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-js" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-js-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-proxy-mysql" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-proxy-mysql-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-proxy-pgsql" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-proxy-pgsql-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-proxy-sqlite3" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-proxy-sqlite3-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-sender" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-sender-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-server-mysql" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-server-mysql-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-server-pgsql" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-server-pgsql-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-web-service" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-web-service-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-apache-conf" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-apache-conf-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-nginx-conf" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-nginx-conf-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-selinux-policy" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-selinux-policy-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-sql-scripts" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-sql-scripts-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-web" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-web-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-web-deps" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-web-deps-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-web-mysql" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-web-mysql-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-web-pgsql" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-web-pgsql-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0040</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость zabbix-lts </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в zabbix-lts</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix-lts-cve-2026-23919-7.3/</description>
               <solution>Установить обновление для пакета(ов) zabbix-lts
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix-lts-cve-2026-23919-7.3/" type="self" id="ROS-20260417-73-0040" title="ROS-20260417-73-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23919" type="cve" id="CVE-2026-23919" title="CVE-2026-23919" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix-lts-agent" epoch="1" version="6.0.42" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-agent-1:6.0.42-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-agent2" epoch="1" version="6.0.42" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-agent2-1:6.0.42-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-get" epoch="1" version="6.0.42" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-get-1:6.0.42-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway" epoch="1" version="6.0.42" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-java-gateway-1:6.0.42-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway-openjdk11" epoch="1" version="6.0.42" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-java-gateway-openjdk11-1:6.0.42-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway-openjdk17" epoch="1" version="6.0.42" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-java-gateway-openjdk17-1:6.0.42-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway-openjdk21" epoch="1" version="6.0.42" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-java-gateway-openjdk21-1:6.0.42-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-js" epoch="1" version="6.0.42" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-js-1:6.0.42-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-proxy-mysql" epoch="1" version="6.0.42" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-proxy-mysql-1:6.0.42-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-proxy-pgsql" epoch="1" version="6.0.42" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-proxy-pgsql-1:6.0.42-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-proxy-sqlite3" epoch="1" version="6.0.42" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-proxy-sqlite3-1:6.0.42-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-sender" epoch="1" version="6.0.42" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-sender-1:6.0.42-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-server-mysql" epoch="1" version="6.0.42" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-server-mysql-1:6.0.42-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-server-pgsql" epoch="1" version="6.0.42" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-server-pgsql-1:6.0.42-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-web-service" epoch="1" version="6.0.42" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-web-service-1:6.0.42-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-apache-conf" epoch="1" version="6.0.42" release="1.el7" arch="noarch" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-apache-conf-1:6.0.42-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-nginx-conf" epoch="1" version="6.0.42" release="1.el7" arch="noarch" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-nginx-conf-1:6.0.42-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-selinux-policy" epoch="1" version="6.0.42" release="1.el7" arch="noarch" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-selinux-policy-1:6.0.42-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-sql-scripts" epoch="1" version="6.0.42" release="1.el7" arch="noarch" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-sql-scripts-1:6.0.42-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-web" epoch="1" version="6.0.42" release="1.el7" arch="noarch" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-web-1:6.0.42-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-web-deps" epoch="1" version="6.0.42" release="1.el7" arch="noarch" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-web-deps-1:6.0.42-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-web-mysql" epoch="1" version="6.0.42" release="1.el7" arch="noarch" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-web-mysql-1:6.0.42-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-web-pgsql" epoch="1" version="6.0.42" release="1.el7" arch="noarch" src="zabbix-lts-6.0.42-1.el7.src.rpm">
					<filename>zabbix-lts-web-pgsql-1:6.0.42-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0041</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость zabbix7-lts </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в zabbix7-lts</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-lts-cve-2026-23919-7.3/</description>
               <solution>Установить обновление для пакета(ов) zabbix7-lts
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-lts-cve-2026-23919-7.3/" type="self" id="ROS-20260417-73-0041" title="ROS-20260417-73-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23919" type="cve" id="CVE-2026-23919" title="CVE-2026-23919" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix7-lts-agent" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-agent-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-agent2" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-agent2-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-get" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-get-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-java-gateway" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-java-gateway-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-java-gateway-openjdk11" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-java-gateway-openjdk11-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-java-gateway-openjdk17" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-java-gateway-openjdk17-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-java-gateway-openjdk21" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-java-gateway-openjdk21-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-js" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-js-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-proxy-mysql" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-proxy-mysql-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-proxy-pgsql" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-proxy-pgsql-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-proxy-sqlite3" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-proxy-sqlite3-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-sender" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-sender-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-server-mysql" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-server-mysql-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-server-pgsql" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-server-pgsql-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-web-service" epoch="1" version="7.0.22" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-web-service-1:7.0.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-apache-conf" epoch="1" version="7.0.22" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-apache-conf-1:7.0.22-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-nginx-conf" epoch="1" version="7.0.22" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-nginx-conf-1:7.0.22-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-selinux-policy" epoch="1" version="7.0.22" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-selinux-policy-1:7.0.22-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-sql-scripts" epoch="1" version="7.0.22" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-sql-scripts-1:7.0.22-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-web" epoch="1" version="7.0.22" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-web-1:7.0.22-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-web-deps" epoch="1" version="7.0.22" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-web-deps-1:7.0.22-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-web-mysql" epoch="1" version="7.0.22" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-web-mysql-1:7.0.22-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-web-pgsql" epoch="1" version="7.0.22" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.22-1.el7.src.rpm">
					<filename>zabbix7-lts-web-pgsql-1:7.0.22-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0042</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость zabbix7.2 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в zabbix7.2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-2-cve-2026-23919-7.3/</description>
               <solution>Установить обновление для пакета(ов) zabbix7.2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-2-cve-2026-23919-7.3/" type="self" id="ROS-20260417-73-0042" title="ROS-20260417-73-0042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23919" type="cve" id="CVE-2026-23919" title="CVE-2026-23919" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix7.2-agent" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-agent-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-agent2" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-agent2-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-get" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-get-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-java-gateway-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway-openjdk11" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-java-gateway-openjdk11-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway-openjdk17" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-java-gateway-openjdk17-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway-openjdk21" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-java-gateway-openjdk21-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-js" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-js-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-proxy-mysql" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-proxy-mysql-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-proxy-pgsql" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-proxy-pgsql-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-proxy-sqlite3" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-proxy-sqlite3-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-sender" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-sender-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-server-mysql" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-server-mysql-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-server-pgsql" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-server-pgsql-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-web-service" epoch="1" version="7.2.15" release="1.el7" arch="x86_64" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-web-service-1:7.2.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-apache-conf" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-apache-conf-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-nginx-conf" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-nginx-conf-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-selinux-policy" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-selinux-policy-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-sql-scripts" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-sql-scripts-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-web" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-web-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-web-deps" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-web-deps-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-web-mysql" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-web-mysql-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-web-pgsql" epoch="1" version="7.2.15" release="1.el7" arch="noarch" src="zabbix7.2-7.2.15-1.el7.src.rpm">
					<filename>zabbix7.2-web-pgsql-1:7.2.15-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0043</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость zabbix7.4 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в zabbix7.4</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-4-cve-2026-23919-7.3/</description>
               <solution>Установить обновление для пакета(ов) zabbix7.4
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-4-cve-2026-23919-7.3/" type="self" id="ROS-20260417-73-0043" title="ROS-20260417-73-0043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23919" type="cve" id="CVE-2026-23919" title="CVE-2026-23919" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix7.4-agent" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-agent-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-agent2" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-agent2-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-get" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-get-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-java-gateway-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway-openjdk11" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-java-gateway-openjdk11-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway-openjdk17" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-java-gateway-openjdk17-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway-openjdk21" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-java-gateway-openjdk21-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-js" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-js-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-proxy-mysql" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-proxy-mysql-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-proxy-pgsql" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-proxy-pgsql-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-proxy-sqlite3" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-proxy-sqlite3-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-sender" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-sender-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-server-mysql" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-server-mysql-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-server-pgsql" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-server-pgsql-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-web-service" epoch="1" version="7.4.6" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-web-service-1:7.4.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-apache-conf" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-apache-conf-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-nginx-conf" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-nginx-conf-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-selinux-policy" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-selinux-policy-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-sql-scripts" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-sql-scripts-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-web" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-web-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-web-deps" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-web-deps-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-web-mysql" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-web-mysql-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-web-pgsql" epoch="1" version="7.4.6" release="1.el7" arch="noarch" src="zabbix7.4-7.4.6-1.el7.src.rpm">
					<filename>zabbix7.4-web-pgsql-1:7.4.6-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0044</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость glpi </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2026-25932-7.3/</description>
               <solution>Установить обновление для пакета(ов) glpi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2026-25932-7.3/" type="self" id="ROS-20260417-73-0044" title="ROS-20260417-73-0044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25932" type="cve" id="CVE-2026-25932" title="CVE-2026-25932" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi" epoch="0" version="11.0.6" release="1.el7" arch="noarch" src="glpi-11.0.6-1.el7.src.rpm">
					<filename>glpi-0:11.0.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="glpi-marketplace" epoch="0" version="11.0.6" release="1.el7" arch="noarch" src="glpi-11.0.6-1.el7.src.rpm">
					<filename>glpi-marketplace-0:11.0.6-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0045</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость glpi </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2026-26026-7.3/</description>
               <solution>Установить обновление для пакета(ов) glpi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2026-26026-7.3/" type="self" id="ROS-20260417-73-0045" title="ROS-20260417-73-0045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26026" type="cve" id="CVE-2026-26026" title="CVE-2026-26026" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi" epoch="0" version="11.0.6" release="1.el7" arch="noarch" src="glpi-11.0.6-1.el7.src.rpm">
					<filename>glpi-0:11.0.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="glpi-marketplace" epoch="0" version="11.0.6" release="1.el7" arch="noarch" src="glpi-11.0.6-1.el7.src.rpm">
					<filename>glpi-marketplace-0:11.0.6-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0046</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость glpi </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2026-26027-7.3/</description>
               <solution>Установить обновление для пакета(ов) glpi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2026-26027-7.3/" type="self" id="ROS-20260417-73-0046" title="ROS-20260417-73-0046" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26027" type="cve" id="CVE-2026-26027" title="CVE-2026-26027" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi" epoch="0" version="11.0.6" release="1.el7" arch="noarch" src="glpi-11.0.6-1.el7.src.rpm">
					<filename>glpi-0:11.0.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="glpi-marketplace" epoch="0" version="11.0.6" release="1.el7" arch="noarch" src="glpi-11.0.6-1.el7.src.rpm">
					<filename>glpi-marketplace-0:11.0.6-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0047</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость glpi </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2026-26263-7.3/</description>
               <solution>Установить обновление для пакета(ов) glpi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2026-26263-7.3/" type="self" id="ROS-20260417-73-0047" title="ROS-20260417-73-0047" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26263" type="cve" id="CVE-2026-26263" title="CVE-2026-26263" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi" epoch="0" version="11.0.6" release="1.el7" arch="noarch" src="glpi-11.0.6-1.el7.src.rpm">
					<filename>glpi-0:11.0.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="glpi-marketplace" epoch="0" version="11.0.6" release="1.el7" arch="noarch" src="glpi-11.0.6-1.el7.src.rpm">
					<filename>glpi-marketplace-0:11.0.6-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0048</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость glpi </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2026-29047-7.3/</description>
               <solution>Установить обновление для пакета(ов) glpi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glpi-cve-2026-29047-7.3/" type="self" id="ROS-20260417-73-0048" title="ROS-20260417-73-0048" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29047" type="cve" id="CVE-2026-29047" title="CVE-2026-29047" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glpi" epoch="0" version="11.0.6" release="1.el7" arch="noarch" src="glpi-11.0.6-1.el7.src.rpm">
					<filename>glpi-0:11.0.6-1.el7.noarch.rpm</filename>
				</package>
				<package name="glpi-marketplace" epoch="0" version="11.0.6" release="1.el7" arch="noarch" src="glpi-11.0.6-1.el7.src.rpm">
					<filename>glpi-marketplace-0:11.0.6-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0049</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2026-2771-7.3/</description>
               <solution>Установить обновление для пакета(ов) firefox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2026-2771-7.3/" type="self" id="ROS-20260417-73-0049" title="ROS-20260417-73-0049" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2771" type="cve" id="CVE-2026-2771" title="CVE-2026-2771" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="140.8.0" release="1.el7" arch="x86_64" src="firefox-140.8.0-1.el7.src.rpm">
					<filename>firefox-0:140.8.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260417-73-0050</id>
		<issued date="2026-04-17" />
		<updated date="2026-04-17" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2026-2781-7.3/</description>
               <solution>Установить обновление для пакета(ов) firefox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firefox-cve-2026-2781-7.3/" type="self" id="ROS-20260417-73-0050" title="ROS-20260417-73-0050" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2781" type="cve" id="CVE-2026-2781" title="CVE-2026-2781" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firefox" epoch="0" version="140.8.0" release="1.el7" arch="x86_64" src="firefox-140.8.0-1.el7.src.rpm">
					<filename>firefox-0:140.8.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0001</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость openssl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openssl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl-cve-2025-68160-7.3/</description>
               <solution>Установить обновление для пакета(ов) openssl
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl-cve-2025-68160-7.3/" type="self" id="ROS-20260420-73-0001" title="ROS-20260420-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160" type="cve" id="CVE-2025-68160" title="CVE-2025-68160" />
			<reference href="https://bdu.fstec.ru/vul/2026-01216" type="self" id="BDU:2026-01216" title="BDU:2026-01216" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl" epoch="1" version="1.1.1ze" release="1.el7" arch="x86_64" src="openssl-1.1.1ze-1.el7.src.rpm">
					<filename>openssl-1:1.1.1ze-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl-devel" epoch="1" version="1.1.1ze" release="1.el7" arch="x86_64" src="openssl-1.1.1ze-1.el7.src.rpm">
					<filename>openssl-devel-1:1.1.1ze-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl-libs" epoch="1" version="1.1.1ze" release="1.el7" arch="x86_64" src="openssl-1.1.1ze-1.el7.src.rpm">
					<filename>openssl-libs-1:1.1.1ze-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl-perl" epoch="1" version="1.1.1ze" release="1.el7" arch="x86_64" src="openssl-1.1.1ze-1.el7.src.rpm">
					<filename>openssl-perl-1:1.1.1ze-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl-static" epoch="1" version="1.1.1ze" release="1.el7" arch="x86_64" src="openssl-1.1.1ze-1.el7.src.rpm">
					<filename>openssl-static-1:1.1.1ze-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0002</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость openssl3 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openssl3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2025-68160-7.3/</description>
               <solution>Установить обновление для пакета(ов) openssl3
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2025-68160-7.3/" type="self" id="ROS-20260420-73-0002" title="ROS-20260420-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160" type="cve" id="CVE-2025-68160" title="CVE-2025-68160" />
			<reference href="https://bdu.fstec.ru/vul/2026-01216" type="self" id="BDU:2026-01216" title="BDU:2026-01216" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl3" epoch="1" version="3.5.5" release="1.el7" arch="x86_64" src="openssl3-3.5.5-1.el7.src.rpm">
					<filename>openssl3-1:3.5.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl3-devel" epoch="1" version="3.5.5" release="1.el7" arch="x86_64" src="openssl3-3.5.5-1.el7.src.rpm">
					<filename>openssl3-devel-1:3.5.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl3-libs" epoch="1" version="3.5.5" release="1.el7" arch="x86_64" src="openssl3-3.5.5-1.el7.src.rpm">
					<filename>openssl3-libs-1:3.5.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0003</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость openssl3 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openssl3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2025-11187-7.3/</description>
               <solution>Установить обновление для пакета(ов) openssl3
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2025-11187-7.3/" type="self" id="ROS-20260420-73-0003" title="ROS-20260420-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187" type="cve" id="CVE-2025-11187" title="CVE-2025-11187" />
			<reference href="https://bdu.fstec.ru/vul/2026-01223" type="self" id="BDU:2026-01223" title="BDU:2026-01223" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl3" epoch="1" version="3.5.5" release="1.el7" arch="x86_64" src="openssl3-3.5.5-1.el7.src.rpm">
					<filename>openssl3-1:3.5.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl3-devel" epoch="1" version="3.5.5" release="1.el7" arch="x86_64" src="openssl3-3.5.5-1.el7.src.rpm">
					<filename>openssl3-devel-1:3.5.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl3-libs" epoch="1" version="3.5.5" release="1.el7" arch="x86_64" src="openssl3-3.5.5-1.el7.src.rpm">
					<filename>openssl3-libs-1:3.5.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0004</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость openssl </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в openssl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl-cve-2025-69419-7.3/</description>
               <solution>Установить обновление для пакета(ов) openssl
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl-cve-2025-69419-7.3/" type="self" id="ROS-20260420-73-0004" title="ROS-20260420-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419" type="cve" id="CVE-2025-69419" title="CVE-2025-69419" />
			<reference href="https://bdu.fstec.ru/vul/2026-01217" type="self" id="BDU:2026-01217" title="BDU:2026-01217" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl" epoch="1" version="1.1.1ze" release="1.el7" arch="x86_64" src="openssl-1.1.1ze-1.el7.src.rpm">
					<filename>openssl-1:1.1.1ze-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl-devel" epoch="1" version="1.1.1ze" release="1.el7" arch="x86_64" src="openssl-1.1.1ze-1.el7.src.rpm">
					<filename>openssl-devel-1:1.1.1ze-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl-libs" epoch="1" version="1.1.1ze" release="1.el7" arch="x86_64" src="openssl-1.1.1ze-1.el7.src.rpm">
					<filename>openssl-libs-1:1.1.1ze-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl-perl" epoch="1" version="1.1.1ze" release="1.el7" arch="x86_64" src="openssl-1.1.1ze-1.el7.src.rpm">
					<filename>openssl-perl-1:1.1.1ze-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl-static" epoch="1" version="1.1.1ze" release="1.el7" arch="x86_64" src="openssl-1.1.1ze-1.el7.src.rpm">
					<filename>openssl-static-1:1.1.1ze-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0005</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость openssl3 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в openssl3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2025-69419-7.3/</description>
               <solution>Установить обновление для пакета(ов) openssl3
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2025-69419-7.3/" type="self" id="ROS-20260420-73-0005" title="ROS-20260420-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419" type="cve" id="CVE-2025-69419" title="CVE-2025-69419" />
			<reference href="https://bdu.fstec.ru/vul/2026-01217" type="self" id="BDU:2026-01217" title="BDU:2026-01217" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl3" epoch="1" version="3.5.5" release="1.el7" arch="x86_64" src="openssl3-3.5.5-1.el7.src.rpm">
					<filename>openssl3-1:3.5.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl3-devel" epoch="1" version="3.5.5" release="1.el7" arch="x86_64" src="openssl3-3.5.5-1.el7.src.rpm">
					<filename>openssl3-devel-1:3.5.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl3-libs" epoch="1" version="3.5.5" release="1.el7" arch="x86_64" src="openssl3-3.5.5-1.el7.src.rpm">
					<filename>openssl3-libs-1:3.5.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0006</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость openssl </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в openssl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl-cve-2025-69420-7.3/</description>
               <solution>Установить обновление для пакета(ов) openssl
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl-cve-2025-69420-7.3/" type="self" id="ROS-20260420-73-0006" title="ROS-20260420-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420" type="cve" id="CVE-2025-69420" title="CVE-2025-69420" />
			<reference href="https://bdu.fstec.ru/vul/2026-01219" type="self" id="BDU:2026-01219" title="BDU:2026-01219" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl" epoch="1" version="1.1.1ze" release="1.el7" arch="x86_64" src="openssl-1.1.1ze-1.el7.src.rpm">
					<filename>openssl-1:1.1.1ze-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl-devel" epoch="1" version="1.1.1ze" release="1.el7" arch="x86_64" src="openssl-1.1.1ze-1.el7.src.rpm">
					<filename>openssl-devel-1:1.1.1ze-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl-libs" epoch="1" version="1.1.1ze" release="1.el7" arch="x86_64" src="openssl-1.1.1ze-1.el7.src.rpm">
					<filename>openssl-libs-1:1.1.1ze-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl-perl" epoch="1" version="1.1.1ze" release="1.el7" arch="x86_64" src="openssl-1.1.1ze-1.el7.src.rpm">
					<filename>openssl-perl-1:1.1.1ze-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl-static" epoch="1" version="1.1.1ze" release="1.el7" arch="x86_64" src="openssl-1.1.1ze-1.el7.src.rpm">
					<filename>openssl-static-1:1.1.1ze-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0007</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость openssl3 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в openssl3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2025-69420-7.3/</description>
               <solution>Установить обновление для пакета(ов) openssl3
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2025-69420-7.3/" type="self" id="ROS-20260420-73-0007" title="ROS-20260420-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420" type="cve" id="CVE-2025-69420" title="CVE-2025-69420" />
			<reference href="https://bdu.fstec.ru/vul/2026-01219" type="self" id="BDU:2026-01219" title="BDU:2026-01219" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl3" epoch="1" version="3.5.5" release="1.el7" arch="x86_64" src="openssl3-3.5.5-1.el7.src.rpm">
					<filename>openssl3-1:3.5.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl3-devel" epoch="1" version="3.5.5" release="1.el7" arch="x86_64" src="openssl3-3.5.5-1.el7.src.rpm">
					<filename>openssl3-devel-1:3.5.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl3-libs" epoch="1" version="3.5.5" release="1.el7" arch="x86_64" src="openssl3-3.5.5-1.el7.src.rpm">
					<filename>openssl3-libs-1:3.5.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0008</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость openssl </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в openssl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl-cve-2025-69421-7.3/</description>
               <solution>Установить обновление для пакета(ов) openssl
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl-cve-2025-69421-7.3/" type="self" id="ROS-20260420-73-0008" title="ROS-20260420-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421" type="cve" id="CVE-2025-69421" title="CVE-2025-69421" />
			<reference href="https://bdu.fstec.ru/vul/2026-01218" type="self" id="BDU:2026-01218" title="BDU:2026-01218" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl" epoch="1" version="1.1.1ze" release="1.el7" arch="x86_64" src="openssl-1.1.1ze-1.el7.src.rpm">
					<filename>openssl-1:1.1.1ze-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl-devel" epoch="1" version="1.1.1ze" release="1.el7" arch="x86_64" src="openssl-1.1.1ze-1.el7.src.rpm">
					<filename>openssl-devel-1:1.1.1ze-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl-libs" epoch="1" version="1.1.1ze" release="1.el7" arch="x86_64" src="openssl-1.1.1ze-1.el7.src.rpm">
					<filename>openssl-libs-1:1.1.1ze-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl-perl" epoch="1" version="1.1.1ze" release="1.el7" arch="x86_64" src="openssl-1.1.1ze-1.el7.src.rpm">
					<filename>openssl-perl-1:1.1.1ze-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl-static" epoch="1" version="1.1.1ze" release="1.el7" arch="x86_64" src="openssl-1.1.1ze-1.el7.src.rpm">
					<filename>openssl-static-1:1.1.1ze-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0009</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость openssl3 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в openssl3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2025-69421-7.3/</description>
               <solution>Установить обновление для пакета(ов) openssl3
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2025-69421-7.3/" type="self" id="ROS-20260420-73-0009" title="ROS-20260420-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421" type="cve" id="CVE-2025-69421" title="CVE-2025-69421" />
			<reference href="https://bdu.fstec.ru/vul/2026-01218" type="self" id="BDU:2026-01218" title="BDU:2026-01218" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl3" epoch="1" version="3.5.5" release="1.el7" arch="x86_64" src="openssl3-3.5.5-1.el7.src.rpm">
					<filename>openssl3-1:3.5.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl3-devel" epoch="1" version="3.5.5" release="1.el7" arch="x86_64" src="openssl3-3.5.5-1.el7.src.rpm">
					<filename>openssl3-devel-1:3.5.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl3-libs" epoch="1" version="3.5.5" release="1.el7" arch="x86_64" src="openssl3-3.5.5-1.el7.src.rpm">
					<filename>openssl3-libs-1:3.5.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0010</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость openssl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openssl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl-cve-2025-69418-7.3/</description>
               <solution>Установить обновление для пакета(ов) openssl
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl-cve-2025-69418-7.3/" type="self" id="ROS-20260420-73-0010" title="ROS-20260420-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418" type="cve" id="CVE-2025-69418" title="CVE-2025-69418" />
			<reference href="https://bdu.fstec.ru/vul/2026-02935" type="self" id="BDU:2026-02935" title="BDU:2026-02935" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl" epoch="1" version="1.1.1ze" release="1.el7" arch="x86_64" src="openssl-1.1.1ze-1.el7.src.rpm">
					<filename>openssl-1:1.1.1ze-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl-devel" epoch="1" version="1.1.1ze" release="1.el7" arch="x86_64" src="openssl-1.1.1ze-1.el7.src.rpm">
					<filename>openssl-devel-1:1.1.1ze-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl-libs" epoch="1" version="1.1.1ze" release="1.el7" arch="x86_64" src="openssl-1.1.1ze-1.el7.src.rpm">
					<filename>openssl-libs-1:1.1.1ze-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl-perl" epoch="1" version="1.1.1ze" release="1.el7" arch="x86_64" src="openssl-1.1.1ze-1.el7.src.rpm">
					<filename>openssl-perl-1:1.1.1ze-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl-static" epoch="1" version="1.1.1ze" release="1.el7" arch="x86_64" src="openssl-1.1.1ze-1.el7.src.rpm">
					<filename>openssl-static-1:1.1.1ze-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0011</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость openssl3 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openssl3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2025-69418-7.3/</description>
               <solution>Установить обновление для пакета(ов) openssl3
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2025-69418-7.3/" type="self" id="ROS-20260420-73-0011" title="ROS-20260420-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418" type="cve" id="CVE-2025-69418" title="CVE-2025-69418" />
			<reference href="https://bdu.fstec.ru/vul/2026-02935" type="self" id="BDU:2026-02935" title="BDU:2026-02935" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl3" epoch="1" version="3.5.5" release="1.el7" arch="x86_64" src="openssl3-3.5.5-1.el7.src.rpm">
					<filename>openssl3-1:3.5.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl3-devel" epoch="1" version="3.5.5" release="1.el7" arch="x86_64" src="openssl3-3.5.5-1.el7.src.rpm">
					<filename>openssl3-devel-1:3.5.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl3-libs" epoch="1" version="3.5.5" release="1.el7" arch="x86_64" src="openssl3-3.5.5-1.el7.src.rpm">
					<filename>openssl3-libs-1:3.5.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0012</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость openssl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openssl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl-cve-2026-22795-7.3/</description>
               <solution>Установить обновление для пакета(ов) openssl
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl-cve-2026-22795-7.3/" type="self" id="ROS-20260420-73-0012" title="ROS-20260420-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795" type="cve" id="CVE-2026-22795" title="CVE-2026-22795" />
			<reference href="https://bdu.fstec.ru/vul/2026-01214" type="self" id="BDU:2026-01214" title="BDU:2026-01214" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl" epoch="1" version="1.1.1ze" release="1.el7" arch="x86_64" src="openssl-1.1.1ze-1.el7.src.rpm">
					<filename>openssl-1:1.1.1ze-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl-devel" epoch="1" version="1.1.1ze" release="1.el7" arch="x86_64" src="openssl-1.1.1ze-1.el7.src.rpm">
					<filename>openssl-devel-1:1.1.1ze-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl-libs" epoch="1" version="1.1.1ze" release="1.el7" arch="x86_64" src="openssl-1.1.1ze-1.el7.src.rpm">
					<filename>openssl-libs-1:1.1.1ze-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl-perl" epoch="1" version="1.1.1ze" release="1.el7" arch="x86_64" src="openssl-1.1.1ze-1.el7.src.rpm">
					<filename>openssl-perl-1:1.1.1ze-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl-static" epoch="1" version="1.1.1ze" release="1.el7" arch="x86_64" src="openssl-1.1.1ze-1.el7.src.rpm">
					<filename>openssl-static-1:1.1.1ze-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0013</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость openssl3 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openssl3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2026-22795-7.3/</description>
               <solution>Установить обновление для пакета(ов) openssl3
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2026-22795-7.3/" type="self" id="ROS-20260420-73-0013" title="ROS-20260420-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795" type="cve" id="CVE-2026-22795" title="CVE-2026-22795" />
			<reference href="https://bdu.fstec.ru/vul/2026-01214" type="self" id="BDU:2026-01214" title="BDU:2026-01214" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl3" epoch="1" version="3.5.5" release="1.el7" arch="x86_64" src="openssl3-3.5.5-1.el7.src.rpm">
					<filename>openssl3-1:3.5.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl3-devel" epoch="1" version="3.5.5" release="1.el7" arch="x86_64" src="openssl3-3.5.5-1.el7.src.rpm">
					<filename>openssl3-devel-1:3.5.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl3-libs" epoch="1" version="3.5.5" release="1.el7" arch="x86_64" src="openssl3-3.5.5-1.el7.src.rpm">
					<filename>openssl3-libs-1:3.5.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0014</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость openssl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openssl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl-cve-2026-22796-7.3/</description>
               <solution>Установить обновление для пакета(ов) openssl
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl-cve-2026-22796-7.3/" type="self" id="ROS-20260420-73-0014" title="ROS-20260420-73-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796" type="cve" id="CVE-2026-22796" title="CVE-2026-22796" />
			<reference href="https://bdu.fstec.ru/vul/2026-01220" type="self" id="BDU:2026-01220" title="BDU:2026-01220" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl" epoch="1" version="1.1.1ze" release="1.el7" arch="x86_64" src="openssl-1.1.1ze-1.el7.src.rpm">
					<filename>openssl-1:1.1.1ze-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl-devel" epoch="1" version="1.1.1ze" release="1.el7" arch="x86_64" src="openssl-1.1.1ze-1.el7.src.rpm">
					<filename>openssl-devel-1:1.1.1ze-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl-libs" epoch="1" version="1.1.1ze" release="1.el7" arch="x86_64" src="openssl-1.1.1ze-1.el7.src.rpm">
					<filename>openssl-libs-1:1.1.1ze-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl-perl" epoch="1" version="1.1.1ze" release="1.el7" arch="x86_64" src="openssl-1.1.1ze-1.el7.src.rpm">
					<filename>openssl-perl-1:1.1.1ze-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl-static" epoch="1" version="1.1.1ze" release="1.el7" arch="x86_64" src="openssl-1.1.1ze-1.el7.src.rpm">
					<filename>openssl-static-1:1.1.1ze-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0015</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость openssl3 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openssl3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2026-22796-7.3/</description>
               <solution>Установить обновление для пакета(ов) openssl3
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2026-22796-7.3/" type="self" id="ROS-20260420-73-0015" title="ROS-20260420-73-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796" type="cve" id="CVE-2026-22796" title="CVE-2026-22796" />
			<reference href="https://bdu.fstec.ru/vul/2026-01220" type="self" id="BDU:2026-01220" title="BDU:2026-01220" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl3" epoch="1" version="3.5.5" release="1.el7" arch="x86_64" src="openssl3-3.5.5-1.el7.src.rpm">
					<filename>openssl3-1:3.5.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl3-devel" epoch="1" version="3.5.5" release="1.el7" arch="x86_64" src="openssl3-3.5.5-1.el7.src.rpm">
					<filename>openssl3-devel-1:3.5.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl3-libs" epoch="1" version="3.5.5" release="1.el7" arch="x86_64" src="openssl3-3.5.5-1.el7.src.rpm">
					<filename>openssl3-libs-1:3.5.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0016</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость openssl3 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openssl3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2025-66199-7.3/</description>
               <solution>Установить обновление для пакета(ов) openssl3
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2025-66199-7.3/" type="self" id="ROS-20260420-73-0016" title="ROS-20260420-73-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199" type="cve" id="CVE-2025-66199" title="CVE-2025-66199" />
			<reference href="https://bdu.fstec.ru/vul/2026-01212" type="self" id="BDU:2026-01212" title="BDU:2026-01212" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl3" epoch="1" version="3.5.5" release="1.el7" arch="x86_64" src="openssl3-3.5.5-1.el7.src.rpm">
					<filename>openssl3-1:3.5.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl3-devel" epoch="1" version="3.5.5" release="1.el7" arch="x86_64" src="openssl3-3.5.5-1.el7.src.rpm">
					<filename>openssl3-devel-1:3.5.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl3-libs" epoch="1" version="3.5.5" release="1.el7" arch="x86_64" src="openssl3-3.5.5-1.el7.src.rpm">
					<filename>openssl3-libs-1:3.5.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0017</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость openssl3 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openssl3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2025-15468-7.3/</description>
               <solution>Установить обновление для пакета(ов) openssl3
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2025-15468-7.3/" type="self" id="ROS-20260420-73-0017" title="ROS-20260420-73-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468" type="cve" id="CVE-2025-15468" title="CVE-2025-15468" />
			<reference href="https://bdu.fstec.ru/vul/2026-01215" type="self" id="BDU:2026-01215" title="BDU:2026-01215" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl3" epoch="1" version="3.5.5" release="1.el7" arch="x86_64" src="openssl3-3.5.5-1.el7.src.rpm">
					<filename>openssl3-1:3.5.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl3-devel" epoch="1" version="3.5.5" release="1.el7" arch="x86_64" src="openssl3-3.5.5-1.el7.src.rpm">
					<filename>openssl3-devel-1:3.5.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl3-libs" epoch="1" version="3.5.5" release="1.el7" arch="x86_64" src="openssl3-3.5.5-1.el7.src.rpm">
					<filename>openssl3-libs-1:3.5.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0018</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость openssl3 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в openssl3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2025-15467-7.3/</description>
               <solution>Установить обновление для пакета(ов) openssl3
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-openssl3-cve-2025-15467-7.3/" type="self" id="ROS-20260420-73-0018" title="ROS-20260420-73-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467" type="cve" id="CVE-2025-15467" title="CVE-2025-15467" />
			<reference href="https://bdu.fstec.ru/vul/2026-00890" type="self" id="BDU:2026-00890" title="BDU:2026-00890" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="openssl3" epoch="1" version="3.5.5" release="1.el7" arch="x86_64" src="openssl3-3.5.5-1.el7.src.rpm">
					<filename>openssl3-1:3.5.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl3-devel" epoch="1" version="3.5.5" release="1.el7" arch="x86_64" src="openssl3-3.5.5-1.el7.src.rpm">
					<filename>openssl3-devel-1:3.5.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="openssl3-libs" epoch="1" version="3.5.5" release="1.el7" arch="x86_64" src="openssl3-3.5.5-1.el7.src.rpm">
					<filename>openssl3-libs-1:3.5.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0019</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость python-aiohttp </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-aiohttp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-aiohttp-cve-2025-69223-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-aiohttp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-aiohttp-cve-2025-69223-7.3/" type="self" id="ROS-20260420-73-0019" title="ROS-20260420-73-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69223" type="cve" id="CVE-2025-69223" title="CVE-2025-69223" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-aiohttp" epoch="0" version="3.10.11" release="3.el7" arch="x86_64" src="python-aiohttp-3.10.11-3.el7.src.rpm">
					<filename>python3-aiohttp-0:3.10.11-3.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-aiohttp+speedups" epoch="0" version="3.10.11" release="3.el7" arch="x86_64" src="python-aiohttp-3.10.11-3.el7.src.rpm">
					<filename>python3-aiohttp+speedups-0:3.10.11-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0020</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость python-pyasn1 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-pyasn1</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pyasn1-cve-2026-23490-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-pyasn1
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pyasn1-cve-2026-23490-7.3/" type="self" id="ROS-20260420-73-0020" title="ROS-20260420-73-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23490" type="cve" id="CVE-2026-23490" title="CVE-2026-23490" />
			<reference href="https://bdu.fstec.ru/vul/2026-05145" type="self" id="BDU:2026-05145" title="BDU:2026-05145" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-pyasn1" epoch="0" version="0.6.2" release="1.el7" arch="noarch" src="python-pyasn1-0.6.2-1.el7.src.rpm">
					<filename>python3-pyasn1-0:0.6.2-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-pyasn1-docs" epoch="0" version="0.6.2" release="1.el7" arch="noarch" src="python-pyasn1-0.6.2-1.el7.src.rpm">
					<filename>python3-pyasn1-docs-0:0.6.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0021</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость python-aiohttp </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-aiohttp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-aiohttp-cve-2025-69229-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-aiohttp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-aiohttp-cve-2025-69229-7.3/" type="self" id="ROS-20260420-73-0021" title="ROS-20260420-73-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69229" type="cve" id="CVE-2025-69229" title="CVE-2025-69229" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-aiohttp" epoch="0" version="3.10.11" release="3.el7" arch="x86_64" src="python-aiohttp-3.10.11-3.el7.src.rpm">
					<filename>python3-aiohttp-0:3.10.11-3.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-aiohttp+speedups" epoch="0" version="3.10.11" release="3.el7" arch="x86_64" src="python-aiohttp-3.10.11-3.el7.src.rpm">
					<filename>python3-aiohttp+speedups-0:3.10.11-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0022</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость python-aiohttp </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-aiohttp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-aiohttp-cve-2025-69230-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-aiohttp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-aiohttp-cve-2025-69230-7.3/" type="self" id="ROS-20260420-73-0022" title="ROS-20260420-73-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69230" type="cve" id="CVE-2025-69230" title="CVE-2025-69230" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-aiohttp" epoch="0" version="3.10.11" release="3.el7" arch="x86_64" src="python-aiohttp-3.10.11-3.el7.src.rpm">
					<filename>python3-aiohttp-0:3.10.11-3.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-aiohttp+speedups" epoch="0" version="3.10.11" release="3.el7" arch="x86_64" src="python-aiohttp-3.10.11-3.el7.src.rpm">
					<filename>python3-aiohttp+speedups-0:3.10.11-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0023</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость python-aiohttp </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-aiohttp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-aiohttp-cve-2025-69228-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-aiohttp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-aiohttp-cve-2025-69228-7.3/" type="self" id="ROS-20260420-73-0023" title="ROS-20260420-73-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69228" type="cve" id="CVE-2025-69228" title="CVE-2025-69228" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-aiohttp" epoch="0" version="3.10.11" release="3.el7" arch="x86_64" src="python-aiohttp-3.10.11-3.el7.src.rpm">
					<filename>python3-aiohttp-0:3.10.11-3.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-aiohttp+speedups" epoch="0" version="3.10.11" release="3.el7" arch="x86_64" src="python-aiohttp-3.10.11-3.el7.src.rpm">
					<filename>python3-aiohttp+speedups-0:3.10.11-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0024</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость python-aiohttp </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-aiohttp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-aiohttp-cve-2025-69227-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-aiohttp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-aiohttp-cve-2025-69227-7.3/" type="self" id="ROS-20260420-73-0024" title="ROS-20260420-73-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69227" type="cve" id="CVE-2025-69227" title="CVE-2025-69227" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-aiohttp" epoch="0" version="3.10.11" release="3.el7" arch="x86_64" src="python-aiohttp-3.10.11-3.el7.src.rpm">
					<filename>python3-aiohttp-0:3.10.11-3.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-aiohttp+speedups" epoch="0" version="3.10.11" release="3.el7" arch="x86_64" src="python-aiohttp-3.10.11-3.el7.src.rpm">
					<filename>python3-aiohttp+speedups-0:3.10.11-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0025</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость python-aiohttp </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-aiohttp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-aiohttp-cve-2025-69226-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-aiohttp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-aiohttp-cve-2025-69226-7.3/" type="self" id="ROS-20260420-73-0025" title="ROS-20260420-73-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69226" type="cve" id="CVE-2025-69226" title="CVE-2025-69226" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-aiohttp" epoch="0" version="3.10.11" release="3.el7" arch="x86_64" src="python-aiohttp-3.10.11-3.el7.src.rpm">
					<filename>python3-aiohttp-0:3.10.11-3.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-aiohttp+speedups" epoch="0" version="3.10.11" release="3.el7" arch="x86_64" src="python-aiohttp-3.10.11-3.el7.src.rpm">
					<filename>python3-aiohttp+speedups-0:3.10.11-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0026</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость python-aiohttp </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-aiohttp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-aiohttp-cve-2025-69225-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-aiohttp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-aiohttp-cve-2025-69225-7.3/" type="self" id="ROS-20260420-73-0026" title="ROS-20260420-73-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69225" type="cve" id="CVE-2025-69225" title="CVE-2025-69225" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-aiohttp" epoch="0" version="3.10.11" release="3.el7" arch="x86_64" src="python-aiohttp-3.10.11-3.el7.src.rpm">
					<filename>python3-aiohttp-0:3.10.11-3.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-aiohttp+speedups" epoch="0" version="3.10.11" release="3.el7" arch="x86_64" src="python-aiohttp-3.10.11-3.el7.src.rpm">
					<filename>python3-aiohttp+speedups-0:3.10.11-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0027</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость python-aiohttp </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-aiohttp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-aiohttp-cve-2025-69224-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-aiohttp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-aiohttp-cve-2025-69224-7.3/" type="self" id="ROS-20260420-73-0027" title="ROS-20260420-73-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69224" type="cve" id="CVE-2025-69224" title="CVE-2025-69224" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-aiohttp" epoch="0" version="3.10.11" release="3.el7" arch="x86_64" src="python-aiohttp-3.10.11-3.el7.src.rpm">
					<filename>python3-aiohttp-0:3.10.11-3.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-aiohttp+speedups" epoch="0" version="3.10.11" release="3.el7" arch="x86_64" src="python-aiohttp-3.10.11-3.el7.src.rpm">
					<filename>python3-aiohttp+speedups-0:3.10.11-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0028</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость libsoup </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libsoup</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libsoup-cve-2026-1761-7.3/</description>
               <solution>Установить обновление для пакета(ов) libsoup
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libsoup-cve-2026-1761-7.3/" type="self" id="ROS-20260420-73-0028" title="ROS-20260420-73-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1761" type="cve" id="CVE-2026-1761" title="CVE-2026-1761" />
			<reference href="https://bdu.fstec.ru/vul/2026-04958" type="self" id="BDU:2026-04958" title="BDU:2026-04958" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libsoup" epoch="0" version="2.74.3" release="6.el7" arch="x86_64" src="libsoup-2.74.3-6.el7.src.rpm">
					<filename>libsoup-0:2.74.3-6.el7.x86_64.rpm</filename>
				</package>
				<package name="libsoup-devel" epoch="0" version="2.74.3" release="6.el7" arch="x86_64" src="libsoup-2.74.3-6.el7.src.rpm">
					<filename>libsoup-devel-0:2.74.3-6.el7.x86_64.rpm</filename>
				</package>
				<package name="libsoup-doc" epoch="0" version="2.74.3" release="6.el7" arch="noarch" src="libsoup-2.74.3-6.el7.src.rpm">
					<filename>libsoup-doc-0:2.74.3-6.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0029</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость moodle </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-moodle-cve-2026-26045-7.3/</description>
               <solution>Установить обновление для пакета(ов) moodle
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-moodle-cve-2026-26045-7.3/" type="self" id="ROS-20260420-73-0029" title="ROS-20260420-73-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26045" type="cve" id="CVE-2026-26045" title="CVE-2026-26045" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="moodle" epoch="0" version="5.1.2" release="1.el7" arch="noarch" src="moodle-5.1.2-1.el7.src.rpm">
					<filename>moodle-0:5.1.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0030</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость moodle </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-moodle-cve-2026-26046-7.3/</description>
               <solution>Установить обновление для пакета(ов) moodle
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-moodle-cve-2026-26046-7.3/" type="self" id="ROS-20260420-73-0030" title="ROS-20260420-73-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26046" type="cve" id="CVE-2026-26046" title="CVE-2026-26046" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="moodle" epoch="0" version="5.1.2" release="1.el7" arch="noarch" src="moodle-5.1.2-1.el7.src.rpm">
					<filename>moodle-0:5.1.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0031</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость moodle </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-moodle-cve-2026-26047-7.3/</description>
               <solution>Установить обновление для пакета(ов) moodle
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-moodle-cve-2026-26047-7.3/" type="self" id="ROS-20260420-73-0031" title="ROS-20260420-73-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26047" type="cve" id="CVE-2026-26047" title="CVE-2026-26047" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="moodle" epoch="0" version="5.1.2" release="1.el7" arch="noarch" src="moodle-5.1.2-1.el7.src.rpm">
					<filename>moodle-0:5.1.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0032</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость lxd </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в lxd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-lxd-cve-2026-28384-7.3/</description>
               <solution>Установить обновление для пакета(ов) lxd
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-lxd-cve-2026-28384-7.3/" type="self" id="ROS-20260420-73-0032" title="ROS-20260420-73-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28384" type="cve" id="CVE-2026-28384" title="CVE-2026-28384" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="lxd" epoch="0" version="6.7" release="1.el7" arch="x86_64" src="lxd-6.7-1.el7.src.rpm">
					<filename>lxd-0:6.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="lxd-fish-completion" epoch="0" version="6.7" release="1.el7" arch="noarch" src="lxd-6.7-1.el7.src.rpm">
					<filename>lxd-fish-completion-0:6.7-1.el7.noarch.rpm</filename>
				</package>
				<package name="lxd-zsh-completion" epoch="0" version="6.7" release="1.el7" arch="noarch" src="lxd-6.7-1.el7.src.rpm">
					<filename>lxd-zsh-completion-0:6.7-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0033</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость lxd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в lxd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-lxd-cve-2025-64507-7.3/</description>
               <solution>Установить обновление для пакета(ов) lxd
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-lxd-cve-2025-64507-7.3/" type="self" id="ROS-20260420-73-0033" title="ROS-20260420-73-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64507" type="cve" id="CVE-2025-64507" title="CVE-2025-64507" />
			<reference href="https://bdu.fstec.ru/vul/2025-16114" type="self" id="BDU:2025-16114" title="BDU:2025-16114" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="lxd" epoch="0" version="6.7" release="1.el7" arch="x86_64" src="lxd-6.7-1.el7.src.rpm">
					<filename>lxd-0:6.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="lxd-fish-completion" epoch="0" version="6.7" release="1.el7" arch="noarch" src="lxd-6.7-1.el7.src.rpm">
					<filename>lxd-fish-completion-0:6.7-1.el7.noarch.rpm</filename>
				</package>
				<package name="lxd-zsh-completion" epoch="0" version="6.7" release="1.el7" arch="noarch" src="lxd-6.7-1.el7.src.rpm">
					<filename>lxd-zsh-completion-0:6.7-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0034</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость mediawiki </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в mediawiki</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mediawiki-cve-2025-61637-7.3/</description>
               <solution>Установить обновление для пакета(ов) mediawiki
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mediawiki-cve-2025-61637-7.3/" type="self" id="ROS-20260420-73-0034" title="ROS-20260420-73-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61637" type="cve" id="CVE-2025-61637" title="CVE-2025-61637" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mediawiki" epoch="0" version="1.40.3" release="9.el7" arch="noarch" src="mediawiki-1.40.3-9.el7.src.rpm">
					<filename>mediawiki-0:1.40.3-9.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0035</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость mediawiki </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в mediawiki</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mediawiki-cve-2025-61638-7.3/</description>
               <solution>Установить обновление для пакета(ов) mediawiki
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mediawiki-cve-2025-61638-7.3/" type="self" id="ROS-20260420-73-0035" title="ROS-20260420-73-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61638" type="cve" id="CVE-2025-61638" title="CVE-2025-61638" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mediawiki" epoch="0" version="1.40.3" release="9.el7" arch="noarch" src="mediawiki-1.40.3-9.el7.src.rpm">
					<filename>mediawiki-0:1.40.3-9.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0036</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость mediawiki </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mediawiki</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mediawiki-cve-2025-61639-7.3/</description>
               <solution>Установить обновление для пакета(ов) mediawiki
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mediawiki-cve-2025-61639-7.3/" type="self" id="ROS-20260420-73-0036" title="ROS-20260420-73-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61639" type="cve" id="CVE-2025-61639" title="CVE-2025-61639" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mediawiki" epoch="0" version="1.40.3" release="9.el7" arch="noarch" src="mediawiki-1.40.3-9.el7.src.rpm">
					<filename>mediawiki-0:1.40.3-9.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0037</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость mediawiki </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в mediawiki</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mediawiki-cve-2025-61640-7.3/</description>
               <solution>Установить обновление для пакета(ов) mediawiki
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mediawiki-cve-2025-61640-7.3/" type="self" id="ROS-20260420-73-0037" title="ROS-20260420-73-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61640" type="cve" id="CVE-2025-61640" title="CVE-2025-61640" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="mediawiki" epoch="0" version="1.40.3" release="9.el7" arch="noarch" src="mediawiki-1.40.3-9.el7.src.rpm">
					<filename>mediawiki-0:1.40.3-9.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0038</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость nodejs-minimatch </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nodejs-minimatch</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-minimatch-cve-2026-26996-7.3/</description>
               <solution>Установить обновление для пакета(ов) nodejs-minimatch
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-minimatch-cve-2026-26996-7.3/" type="self" id="ROS-20260420-73-0038" title="ROS-20260420-73-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26996" type="cve" id="CVE-2026-26996" title="CVE-2026-26996" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs-minimatch" epoch="0" version="3.1.4" release="1.el7" arch="noarch" src="nodejs-minimatch-3.1.4-1.el7.src.rpm">
					<filename>nodejs-minimatch-0:3.1.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0039</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость python-pyasn1 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-pyasn1</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pyasn1-cve-2026-30922-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-pyasn1
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pyasn1-cve-2026-30922-7.3/" type="self" id="ROS-20260420-73-0039" title="ROS-20260420-73-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-30922" type="cve" id="CVE-2026-30922" title="CVE-2026-30922" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-pyasn1" epoch="0" version="0.6.3" release="1.el7" arch="noarch" src="python-pyasn1-0.6.3-1.el7.src.rpm">
					<filename>python3-pyasn1-0:0.6.3-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-pyasn1-docs" epoch="0" version="0.6.3" release="1.el7" arch="noarch" src="python-pyasn1-0.6.3-1.el7.src.rpm">
					<filename>python3-pyasn1-docs-0:0.6.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0040</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость beats </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в beats</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-beats-cve-2026-26931-7.3/</description>
               <solution>Установить обновление для пакета(ов) beats
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-beats-cve-2026-26931-7.3/" type="self" id="ROS-20260420-73-0040" title="ROS-20260420-73-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26931" type="cve" id="CVE-2026-26931" title="CVE-2026-26931" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="auditbeat" epoch="0" version="9.2.5" release="1.el7" arch="x86_64" src="beats-9.2.5-1.el7.src.rpm">
					<filename>auditbeat-0:9.2.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="auditbeat-docs" epoch="0" version="9.2.5" release="1.el7" arch="x86_64" src="beats-9.2.5-1.el7.src.rpm">
					<filename>auditbeat-docs-0:9.2.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="beats" epoch="0" version="9.2.5" release="1.el7" arch="x86_64" src="beats-9.2.5-1.el7.src.rpm">
					<filename>beats-0:9.2.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="filebeat" epoch="0" version="9.2.5" release="1.el7" arch="x86_64" src="beats-9.2.5-1.el7.src.rpm">
					<filename>filebeat-0:9.2.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="filebeat-docs" epoch="0" version="9.2.5" release="1.el7" arch="x86_64" src="beats-9.2.5-1.el7.src.rpm">
					<filename>filebeat-docs-0:9.2.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="heartbeat" epoch="0" version="9.2.5" release="1.el7" arch="x86_64" src="beats-9.2.5-1.el7.src.rpm">
					<filename>heartbeat-0:9.2.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="heartbeat-docs" epoch="0" version="9.2.5" release="1.el7" arch="x86_64" src="beats-9.2.5-1.el7.src.rpm">
					<filename>heartbeat-docs-0:9.2.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="metricbeat" epoch="0" version="9.2.5" release="1.el7" arch="x86_64" src="beats-9.2.5-1.el7.src.rpm">
					<filename>metricbeat-0:9.2.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="metricbeat-docs" epoch="0" version="9.2.5" release="1.el7" arch="x86_64" src="beats-9.2.5-1.el7.src.rpm">
					<filename>metricbeat-docs-0:9.2.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="packetbeat" epoch="0" version="9.2.5" release="1.el7" arch="x86_64" src="beats-9.2.5-1.el7.src.rpm">
					<filename>packetbeat-0:9.2.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="packetbeat-docs" epoch="0" version="9.2.5" release="1.el7" arch="x86_64" src="beats-9.2.5-1.el7.src.rpm">
					<filename>packetbeat-docs-0:9.2.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0041</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость beats </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в beats</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-beats-cve-2026-26933-7.3/</description>
               <solution>Установить обновление для пакета(ов) beats
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-beats-cve-2026-26933-7.3/" type="self" id="ROS-20260420-73-0041" title="ROS-20260420-73-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26933" type="cve" id="CVE-2026-26933" title="CVE-2026-26933" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="auditbeat" epoch="0" version="9.2.5" release="1.el7" arch="x86_64" src="beats-9.2.5-1.el7.src.rpm">
					<filename>auditbeat-0:9.2.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="auditbeat-docs" epoch="0" version="9.2.5" release="1.el7" arch="x86_64" src="beats-9.2.5-1.el7.src.rpm">
					<filename>auditbeat-docs-0:9.2.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="beats" epoch="0" version="9.2.5" release="1.el7" arch="x86_64" src="beats-9.2.5-1.el7.src.rpm">
					<filename>beats-0:9.2.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="filebeat" epoch="0" version="9.2.5" release="1.el7" arch="x86_64" src="beats-9.2.5-1.el7.src.rpm">
					<filename>filebeat-0:9.2.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="filebeat-docs" epoch="0" version="9.2.5" release="1.el7" arch="x86_64" src="beats-9.2.5-1.el7.src.rpm">
					<filename>filebeat-docs-0:9.2.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="heartbeat" epoch="0" version="9.2.5" release="1.el7" arch="x86_64" src="beats-9.2.5-1.el7.src.rpm">
					<filename>heartbeat-0:9.2.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="heartbeat-docs" epoch="0" version="9.2.5" release="1.el7" arch="x86_64" src="beats-9.2.5-1.el7.src.rpm">
					<filename>heartbeat-docs-0:9.2.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="metricbeat" epoch="0" version="9.2.5" release="1.el7" arch="x86_64" src="beats-9.2.5-1.el7.src.rpm">
					<filename>metricbeat-0:9.2.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="metricbeat-docs" epoch="0" version="9.2.5" release="1.el7" arch="x86_64" src="beats-9.2.5-1.el7.src.rpm">
					<filename>metricbeat-docs-0:9.2.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="packetbeat" epoch="0" version="9.2.5" release="1.el7" arch="x86_64" src="beats-9.2.5-1.el7.src.rpm">
					<filename>packetbeat-0:9.2.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="packetbeat-docs" epoch="0" version="9.2.5" release="1.el7" arch="x86_64" src="beats-9.2.5-1.el7.src.rpm">
					<filename>packetbeat-docs-0:9.2.5-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0042</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость incus </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в incus</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-incus-cve-2026-33542-7.3/</description>
               <solution>Установить обновление для пакета(ов) incus
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-incus-cve-2026-33542-7.3/" type="self" id="ROS-20260420-73-0042" title="ROS-20260420-73-0042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33542" type="cve" id="CVE-2026-33542" title="CVE-2026-33542" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="incus" epoch="0" version="6.23.0" release="1.el7" arch="x86_64" src="incus-6.23.0-1.el7.src.rpm">
					<filename>incus-0:6.23.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="incus-agent" epoch="0" version="6.23.0" release="1.el7" arch="x86_64" src="incus-6.23.0-1.el7.src.rpm">
					<filename>incus-agent-0:6.23.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="incus-client" epoch="0" version="6.23.0" release="1.el7" arch="x86_64" src="incus-6.23.0-1.el7.src.rpm">
					<filename>incus-client-0:6.23.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="incus-tools" epoch="0" version="6.23.0" release="1.el7" arch="x86_64" src="incus-6.23.0-1.el7.src.rpm">
					<filename>incus-tools-0:6.23.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="incus-selinux" epoch="0" version="6.23.0" release="1.el7" arch="noarch" src="incus-6.23.0-1.el7.src.rpm">
					<filename>incus-selinux-0:6.23.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0043</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость incus </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в incus</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-incus-cve-2026-33945-7.3/</description>
               <solution>Установить обновление для пакета(ов) incus
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-incus-cve-2026-33945-7.3/" type="self" id="ROS-20260420-73-0043" title="ROS-20260420-73-0043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33945" type="cve" id="CVE-2026-33945" title="CVE-2026-33945" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="incus" epoch="0" version="6.23.0" release="1.el7" arch="x86_64" src="incus-6.23.0-1.el7.src.rpm">
					<filename>incus-0:6.23.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="incus-agent" epoch="0" version="6.23.0" release="1.el7" arch="x86_64" src="incus-6.23.0-1.el7.src.rpm">
					<filename>incus-agent-0:6.23.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="incus-client" epoch="0" version="6.23.0" release="1.el7" arch="x86_64" src="incus-6.23.0-1.el7.src.rpm">
					<filename>incus-client-0:6.23.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="incus-tools" epoch="0" version="6.23.0" release="1.el7" arch="x86_64" src="incus-6.23.0-1.el7.src.rpm">
					<filename>incus-tools-0:6.23.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="incus-selinux" epoch="0" version="6.23.0" release="1.el7" arch="noarch" src="incus-6.23.0-1.el7.src.rpm">
					<filename>incus-selinux-0:6.23.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0044</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость incus </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в incus</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-incus-cve-2026-33898-7.3/</description>
               <solution>Установить обновление для пакета(ов) incus
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-incus-cve-2026-33898-7.3/" type="self" id="ROS-20260420-73-0044" title="ROS-20260420-73-0044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33898" type="cve" id="CVE-2026-33898" title="CVE-2026-33898" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="incus" epoch="0" version="6.23.0" release="1.el7" arch="x86_64" src="incus-6.23.0-1.el7.src.rpm">
					<filename>incus-0:6.23.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="incus-agent" epoch="0" version="6.23.0" release="1.el7" arch="x86_64" src="incus-6.23.0-1.el7.src.rpm">
					<filename>incus-agent-0:6.23.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="incus-client" epoch="0" version="6.23.0" release="1.el7" arch="x86_64" src="incus-6.23.0-1.el7.src.rpm">
					<filename>incus-client-0:6.23.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="incus-tools" epoch="0" version="6.23.0" release="1.el7" arch="x86_64" src="incus-6.23.0-1.el7.src.rpm">
					<filename>incus-tools-0:6.23.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="incus-selinux" epoch="0" version="6.23.0" release="1.el7" arch="noarch" src="incus-6.23.0-1.el7.src.rpm">
					<filename>incus-selinux-0:6.23.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0045</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость incus </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в incus</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-incus-cve-2026-33897-7.3/</description>
               <solution>Установить обновление для пакета(ов) incus
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-incus-cve-2026-33897-7.3/" type="self" id="ROS-20260420-73-0045" title="ROS-20260420-73-0045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33897" type="cve" id="CVE-2026-33897" title="CVE-2026-33897" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="incus" epoch="0" version="6.23.0" release="1.el7" arch="x86_64" src="incus-6.23.0-1.el7.src.rpm">
					<filename>incus-0:6.23.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="incus-agent" epoch="0" version="6.23.0" release="1.el7" arch="x86_64" src="incus-6.23.0-1.el7.src.rpm">
					<filename>incus-agent-0:6.23.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="incus-client" epoch="0" version="6.23.0" release="1.el7" arch="x86_64" src="incus-6.23.0-1.el7.src.rpm">
					<filename>incus-client-0:6.23.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="incus-tools" epoch="0" version="6.23.0" release="1.el7" arch="x86_64" src="incus-6.23.0-1.el7.src.rpm">
					<filename>incus-tools-0:6.23.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="incus-selinux" epoch="0" version="6.23.0" release="1.el7" arch="noarch" src="incus-6.23.0-1.el7.src.rpm">
					<filename>incus-selinux-0:6.23.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0046</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость incus </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в incus</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-incus-cve-2026-33743-7.3/</description>
               <solution>Установить обновление для пакета(ов) incus
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-incus-cve-2026-33743-7.3/" type="self" id="ROS-20260420-73-0046" title="ROS-20260420-73-0046" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33743" type="cve" id="CVE-2026-33743" title="CVE-2026-33743" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="incus" epoch="0" version="6.23.0" release="1.el7" arch="x86_64" src="incus-6.23.0-1.el7.src.rpm">
					<filename>incus-0:6.23.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="incus-agent" epoch="0" version="6.23.0" release="1.el7" arch="x86_64" src="incus-6.23.0-1.el7.src.rpm">
					<filename>incus-agent-0:6.23.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="incus-client" epoch="0" version="6.23.0" release="1.el7" arch="x86_64" src="incus-6.23.0-1.el7.src.rpm">
					<filename>incus-client-0:6.23.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="incus-tools" epoch="0" version="6.23.0" release="1.el7" arch="x86_64" src="incus-6.23.0-1.el7.src.rpm">
					<filename>incus-tools-0:6.23.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="incus-selinux" epoch="0" version="6.23.0" release="1.el7" arch="noarch" src="incus-6.23.0-1.el7.src.rpm">
					<filename>incus-selinux-0:6.23.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260420-73-0047</id>
		<issued date="2026-04-20" />
		<updated date="2026-04-20" />
		<title>Уязвимость incus </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в incus</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-incus-cve-2026-33711-7.3/</description>
               <solution>Установить обновление для пакета(ов) incus
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-incus-cve-2026-33711-7.3/" type="self" id="ROS-20260420-73-0047" title="ROS-20260420-73-0047" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33711" type="cve" id="CVE-2026-33711" title="CVE-2026-33711" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="incus" epoch="0" version="6.23.0" release="1.el7" arch="x86_64" src="incus-6.23.0-1.el7.src.rpm">
					<filename>incus-0:6.23.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="incus-agent" epoch="0" version="6.23.0" release="1.el7" arch="x86_64" src="incus-6.23.0-1.el7.src.rpm">
					<filename>incus-agent-0:6.23.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="incus-client" epoch="0" version="6.23.0" release="1.el7" arch="x86_64" src="incus-6.23.0-1.el7.src.rpm">
					<filename>incus-client-0:6.23.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="incus-tools" epoch="0" version="6.23.0" release="1.el7" arch="x86_64" src="incus-6.23.0-1.el7.src.rpm">
					<filename>incus-tools-0:6.23.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="incus-selinux" epoch="0" version="6.23.0" release="1.el7" arch="noarch" src="incus-6.23.0-1.el7.src.rpm">
					<filename>incus-selinux-0:6.23.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260424-73-0001</id>
		<issued date="2026-04-24" />
		<updated date="2026-04-24" />
		<title>Уязвимость gimp </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в gimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2025-15059-7.3/</description>
               <solution>Установить обновление для пакета(ов) gimp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2025-15059-7.3/" type="self" id="ROS-20260424-73-0001" title="ROS-20260424-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15059" type="cve" id="CVE-2025-15059" title="CVE-2025-15059" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gimp" epoch="2" version="2.10.36" release="7.el7" arch="x86_64" src="gimp-2.10.36-7.el7.src.rpm">
					<filename>gimp-2:2.10.36-7.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="2.10.36" release="7.el7" arch="x86_64" src="gimp-2.10.36-7.el7.src.rpm">
					<filename>gimp-devel-2:2.10.36-7.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="2.10.36" release="7.el7" arch="x86_64" src="gimp-2.10.36-7.el7.src.rpm">
					<filename>gimp-devel-tools-2:2.10.36-7.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="2.10.36" release="7.el7" arch="x86_64" src="gimp-2.10.36-7.el7.src.rpm">
					<filename>gimp-libs-2:2.10.36-7.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260424-73-0002</id>
		<issued date="2026-04-24" />
		<updated date="2026-04-24" />
		<title>Уязвимость gimp </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в gimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2026-0797-7.3/</description>
               <solution>Установить обновление для пакета(ов) gimp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2026-0797-7.3/" type="self" id="ROS-20260424-73-0002" title="ROS-20260424-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0797" type="cve" id="CVE-2026-0797" title="CVE-2026-0797" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gimp" epoch="2" version="2.10.36" release="8.el7" arch="x86_64" src="gimp-2.10.36-8.el7.src.rpm">
					<filename>gimp-2:2.10.36-8.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="2.10.36" release="8.el7" arch="x86_64" src="gimp-2.10.36-8.el7.src.rpm">
					<filename>gimp-devel-2:2.10.36-8.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="2.10.36" release="8.el7" arch="x86_64" src="gimp-2.10.36-8.el7.src.rpm">
					<filename>gimp-devel-tools-2:2.10.36-8.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="2.10.36" release="8.el7" arch="x86_64" src="gimp-2.10.36-8.el7.src.rpm">
					<filename>gimp-libs-2:2.10.36-8.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260424-73-0003</id>
		<issued date="2026-04-24" />
		<updated date="2026-04-24" />
		<title>Уязвимость gimp </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в gimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2026-2044-7.3/</description>
               <solution>Установить обновление для пакета(ов) gimp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2026-2044-7.3/" type="self" id="ROS-20260424-73-0003" title="ROS-20260424-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2044" type="cve" id="CVE-2026-2044" title="CVE-2026-2044" />
			<reference href="https://bdu.fstec.ru/vul/2026-06700" type="self" id="BDU:2026-06700" title="BDU:2026-06700" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gimp" epoch="2" version="2.10.36" release="8.el7" arch="x86_64" src="gimp-2.10.36-8.el7.src.rpm">
					<filename>gimp-2:2.10.36-8.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="2.10.36" release="8.el7" arch="x86_64" src="gimp-2.10.36-8.el7.src.rpm">
					<filename>gimp-devel-2:2.10.36-8.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="2.10.36" release="8.el7" arch="x86_64" src="gimp-2.10.36-8.el7.src.rpm">
					<filename>gimp-devel-tools-2:2.10.36-8.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="2.10.36" release="8.el7" arch="x86_64" src="gimp-2.10.36-8.el7.src.rpm">
					<filename>gimp-libs-2:2.10.36-8.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260424-73-0004</id>
		<issued date="2026-04-24" />
		<updated date="2026-04-24" />
		<title>Уязвимость gimp </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в gimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2026-2045-7.3/</description>
               <solution>Установить обновление для пакета(ов) gimp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2026-2045-7.3/" type="self" id="ROS-20260424-73-0004" title="ROS-20260424-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2045" type="cve" id="CVE-2026-2045" title="CVE-2026-2045" />
			<reference href="https://bdu.fstec.ru/vul/2026-06701" type="self" id="BDU:2026-06701" title="BDU:2026-06701" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gimp" epoch="2" version="2.10.36" release="8.el7" arch="x86_64" src="gimp-2.10.36-8.el7.src.rpm">
					<filename>gimp-2:2.10.36-8.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="2.10.36" release="8.el7" arch="x86_64" src="gimp-2.10.36-8.el7.src.rpm">
					<filename>gimp-devel-2:2.10.36-8.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="2.10.36" release="8.el7" arch="x86_64" src="gimp-2.10.36-8.el7.src.rpm">
					<filename>gimp-devel-tools-2:2.10.36-8.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="2.10.36" release="8.el7" arch="x86_64" src="gimp-2.10.36-8.el7.src.rpm">
					<filename>gimp-libs-2:2.10.36-8.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260424-73-0005</id>
		<issued date="2026-04-24" />
		<updated date="2026-04-24" />
		<title>Уязвимость gimp </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в gimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2026-2048-7.3/</description>
               <solution>Установить обновление для пакета(ов) gimp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-gimp-cve-2026-2048-7.3/" type="self" id="ROS-20260424-73-0005" title="ROS-20260424-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2048" type="cve" id="CVE-2026-2048" title="CVE-2026-2048" />
			<reference href="https://bdu.fstec.ru/vul/2026-06702" type="self" id="BDU:2026-06702" title="BDU:2026-06702" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="gimp" epoch="2" version="2.10.36" release="8.el7" arch="x86_64" src="gimp-2.10.36-8.el7.src.rpm">
					<filename>gimp-2:2.10.36-8.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="2.10.36" release="8.el7" arch="x86_64" src="gimp-2.10.36-8.el7.src.rpm">
					<filename>gimp-devel-2:2.10.36-8.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="2.10.36" release="8.el7" arch="x86_64" src="gimp-2.10.36-8.el7.src.rpm">
					<filename>gimp-devel-tools-2:2.10.36-8.el7.x86_64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="2.10.36" release="8.el7" arch="x86_64" src="gimp-2.10.36-8.el7.src.rpm">
					<filename>gimp-libs-2:2.10.36-8.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260424-73-0006</id>
		<issued date="2026-04-24" />
		<updated date="2026-04-24" />
		<title>Уязвимость libssh </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libssh</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libssh-cve-2025-14821-7.3/</description>
               <solution>Установить обновление для пакета(ов) libssh
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libssh-cve-2025-14821-7.3/" type="self" id="ROS-20260424-73-0006" title="ROS-20260424-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14821" type="cve" id="CVE-2025-14821" title="CVE-2025-14821" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libssh" epoch="0" version="0.11.4" release="1.el7" arch="x86_64" src="libssh-0.11.4-1.el7.src.rpm">
					<filename>libssh-0:0.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libssh-devel" epoch="0" version="0.11.4" release="1.el7" arch="x86_64" src="libssh-0.11.4-1.el7.src.rpm">
					<filename>libssh-devel-0:0.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libssh-config" epoch="0" version="0.11.4" release="1.el7" arch="noarch" src="libssh-0.11.4-1.el7.src.rpm">
					<filename>libssh-config-0:0.11.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0001</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость coreutils </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в coreutils</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-coreutils-cve-2025-5278-7.3/</description>
               <solution>Установить обновление для пакета(ов) coreutils
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-coreutils-cve-2025-5278-7.3/" type="self" id="ROS-20260429-73-0001" title="ROS-20260429-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5278" type="cve" id="CVE-2025-5278" title="CVE-2025-5278" />
			<reference href="https://bdu.fstec.ru/vul/2025-10950" type="self" id="BDU:2025-10950" title="BDU:2025-10950" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="coreutils" epoch="0" version="8.32" release="8.el7" arch="x86_64" src="coreutils-8.32-8.el7.src.rpm">
					<filename>coreutils-0:8.32-8.el7.x86_64.rpm</filename>
				</package>
				<package name="coreutils-common" epoch="0" version="8.32" release="8.el7" arch="x86_64" src="coreutils-8.32-8.el7.src.rpm">
					<filename>coreutils-common-0:8.32-8.el7.x86_64.rpm</filename>
				</package>
				<package name="coreutils-single" epoch="0" version="8.32" release="8.el7" arch="x86_64" src="coreutils-8.32-8.el7.src.rpm">
					<filename>coreutils-single-0:8.32-8.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0002</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость postgresql18 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в postgresql18</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql18-cve-2026-2003-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql18
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql18-cve-2026-2003-7.3/" type="self" id="ROS-20260429-73-0002" title="ROS-20260429-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2003" type="cve" id="CVE-2026-2003" title="CVE-2026-2003" />
			<reference href="https://bdu.fstec.ru/vul/2026-01726" type="self" id="BDU:2026-01726" title="BDU:2026-01726" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql18" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-contrib" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-contrib-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-devel" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-devel-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-docs" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-docs-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-libs" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-libs-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-llvmjit" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-llvmjit-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-plperl" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-plperl-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-plpython3" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-plpython3-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-pltcl" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-pltcl-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-server" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-server-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-test" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-test-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0003</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость postgresql17 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в postgresql17</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql17-cve-2026-2003-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql17
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql17-cve-2026-2003-7.3/" type="self" id="ROS-20260429-73-0003" title="ROS-20260429-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2003" type="cve" id="CVE-2026-2003" title="CVE-2026-2003" />
			<reference href="https://bdu.fstec.ru/vul/2026-01726" type="self" id="BDU:2026-01726" title="BDU:2026-01726" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql17" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-contrib" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-contrib-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-devel" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-devel-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-docs" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-docs-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-libs" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-libs-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-llvmjit" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-llvmjit-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-plperl" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-plperl-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-plpython3" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-plpython3-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-pltcl" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-pltcl-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-server" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-server-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-test" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-test-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0004</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость postgresql16 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в postgresql16</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql16-cve-2026-2003-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql16
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql16-cve-2026-2003-7.3/" type="self" id="ROS-20260429-73-0004" title="ROS-20260429-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2003" type="cve" id="CVE-2026-2003" title="CVE-2026-2003" />
			<reference href="https://bdu.fstec.ru/vul/2026-01726" type="self" id="BDU:2026-01726" title="BDU:2026-01726" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql16" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-contrib" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-contrib-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-devel" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-devel-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-docs" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-docs-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-libs" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-libs-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-llvmjit" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-llvmjit-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-plperl" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-plperl-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-plpython3" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-plpython3-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-pltcl" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-pltcl-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-server" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-server-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-test" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-test-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0005</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость postgresql15 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в postgresql15</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql15-cve-2026-2003-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql15
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql15-cve-2026-2003-7.3/" type="self" id="ROS-20260429-73-0005" title="ROS-20260429-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2003" type="cve" id="CVE-2026-2003" title="CVE-2026-2003" />
			<reference href="https://bdu.fstec.ru/vul/2026-01726" type="self" id="BDU:2026-01726" title="BDU:2026-01726" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql15" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-contrib" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-contrib-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-devel" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-devel-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-docs" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-docs-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-libs" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-libs-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-llvmjit" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-llvmjit-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-plperl" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-plperl-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-plpython3" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-plpython3-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-pltcl" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-pltcl-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-server" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-server-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-test" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-test-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0006</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость postgresql14 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в postgresql14</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql14-cve-2026-2003-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql14
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql14-cve-2026-2003-7.3/" type="self" id="ROS-20260429-73-0006" title="ROS-20260429-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2003" type="cve" id="CVE-2026-2003" title="CVE-2026-2003" />
			<reference href="https://bdu.fstec.ru/vul/2026-01726" type="self" id="BDU:2026-01726" title="BDU:2026-01726" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql14" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-contrib" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-contrib-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-devel" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-devel-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-docs" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-docs-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-libs" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-libs-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-llvmjit" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-llvmjit-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-plperl" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-plperl-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-plpython3" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-plpython3-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-pltcl" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-pltcl-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-server" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-server-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-test" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-test-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0007</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость postgresql18-1c </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в postgresql18-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql18-1c-cve-2026-2003-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql18-1c
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql18-1c-cve-2026-2003-7.3/" type="self" id="ROS-20260429-73-0007" title="ROS-20260429-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2003" type="cve" id="CVE-2026-2003" title="CVE-2026-2003" />
			<reference href="https://bdu.fstec.ru/vul/2026-01726" type="self" id="BDU:2026-01726" title="BDU:2026-01726" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql18-1c" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-contrib" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-contrib-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-devel" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-devel-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-docs" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-docs-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-libs" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-libs-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-llvmjit" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-llvmjit-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-plperl" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-plperl-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-plpython3" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-plpython3-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-pltcl" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-pltcl-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-server" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-server-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-test" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-test-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0008</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость postgresql17-1c </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в postgresql17-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql17-1c-cve-2026-2003-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql17-1c
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql17-1c-cve-2026-2003-7.3/" type="self" id="ROS-20260429-73-0008" title="ROS-20260429-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2003" type="cve" id="CVE-2026-2003" title="CVE-2026-2003" />
			<reference href="https://bdu.fstec.ru/vul/2026-01726" type="self" id="BDU:2026-01726" title="BDU:2026-01726" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql17-1c" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-contrib" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-contrib-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-devel" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-devel-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-docs" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-docs-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-libs" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-libs-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-llvmjit" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-llvmjit-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-plperl" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-plperl-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-plpython3" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-plpython3-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-pltcl" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-pltcl-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-server" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-server-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-test" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-test-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0009</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость postgresql15-1c </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в postgresql15-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql15-1c-cve-2026-2003-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql15-1c
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql15-1c-cve-2026-2003-7.3/" type="self" id="ROS-20260429-73-0009" title="ROS-20260429-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2003" type="cve" id="CVE-2026-2003" title="CVE-2026-2003" />
			<reference href="https://bdu.fstec.ru/vul/2026-01726" type="self" id="BDU:2026-01726" title="BDU:2026-01726" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql15-1c" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-contrib" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-contrib-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-devel" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-devel-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-docs" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-docs-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-libs" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-libs-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-llvmjit" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-llvmjit-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-plperl" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-plperl-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-plpython3" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-plpython3-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-pltcl" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-pltcl-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-server" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-server-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-test" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-test-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0010</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость postgresql-1c </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в postgresql-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-1c-cve-2026-2003-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql-1c
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-1c-cve-2026-2003-7.3/" type="self" id="ROS-20260429-73-0010" title="ROS-20260429-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2003" type="cve" id="CVE-2026-2003" title="CVE-2026-2003" />
			<reference href="https://bdu.fstec.ru/vul/2026-01726" type="self" id="BDU:2026-01726" title="BDU:2026-01726" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql-1c" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-contrib" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-contrib-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-devel" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-devel-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-docs" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-docs-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-libs" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-libs-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-llvmjit" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-llvmjit-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-plperl" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-plperl-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-plpython3" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-plpython3-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-pltcl" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-pltcl-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-server" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-server-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-test" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-test-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0011</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость postgresql18 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql18</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql18-cve-2026-2007-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql18
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql18-cve-2026-2007-7.3/" type="self" id="ROS-20260429-73-0011" title="ROS-20260429-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2007" type="cve" id="CVE-2026-2007" title="CVE-2026-2007" />
			<reference href="https://bdu.fstec.ru/vul/2026-01724" type="self" id="BDU:2026-01724" title="BDU:2026-01724" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql18" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-contrib" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-contrib-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-devel" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-devel-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-docs" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-docs-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-libs" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-libs-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-llvmjit" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-llvmjit-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-plperl" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-plperl-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-plpython3" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-plpython3-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-pltcl" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-pltcl-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-server" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-server-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-test" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-test-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0012</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость postgresql18-1c </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql18-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql18-1c-cve-2026-2007-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql18-1c
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql18-1c-cve-2026-2007-7.3/" type="self" id="ROS-20260429-73-0012" title="ROS-20260429-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2007" type="cve" id="CVE-2026-2007" title="CVE-2026-2007" />
			<reference href="https://bdu.fstec.ru/vul/2026-01724" type="self" id="BDU:2026-01724" title="BDU:2026-01724" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql18-1c" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-contrib" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-contrib-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-devel" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-devel-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-docs" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-docs-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-libs" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-libs-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-llvmjit" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-llvmjit-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-plperl" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-plperl-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-plpython3" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-plpython3-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-pltcl" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-pltcl-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-server" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-server-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-test" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-test-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0013</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость postgresql18 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql18</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql18-cve-2026-2006-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql18
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql18-cve-2026-2006-7.3/" type="self" id="ROS-20260429-73-0013" title="ROS-20260429-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2006" type="cve" id="CVE-2026-2006" title="CVE-2026-2006" />
			<reference href="https://bdu.fstec.ru/vul/2026-01723" type="self" id="BDU:2026-01723" title="BDU:2026-01723" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql18" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-contrib" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-contrib-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-devel" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-devel-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-docs" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-docs-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-libs" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-libs-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-llvmjit" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-llvmjit-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-plperl" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-plperl-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-plpython3" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-plpython3-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-pltcl" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-pltcl-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-server" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-server-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-test" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-test-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0014</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость postgresql17 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql17</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql17-cve-2026-2006-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql17
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql17-cve-2026-2006-7.3/" type="self" id="ROS-20260429-73-0014" title="ROS-20260429-73-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2006" type="cve" id="CVE-2026-2006" title="CVE-2026-2006" />
			<reference href="https://bdu.fstec.ru/vul/2026-01723" type="self" id="BDU:2026-01723" title="BDU:2026-01723" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql17" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-contrib" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-contrib-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-devel" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-devel-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-docs" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-docs-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-libs" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-libs-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-llvmjit" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-llvmjit-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-plperl" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-plperl-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-plpython3" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-plpython3-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-pltcl" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-pltcl-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-server" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-server-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-test" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-test-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0015</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость postgresql16 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql16</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql16-cve-2026-2006-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql16
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql16-cve-2026-2006-7.3/" type="self" id="ROS-20260429-73-0015" title="ROS-20260429-73-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2006" type="cve" id="CVE-2026-2006" title="CVE-2026-2006" />
			<reference href="https://bdu.fstec.ru/vul/2026-01723" type="self" id="BDU:2026-01723" title="BDU:2026-01723" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql16" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-contrib" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-contrib-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-devel" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-devel-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-docs" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-docs-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-libs" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-libs-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-llvmjit" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-llvmjit-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-plperl" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-plperl-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-plpython3" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-plpython3-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-pltcl" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-pltcl-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-server" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-server-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-test" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-test-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0016</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость postgresql15 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql15</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql15-cve-2026-2006-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql15
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql15-cve-2026-2006-7.3/" type="self" id="ROS-20260429-73-0016" title="ROS-20260429-73-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2006" type="cve" id="CVE-2026-2006" title="CVE-2026-2006" />
			<reference href="https://bdu.fstec.ru/vul/2026-01723" type="self" id="BDU:2026-01723" title="BDU:2026-01723" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql15" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-contrib" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-contrib-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-devel" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-devel-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-docs" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-docs-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-libs" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-libs-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-llvmjit" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-llvmjit-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-plperl" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-plperl-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-plpython3" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-plpython3-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-pltcl" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-pltcl-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-server" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-server-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-test" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-test-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0017</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость postgresql14 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql14</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql14-cve-2026-2006-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql14
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql14-cve-2026-2006-7.3/" type="self" id="ROS-20260429-73-0017" title="ROS-20260429-73-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2006" type="cve" id="CVE-2026-2006" title="CVE-2026-2006" />
			<reference href="https://bdu.fstec.ru/vul/2026-01723" type="self" id="BDU:2026-01723" title="BDU:2026-01723" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql14" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-contrib" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-contrib-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-devel" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-devel-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-docs" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-docs-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-libs" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-libs-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-llvmjit" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-llvmjit-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-plperl" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-plperl-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-plpython3" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-plpython3-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-pltcl" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-pltcl-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-server" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-server-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-test" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-test-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0018</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость postgresql18-1c </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql18-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql18-1c-cve-2026-2006-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql18-1c
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql18-1c-cve-2026-2006-7.3/" type="self" id="ROS-20260429-73-0018" title="ROS-20260429-73-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2006" type="cve" id="CVE-2026-2006" title="CVE-2026-2006" />
			<reference href="https://bdu.fstec.ru/vul/2026-01723" type="self" id="BDU:2026-01723" title="BDU:2026-01723" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql18-1c" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-contrib" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-contrib-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-devel" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-devel-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-docs" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-docs-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-libs" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-libs-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-llvmjit" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-llvmjit-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-plperl" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-plperl-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-plpython3" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-plpython3-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-pltcl" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-pltcl-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-server" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-server-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-test" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-test-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0019</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость postgresql17-1c </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql17-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql17-1c-cve-2026-2006-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql17-1c
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql17-1c-cve-2026-2006-7.3/" type="self" id="ROS-20260429-73-0019" title="ROS-20260429-73-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2006" type="cve" id="CVE-2026-2006" title="CVE-2026-2006" />
			<reference href="https://bdu.fstec.ru/vul/2026-01723" type="self" id="BDU:2026-01723" title="BDU:2026-01723" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql17-1c" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-contrib" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-contrib-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-devel" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-devel-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-docs" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-docs-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-libs" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-libs-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-llvmjit" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-llvmjit-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-plperl" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-plperl-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-plpython3" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-plpython3-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-pltcl" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-pltcl-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-server" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-server-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-test" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-test-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0020</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость postgresql15-1c </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql15-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql15-1c-cve-2026-2006-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql15-1c
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql15-1c-cve-2026-2006-7.3/" type="self" id="ROS-20260429-73-0020" title="ROS-20260429-73-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2006" type="cve" id="CVE-2026-2006" title="CVE-2026-2006" />
			<reference href="https://bdu.fstec.ru/vul/2026-01723" type="self" id="BDU:2026-01723" title="BDU:2026-01723" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql15-1c" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-contrib" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-contrib-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-devel" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-devel-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-docs" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-docs-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-libs" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-libs-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-llvmjit" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-llvmjit-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-plperl" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-plperl-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-plpython3" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-plpython3-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-pltcl" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-pltcl-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-server" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-server-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-test" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-test-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0021</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость postgresql-1c </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-1c-cve-2026-2006-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql-1c
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-1c-cve-2026-2006-7.3/" type="self" id="ROS-20260429-73-0021" title="ROS-20260429-73-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2006" type="cve" id="CVE-2026-2006" title="CVE-2026-2006" />
			<reference href="https://bdu.fstec.ru/vul/2026-01723" type="self" id="BDU:2026-01723" title="BDU:2026-01723" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql-1c" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-contrib" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-contrib-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-devel" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-devel-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-docs" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-docs-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-libs" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-libs-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-llvmjit" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-llvmjit-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-plperl" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-plperl-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-plpython3" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-plpython3-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-pltcl" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-pltcl-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-server" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-server-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-test" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-test-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0022</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость postgresql18 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql18</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql18-cve-2026-2005-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql18
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql18-cve-2026-2005-7.3/" type="self" id="ROS-20260429-73-0022" title="ROS-20260429-73-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2005" type="cve" id="CVE-2026-2005" title="CVE-2026-2005" />
			<reference href="https://bdu.fstec.ru/vul/2026-01722" type="self" id="BDU:2026-01722" title="BDU:2026-01722" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql18" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-contrib" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-contrib-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-devel" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-devel-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-docs" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-docs-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-libs" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-libs-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-llvmjit" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-llvmjit-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-plperl" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-plperl-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-plpython3" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-plpython3-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-pltcl" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-pltcl-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-server" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-server-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-test" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-test-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0023</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость postgresql17 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql17</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql17-cve-2026-2005-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql17
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql17-cve-2026-2005-7.3/" type="self" id="ROS-20260429-73-0023" title="ROS-20260429-73-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2005" type="cve" id="CVE-2026-2005" title="CVE-2026-2005" />
			<reference href="https://bdu.fstec.ru/vul/2026-01722" type="self" id="BDU:2026-01722" title="BDU:2026-01722" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql17" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-contrib" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-contrib-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-devel" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-devel-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-docs" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-docs-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-libs" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-libs-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-llvmjit" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-llvmjit-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-plperl" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-plperl-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-plpython3" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-plpython3-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-pltcl" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-pltcl-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-server" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-server-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-test" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-test-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0024</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость postgresql16 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql16</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql16-cve-2026-2005-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql16
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql16-cve-2026-2005-7.3/" type="self" id="ROS-20260429-73-0024" title="ROS-20260429-73-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2005" type="cve" id="CVE-2026-2005" title="CVE-2026-2005" />
			<reference href="https://bdu.fstec.ru/vul/2026-01722" type="self" id="BDU:2026-01722" title="BDU:2026-01722" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql16" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-contrib" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-contrib-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-devel" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-devel-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-docs" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-docs-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-libs" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-libs-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-llvmjit" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-llvmjit-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-plperl" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-plperl-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-plpython3" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-plpython3-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-pltcl" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-pltcl-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-server" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-server-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-test" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-test-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0025</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость postgresql15 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql15</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql15-cve-2026-2005-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql15
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql15-cve-2026-2005-7.3/" type="self" id="ROS-20260429-73-0025" title="ROS-20260429-73-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2005" type="cve" id="CVE-2026-2005" title="CVE-2026-2005" />
			<reference href="https://bdu.fstec.ru/vul/2026-01722" type="self" id="BDU:2026-01722" title="BDU:2026-01722" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql15" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-contrib" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-contrib-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-devel" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-devel-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-docs" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-docs-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-libs" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-libs-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-llvmjit" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-llvmjit-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-plperl" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-plperl-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-plpython3" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-plpython3-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-pltcl" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-pltcl-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-server" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-server-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-test" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-test-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0026</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость postgresql14 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql14</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql14-cve-2026-2005-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql14
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql14-cve-2026-2005-7.3/" type="self" id="ROS-20260429-73-0026" title="ROS-20260429-73-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2005" type="cve" id="CVE-2026-2005" title="CVE-2026-2005" />
			<reference href="https://bdu.fstec.ru/vul/2026-01722" type="self" id="BDU:2026-01722" title="BDU:2026-01722" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql14" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-contrib" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-contrib-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-devel" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-devel-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-docs" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-docs-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-libs" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-libs-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-llvmjit" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-llvmjit-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-plperl" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-plperl-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-plpython3" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-plpython3-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-pltcl" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-pltcl-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-server" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-server-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-test" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-test-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0027</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость postgresql18-1c </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql18-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql18-1c-cve-2026-2005-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql18-1c
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql18-1c-cve-2026-2005-7.3/" type="self" id="ROS-20260429-73-0027" title="ROS-20260429-73-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2005" type="cve" id="CVE-2026-2005" title="CVE-2026-2005" />
			<reference href="https://bdu.fstec.ru/vul/2026-01722" type="self" id="BDU:2026-01722" title="BDU:2026-01722" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql18-1c" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-contrib" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-contrib-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-devel" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-devel-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-docs" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-docs-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-libs" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-libs-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-llvmjit" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-llvmjit-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-plperl" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-plperl-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-plpython3" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-plpython3-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-pltcl" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-pltcl-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-server" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-server-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-test" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-test-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0028</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость postgresql17-1c </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql17-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql17-1c-cve-2026-2005-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql17-1c
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql17-1c-cve-2026-2005-7.3/" type="self" id="ROS-20260429-73-0028" title="ROS-20260429-73-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2005" type="cve" id="CVE-2026-2005" title="CVE-2026-2005" />
			<reference href="https://bdu.fstec.ru/vul/2026-01722" type="self" id="BDU:2026-01722" title="BDU:2026-01722" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql17-1c" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-contrib" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-contrib-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-devel" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-devel-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-docs" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-docs-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-libs" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-libs-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-llvmjit" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-llvmjit-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-plperl" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-plperl-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-plpython3" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-plpython3-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-pltcl" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-pltcl-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-server" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-server-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-test" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-test-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0029</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость postgresql-1c </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-1c-cve-2026-2005-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql-1c
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-1c-cve-2026-2005-7.3/" type="self" id="ROS-20260429-73-0029" title="ROS-20260429-73-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2005" type="cve" id="CVE-2026-2005" title="CVE-2026-2005" />
			<reference href="https://bdu.fstec.ru/vul/2026-01722" type="self" id="BDU:2026-01722" title="BDU:2026-01722" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql-1c" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-contrib" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-contrib-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-devel" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-devel-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-docs" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-docs-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-libs" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-libs-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-llvmjit" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-llvmjit-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-plperl" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-plperl-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-plpython3" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-plpython3-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-pltcl" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-pltcl-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-server" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-server-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-test" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-test-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0030</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость postgresql15-1c </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql15-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql15-1c-cve-2026-2005-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql15-1c
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql15-1c-cve-2026-2005-7.3/" type="self" id="ROS-20260429-73-0030" title="ROS-20260429-73-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2005" type="cve" id="CVE-2026-2005" title="CVE-2026-2005" />
			<reference href="https://bdu.fstec.ru/vul/2026-01722" type="self" id="BDU:2026-01722" title="BDU:2026-01722" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql15-1c" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-contrib" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-contrib-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-devel" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-devel-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-docs" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-docs-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-libs" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-libs-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-llvmjit" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-llvmjit-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-plperl" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-plperl-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-plpython3" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-plpython3-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-pltcl" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-pltcl-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-server" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-server-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-test" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-test-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0031</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость postgresql18 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql18</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql18-cve-2026-2004-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql18
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql18-cve-2026-2004-7.3/" type="self" id="ROS-20260429-73-0031" title="ROS-20260429-73-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2004" type="cve" id="CVE-2026-2004" title="CVE-2026-2004" />
			<reference href="https://bdu.fstec.ru/vul/2026-01727" type="self" id="BDU:2026-01727" title="BDU:2026-01727" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql18" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-contrib" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-contrib-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-devel" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-devel-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-docs" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-docs-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-libs" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-libs-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-llvmjit" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-llvmjit-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-plperl" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-plperl-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-plpython3" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-plpython3-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-pltcl" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-pltcl-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-server" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-server-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-test" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-18.3-1.el7.src.rpm">
					<filename>postgresql18-test-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0032</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость postgresql17 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql17</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql17-cve-2026-2004-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql17
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql17-cve-2026-2004-7.3/" type="self" id="ROS-20260429-73-0032" title="ROS-20260429-73-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2004" type="cve" id="CVE-2026-2004" title="CVE-2026-2004" />
			<reference href="https://bdu.fstec.ru/vul/2026-01727" type="self" id="BDU:2026-01727" title="BDU:2026-01727" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql17" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-contrib" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-contrib-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-devel" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-devel-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-docs" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-docs-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-libs" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-libs-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-llvmjit" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-llvmjit-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-plperl" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-plperl-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-plpython3" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-plpython3-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-pltcl" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-pltcl-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-server" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-server-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-test" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-17.9-1.el7.src.rpm">
					<filename>postgresql17-test-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0033</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость postgresql16 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql16</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql16-cve-2026-2004-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql16
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql16-cve-2026-2004-7.3/" type="self" id="ROS-20260429-73-0033" title="ROS-20260429-73-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2004" type="cve" id="CVE-2026-2004" title="CVE-2026-2004" />
			<reference href="https://bdu.fstec.ru/vul/2026-01727" type="self" id="BDU:2026-01727" title="BDU:2026-01727" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql16" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-contrib" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-contrib-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-devel" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-devel-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-docs" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-docs-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-libs" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-libs-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-llvmjit" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-llvmjit-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-plperl" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-plperl-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-plpython3" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-plpython3-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-pltcl" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-pltcl-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-server" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-server-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-test" epoch="0" version="16.13" release="1.el7" arch="x86_64" src="postgresql16-16.13-1.el7.src.rpm">
					<filename>postgresql16-test-0:16.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0034</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость postgresql15 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql15</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql15-cve-2026-2004-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql15
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql15-cve-2026-2004-7.3/" type="self" id="ROS-20260429-73-0034" title="ROS-20260429-73-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2004" type="cve" id="CVE-2026-2004" title="CVE-2026-2004" />
			<reference href="https://bdu.fstec.ru/vul/2026-01727" type="self" id="BDU:2026-01727" title="BDU:2026-01727" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql15" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-contrib" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-contrib-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-devel" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-devel-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-docs" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-docs-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-libs" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-libs-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-llvmjit" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-llvmjit-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-plperl" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-plperl-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-plpython3" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-plpython3-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-pltcl" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-pltcl-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-server" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-server-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-test" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-15.17-1.el7.src.rpm">
					<filename>postgresql15-test-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0035</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость postgresql14 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql14</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql14-cve-2026-2004-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql14
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql14-cve-2026-2004-7.3/" type="self" id="ROS-20260429-73-0035" title="ROS-20260429-73-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2004" type="cve" id="CVE-2026-2004" title="CVE-2026-2004" />
			<reference href="https://bdu.fstec.ru/vul/2026-01727" type="self" id="BDU:2026-01727" title="BDU:2026-01727" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql14" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-contrib" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-contrib-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-devel" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-devel-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-docs" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-docs-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-libs" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-libs-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-llvmjit" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-llvmjit-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-plperl" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-plperl-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-plpython3" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-plpython3-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-pltcl" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-pltcl-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-server" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-server-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-test" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql14-14.22-1.el7.src.rpm">
					<filename>postgresql14-test-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0036</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость postgresql18-1c </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql18-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql18-1c-cve-2026-2004-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql18-1c
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql18-1c-cve-2026-2004-7.3/" type="self" id="ROS-20260429-73-0036" title="ROS-20260429-73-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2004" type="cve" id="CVE-2026-2004" title="CVE-2026-2004" />
			<reference href="https://bdu.fstec.ru/vul/2026-01727" type="self" id="BDU:2026-01727" title="BDU:2026-01727" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql18-1c" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-contrib" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-contrib-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-devel" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-devel-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-docs" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-docs-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-libs" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-libs-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-llvmjit" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-llvmjit-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-plperl" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-plperl-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-plpython3" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-plpython3-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-pltcl" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-pltcl-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-server" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-server-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql18-1c-test" epoch="0" version="18.3" release="1.el7" arch="x86_64" src="postgresql18-1c-18.3-1.el7.src.rpm">
					<filename>postgresql18-1c-test-0:18.3-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0037</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость postgresql17-1c </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql17-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql17-1c-cve-2026-2004-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql17-1c
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql17-1c-cve-2026-2004-7.3/" type="self" id="ROS-20260429-73-0037" title="ROS-20260429-73-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2004" type="cve" id="CVE-2026-2004" title="CVE-2026-2004" />
			<reference href="https://bdu.fstec.ru/vul/2026-01727" type="self" id="BDU:2026-01727" title="BDU:2026-01727" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql17-1c" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-contrib" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-contrib-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-devel" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-devel-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-docs" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-docs-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-libs" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-libs-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-llvmjit" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-llvmjit-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-plperl" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-plperl-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-plpython3" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-plpython3-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-pltcl" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-pltcl-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-server" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-server-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-test" epoch="0" version="17.9" release="1.el7" arch="x86_64" src="postgresql17-1c-17.9-1.el7.src.rpm">
					<filename>postgresql17-1c-test-0:17.9-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0038</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость postgresql15-1c </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql15-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql15-1c-cve-2026-2004-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql15-1c
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql15-1c-cve-2026-2004-7.3/" type="self" id="ROS-20260429-73-0038" title="ROS-20260429-73-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2004" type="cve" id="CVE-2026-2004" title="CVE-2026-2004" />
			<reference href="https://bdu.fstec.ru/vul/2026-01727" type="self" id="BDU:2026-01727" title="BDU:2026-01727" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql15-1c" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-contrib" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-contrib-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-devel" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-devel-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-docs" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-docs-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-libs" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-libs-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-llvmjit" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-llvmjit-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-plperl" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-plperl-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-plpython3" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-plpython3-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-pltcl" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-pltcl-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-server" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-server-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-test" epoch="0" version="15.17" release="1.el7" arch="x86_64" src="postgresql15-1c-15.17-1.el7.src.rpm">
					<filename>postgresql15-1c-test-0:15.17-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0039</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость postgresql-1c </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в postgresql-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-1c-cve-2026-2004-7.3/</description>
               <solution>Установить обновление для пакета(ов) postgresql-1c
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-postgresql-1c-cve-2026-2004-7.3/" type="self" id="ROS-20260429-73-0039" title="ROS-20260429-73-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2004" type="cve" id="CVE-2026-2004" title="CVE-2026-2004" />
			<reference href="https://bdu.fstec.ru/vul/2026-01727" type="self" id="BDU:2026-01727" title="BDU:2026-01727" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="postgresql-1c" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-contrib" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-contrib-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-devel" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-devel-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-docs" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-docs-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-libs" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-libs-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-llvmjit" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-llvmjit-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-plperl" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-plperl-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-plpython3" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-plpython3-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-pltcl" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-pltcl-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-server" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-server-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-test" epoch="0" version="14.22" release="1.el7" arch="x86_64" src="postgresql-1c-14.22-1.el7.src.rpm">
					<filename>postgresql-1c-test-0:14.22-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0040</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость golang-k8s-ingress-nginx </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang-k8s-ingress-nginx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-k8s-ingress-nginx-cve-2026-3288-7.3/</description>
               <solution>Установить обновление для пакета(ов) golang-k8s-ingress-nginx
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-k8s-ingress-nginx-cve-2026-3288-7.3/" type="self" id="ROS-20260429-73-0040" title="ROS-20260429-73-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3288" type="cve" id="CVE-2026-3288" title="CVE-2026-3288" />
			<reference href="https://bdu.fstec.ru/vul/2026-02870" type="self" id="BDU:2026-02870" title="BDU:2026-02870" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang-k8s-ingress-nginx" epoch="0" version="1.13.8" release="1.el7" arch="x86_64" src="golang-k8s-ingress-nginx-1.13.8-1.el7.src.rpm">
					<filename>golang-k8s-ingress-nginx-0:1.13.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0041</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость golang-k8s-ingress-nginx </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang-k8s-ingress-nginx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-k8s-ingress-nginx-cve-2026-4342-7.3/</description>
               <solution>Установить обновление для пакета(ов) golang-k8s-ingress-nginx
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-k8s-ingress-nginx-cve-2026-4342-7.3/" type="self" id="ROS-20260429-73-0041" title="ROS-20260429-73-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4342" type="cve" id="CVE-2026-4342" title="CVE-2026-4342" />
			<reference href="https://bdu.fstec.ru/vul/2026-03523" type="self" id="BDU:2026-03523" title="BDU:2026-03523" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang-k8s-ingress-nginx" epoch="0" version="1.13.9" release="1.el7" arch="x86_64" src="golang-k8s-ingress-nginx-1.13.9-1.el7.src.rpm">
					<filename>golang-k8s-ingress-nginx-0:1.13.9-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0042</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость nginx </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nginx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nginx-cve-2026-28755-7.3/</description>
               <solution>Установить обновление для пакета(ов) nginx
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nginx-cve-2026-28755-7.3/" type="self" id="ROS-20260429-73-0042" title="ROS-20260429-73-0042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28755" type="cve" id="CVE-2026-28755" title="CVE-2026-28755" />
			<reference href="https://bdu.fstec.ru/vul/2026-04821" type="self" id="BDU:2026-04821" title="BDU:2026-04821" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nginx" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-core" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-core-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-devel" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-devel-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-geoip" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-http-geoip-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-image-filter" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-http-image-filter-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-perl" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-http-perl-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-push-stream" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-http-push-stream-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-xslt-filter" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-http-xslt-filter-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-mail" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-mail-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-stream" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-stream-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-all-modules" epoch="1" version="1.28.3" release="1.el7" arch="noarch" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-all-modules-1:1.28.3-1.el7.noarch.rpm</filename>
				</package>
				<package name="nginx-filesystem" epoch="1" version="1.28.3" release="1.el7" arch="noarch" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-filesystem-1:1.28.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0043</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость dotnet10.0 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dotnet10.0</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet10-0-cve-2026-26130-7.3/</description>
               <solution>Установить обновление для пакета(ов) dotnet10.0
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet10-0-cve-2026-26130-7.3/" type="self" id="ROS-20260429-73-0043" title="ROS-20260429-73-0043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26130" type="cve" id="CVE-2026-26130" title="CVE-2026-26130" />
			<reference href="https://bdu.fstec.ru/vul/2026-03049" type="self" id="BDU:2026-03049" title="BDU:2026-03049" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="aspnetcore-runtime-10.0" epoch="0" version="10.0.4" release="1.el7" arch="x86_64" src="dotnet10.0-10.0.104-1.el7.src.rpm">
					<filename>aspnetcore-runtime-10.0-0:10.0.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="aspnetcore-runtime-dbg-10.0" epoch="0" version="10.0.4" release="1.el7" arch="x86_64" src="dotnet10.0-10.0.104-1.el7.src.rpm">
					<filename>aspnetcore-runtime-dbg-10.0-0:10.0.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="aspnetcore-targeting-pack-10.0" epoch="0" version="10.0.4" release="1.el7" arch="x86_64" src="dotnet10.0-10.0.104-1.el7.src.rpm">
					<filename>aspnetcore-targeting-pack-10.0-0:10.0.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-apphost-pack-10.0" epoch="0" version="10.0.4" release="1.el7" arch="x86_64" src="dotnet10.0-10.0.104-1.el7.src.rpm">
					<filename>dotnet-apphost-pack-10.0-0:10.0.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-host" epoch="0" version="10.0.4" release="1.el7" arch="x86_64" src="dotnet10.0-10.0.104-1.el7.src.rpm">
					<filename>dotnet-host-0:10.0.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-hostfxr-10.0" epoch="0" version="10.0.4" release="1.el7" arch="x86_64" src="dotnet10.0-10.0.104-1.el7.src.rpm">
					<filename>dotnet-hostfxr-10.0-0:10.0.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-runtime-10.0" epoch="0" version="10.0.4" release="1.el7" arch="x86_64" src="dotnet10.0-10.0.104-1.el7.src.rpm">
					<filename>dotnet-runtime-10.0-0:10.0.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-runtime-dbg-10.0" epoch="0" version="10.0.4" release="1.el7" arch="x86_64" src="dotnet10.0-10.0.104-1.el7.src.rpm">
					<filename>dotnet-runtime-dbg-10.0-0:10.0.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-sdk-10.0" epoch="0" version="10.0.104" release="1.el7" arch="x86_64" src="dotnet10.0-10.0.104-1.el7.src.rpm">
					<filename>dotnet-sdk-10.0-0:10.0.104-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-sdk-10.0-source-built-artifacts" epoch="0" version="10.0.104" release="1.el7" arch="x86_64" src="dotnet10.0-10.0.104-1.el7.src.rpm">
					<filename>dotnet-sdk-10.0-source-built-artifacts-0:10.0.104-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-sdk-aot-10.0" epoch="0" version="10.0.104" release="1.el7" arch="x86_64" src="dotnet10.0-10.0.104-1.el7.src.rpm">
					<filename>dotnet-sdk-aot-10.0-0:10.0.104-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-sdk-dbg-10.0" epoch="0" version="10.0.104" release="1.el7" arch="x86_64" src="dotnet10.0-10.0.104-1.el7.src.rpm">
					<filename>dotnet-sdk-dbg-10.0-0:10.0.104-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-targeting-pack-10.0" epoch="0" version="10.0.4" release="1.el7" arch="x86_64" src="dotnet10.0-10.0.104-1.el7.src.rpm">
					<filename>dotnet-targeting-pack-10.0-0:10.0.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-templates-10.0" epoch="0" version="10.0.104" release="1.el7" arch="x86_64" src="dotnet10.0-10.0.104-1.el7.src.rpm">
					<filename>dotnet-templates-10.0-0:10.0.104-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0044</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость dotnet9.0 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dotnet9.0</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet9-0-cve-2026-26130-7.3/</description>
               <solution>Установить обновление для пакета(ов) dotnet9.0
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet9-0-cve-2026-26130-7.3/" type="self" id="ROS-20260429-73-0044" title="ROS-20260429-73-0044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26130" type="cve" id="CVE-2026-26130" title="CVE-2026-26130" />
			<reference href="https://bdu.fstec.ru/vul/2026-03049" type="self" id="BDU:2026-03049" title="BDU:2026-03049" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="aspnetcore-runtime-9.0" epoch="0" version="9.0.14" release="1.el7" arch="x86_64" src="dotnet9.0-9.0.115-1.el7.src.rpm">
					<filename>aspnetcore-runtime-9.0-0:9.0.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="aspnetcore-runtime-dbg-9.0" epoch="0" version="9.0.14" release="1.el7" arch="x86_64" src="dotnet9.0-9.0.115-1.el7.src.rpm">
					<filename>aspnetcore-runtime-dbg-9.0-0:9.0.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="aspnetcore-targeting-pack-9.0" epoch="0" version="9.0.14" release="1.el7" arch="x86_64" src="dotnet9.0-9.0.115-1.el7.src.rpm">
					<filename>aspnetcore-targeting-pack-9.0-0:9.0.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-apphost-pack-9.0" epoch="0" version="9.0.14" release="1.el7" arch="x86_64" src="dotnet9.0-9.0.115-1.el7.src.rpm">
					<filename>dotnet-apphost-pack-9.0-0:9.0.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-hostfxr-9.0" epoch="0" version="9.0.14" release="1.el7" arch="x86_64" src="dotnet9.0-9.0.115-1.el7.src.rpm">
					<filename>dotnet-hostfxr-9.0-0:9.0.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-runtime-9.0" epoch="0" version="9.0.14" release="1.el7" arch="x86_64" src="dotnet9.0-9.0.115-1.el7.src.rpm">
					<filename>dotnet-runtime-9.0-0:9.0.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-runtime-dbg-9.0" epoch="0" version="9.0.14" release="1.el7" arch="x86_64" src="dotnet9.0-9.0.115-1.el7.src.rpm">
					<filename>dotnet-runtime-dbg-9.0-0:9.0.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-sdk-9.0" epoch="0" version="9.0.115" release="1.el7" arch="x86_64" src="dotnet9.0-9.0.115-1.el7.src.rpm">
					<filename>dotnet-sdk-9.0-0:9.0.115-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-sdk-9.0-source-built-artifacts" epoch="0" version="9.0.115" release="1.el7" arch="x86_64" src="dotnet9.0-9.0.115-1.el7.src.rpm">
					<filename>dotnet-sdk-9.0-source-built-artifacts-0:9.0.115-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-sdk-aot-9.0" epoch="0" version="9.0.115" release="1.el7" arch="x86_64" src="dotnet9.0-9.0.115-1.el7.src.rpm">
					<filename>dotnet-sdk-aot-9.0-0:9.0.115-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-sdk-dbg-9.0" epoch="0" version="9.0.115" release="1.el7" arch="x86_64" src="dotnet9.0-9.0.115-1.el7.src.rpm">
					<filename>dotnet-sdk-dbg-9.0-0:9.0.115-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-targeting-pack-9.0" epoch="0" version="9.0.14" release="1.el7" arch="x86_64" src="dotnet9.0-9.0.115-1.el7.src.rpm">
					<filename>dotnet-targeting-pack-9.0-0:9.0.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-templates-9.0" epoch="0" version="9.0.115" release="1.el7" arch="x86_64" src="dotnet9.0-9.0.115-1.el7.src.rpm">
					<filename>dotnet-templates-9.0-0:9.0.115-1.el7.x86_64.rpm</filename>
				</package>
				<package name="netstandard-targeting-pack-2.1" epoch="0" version="9.0.115" release="1.el7" arch="x86_64" src="dotnet9.0-9.0.115-1.el7.src.rpm">
					<filename>netstandard-targeting-pack-2.1-0:9.0.115-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260429-73-0045</id>
		<issued date="2026-04-29" />
		<updated date="2026-04-29" />
		<title>Уязвимость dotnet8.0 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dotnet8.0</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet8-0-cve-2026-26130-7.3/</description>
               <solution>Установить обновление для пакета(ов) dotnet8.0
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet8-0-cve-2026-26130-7.3/" type="self" id="ROS-20260429-73-0045" title="ROS-20260429-73-0045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26130" type="cve" id="CVE-2026-26130" title="CVE-2026-26130" />
			<reference href="https://bdu.fstec.ru/vul/2026-03049" type="self" id="BDU:2026-03049" title="BDU:2026-03049" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="aspnetcore-runtime-8.0" epoch="0" version="8.0.25" release="1.el7" arch="x86_64" src="dotnet8.0-8.0.125-1.el7.src.rpm">
					<filename>aspnetcore-runtime-8.0-0:8.0.25-1.el7.x86_64.rpm</filename>
				</package>
				<package name="aspnetcore-runtime-dbg-8.0" epoch="0" version="8.0.25" release="1.el7" arch="x86_64" src="dotnet8.0-8.0.125-1.el7.src.rpm">
					<filename>aspnetcore-runtime-dbg-8.0-0:8.0.25-1.el7.x86_64.rpm</filename>
				</package>
				<package name="aspnetcore-targeting-pack-8.0" epoch="0" version="8.0.25" release="1.el7" arch="x86_64" src="dotnet8.0-8.0.125-1.el7.src.rpm">
					<filename>aspnetcore-targeting-pack-8.0-0:8.0.25-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-apphost-pack-8.0" epoch="0" version="8.0.25" release="1.el7" arch="x86_64" src="dotnet8.0-8.0.125-1.el7.src.rpm">
					<filename>dotnet-apphost-pack-8.0-0:8.0.25-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-hostfxr-8.0" epoch="0" version="8.0.25" release="1.el7" arch="x86_64" src="dotnet8.0-8.0.125-1.el7.src.rpm">
					<filename>dotnet-hostfxr-8.0-0:8.0.25-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-runtime-8.0" epoch="0" version="8.0.25" release="1.el7" arch="x86_64" src="dotnet8.0-8.0.125-1.el7.src.rpm">
					<filename>dotnet-runtime-8.0-0:8.0.25-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-runtime-dbg-8.0" epoch="0" version="8.0.25" release="1.el7" arch="x86_64" src="dotnet8.0-8.0.125-1.el7.src.rpm">
					<filename>dotnet-runtime-dbg-8.0-0:8.0.25-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-sdk-8.0" epoch="0" version="8.0.125" release="1.el7" arch="x86_64" src="dotnet8.0-8.0.125-1.el7.src.rpm">
					<filename>dotnet-sdk-8.0-0:8.0.125-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-sdk-8.0-source-built-artifacts" epoch="0" version="8.0.125" release="1.el7" arch="x86_64" src="dotnet8.0-8.0.125-1.el7.src.rpm">
					<filename>dotnet-sdk-8.0-source-built-artifacts-0:8.0.125-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-sdk-dbg-8.0" epoch="0" version="8.0.125" release="1.el7" arch="x86_64" src="dotnet8.0-8.0.125-1.el7.src.rpm">
					<filename>dotnet-sdk-dbg-8.0-0:8.0.125-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-targeting-pack-8.0" epoch="0" version="8.0.25" release="1.el7" arch="x86_64" src="dotnet8.0-8.0.125-1.el7.src.rpm">
					<filename>dotnet-targeting-pack-8.0-0:8.0.25-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-templates-8.0" epoch="0" version="8.0.125" release="1.el7" arch="x86_64" src="dotnet8.0-8.0.125-1.el7.src.rpm">
					<filename>dotnet-templates-8.0-0:8.0.125-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260430-73-0001</id>
		<issued date="2026-04-30" />
		<updated date="2026-04-30" />
		<title>Уязвимость valkey </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в valkey</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-valkey-cve-2025-67733-7.3/</description>
               <solution>Установить обновление для пакета(ов) valkey
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-valkey-cve-2025-67733-7.3/" type="self" id="ROS-20260430-73-0001" title="ROS-20260430-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67733" type="cve" id="CVE-2025-67733" title="CVE-2025-67733" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="valkey" epoch="0" version="9.0.3" release="1.el7" arch="x86_64" src="valkey-9.0.3-1.el7.src.rpm">
					<filename>valkey-0:9.0.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="valkey-devel" epoch="0" version="9.0.3" release="1.el7" arch="x86_64" src="valkey-9.0.3-1.el7.src.rpm">
					<filename>valkey-devel-0:9.0.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="valkey-compat-redis" epoch="0" version="9.0.3" release="1.el7" arch="noarch" src="valkey-9.0.3-1.el7.src.rpm">
					<filename>valkey-compat-redis-0:9.0.3-1.el7.noarch.rpm</filename>
				</package>
				<package name="valkey-compat-redis-devel" epoch="0" version="9.0.3" release="1.el7" arch="noarch" src="valkey-9.0.3-1.el7.src.rpm">
					<filename>valkey-compat-redis-devel-0:9.0.3-1.el7.noarch.rpm</filename>
				</package>
				<package name="valkey-doc" epoch="0" version="9.0.3" release="1.el7" arch="noarch" src="valkey-9.0.3-1.el7.src.rpm">
					<filename>valkey-doc-0:9.0.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260430-73-0002</id>
		<issued date="2026-04-30" />
		<updated date="2026-04-30" />
		<title>Уязвимость valkey </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в valkey</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-valkey-cve-2026-21863-7.3/</description>
               <solution>Установить обновление для пакета(ов) valkey
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-valkey-cve-2026-21863-7.3/" type="self" id="ROS-20260430-73-0002" title="ROS-20260430-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21863" type="cve" id="CVE-2026-21863" title="CVE-2026-21863" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="valkey" epoch="0" version="9.0.3" release="1.el7" arch="x86_64" src="valkey-9.0.3-1.el7.src.rpm">
					<filename>valkey-0:9.0.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="valkey-devel" epoch="0" version="9.0.3" release="1.el7" arch="x86_64" src="valkey-9.0.3-1.el7.src.rpm">
					<filename>valkey-devel-0:9.0.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="valkey-compat-redis" epoch="0" version="9.0.3" release="1.el7" arch="noarch" src="valkey-9.0.3-1.el7.src.rpm">
					<filename>valkey-compat-redis-0:9.0.3-1.el7.noarch.rpm</filename>
				</package>
				<package name="valkey-compat-redis-devel" epoch="0" version="9.0.3" release="1.el7" arch="noarch" src="valkey-9.0.3-1.el7.src.rpm">
					<filename>valkey-compat-redis-devel-0:9.0.3-1.el7.noarch.rpm</filename>
				</package>
				<package name="valkey-doc" epoch="0" version="9.0.3" release="1.el7" arch="noarch" src="valkey-9.0.3-1.el7.src.rpm">
					<filename>valkey-doc-0:9.0.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260430-73-0003</id>
		<issued date="2026-04-30" />
		<updated date="2026-04-30" />
		<title>Уязвимость valkey </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в valkey</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-valkey-cve-2026-27623-7.3/</description>
               <solution>Установить обновление для пакета(ов) valkey
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-valkey-cve-2026-27623-7.3/" type="self" id="ROS-20260430-73-0003" title="ROS-20260430-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27623" type="cve" id="CVE-2026-27623" title="CVE-2026-27623" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="valkey" epoch="0" version="9.0.3" release="1.el7" arch="x86_64" src="valkey-9.0.3-1.el7.src.rpm">
					<filename>valkey-0:9.0.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="valkey-devel" epoch="0" version="9.0.3" release="1.el7" arch="x86_64" src="valkey-9.0.3-1.el7.src.rpm">
					<filename>valkey-devel-0:9.0.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="valkey-compat-redis" epoch="0" version="9.0.3" release="1.el7" arch="noarch" src="valkey-9.0.3-1.el7.src.rpm">
					<filename>valkey-compat-redis-0:9.0.3-1.el7.noarch.rpm</filename>
				</package>
				<package name="valkey-compat-redis-devel" epoch="0" version="9.0.3" release="1.el7" arch="noarch" src="valkey-9.0.3-1.el7.src.rpm">
					<filename>valkey-compat-redis-devel-0:9.0.3-1.el7.noarch.rpm</filename>
				</package>
				<package name="valkey-doc" epoch="0" version="9.0.3" release="1.el7" arch="noarch" src="valkey-9.0.3-1.el7.src.rpm">
					<filename>valkey-doc-0:9.0.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260430-73-0004</id>
		<issued date="2026-04-30" />
		<updated date="2026-04-30" />
		<title>Уязвимость buildkit </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в buildkit</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-buildkit-cve-2026-33747-7.3/</description>
               <solution>Установить обновление для пакета(ов) buildkit
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-buildkit-cve-2026-33747-7.3/" type="self" id="ROS-20260430-73-0004" title="ROS-20260430-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33747" type="cve" id="CVE-2026-33747" title="CVE-2026-33747" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="buildkit" epoch="0" version="0.29.0" release="1.el7" arch="x86_64" src="buildkit-0.29.0-1.el7.src.rpm">
					<filename>buildkit-0:0.29.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260430-73-0005</id>
		<issued date="2026-04-30" />
		<updated date="2026-04-30" />
		<title>Уязвимость buildkit </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в buildkit</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-buildkit-cve-2026-33748-7.3/</description>
               <solution>Установить обновление для пакета(ов) buildkit
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-buildkit-cve-2026-33748-7.3/" type="self" id="ROS-20260430-73-0005" title="ROS-20260430-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33748" type="cve" id="CVE-2026-33748" title="CVE-2026-33748" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="buildkit" epoch="0" version="0.29.0" release="1.el7" arch="x86_64" src="buildkit-0.29.0-1.el7.src.rpm">
					<filename>buildkit-0:0.29.0-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260430-73-0006</id>
		<issued date="2026-04-30" />
		<updated date="2026-04-30" />
		<title>Уязвимость golang-x-image </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang-x-image</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-x-image-cve-2026-33809-7.3/</description>
               <solution>Установить обновление для пакета(ов) golang-x-image
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-x-image-cve-2026-33809-7.3/" type="self" id="ROS-20260430-73-0006" title="ROS-20260430-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33809" type="cve" id="CVE-2026-33809" title="CVE-2026-33809" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang-x-image-devel" epoch="0" version="0.13.0" release="2.el7" arch="noarch" src="golang-x-image-0.13.0-2.el7.src.rpm">
					<filename>golang-x-image-devel-0:0.13.0-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260430-73-0007</id>
		<issued date="2026-04-30" />
		<updated date="2026-04-30" />
		<title>Уязвимость crun </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в crun</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-crun-cve-2026-30892-7.3/</description>
               <solution>Установить обновление для пакета(ов) crun
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-crun-cve-2026-30892-7.3/" type="self" id="ROS-20260430-73-0007" title="ROS-20260430-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-30892" type="cve" id="CVE-2026-30892" title="CVE-2026-30892" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="crun" epoch="0" version="1.20" release="2.el7" arch="x86_64" src="crun-1.20-2.el7.src.rpm">
					<filename>crun-0:1.20-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260430-73-0008</id>
		<issued date="2026-04-30" />
		<updated date="2026-04-30" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2026-32281-7.3/</description>
               <solution>Установить обновление для пакета(ов) golang
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2026-32281-7.3/" type="self" id="ROS-20260430-73-0008" title="ROS-20260430-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32281" type="cve" id="CVE-2026-32281" title="CVE-2026-32281" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.26.2" release="1.el7" arch="x86_64" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-0:1.26.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.26.2" release="1.el7" arch="x86_64" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-bin-0:1.26.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.26.2" release="1.el7" arch="x86_64" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-shared-0:1.26.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-docs" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-docs-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-misc" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-misc-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-src" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-src-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-tests" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-tests-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260430-73-0009</id>
		<issued date="2026-04-30" />
		<updated date="2026-04-30" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2026-27144-7.3/</description>
               <solution>Установить обновление для пакета(ов) golang
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2026-27144-7.3/" type="self" id="ROS-20260430-73-0009" title="ROS-20260430-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27144" type="cve" id="CVE-2026-27144" title="CVE-2026-27144" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.26.2" release="1.el7" arch="x86_64" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-0:1.26.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.26.2" release="1.el7" arch="x86_64" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-bin-0:1.26.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.26.2" release="1.el7" arch="x86_64" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-shared-0:1.26.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-docs" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-docs-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-misc" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-misc-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-src" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-src-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-tests" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-tests-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260430-73-0010</id>
		<issued date="2026-04-30" />
		<updated date="2026-04-30" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2026-27143-7.3/</description>
               <solution>Установить обновление для пакета(ов) golang
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2026-27143-7.3/" type="self" id="ROS-20260430-73-0010" title="ROS-20260430-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27143" type="cve" id="CVE-2026-27143" title="CVE-2026-27143" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.26.2" release="1.el7" arch="x86_64" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-0:1.26.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.26.2" release="1.el7" arch="x86_64" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-bin-0:1.26.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.26.2" release="1.el7" arch="x86_64" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-shared-0:1.26.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-docs" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-docs-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-misc" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-misc-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-src" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-src-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-tests" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-tests-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260430-73-0011</id>
		<issued date="2026-04-30" />
		<updated date="2026-04-30" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2026-32282-7.3/</description>
               <solution>Установить обновление для пакета(ов) golang
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2026-32282-7.3/" type="self" id="ROS-20260430-73-0011" title="ROS-20260430-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32282" type="cve" id="CVE-2026-32282" title="CVE-2026-32282" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.26.2" release="1.el7" arch="x86_64" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-0:1.26.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.26.2" release="1.el7" arch="x86_64" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-bin-0:1.26.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.26.2" release="1.el7" arch="x86_64" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-shared-0:1.26.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-docs" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-docs-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-misc" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-misc-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-src" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-src-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-tests" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-tests-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260430-73-0012</id>
		<issued date="2026-04-30" />
		<updated date="2026-04-30" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2026-32289-7.3/</description>
               <solution>Установить обновление для пакета(ов) golang
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2026-32289-7.3/" type="self" id="ROS-20260430-73-0012" title="ROS-20260430-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32289" type="cve" id="CVE-2026-32289" title="CVE-2026-32289" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.26.2" release="1.el7" arch="x86_64" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-0:1.26.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.26.2" release="1.el7" arch="x86_64" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-bin-0:1.26.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.26.2" release="1.el7" arch="x86_64" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-shared-0:1.26.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-docs" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-docs-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-misc" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-misc-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-src" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-src-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-tests" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-tests-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260430-73-0013</id>
		<issued date="2026-04-30" />
		<updated date="2026-04-30" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2026-32288-7.3/</description>
               <solution>Установить обновление для пакета(ов) golang
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2026-32288-7.3/" type="self" id="ROS-20260430-73-0013" title="ROS-20260430-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32288" type="cve" id="CVE-2026-32288" title="CVE-2026-32288" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.26.2" release="1.el7" arch="x86_64" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-0:1.26.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.26.2" release="1.el7" arch="x86_64" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-bin-0:1.26.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.26.2" release="1.el7" arch="x86_64" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-shared-0:1.26.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-docs" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-docs-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-misc" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-misc-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-src" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-src-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-tests" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-tests-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260430-73-0014</id>
		<issued date="2026-04-30" />
		<updated date="2026-04-30" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2026-32283-7.3/</description>
               <solution>Установить обновление для пакета(ов) golang
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2026-32283-7.3/" type="self" id="ROS-20260430-73-0014" title="ROS-20260430-73-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32283" type="cve" id="CVE-2026-32283" title="CVE-2026-32283" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.26.2" release="1.el7" arch="x86_64" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-0:1.26.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.26.2" release="1.el7" arch="x86_64" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-bin-0:1.26.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.26.2" release="1.el7" arch="x86_64" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-shared-0:1.26.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-docs" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-docs-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-misc" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-misc-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-src" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-src-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-tests" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-tests-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260430-73-0015</id>
		<issued date="2026-04-30" />
		<updated date="2026-04-30" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2026-27140-7.3/</description>
               <solution>Установить обновление для пакета(ов) golang
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2026-27140-7.3/" type="self" id="ROS-20260430-73-0015" title="ROS-20260430-73-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27140" type="cve" id="CVE-2026-27140" title="CVE-2026-27140" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.26.2" release="1.el7" arch="x86_64" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-0:1.26.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.26.2" release="1.el7" arch="x86_64" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-bin-0:1.26.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.26.2" release="1.el7" arch="x86_64" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-shared-0:1.26.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-docs" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-docs-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-misc" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-misc-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-src" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-src-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-tests" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-tests-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260430-73-0016</id>
		<issued date="2026-04-30" />
		<updated date="2026-04-30" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2026-33810-7.3/</description>
               <solution>Установить обновление для пакета(ов) golang
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2026-33810-7.3/" type="self" id="ROS-20260430-73-0016" title="ROS-20260430-73-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33810" type="cve" id="CVE-2026-33810" title="CVE-2026-33810" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.26.2" release="1.el7" arch="x86_64" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-0:1.26.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.26.2" release="1.el7" arch="x86_64" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-bin-0:1.26.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.26.2" release="1.el7" arch="x86_64" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-shared-0:1.26.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-docs" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-docs-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-misc" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-misc-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-src" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-src-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-tests" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-tests-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260430-73-1001</id>
		<issued date="2026-04-30" />
		<updated date="2026-05-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2026-31431-01/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
В cmdline ядра добавить строку: 
  initcall_blacklist=algif_aead_init 
  Порядок действий: 
  1. Отредактировать файл /etc/default/grub добавить указанную строку в переменную GRUB_CMDLINE_LINUX 
  2. Перегенерировать grub.cfg командой: 
  grub2-mkconfig -o /boot/grub2/grub.cfg 
 3. Перезагрузить ОС
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2026-31431-01/" type="self" id="ROS-20260430-73-1001" title="ROS-20260430-73-1001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31431" type="cve" id="CVE-2026-31431" title="CVE-2026-31431" />
			<reference href="https://bdu.fstec.ru/vul/2026-06123" type="self" id="BDU:2026-06123" title="BDU:2026-06123" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="" version="6.1.170" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.170-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.170-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="" version="6.1.170" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.170-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.170-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="" version="6.1.170" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.170-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.170-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="" version="6.1.170" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.170-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.170-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="" version="6.1.170" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.170-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.170-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="" version="6.1.170" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.170-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.170-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="" version="6.1.170" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.170-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.170-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="" version="6.1.170" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.170-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.170-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="" version="6.1.170" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.170-1.el7.3.src.rpm">
					<filename>perf-0:6.1.170-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="" version="6.1.170" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.170-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.170-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="" version="6.1.170" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.170-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.170-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0001</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость zabbix7.4 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в zabbix7.4</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-4-cve-2026-23923-7.3/</description>
               <solution>Установить обновление для пакета(ов) zabbix7.4
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-4-cve-2026-23923-7.3/" type="self" id="ROS-20260505-73-0001" title="ROS-20260505-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23923" type="cve" id="CVE-2026-23923" title="CVE-2026-23923" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix7.4-agent" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-agent-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-agent2" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-agent2-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-get" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-get-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-java-gateway-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway-openjdk11" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-java-gateway-openjdk11-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway-openjdk17" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-java-gateway-openjdk17-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway-openjdk21" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-java-gateway-openjdk21-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-js" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-js-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-proxy-mysql" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-proxy-mysql-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-proxy-pgsql" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-proxy-pgsql-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-proxy-sqlite3" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-proxy-sqlite3-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-sender" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-sender-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-server-mysql" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-server-mysql-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-server-pgsql" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-server-pgsql-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-web-service" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-web-service-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-apache-conf" epoch="1" version="7.4.9" release="1.el7" arch="noarch" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-apache-conf-1:7.4.9-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-nginx-conf" epoch="1" version="7.4.9" release="1.el7" arch="noarch" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-nginx-conf-1:7.4.9-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-selinux-policy" epoch="1" version="7.4.9" release="1.el7" arch="noarch" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-selinux-policy-1:7.4.9-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-sql-scripts" epoch="1" version="7.4.9" release="1.el7" arch="noarch" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-sql-scripts-1:7.4.9-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-web" epoch="1" version="7.4.9" release="1.el7" arch="noarch" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-web-1:7.4.9-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-web-deps" epoch="1" version="7.4.9" release="1.el7" arch="noarch" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-web-deps-1:7.4.9-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-web-mysql" epoch="1" version="7.4.9" release="1.el7" arch="noarch" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-web-mysql-1:7.4.9-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-web-pgsql" epoch="1" version="7.4.9" release="1.el7" arch="noarch" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-web-pgsql-1:7.4.9-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0002</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость zabbix7.4 </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в zabbix7.4</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-4-cve-2026-23924-7.3/</description>
               <solution>Установить обновление для пакета(ов) zabbix7.4
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-4-cve-2026-23924-7.3/" type="self" id="ROS-20260505-73-0002" title="ROS-20260505-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23924" type="cve" id="CVE-2026-23924" title="CVE-2026-23924" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix7.4-agent" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-agent-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-agent2" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-agent2-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-get" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-get-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-java-gateway-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway-openjdk11" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-java-gateway-openjdk11-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway-openjdk17" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-java-gateway-openjdk17-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway-openjdk21" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-java-gateway-openjdk21-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-js" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-js-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-proxy-mysql" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-proxy-mysql-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-proxy-pgsql" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-proxy-pgsql-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-proxy-sqlite3" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-proxy-sqlite3-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-sender" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-sender-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-server-mysql" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-server-mysql-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-server-pgsql" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-server-pgsql-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-web-service" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-web-service-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-apache-conf" epoch="1" version="7.4.9" release="1.el7" arch="noarch" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-apache-conf-1:7.4.9-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-nginx-conf" epoch="1" version="7.4.9" release="1.el7" arch="noarch" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-nginx-conf-1:7.4.9-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-selinux-policy" epoch="1" version="7.4.9" release="1.el7" arch="noarch" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-selinux-policy-1:7.4.9-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-sql-scripts" epoch="1" version="7.4.9" release="1.el7" arch="noarch" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-sql-scripts-1:7.4.9-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-web" epoch="1" version="7.4.9" release="1.el7" arch="noarch" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-web-1:7.4.9-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-web-deps" epoch="1" version="7.4.9" release="1.el7" arch="noarch" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-web-deps-1:7.4.9-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-web-mysql" epoch="1" version="7.4.9" release="1.el7" arch="noarch" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-web-mysql-1:7.4.9-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-web-pgsql" epoch="1" version="7.4.9" release="1.el7" arch="noarch" src="zabbix7.4-7.4.9-1.el7.src.rpm">
					<filename>zabbix7.4-web-pgsql-1:7.4.9-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0003</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость zabbix7-lts </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в zabbix7-lts</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-lts-cve-2026-23924-7.3/</description>
               <solution>Установить обновление для пакета(ов) zabbix7-lts
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix7-lts-cve-2026-23924-7.3/" type="self" id="ROS-20260505-73-0003" title="ROS-20260505-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23924" type="cve" id="CVE-2026-23924" title="CVE-2026-23924" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix7-lts-agent" epoch="1" version="7.0.25" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.25-1.el7.src.rpm">
					<filename>zabbix7-lts-agent-1:7.0.25-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-agent2" epoch="1" version="7.0.25" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.25-1.el7.src.rpm">
					<filename>zabbix7-lts-agent2-1:7.0.25-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-get" epoch="1" version="7.0.25" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.25-1.el7.src.rpm">
					<filename>zabbix7-lts-get-1:7.0.25-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-java-gateway" epoch="1" version="7.0.25" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.25-1.el7.src.rpm">
					<filename>zabbix7-lts-java-gateway-1:7.0.25-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-java-gateway-openjdk11" epoch="1" version="7.0.25" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.25-1.el7.src.rpm">
					<filename>zabbix7-lts-java-gateway-openjdk11-1:7.0.25-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-java-gateway-openjdk17" epoch="1" version="7.0.25" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.25-1.el7.src.rpm">
					<filename>zabbix7-lts-java-gateway-openjdk17-1:7.0.25-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-java-gateway-openjdk21" epoch="1" version="7.0.25" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.25-1.el7.src.rpm">
					<filename>zabbix7-lts-java-gateway-openjdk21-1:7.0.25-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-js" epoch="1" version="7.0.25" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.25-1.el7.src.rpm">
					<filename>zabbix7-lts-js-1:7.0.25-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-proxy-mysql" epoch="1" version="7.0.25" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.25-1.el7.src.rpm">
					<filename>zabbix7-lts-proxy-mysql-1:7.0.25-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-proxy-pgsql" epoch="1" version="7.0.25" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.25-1.el7.src.rpm">
					<filename>zabbix7-lts-proxy-pgsql-1:7.0.25-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-proxy-sqlite3" epoch="1" version="7.0.25" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.25-1.el7.src.rpm">
					<filename>zabbix7-lts-proxy-sqlite3-1:7.0.25-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-sender" epoch="1" version="7.0.25" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.25-1.el7.src.rpm">
					<filename>zabbix7-lts-sender-1:7.0.25-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-server-mysql" epoch="1" version="7.0.25" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.25-1.el7.src.rpm">
					<filename>zabbix7-lts-server-mysql-1:7.0.25-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-server-pgsql" epoch="1" version="7.0.25" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.25-1.el7.src.rpm">
					<filename>zabbix7-lts-server-pgsql-1:7.0.25-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-web-service" epoch="1" version="7.0.25" release="1.el7" arch="x86_64" src="zabbix7-lts-7.0.25-1.el7.src.rpm">
					<filename>zabbix7-lts-web-service-1:7.0.25-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-apache-conf" epoch="1" version="7.0.25" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.25-1.el7.src.rpm">
					<filename>zabbix7-lts-apache-conf-1:7.0.25-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-nginx-conf" epoch="1" version="7.0.25" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.25-1.el7.src.rpm">
					<filename>zabbix7-lts-nginx-conf-1:7.0.25-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-selinux-policy" epoch="1" version="7.0.25" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.25-1.el7.src.rpm">
					<filename>zabbix7-lts-selinux-policy-1:7.0.25-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-sql-scripts" epoch="1" version="7.0.25" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.25-1.el7.src.rpm">
					<filename>zabbix7-lts-sql-scripts-1:7.0.25-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-web" epoch="1" version="7.0.25" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.25-1.el7.src.rpm">
					<filename>zabbix7-lts-web-1:7.0.25-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-web-deps" epoch="1" version="7.0.25" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.25-1.el7.src.rpm">
					<filename>zabbix7-lts-web-deps-1:7.0.25-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-web-mysql" epoch="1" version="7.0.25" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.25-1.el7.src.rpm">
					<filename>zabbix7-lts-web-mysql-1:7.0.25-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-web-pgsql" epoch="1" version="7.0.25" release="1.el7" arch="noarch" src="zabbix7-lts-7.0.25-1.el7.src.rpm">
					<filename>zabbix7-lts-web-pgsql-1:7.0.25-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0004</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость zabbix-latest </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в zabbix-latest</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix-latest-cve-2026-23924-7.3/</description>
               <solution>Установить обновление для пакета(ов) zabbix-latest
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix-latest-cve-2026-23924-7.3/" type="self" id="ROS-20260505-73-0004" title="ROS-20260505-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23924" type="cve" id="CVE-2026-23924" title="CVE-2026-23924" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix-latest-agent" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.9-1.el7.src.rpm">
					<filename>zabbix-latest-agent-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-agent2" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.9-1.el7.src.rpm">
					<filename>zabbix-latest-agent2-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-get" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.9-1.el7.src.rpm">
					<filename>zabbix-latest-get-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-java-gateway" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.9-1.el7.src.rpm">
					<filename>zabbix-latest-java-gateway-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-java-gateway-openjdk11" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.9-1.el7.src.rpm">
					<filename>zabbix-latest-java-gateway-openjdk11-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-java-gateway-openjdk17" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.9-1.el7.src.rpm">
					<filename>zabbix-latest-java-gateway-openjdk17-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-java-gateway-openjdk21" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.9-1.el7.src.rpm">
					<filename>zabbix-latest-java-gateway-openjdk21-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-js" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.9-1.el7.src.rpm">
					<filename>zabbix-latest-js-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-proxy-mysql" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.9-1.el7.src.rpm">
					<filename>zabbix-latest-proxy-mysql-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-proxy-pgsql" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.9-1.el7.src.rpm">
					<filename>zabbix-latest-proxy-pgsql-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-proxy-sqlite3" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.9-1.el7.src.rpm">
					<filename>zabbix-latest-proxy-sqlite3-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-sender" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.9-1.el7.src.rpm">
					<filename>zabbix-latest-sender-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-server-mysql" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.9-1.el7.src.rpm">
					<filename>zabbix-latest-server-mysql-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-server-pgsql" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.9-1.el7.src.rpm">
					<filename>zabbix-latest-server-pgsql-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-web-service" epoch="1" version="7.4.9" release="1.el7" arch="x86_64" src="zabbix-latest-7.4.9-1.el7.src.rpm">
					<filename>zabbix-latest-web-service-1:7.4.9-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-apache-conf" epoch="1" version="7.4.9" release="1.el7" arch="noarch" src="zabbix-latest-7.4.9-1.el7.src.rpm">
					<filename>zabbix-latest-apache-conf-1:7.4.9-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-latest-nginx-conf" epoch="1" version="7.4.9" release="1.el7" arch="noarch" src="zabbix-latest-7.4.9-1.el7.src.rpm">
					<filename>zabbix-latest-nginx-conf-1:7.4.9-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-latest-selinux-policy" epoch="1" version="7.4.9" release="1.el7" arch="noarch" src="zabbix-latest-7.4.9-1.el7.src.rpm">
					<filename>zabbix-latest-selinux-policy-1:7.4.9-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-latest-sql-scripts" epoch="1" version="7.4.9" release="1.el7" arch="noarch" src="zabbix-latest-7.4.9-1.el7.src.rpm">
					<filename>zabbix-latest-sql-scripts-1:7.4.9-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-latest-web" epoch="1" version="7.4.9" release="1.el7" arch="noarch" src="zabbix-latest-7.4.9-1.el7.src.rpm">
					<filename>zabbix-latest-web-1:7.4.9-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-latest-web-deps" epoch="1" version="7.4.9" release="1.el7" arch="noarch" src="zabbix-latest-7.4.9-1.el7.src.rpm">
					<filename>zabbix-latest-web-deps-1:7.4.9-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-latest-web-mysql" epoch="1" version="7.4.9" release="1.el7" arch="noarch" src="zabbix-latest-7.4.9-1.el7.src.rpm">
					<filename>zabbix-latest-web-mysql-1:7.4.9-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-latest-web-pgsql" epoch="1" version="7.4.9" release="1.el7" arch="noarch" src="zabbix-latest-7.4.9-1.el7.src.rpm">
					<filename>zabbix-latest-web-pgsql-1:7.4.9-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0005</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость zabbix-lts </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в zabbix-lts</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix-lts-cve-2026-23924-7.3/</description>
               <solution>Установить обновление для пакета(ов) zabbix-lts
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-zabbix-lts-cve-2026-23924-7.3/" type="self" id="ROS-20260505-73-0005" title="ROS-20260505-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23924" type="cve" id="CVE-2026-23924" title="CVE-2026-23924" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="zabbix-lts-agent" epoch="1" version="6.0.45" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.45-1.el7.src.rpm">
					<filename>zabbix-lts-agent-1:6.0.45-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-agent2" epoch="1" version="6.0.45" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.45-1.el7.src.rpm">
					<filename>zabbix-lts-agent2-1:6.0.45-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-get" epoch="1" version="6.0.45" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.45-1.el7.src.rpm">
					<filename>zabbix-lts-get-1:6.0.45-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway" epoch="1" version="6.0.45" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.45-1.el7.src.rpm">
					<filename>zabbix-lts-java-gateway-1:6.0.45-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway-openjdk11" epoch="1" version="6.0.45" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.45-1.el7.src.rpm">
					<filename>zabbix-lts-java-gateway-openjdk11-1:6.0.45-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway-openjdk17" epoch="1" version="6.0.45" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.45-1.el7.src.rpm">
					<filename>zabbix-lts-java-gateway-openjdk17-1:6.0.45-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway-openjdk21" epoch="1" version="6.0.45" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.45-1.el7.src.rpm">
					<filename>zabbix-lts-java-gateway-openjdk21-1:6.0.45-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-js" epoch="1" version="6.0.45" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.45-1.el7.src.rpm">
					<filename>zabbix-lts-js-1:6.0.45-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-proxy-mysql" epoch="1" version="6.0.45" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.45-1.el7.src.rpm">
					<filename>zabbix-lts-proxy-mysql-1:6.0.45-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-proxy-pgsql" epoch="1" version="6.0.45" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.45-1.el7.src.rpm">
					<filename>zabbix-lts-proxy-pgsql-1:6.0.45-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-proxy-sqlite3" epoch="1" version="6.0.45" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.45-1.el7.src.rpm">
					<filename>zabbix-lts-proxy-sqlite3-1:6.0.45-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-sender" epoch="1" version="6.0.45" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.45-1.el7.src.rpm">
					<filename>zabbix-lts-sender-1:6.0.45-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-server-mysql" epoch="1" version="6.0.45" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.45-1.el7.src.rpm">
					<filename>zabbix-lts-server-mysql-1:6.0.45-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-server-pgsql" epoch="1" version="6.0.45" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.45-1.el7.src.rpm">
					<filename>zabbix-lts-server-pgsql-1:6.0.45-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-web-service" epoch="1" version="6.0.45" release="1.el7" arch="x86_64" src="zabbix-lts-6.0.45-1.el7.src.rpm">
					<filename>zabbix-lts-web-service-1:6.0.45-1.el7.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-apache-conf" epoch="1" version="6.0.45" release="1.el7" arch="noarch" src="zabbix-lts-6.0.45-1.el7.src.rpm">
					<filename>zabbix-lts-apache-conf-1:6.0.45-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-nginx-conf" epoch="1" version="6.0.45" release="1.el7" arch="noarch" src="zabbix-lts-6.0.45-1.el7.src.rpm">
					<filename>zabbix-lts-nginx-conf-1:6.0.45-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-selinux-policy" epoch="1" version="6.0.45" release="1.el7" arch="noarch" src="zabbix-lts-6.0.45-1.el7.src.rpm">
					<filename>zabbix-lts-selinux-policy-1:6.0.45-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-sql-scripts" epoch="1" version="6.0.45" release="1.el7" arch="noarch" src="zabbix-lts-6.0.45-1.el7.src.rpm">
					<filename>zabbix-lts-sql-scripts-1:6.0.45-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-web" epoch="1" version="6.0.45" release="1.el7" arch="noarch" src="zabbix-lts-6.0.45-1.el7.src.rpm">
					<filename>zabbix-lts-web-1:6.0.45-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-web-deps" epoch="1" version="6.0.45" release="1.el7" arch="noarch" src="zabbix-lts-6.0.45-1.el7.src.rpm">
					<filename>zabbix-lts-web-deps-1:6.0.45-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-web-mysql" epoch="1" version="6.0.45" release="1.el7" arch="noarch" src="zabbix-lts-6.0.45-1.el7.src.rpm">
					<filename>zabbix-lts-web-mysql-1:6.0.45-1.el7.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-web-pgsql" epoch="1" version="6.0.45" release="1.el7" arch="noarch" src="zabbix-lts-6.0.45-1.el7.src.rpm">
					<filename>zabbix-lts-web-pgsql-1:6.0.45-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0006</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.10 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3.10</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-10-cve-2026-4519-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.10
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-10-cve-2026-4519-7.3/" type="self" id="ROS-20260505-73-0006" title="ROS-20260505-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4519" type="cve" id="CVE-2026-4519" title="CVE-2026-4519" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.10" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-debug" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-debug-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-devel" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-devel-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-idle" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-idle-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-libs" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-libs-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-test" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-test-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-tkinter" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-tkinter-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0007</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.11 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3.11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2026-4519-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.11
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2026-4519-7.3/" type="self" id="ROS-20260505-73-0007" title="ROS-20260505-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4519" type="cve" id="CVE-2026-4519" title="CVE-2026-4519" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.11" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-debug" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-debug-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-devel" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-devel-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-idle" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-idle-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-libs" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-libs-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-test" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-test-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-tkinter" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-tkinter-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0008</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.12 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3.12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-12-cve-2026-4519-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.12
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-12-cve-2026-4519-7.3/" type="self" id="ROS-20260505-73-0008" title="ROS-20260505-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4519" type="cve" id="CVE-2026-4519" title="CVE-2026-4519" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.12" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-debug" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-debug-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-devel" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-devel-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-idle" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-idle-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-libs" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-libs-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-test" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-test-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-tkinter" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-tkinter-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0009</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.13 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3.13</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-13-cve-2026-4519-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.13
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-13-cve-2026-4519-7.3/" type="self" id="ROS-20260505-73-0009" title="ROS-20260505-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4519" type="cve" id="CVE-2026-4519" title="CVE-2026-4519" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.13" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-debug" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-debug-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-devel" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-devel-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-freethreading-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading-debug" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-freethreading-debug-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-idle" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-idle-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-libs" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-libs-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-test" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-test-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-tkinter" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-tkinter-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0010</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2026-3644-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2026-3644-7.3/" type="self" id="ROS-20260505-73-0010" title="ROS-20260505-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3644" type="cve" id="CVE-2026-3644" title="CVE-2026-3644" />
			<reference href="https://bdu.fstec.ru/vul/2026-04601" type="self" id="BDU:2026-04601" title="BDU:2026-04601" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-debug" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-debug-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-devel" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-devel-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-idle" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-idle-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-libs" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-libs-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-test" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-test-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-tkinter" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-tkinter-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python-unversioned-command" epoch="0" version="3.8.20" release="10.el7" arch="noarch" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python-unversioned-command-0:3.8.20-10.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0011</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.10 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3.10</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-10-cve-2026-3644-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.10
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-10-cve-2026-3644-7.3/" type="self" id="ROS-20260505-73-0011" title="ROS-20260505-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3644" type="cve" id="CVE-2026-3644" title="CVE-2026-3644" />
			<reference href="https://bdu.fstec.ru/vul/2026-04601" type="self" id="BDU:2026-04601" title="BDU:2026-04601" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.10" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-debug" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-debug-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-devel" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-devel-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-idle" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-idle-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-libs" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-libs-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-test" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-test-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-tkinter" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-tkinter-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0012</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.11 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3.11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2026-3644-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.11
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2026-3644-7.3/" type="self" id="ROS-20260505-73-0012" title="ROS-20260505-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3644" type="cve" id="CVE-2026-3644" title="CVE-2026-3644" />
			<reference href="https://bdu.fstec.ru/vul/2026-04601" type="self" id="BDU:2026-04601" title="BDU:2026-04601" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.11" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-debug" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-debug-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-devel" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-devel-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-idle" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-idle-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-libs" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-libs-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-test" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-test-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-tkinter" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-tkinter-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0013</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.12 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3.12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-12-cve-2026-3644-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.12
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-12-cve-2026-3644-7.3/" type="self" id="ROS-20260505-73-0013" title="ROS-20260505-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3644" type="cve" id="CVE-2026-3644" title="CVE-2026-3644" />
			<reference href="https://bdu.fstec.ru/vul/2026-04601" type="self" id="BDU:2026-04601" title="BDU:2026-04601" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.12" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-debug" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-debug-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-devel" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-devel-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-idle" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-idle-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-libs" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-libs-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-test" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-test-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-tkinter" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-tkinter-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0014</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.13 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3.13</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-13-cve-2026-3644-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.13
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-13-cve-2026-3644-7.3/" type="self" id="ROS-20260505-73-0014" title="ROS-20260505-73-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3644" type="cve" id="CVE-2026-3644" title="CVE-2026-3644" />
			<reference href="https://bdu.fstec.ru/vul/2026-04601" type="self" id="BDU:2026-04601" title="BDU:2026-04601" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.13" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-debug" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-debug-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-devel" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-devel-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-freethreading-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading-debug" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-freethreading-debug-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-idle" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-idle-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-libs" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-libs-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-test" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-test-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-tkinter" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-tkinter-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0015</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2026-4224-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2026-4224-7.3/" type="self" id="ROS-20260505-73-0015" title="ROS-20260505-73-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4224" type="cve" id="CVE-2026-4224" title="CVE-2026-4224" />
			<reference href="https://bdu.fstec.ru/vul/2026-04602" type="self" id="BDU:2026-04602" title="BDU:2026-04602" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-debug" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-debug-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-devel" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-devel-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-idle" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-idle-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-libs" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-libs-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-test" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-test-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-tkinter" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-tkinter-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python-unversioned-command" epoch="0" version="3.8.20" release="10.el7" arch="noarch" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python-unversioned-command-0:3.8.20-10.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0016</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.10 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.10</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-10-cve-2026-4224-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.10
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-10-cve-2026-4224-7.3/" type="self" id="ROS-20260505-73-0016" title="ROS-20260505-73-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4224" type="cve" id="CVE-2026-4224" title="CVE-2026-4224" />
			<reference href="https://bdu.fstec.ru/vul/2026-04602" type="self" id="BDU:2026-04602" title="BDU:2026-04602" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.10" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-debug" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-debug-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-devel" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-devel-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-idle" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-idle-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-libs" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-libs-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-test" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-test-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-tkinter" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-tkinter-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0017</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.11 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2026-4224-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.11
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2026-4224-7.3/" type="self" id="ROS-20260505-73-0017" title="ROS-20260505-73-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4224" type="cve" id="CVE-2026-4224" title="CVE-2026-4224" />
			<reference href="https://bdu.fstec.ru/vul/2026-04602" type="self" id="BDU:2026-04602" title="BDU:2026-04602" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.11" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-debug" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-debug-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-devel" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-devel-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-idle" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-idle-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-libs" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-libs-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-test" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-test-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-tkinter" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-tkinter-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0018</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.12 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-12-cve-2026-4224-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.12
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-12-cve-2026-4224-7.3/" type="self" id="ROS-20260505-73-0018" title="ROS-20260505-73-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4224" type="cve" id="CVE-2026-4224" title="CVE-2026-4224" />
			<reference href="https://bdu.fstec.ru/vul/2026-04602" type="self" id="BDU:2026-04602" title="BDU:2026-04602" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.12" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-debug" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-debug-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-devel" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-devel-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-idle" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-idle-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-libs" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-libs-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-test" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-test-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-tkinter" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-tkinter-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0019</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.13 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.13</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-13-cve-2026-4224-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.13
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-13-cve-2026-4224-7.3/" type="self" id="ROS-20260505-73-0019" title="ROS-20260505-73-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4224" type="cve" id="CVE-2026-4224" title="CVE-2026-4224" />
			<reference href="https://bdu.fstec.ru/vul/2026-04602" type="self" id="BDU:2026-04602" title="BDU:2026-04602" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.13" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-debug" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-debug-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-devel" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-devel-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-freethreading-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading-debug" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-freethreading-debug-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-idle" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-idle-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-libs" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-libs-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-test" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-test-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-tkinter" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-tkinter-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0020</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2025-6075-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2025-6075-7.3/" type="self" id="ROS-20260505-73-0020" title="ROS-20260505-73-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6075" type="cve" id="CVE-2025-6075" title="CVE-2025-6075" />
			<reference href="https://bdu.fstec.ru/vul/2026-05129" type="self" id="BDU:2026-05129" title="BDU:2026-05129" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-debug" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-debug-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-devel" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-devel-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-idle" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-idle-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-libs" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-libs-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-test" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-test-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-tkinter" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-tkinter-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python-unversioned-command" epoch="0" version="3.8.20" release="10.el7" arch="noarch" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python-unversioned-command-0:3.8.20-10.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0021</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.10 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.10</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-10-cve-2025-6075-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.10
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-10-cve-2025-6075-7.3/" type="self" id="ROS-20260505-73-0021" title="ROS-20260505-73-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6075" type="cve" id="CVE-2025-6075" title="CVE-2025-6075" />
			<reference href="https://bdu.fstec.ru/vul/2026-05129" type="self" id="BDU:2026-05129" title="BDU:2026-05129" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.10" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-debug" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-debug-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-devel" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-devel-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-idle" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-idle-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-libs" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-libs-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-test" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-test-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-tkinter" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-tkinter-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0022</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.11 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2025-6075-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.11
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2025-6075-7.3/" type="self" id="ROS-20260505-73-0022" title="ROS-20260505-73-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6075" type="cve" id="CVE-2025-6075" title="CVE-2025-6075" />
			<reference href="https://bdu.fstec.ru/vul/2026-05129" type="self" id="BDU:2026-05129" title="BDU:2026-05129" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.11" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-debug" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-debug-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-devel" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-devel-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-idle" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-idle-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-libs" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-libs-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-test" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-test-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-tkinter" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-tkinter-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0023</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.12 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-12-cve-2025-6075-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.12
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-12-cve-2025-6075-7.3/" type="self" id="ROS-20260505-73-0023" title="ROS-20260505-73-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6075" type="cve" id="CVE-2025-6075" title="CVE-2025-6075" />
			<reference href="https://bdu.fstec.ru/vul/2026-05129" type="self" id="BDU:2026-05129" title="BDU:2026-05129" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.12" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-debug" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-debug-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-devel" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-devel-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-idle" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-idle-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-libs" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-libs-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-test" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-test-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-tkinter" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-tkinter-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0024</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.13 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.13</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-13-cve-2025-6075-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.13
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-13-cve-2025-6075-7.3/" type="self" id="ROS-20260505-73-0024" title="ROS-20260505-73-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6075" type="cve" id="CVE-2025-6075" title="CVE-2025-6075" />
			<reference href="https://bdu.fstec.ru/vul/2026-05129" type="self" id="BDU:2026-05129" title="BDU:2026-05129" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.13" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-debug" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-debug-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-devel" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-devel-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-freethreading-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading-debug" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-freethreading-debug-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-idle" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-idle-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-libs" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-libs-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-test" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-test-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-tkinter" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-tkinter-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0025</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2025-12084-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2025-12084-7.3/" type="self" id="ROS-20260505-73-0025" title="ROS-20260505-73-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12084" type="cve" id="CVE-2025-12084" title="CVE-2025-12084" />
			<reference href="https://bdu.fstec.ru/vul/2026-01344" type="self" id="BDU:2026-01344" title="BDU:2026-01344" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-debug" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-debug-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-devel" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-devel-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-idle" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-idle-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-libs" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-libs-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-test" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-test-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-tkinter" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-tkinter-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python-unversioned-command" epoch="0" version="3.8.20" release="10.el7" arch="noarch" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python-unversioned-command-0:3.8.20-10.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0026</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.10 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.10</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-10-cve-2025-12084-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.10
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-10-cve-2025-12084-7.3/" type="self" id="ROS-20260505-73-0026" title="ROS-20260505-73-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12084" type="cve" id="CVE-2025-12084" title="CVE-2025-12084" />
			<reference href="https://bdu.fstec.ru/vul/2026-01344" type="self" id="BDU:2026-01344" title="BDU:2026-01344" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.10" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-debug" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-debug-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-devel" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-devel-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-idle" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-idle-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-libs" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-libs-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-test" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-test-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-tkinter" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-tkinter-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0027</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.11 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2025-12084-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.11
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2025-12084-7.3/" type="self" id="ROS-20260505-73-0027" title="ROS-20260505-73-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12084" type="cve" id="CVE-2025-12084" title="CVE-2025-12084" />
			<reference href="https://bdu.fstec.ru/vul/2026-01344" type="self" id="BDU:2026-01344" title="BDU:2026-01344" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.11" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-debug" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-debug-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-devel" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-devel-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-idle" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-idle-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-libs" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-libs-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-test" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-test-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-tkinter" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-tkinter-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0028</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.12 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-12-cve-2025-12084-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.12
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-12-cve-2025-12084-7.3/" type="self" id="ROS-20260505-73-0028" title="ROS-20260505-73-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12084" type="cve" id="CVE-2025-12084" title="CVE-2025-12084" />
			<reference href="https://bdu.fstec.ru/vul/2026-01344" type="self" id="BDU:2026-01344" title="BDU:2026-01344" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.12" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-debug" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-debug-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-devel" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-devel-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-idle" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-idle-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-libs" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-libs-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-test" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-test-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-tkinter" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-tkinter-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0029</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.13 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.13</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-13-cve-2025-12084-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.13
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-13-cve-2025-12084-7.3/" type="self" id="ROS-20260505-73-0029" title="ROS-20260505-73-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12084" type="cve" id="CVE-2025-12084" title="CVE-2025-12084" />
			<reference href="https://bdu.fstec.ru/vul/2026-01344" type="self" id="BDU:2026-01344" title="BDU:2026-01344" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.13" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-debug" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-debug-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-devel" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-devel-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-freethreading-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading-debug" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-freethreading-debug-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-idle" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-idle-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-libs" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-libs-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-test" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-test-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-tkinter" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-tkinter-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0030</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2025-13836-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2025-13836-7.3/" type="self" id="ROS-20260505-73-0030" title="ROS-20260505-73-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13836" type="cve" id="CVE-2025-13836" title="CVE-2025-13836" />
			<reference href="https://bdu.fstec.ru/vul/2026-05127" type="self" id="BDU:2026-05127" title="BDU:2026-05127" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-debug" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-debug-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-devel" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-devel-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-idle" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-idle-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-libs" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-libs-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-test" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-test-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-tkinter" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-tkinter-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python-unversioned-command" epoch="0" version="3.8.20" release="10.el7" arch="noarch" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python-unversioned-command-0:3.8.20-10.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0031</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.10 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3.10</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-10-cve-2025-13836-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.10
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-10-cve-2025-13836-7.3/" type="self" id="ROS-20260505-73-0031" title="ROS-20260505-73-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13836" type="cve" id="CVE-2025-13836" title="CVE-2025-13836" />
			<reference href="https://bdu.fstec.ru/vul/2026-05127" type="self" id="BDU:2026-05127" title="BDU:2026-05127" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.10" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-debug" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-debug-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-devel" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-devel-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-idle" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-idle-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-libs" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-libs-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-test" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-test-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-tkinter" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-tkinter-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0032</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.11 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3.11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2025-13836-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.11
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2025-13836-7.3/" type="self" id="ROS-20260505-73-0032" title="ROS-20260505-73-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13836" type="cve" id="CVE-2025-13836" title="CVE-2025-13836" />
			<reference href="https://bdu.fstec.ru/vul/2026-05127" type="self" id="BDU:2026-05127" title="BDU:2026-05127" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.11" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-debug" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-debug-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-devel" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-devel-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-idle" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-idle-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-libs" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-libs-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-test" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-test-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-tkinter" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-tkinter-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0033</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.12 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3.12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-12-cve-2025-13836-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.12
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-12-cve-2025-13836-7.3/" type="self" id="ROS-20260505-73-0033" title="ROS-20260505-73-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13836" type="cve" id="CVE-2025-13836" title="CVE-2025-13836" />
			<reference href="https://bdu.fstec.ru/vul/2026-05127" type="self" id="BDU:2026-05127" title="BDU:2026-05127" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.12" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-debug" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-debug-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-devel" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-devel-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-idle" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-idle-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-libs" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-libs-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-test" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-test-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-tkinter" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-tkinter-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0034</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.13 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3.13</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-13-cve-2025-13836-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.13
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-13-cve-2025-13836-7.3/" type="self" id="ROS-20260505-73-0034" title="ROS-20260505-73-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13836" type="cve" id="CVE-2025-13836" title="CVE-2025-13836" />
			<reference href="https://bdu.fstec.ru/vul/2026-05127" type="self" id="BDU:2026-05127" title="BDU:2026-05127" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.13" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-debug" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-debug-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-devel" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-devel-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-freethreading-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading-debug" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-freethreading-debug-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-idle" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-idle-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-libs" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-libs-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-test" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-test-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-tkinter" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-tkinter-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0035</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2025-13837-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2025-13837-7.3/" type="self" id="ROS-20260505-73-0035" title="ROS-20260505-73-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13837" type="cve" id="CVE-2025-13837" title="CVE-2025-13837" />
			<reference href="https://bdu.fstec.ru/vul/2026-05126" type="self" id="BDU:2026-05126" title="BDU:2026-05126" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-debug" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-debug-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-devel" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-devel-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-idle" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-idle-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-libs" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-libs-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-test" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-test-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-tkinter" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-tkinter-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python-unversioned-command" epoch="0" version="3.8.20" release="10.el7" arch="noarch" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python-unversioned-command-0:3.8.20-10.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0036</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.10 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.10</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-10-cve-2025-13837-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.10
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-10-cve-2025-13837-7.3/" type="self" id="ROS-20260505-73-0036" title="ROS-20260505-73-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13837" type="cve" id="CVE-2025-13837" title="CVE-2025-13837" />
			<reference href="https://bdu.fstec.ru/vul/2026-05126" type="self" id="BDU:2026-05126" title="BDU:2026-05126" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.10" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-debug" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-debug-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-devel" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-devel-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-idle" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-idle-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-libs" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-libs-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-test" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-test-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-tkinter" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-tkinter-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0037</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.11 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2025-13837-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.11
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2025-13837-7.3/" type="self" id="ROS-20260505-73-0037" title="ROS-20260505-73-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13837" type="cve" id="CVE-2025-13837" title="CVE-2025-13837" />
			<reference href="https://bdu.fstec.ru/vul/2026-05126" type="self" id="BDU:2026-05126" title="BDU:2026-05126" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.11" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-debug" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-debug-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-devel" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-devel-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-idle" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-idle-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-libs" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-libs-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-test" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-test-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-tkinter" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-tkinter-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0038</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.12 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-12-cve-2025-13837-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.12
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-12-cve-2025-13837-7.3/" type="self" id="ROS-20260505-73-0038" title="ROS-20260505-73-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13837" type="cve" id="CVE-2025-13837" title="CVE-2025-13837" />
			<reference href="https://bdu.fstec.ru/vul/2026-05126" type="self" id="BDU:2026-05126" title="BDU:2026-05126" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.12" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-debug" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-debug-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-devel" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-devel-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-idle" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-idle-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-libs" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-libs-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-test" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-test-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-tkinter" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-tkinter-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0039</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.13 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.13</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-13-cve-2025-13837-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.13
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-13-cve-2025-13837-7.3/" type="self" id="ROS-20260505-73-0039" title="ROS-20260505-73-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13837" type="cve" id="CVE-2025-13837" title="CVE-2025-13837" />
			<reference href="https://bdu.fstec.ru/vul/2026-05126" type="self" id="BDU:2026-05126" title="BDU:2026-05126" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.13" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-debug" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-debug-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-devel" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-devel-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-freethreading-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading-debug" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-freethreading-debug-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-idle" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-idle-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-libs" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-libs-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-test" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-test-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-tkinter" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-tkinter-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0040</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2025-11468-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2025-11468-7.3/" type="self" id="ROS-20260505-73-0040" title="ROS-20260505-73-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11468" type="cve" id="CVE-2025-11468" title="CVE-2025-11468" />
			<reference href="https://bdu.fstec.ru/vul/2026-06436" type="self" id="BDU:2026-06436" title="BDU:2026-06436" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-debug" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-debug-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-devel" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-devel-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-idle" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-idle-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-libs" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-libs-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-test" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-test-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-tkinter" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-tkinter-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python-unversioned-command" epoch="0" version="3.8.20" release="10.el7" arch="noarch" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python-unversioned-command-0:3.8.20-10.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0041</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.10 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.10</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-10-cve-2025-11468-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.10
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-10-cve-2025-11468-7.3/" type="self" id="ROS-20260505-73-0041" title="ROS-20260505-73-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11468" type="cve" id="CVE-2025-11468" title="CVE-2025-11468" />
			<reference href="https://bdu.fstec.ru/vul/2026-06436" type="self" id="BDU:2026-06436" title="BDU:2026-06436" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.10" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-debug" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-debug-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-devel" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-devel-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-idle" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-idle-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-libs" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-libs-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-test" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-test-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-tkinter" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-tkinter-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0042</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.11 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2025-11468-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.11
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2025-11468-7.3/" type="self" id="ROS-20260505-73-0042" title="ROS-20260505-73-0042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11468" type="cve" id="CVE-2025-11468" title="CVE-2025-11468" />
			<reference href="https://bdu.fstec.ru/vul/2026-06436" type="self" id="BDU:2026-06436" title="BDU:2026-06436" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.11" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-debug" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-debug-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-devel" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-devel-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-idle" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-idle-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-libs" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-libs-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-test" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-test-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-tkinter" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-tkinter-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0043</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.12 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-12-cve-2025-11468-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.12
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-12-cve-2025-11468-7.3/" type="self" id="ROS-20260505-73-0043" title="ROS-20260505-73-0043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11468" type="cve" id="CVE-2025-11468" title="CVE-2025-11468" />
			<reference href="https://bdu.fstec.ru/vul/2026-06436" type="self" id="BDU:2026-06436" title="BDU:2026-06436" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.12" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-debug" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-debug-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-devel" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-devel-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-idle" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-idle-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-libs" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-libs-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-test" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-test-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-tkinter" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-tkinter-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0044</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.13 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.13</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-13-cve-2025-11468-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.13
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-13-cve-2025-11468-7.3/" type="self" id="ROS-20260505-73-0044" title="ROS-20260505-73-0044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11468" type="cve" id="CVE-2025-11468" title="CVE-2025-11468" />
			<reference href="https://bdu.fstec.ru/vul/2026-06436" type="self" id="BDU:2026-06436" title="BDU:2026-06436" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.13" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-debug" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-debug-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-devel" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-devel-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-freethreading-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading-debug" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-freethreading-debug-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-idle" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-idle-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-libs" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-libs-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-test" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-test-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-tkinter" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-tkinter-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0045</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2025-15282-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2025-15282-7.3/" type="self" id="ROS-20260505-73-0045" title="ROS-20260505-73-0045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15282" type="cve" id="CVE-2025-15282" title="CVE-2025-15282" />
			<reference href="https://bdu.fstec.ru/vul/2026-05133" type="self" id="BDU:2026-05133" title="BDU:2026-05133" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-debug" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-debug-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-devel" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-devel-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-idle" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-idle-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-libs" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-libs-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-test" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-test-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-tkinter" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-tkinter-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python-unversioned-command" epoch="0" version="3.8.20" release="10.el7" arch="noarch" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python-unversioned-command-0:3.8.20-10.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0046</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.10 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3.10</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-10-cve-2025-15282-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.10
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-10-cve-2025-15282-7.3/" type="self" id="ROS-20260505-73-0046" title="ROS-20260505-73-0046" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15282" type="cve" id="CVE-2025-15282" title="CVE-2025-15282" />
			<reference href="https://bdu.fstec.ru/vul/2026-05133" type="self" id="BDU:2026-05133" title="BDU:2026-05133" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.10" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-debug" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-debug-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-devel" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-devel-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-idle" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-idle-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-libs" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-libs-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-test" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-test-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-tkinter" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-tkinter-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0047</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.11 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3.11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2025-15282-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.11
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2025-15282-7.3/" type="self" id="ROS-20260505-73-0047" title="ROS-20260505-73-0047" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15282" type="cve" id="CVE-2025-15282" title="CVE-2025-15282" />
			<reference href="https://bdu.fstec.ru/vul/2026-05133" type="self" id="BDU:2026-05133" title="BDU:2026-05133" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.11" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-debug" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-debug-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-devel" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-devel-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-idle" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-idle-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-libs" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-libs-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-test" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-test-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-tkinter" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-tkinter-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0048</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.12 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3.12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-12-cve-2025-15282-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.12
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-12-cve-2025-15282-7.3/" type="self" id="ROS-20260505-73-0048" title="ROS-20260505-73-0048" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15282" type="cve" id="CVE-2025-15282" title="CVE-2025-15282" />
			<reference href="https://bdu.fstec.ru/vul/2026-05133" type="self" id="BDU:2026-05133" title="BDU:2026-05133" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.12" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-debug" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-debug-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-devel" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-devel-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-idle" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-idle-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-libs" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-libs-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-test" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-test-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-tkinter" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-tkinter-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0049</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.13 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3.13</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-13-cve-2025-15282-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.13
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-13-cve-2025-15282-7.3/" type="self" id="ROS-20260505-73-0049" title="ROS-20260505-73-0049" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15282" type="cve" id="CVE-2025-15282" title="CVE-2025-15282" />
			<reference href="https://bdu.fstec.ru/vul/2026-05133" type="self" id="BDU:2026-05133" title="BDU:2026-05133" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.13" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-debug" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-debug-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-devel" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-devel-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-freethreading-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading-debug" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-freethreading-debug-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-idle" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-idle-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-libs" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-libs-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-test" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-test-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-tkinter" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-tkinter-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0050</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2026-0672-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2026-0672-7.3/" type="self" id="ROS-20260505-73-0050" title="ROS-20260505-73-0050" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0672" type="cve" id="CVE-2026-0672" title="CVE-2026-0672" />
			<reference href="https://bdu.fstec.ru/vul/2026-05125" type="self" id="BDU:2026-05125" title="BDU:2026-05125" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-debug" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-debug-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-devel" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-devel-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-idle" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-idle-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-libs" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-libs-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-test" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-test-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-tkinter" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-tkinter-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python-unversioned-command" epoch="0" version="3.8.20" release="10.el7" arch="noarch" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python-unversioned-command-0:3.8.20-10.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0051</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.10 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3.10</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-10-cve-2026-0672-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.10
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-10-cve-2026-0672-7.3/" type="self" id="ROS-20260505-73-0051" title="ROS-20260505-73-0051" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0672" type="cve" id="CVE-2026-0672" title="CVE-2026-0672" />
			<reference href="https://bdu.fstec.ru/vul/2026-05125" type="self" id="BDU:2026-05125" title="BDU:2026-05125" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.10" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-debug" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-debug-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-devel" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-devel-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-idle" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-idle-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-libs" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-libs-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-test" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-test-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-tkinter" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-tkinter-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0052</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.11 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3.11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2026-0672-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.11
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2026-0672-7.3/" type="self" id="ROS-20260505-73-0052" title="ROS-20260505-73-0052" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0672" type="cve" id="CVE-2026-0672" title="CVE-2026-0672" />
			<reference href="https://bdu.fstec.ru/vul/2026-05125" type="self" id="BDU:2026-05125" title="BDU:2026-05125" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.11" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-debug" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-debug-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-devel" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-devel-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-idle" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-idle-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-libs" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-libs-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-test" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-test-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-tkinter" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-tkinter-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0053</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.12 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3.12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-12-cve-2026-0672-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.12
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-12-cve-2026-0672-7.3/" type="self" id="ROS-20260505-73-0053" title="ROS-20260505-73-0053" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0672" type="cve" id="CVE-2026-0672" title="CVE-2026-0672" />
			<reference href="https://bdu.fstec.ru/vul/2026-05125" type="self" id="BDU:2026-05125" title="BDU:2026-05125" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.12" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-debug" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-debug-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-devel" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-devel-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-idle" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-idle-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-libs" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-libs-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-test" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-test-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-tkinter" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-tkinter-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0054</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.13 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3.13</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-13-cve-2026-0672-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.13
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-13-cve-2026-0672-7.3/" type="self" id="ROS-20260505-73-0054" title="ROS-20260505-73-0054" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0672" type="cve" id="CVE-2026-0672" title="CVE-2026-0672" />
			<reference href="https://bdu.fstec.ru/vul/2026-05125" type="self" id="BDU:2026-05125" title="BDU:2026-05125" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.13" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-debug" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-debug-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-devel" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-devel-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-freethreading-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading-debug" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-freethreading-debug-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-idle" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-idle-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-libs" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-libs-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-test" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-test-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-tkinter" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-tkinter-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0055</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2026-0865-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2026-0865-7.3/" type="self" id="ROS-20260505-73-0055" title="ROS-20260505-73-0055" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0865" type="cve" id="CVE-2026-0865" title="CVE-2026-0865" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-debug" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-debug-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-devel" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-devel-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-idle" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-idle-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-libs" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-libs-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-test" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-test-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-tkinter" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-tkinter-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python-unversioned-command" epoch="0" version="3.8.20" release="10.el7" arch="noarch" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python-unversioned-command-0:3.8.20-10.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0056</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.10 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.10</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-10-cve-2026-0865-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.10
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-10-cve-2026-0865-7.3/" type="self" id="ROS-20260505-73-0056" title="ROS-20260505-73-0056" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0865" type="cve" id="CVE-2026-0865" title="CVE-2026-0865" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.10" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-debug" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-debug-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-devel" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-devel-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-idle" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-idle-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-libs" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-libs-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-test" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-test-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-tkinter" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-tkinter-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0057</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.11 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2026-0865-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.11
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2026-0865-7.3/" type="self" id="ROS-20260505-73-0057" title="ROS-20260505-73-0057" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0865" type="cve" id="CVE-2026-0865" title="CVE-2026-0865" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.11" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-debug" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-debug-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-devel" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-devel-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-idle" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-idle-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-libs" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-libs-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-test" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-test-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-tkinter" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-tkinter-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0058</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.12 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-12-cve-2026-0865-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.12
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-12-cve-2026-0865-7.3/" type="self" id="ROS-20260505-73-0058" title="ROS-20260505-73-0058" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0865" type="cve" id="CVE-2026-0865" title="CVE-2026-0865" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.12" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-debug" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-debug-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-devel" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-devel-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-idle" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-idle-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-libs" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-libs-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-test" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-test-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-tkinter" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-tkinter-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0059</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.13 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.13</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-13-cve-2026-0865-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.13
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-13-cve-2026-0865-7.3/" type="self" id="ROS-20260505-73-0059" title="ROS-20260505-73-0059" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0865" type="cve" id="CVE-2026-0865" title="CVE-2026-0865" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.13" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-debug" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-debug-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-devel" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-devel-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-freethreading-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading-debug" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-freethreading-debug-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-idle" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-idle-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-libs" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-libs-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-test" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-test-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-tkinter" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-tkinter-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0060</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2026-1299-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2026-1299-7.3/" type="self" id="ROS-20260505-73-0060" title="ROS-20260505-73-0060" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1299" type="cve" id="CVE-2026-1299" title="CVE-2026-1299" />
			<reference href="https://bdu.fstec.ru/vul/2026-05130" type="self" id="BDU:2026-05130" title="BDU:2026-05130" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-debug" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-debug-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-devel" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-devel-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-idle" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-idle-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-libs" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-libs-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-test" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-test-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-tkinter" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-tkinter-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python-unversioned-command" epoch="0" version="3.8.20" release="10.el7" arch="noarch" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python-unversioned-command-0:3.8.20-10.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0061</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.10 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3.10</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-10-cve-2026-1299-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.10
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-10-cve-2026-1299-7.3/" type="self" id="ROS-20260505-73-0061" title="ROS-20260505-73-0061" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1299" type="cve" id="CVE-2026-1299" title="CVE-2026-1299" />
			<reference href="https://bdu.fstec.ru/vul/2026-05130" type="self" id="BDU:2026-05130" title="BDU:2026-05130" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.10" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-debug" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-debug-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-devel" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-devel-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-idle" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-idle-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-libs" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-libs-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-test" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-test-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-tkinter" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-tkinter-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0062</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.11 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3.11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2026-1299-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.11
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2026-1299-7.3/" type="self" id="ROS-20260505-73-0062" title="ROS-20260505-73-0062" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1299" type="cve" id="CVE-2026-1299" title="CVE-2026-1299" />
			<reference href="https://bdu.fstec.ru/vul/2026-05130" type="self" id="BDU:2026-05130" title="BDU:2026-05130" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.11" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-debug" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-debug-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-devel" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-devel-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-idle" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-idle-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-libs" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-libs-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-test" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-test-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-tkinter" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-tkinter-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0063</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.12 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3.12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-12-cve-2026-1299-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.12
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-12-cve-2026-1299-7.3/" type="self" id="ROS-20260505-73-0063" title="ROS-20260505-73-0063" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1299" type="cve" id="CVE-2026-1299" title="CVE-2026-1299" />
			<reference href="https://bdu.fstec.ru/vul/2026-05130" type="self" id="BDU:2026-05130" title="BDU:2026-05130" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.12" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-debug" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-debug-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-devel" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-devel-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-idle" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-idle-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-libs" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-libs-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-test" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-test-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-tkinter" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-tkinter-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0064</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.13 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3.13</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-13-cve-2026-1299-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.13
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-13-cve-2026-1299-7.3/" type="self" id="ROS-20260505-73-0064" title="ROS-20260505-73-0064" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1299" type="cve" id="CVE-2026-1299" title="CVE-2026-1299" />
			<reference href="https://bdu.fstec.ru/vul/2026-05130" type="self" id="BDU:2026-05130" title="BDU:2026-05130" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.13" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-debug" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-debug-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-devel" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-devel-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-freethreading-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading-debug" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-freethreading-debug-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-idle" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-idle-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-libs" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-libs-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-test" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-test-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-tkinter" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-tkinter-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0065</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2025-12781-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-cve-2025-12781-7.3/" type="self" id="ROS-20260505-73-0065" title="ROS-20260505-73-0065" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12781" type="cve" id="CVE-2025-12781" title="CVE-2025-12781" />
			<reference href="https://bdu.fstec.ru/vul/2026-05132" type="self" id="BDU:2026-05132" title="BDU:2026-05132" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-debug" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-debug-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-devel" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-devel-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-idle" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-idle-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-libs" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-libs-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-test" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-test-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-tkinter" epoch="0" version="3.8.20" release="10.el7" arch="x86_64" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python3-tkinter-0:3.8.20-10.el7.x86_64.rpm</filename>
				</package>
				<package name="python-unversioned-command" epoch="0" version="3.8.20" release="10.el7" arch="noarch" src="python3-3.8.20-10.el7.src.rpm">
					<filename>python-unversioned-command-0:3.8.20-10.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0066</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.10 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.10</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-10-cve-2025-12781-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.10
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-10-cve-2025-12781-7.3/" type="self" id="ROS-20260505-73-0066" title="ROS-20260505-73-0066" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12781" type="cve" id="CVE-2025-12781" title="CVE-2025-12781" />
			<reference href="https://bdu.fstec.ru/vul/2026-05132" type="self" id="BDU:2026-05132" title="BDU:2026-05132" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.10" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-debug" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-debug-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-devel" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-devel-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-idle" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-idle-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-libs" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-libs-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-test" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-test-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-tkinter" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-tkinter-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0067</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.11 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2025-12781-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.11
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2025-12781-7.3/" type="self" id="ROS-20260505-73-0067" title="ROS-20260505-73-0067" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12781" type="cve" id="CVE-2025-12781" title="CVE-2025-12781" />
			<reference href="https://bdu.fstec.ru/vul/2026-05132" type="self" id="BDU:2026-05132" title="BDU:2026-05132" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.11" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-debug" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-debug-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-devel" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-devel-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-idle" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-idle-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-libs" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-libs-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-test" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-test-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-tkinter" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-tkinter-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0068</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.12 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-12-cve-2025-12781-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.12
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-12-cve-2025-12781-7.3/" type="self" id="ROS-20260505-73-0068" title="ROS-20260505-73-0068" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12781" type="cve" id="CVE-2025-12781" title="CVE-2025-12781" />
			<reference href="https://bdu.fstec.ru/vul/2026-05132" type="self" id="BDU:2026-05132" title="BDU:2026-05132" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.12" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-debug" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-debug-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-devel" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-devel-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-idle" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-idle-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-libs" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-libs-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-test" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-test-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-tkinter" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-tkinter-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0069</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.13 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.13</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-13-cve-2025-12781-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.13
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-13-cve-2025-12781-7.3/" type="self" id="ROS-20260505-73-0069" title="ROS-20260505-73-0069" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12781" type="cve" id="CVE-2025-12781" title="CVE-2025-12781" />
			<reference href="https://bdu.fstec.ru/vul/2026-05132" type="self" id="BDU:2026-05132" title="BDU:2026-05132" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.13" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-debug" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-debug-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-devel" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-devel-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-freethreading-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading-debug" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-freethreading-debug-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-idle" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-idle-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-libs" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-libs-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-test" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-test-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-tkinter" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-tkinter-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0070</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.10 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3.10</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-10-cve-2024-6232-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.10
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-10-cve-2024-6232-7.3/" type="self" id="ROS-20260505-73-0070" title="ROS-20260505-73-0070" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6232" type="cve" id="CVE-2024-6232" title="CVE-2024-6232" />
			<reference href="https://bdu.fstec.ru/vul/2024-08943" type="self" id="BDU:2024-08943" title="BDU:2024-08943" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.10" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-debug" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-debug-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-devel" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-devel-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-idle" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-idle-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-libs" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-libs-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-test" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-test-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.10-tkinter" epoch="0" version="3.10.20" release="1.el7" arch="x86_64" src="python3.10-3.10.20-1.el7.src.rpm">
					<filename>python3.10-tkinter-0:3.10.20-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0071</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.11 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3.11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2024-6232-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.11
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2024-6232-7.3/" type="self" id="ROS-20260505-73-0071" title="ROS-20260505-73-0071" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6232" type="cve" id="CVE-2024-6232" title="CVE-2024-6232" />
			<reference href="https://bdu.fstec.ru/vul/2024-08943" type="self" id="BDU:2024-08943" title="BDU:2024-08943" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.11" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-debug" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-debug-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-devel" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-devel-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-idle" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-idle-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-libs" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-libs-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-test" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-test-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-tkinter" epoch="0" version="3.11.15" release="1.el7" arch="x86_64" src="python3.11-3.11.15-1.el7.src.rpm">
					<filename>python3.11-tkinter-0:3.11.15-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0072</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.12 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3.12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-12-cve-2024-6232-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.12
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-12-cve-2024-6232-7.3/" type="self" id="ROS-20260505-73-0072" title="ROS-20260505-73-0072" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6232" type="cve" id="CVE-2024-6232" title="CVE-2024-6232" />
			<reference href="https://bdu.fstec.ru/vul/2024-08943" type="self" id="BDU:2024-08943" title="BDU:2024-08943" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.12" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-debug" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-debug-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-devel" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-devel-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-idle" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-idle-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-libs" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-libs-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-test" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-test-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-tkinter" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-tkinter-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0073</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.13 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3.13</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-13-cve-2024-6232-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.13
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-13-cve-2024-6232-7.3/" type="self" id="ROS-20260505-73-0073" title="ROS-20260505-73-0073" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6232" type="cve" id="CVE-2024-6232" title="CVE-2024-6232" />
			<reference href="https://bdu.fstec.ru/vul/2024-08943" type="self" id="BDU:2024-08943" title="BDU:2024-08943" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.13" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-debug" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-debug-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-devel" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-devel-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-freethreading-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading-debug" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-freethreading-debug-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-idle" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-idle-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-libs" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-libs-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-test" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-test-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.13-tkinter" epoch="0" version="3.13.12" release="1.el7" arch="x86_64" src="python3.13-3.13.12-1.el7.src.rpm">
					<filename>python3.13-tkinter-0:3.13.12-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0074</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость angie </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в angie</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-angie-cve-2026-28755-7.3/</description>
               <solution>Установить обновление для пакета(ов) angie
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-angie-cve-2026-28755-7.3/" type="self" id="ROS-20260505-73-0074" title="ROS-20260505-73-0074" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28755" type="cve" id="CVE-2026-28755" title="CVE-2026-28755" />
			<reference href="https://bdu.fstec.ru/vul/2026-04821" type="self" id="BDU:2026-04821" title="BDU:2026-04821" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="angie" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-auth-jwt" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-auth-jwt-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-auth-ldap" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-auth-ldap-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-auth-pam" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-auth-pam-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-auth-spnego" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-auth-spnego-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-auth-totp" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-auth-totp-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-brotli" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-brotli-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-cache-purge" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-cache-purge-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-cgi" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-cgi-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-combined-upstreams" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-combined-upstreams-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-dav-ext" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-dav-ext-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-dynamic-limit-req" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-dynamic-limit-req-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-echo" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-echo-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-enhanced-memcached" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-enhanced-memcached-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-eval" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-eval-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-geoip2" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-geoip2-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-headers-more" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-headers-more-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-http-auth-radius" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-http-auth-radius-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-image-filter" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-image-filter-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-keyval" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-keyval-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-lua" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-lua-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-modsecurity" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-modsecurity-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-ndk" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-ndk-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-njs" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-njs-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-njs-cli" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-njs-cli-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-njs-light" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-njs-light-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-njs-light-cli" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-njs-light-cli-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-opentracing" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-opentracing-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-otel" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-otel-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-perl" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-perl-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-postgres" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-postgres-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-redis2" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-redis2-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-rtmp" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-rtmp-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-set-misc" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-set-misc-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-subs" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-subs-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-testcookie" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-testcookie-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-unbrotli" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-unbrotli-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-upload" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-upload-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-vod" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-vod-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-vts" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-vts-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-wamr" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-wamr-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-wasm" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-wasm-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-wasmtime" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-wasmtime-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-xslt" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-xslt-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-zip" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-zip-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="angie-module-zstd" epoch="0" version="1.11.4" release="1.el7" arch="x86_64" src="angie-1.11.4-1.el7.src.rpm">
					<filename>angie-module-zstd-0:1.11.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0075</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость mongo-c-driver </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mongo-c-driver</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongo-c-driver-cve-2026-6231-7.3/</description>
               <solution>Установить обновление для пакета(ов) mongo-c-driver
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongo-c-driver-cve-2026-6231-7.3/" type="self" id="ROS-20260505-73-0075" title="ROS-20260505-73-0075" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6231" type="cve" id="CVE-2026-6231" title="CVE-2026-6231" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libbson" epoch="0" version="2.2.2" release="2.el7" arch="x86_64" src="mongo-c-driver-2.2.2-2.el7.src.rpm">
					<filename>libbson-0:2.2.2-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libbson-devel" epoch="0" version="2.2.2" release="2.el7" arch="x86_64" src="mongo-c-driver-2.2.2-2.el7.src.rpm">
					<filename>libbson-devel-0:2.2.2-2.el7.x86_64.rpm</filename>
				</package>
				<package name="mongo-c-driver" epoch="0" version="2.2.2" release="2.el7" arch="x86_64" src="mongo-c-driver-2.2.2-2.el7.src.rpm">
					<filename>mongo-c-driver-0:2.2.2-2.el7.x86_64.rpm</filename>
				</package>
				<package name="mongo-c-driver-devel" epoch="0" version="2.2.2" release="2.el7" arch="x86_64" src="mongo-c-driver-2.2.2-2.el7.src.rpm">
					<filename>mongo-c-driver-devel-0:2.2.2-2.el7.x86_64.rpm</filename>
				</package>
				<package name="mongo-c-driver-libs" epoch="0" version="2.2.2" release="2.el7" arch="x86_64" src="mongo-c-driver-2.2.2-2.el7.src.rpm">
					<filename>mongo-c-driver-libs-0:2.2.2-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0076</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость mongo-c-driver </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mongo-c-driver</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongo-c-driver-cve-2024-6383-7.3/</description>
               <solution>Установить обновление для пакета(ов) mongo-c-driver
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-mongo-c-driver-cve-2024-6383-7.3/" type="self" id="ROS-20260505-73-0076" title="ROS-20260505-73-0076" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6383" type="cve" id="CVE-2024-6383" title="CVE-2024-6383" />
			<reference href="https://bdu.fstec.ru/vul/2025-11249" type="self" id="BDU:2025-11249" title="BDU:2025-11249" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="libbson" epoch="0" version="2.2.2" release="2.el7" arch="x86_64" src="mongo-c-driver-2.2.2-2.el7.src.rpm">
					<filename>libbson-0:2.2.2-2.el7.x86_64.rpm</filename>
				</package>
				<package name="libbson-devel" epoch="0" version="2.2.2" release="2.el7" arch="x86_64" src="mongo-c-driver-2.2.2-2.el7.src.rpm">
					<filename>libbson-devel-0:2.2.2-2.el7.x86_64.rpm</filename>
				</package>
				<package name="mongo-c-driver" epoch="0" version="2.2.2" release="2.el7" arch="x86_64" src="mongo-c-driver-2.2.2-2.el7.src.rpm">
					<filename>mongo-c-driver-0:2.2.2-2.el7.x86_64.rpm</filename>
				</package>
				<package name="mongo-c-driver-devel" epoch="0" version="2.2.2" release="2.el7" arch="x86_64" src="mongo-c-driver-2.2.2-2.el7.src.rpm">
					<filename>mongo-c-driver-devel-0:2.2.2-2.el7.x86_64.rpm</filename>
				</package>
				<package name="mongo-c-driver-libs" epoch="0" version="2.2.2" release="2.el7" arch="x86_64" src="mongo-c-driver-2.2.2-2.el7.src.rpm">
					<filename>mongo-c-driver-libs-0:2.2.2-2.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0077</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.10 </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в python3.10</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-10-cve-2024-4032-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.10
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-10-cve-2024-4032-7.3/" type="self" id="ROS-20260505-73-0077" title="ROS-20260505-73-0077" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4032" type="cve" id="CVE-2024-4032" title="CVE-2024-4032" />
			<reference href="https://bdu.fstec.ru/vul/2024-05196" type="self" id="BDU:2024-05196" title="BDU:2024-05196" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.10" epoch="0" version="3.10.18" release="1.el7" arch="x86_64" src="python3.10-3.10.18-1.el7.src.rpm">
					<filename>python3.10-0:3.10.18-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0078</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.11 </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в python3.11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2024-4032-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.11
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-11-cve-2024-4032-7.3/" type="self" id="ROS-20260505-73-0078" title="ROS-20260505-73-0078" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4032" type="cve" id="CVE-2024-4032" title="CVE-2024-4032" />
			<reference href="https://bdu.fstec.ru/vul/2024-05196" type="self" id="BDU:2024-05196" title="BDU:2024-05196" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.11" epoch="0" version="3.11.13" release="1.el7" arch="x86_64" src="python3.11-3.11.13-1.el7.src.rpm">
					<filename>python3.11-0:3.11.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-debug" epoch="0" version="3.11.13" release="1.el7" arch="x86_64" src="python3.11-3.11.13-1.el7.src.rpm">
					<filename>python3.11-debug-0:3.11.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-devel" epoch="0" version="3.11.13" release="1.el7" arch="x86_64" src="python3.11-3.11.13-1.el7.src.rpm">
					<filename>python3.11-devel-0:3.11.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-idle" epoch="0" version="3.11.13" release="1.el7" arch="x86_64" src="python3.11-3.11.13-1.el7.src.rpm">
					<filename>python3.11-idle-0:3.11.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-libs" epoch="0" version="3.11.13" release="1.el7" arch="x86_64" src="python3.11-3.11.13-1.el7.src.rpm">
					<filename>python3.11-libs-0:3.11.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-test" epoch="0" version="3.11.13" release="1.el7" arch="x86_64" src="python3.11-3.11.13-1.el7.src.rpm">
					<filename>python3.11-test-0:3.11.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.11-tkinter" epoch="0" version="3.11.13" release="1.el7" arch="x86_64" src="python3.11-3.11.13-1.el7.src.rpm">
					<filename>python3.11-tkinter-0:3.11.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0079</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость python3.12 </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в python3.12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-12-cve-2024-4032-7.3/</description>
               <solution>Установить обновление для пакета(ов) python3.12
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python3-12-cve-2024-4032-7.3/" type="self" id="ROS-20260505-73-0079" title="ROS-20260505-73-0079" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4032" type="cve" id="CVE-2024-4032" title="CVE-2024-4032" />
			<reference href="https://bdu.fstec.ru/vul/2024-05196" type="self" id="BDU:2024-05196" title="BDU:2024-05196" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3.12" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-debug" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-debug-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-devel" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-devel-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-idle" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-idle-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-libs" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-libs-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-test" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-test-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3.12-tkinter" epoch="0" version="3.12.13" release="1.el7" arch="x86_64" src="python3.12-3.12.13-1.el7.src.rpm">
					<filename>python3.12-tkinter-0:3.12.13-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0080</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость glibc </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в glibc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glibc-cve-2025-15281-7.3/</description>
               <solution>Установить обновление для пакета(ов) glibc
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glibc-cve-2025-15281-7.3/" type="self" id="ROS-20260505-73-0080" title="ROS-20260505-73-0080" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15281" type="cve" id="CVE-2025-15281" title="CVE-2025-15281" />
			<reference href="https://bdu.fstec.ru/vul/2026-05135" type="self" id="BDU:2026-05135" title="BDU:2026-05135" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="compat-libpthread-nonshared" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>compat-libpthread-nonshared-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-all-langpacks" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-all-langpacks-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-benchtests" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-benchtests-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-common" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-common-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-devel" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-devel-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-headers" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-headers-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-aa" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-aa-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-af" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-af-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-agr" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-agr-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ak" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ak-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-am" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-am-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-an" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-an-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-anp" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-anp-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ar" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ar-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-as" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-as-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ast" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ast-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ayc" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ayc-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-az" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-az-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-be" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-be-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-bem" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-bem-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ber" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ber-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-bg" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-bg-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-bhb" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-bhb-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-bho" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-bho-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-bi" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-bi-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-bn" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-bn-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-bo" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-bo-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-br" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-br-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-brx" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-brx-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-bs" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-bs-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-byn" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-byn-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ca" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ca-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ce" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ce-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-chr" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-chr-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-cmn" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-cmn-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-crh" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-crh-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-cs" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-cs-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-csb" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-csb-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-cv" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-cv-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-cy" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-cy-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-da" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-da-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-de" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-de-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-doi" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-doi-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-dsb" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-dsb-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-dv" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-dv-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-dz" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-dz-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-el" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-el-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-en" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-en-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-eo" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-eo-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-es" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-es-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-et" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-et-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-eu" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-eu-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-fa" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-fa-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ff" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ff-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-fi" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-fi-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-fil" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-fil-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-fo" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-fo-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-fr" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-fr-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-fur" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-fur-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-fy" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-fy-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ga" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ga-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-gd" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-gd-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-gez" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-gez-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-gl" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-gl-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-gu" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-gu-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-gv" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-gv-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ha" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ha-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-hak" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-hak-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-he" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-he-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-hi" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-hi-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-hif" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-hif-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-hne" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-hne-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-hr" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-hr-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-hsb" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-hsb-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ht" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ht-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-hu" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-hu-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-hy" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-hy-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ia" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ia-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-id" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-id-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ig" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ig-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ik" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ik-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-is" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-is-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-it" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-it-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-iu" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-iu-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ja" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ja-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ka" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ka-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-kab" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-kab-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-kk" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-kk-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-kl" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-kl-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-km" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-km-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-kn" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-kn-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ko" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ko-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-kok" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-kok-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ks" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ks-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ku" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ku-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-kw" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-kw-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ky" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ky-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-lb" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-lb-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-lg" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-lg-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-li" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-li-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-lij" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-lij-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ln" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ln-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-lo" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-lo-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-lt" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-lt-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-lv" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-lv-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-lzh" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-lzh-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-mag" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-mag-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-mai" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-mai-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-mfe" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-mfe-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-mg" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-mg-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-mhr" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-mhr-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-mi" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-mi-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-miq" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-miq-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-mjw" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-mjw-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-mk" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-mk-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ml" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ml-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-mn" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-mn-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-mni" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-mni-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-mr" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-mr-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ms" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ms-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-mt" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-mt-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-my" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-my-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-nan" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-nan-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-nb" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-nb-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-nds" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-nds-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ne" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ne-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-nhn" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-nhn-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-niu" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-niu-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-nl" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-nl-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-nn" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-nn-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-nr" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-nr-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-nso" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-nso-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-oc" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-oc-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-om" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-om-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-or" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-or-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-os" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-os-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-pa" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-pa-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-pap" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-pap-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-pl" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-pl-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ps" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ps-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-pt" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-pt-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-quz" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-quz-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-raj" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-raj-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ro" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ro-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ru" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ru-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-rw" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-rw-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-sa" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-sa-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-sah" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-sah-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-sat" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-sat-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-sc" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-sc-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-sd" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-sd-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-se" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-se-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-sgs" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-sgs-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-shn" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-shn-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-shs" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-shs-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-si" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-si-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-sid" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-sid-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-sk" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-sk-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-sl" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-sl-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-sm" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-sm-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-so" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-so-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-sq" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-sq-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-sr" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-sr-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ss" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ss-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-st" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-st-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-sv" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-sv-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-sw" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-sw-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-szl" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-szl-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ta" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ta-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-tcy" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-tcy-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-te" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-te-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-tg" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-tg-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-th" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-th-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-the" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-the-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ti" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ti-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-tig" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-tig-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-tk" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-tk-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-tl" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-tl-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-tn" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-tn-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-to" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-to-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-tpi" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-tpi-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-tr" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-tr-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ts" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ts-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-tt" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-tt-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ug" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ug-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-uk" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-uk-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-unm" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-unm-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ur" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ur-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-uz" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-uz-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ve" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ve-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-vi" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-vi-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-wa" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-wa-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-wae" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-wae-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-wal" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-wal-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-wo" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-wo-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-xh" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-xh-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-yi" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-yi-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-yo" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-yo-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-yue" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-yue-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-yuw" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-yuw-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-zh" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-zh-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-zu" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-zu-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-locale-source" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-locale-source-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-minimal-langpack" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-minimal-langpack-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-nss-devel" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-nss-devel-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-static" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-static-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-utils" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-utils-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="libnsl" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>libnsl-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="nscd" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>nscd-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="nss_db" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>nss_db-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="nss_hesiod" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>nss_hesiod-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260505-73-0081</id>
		<issued date="2026-05-05" />
		<updated date="2026-05-05" />
		<title>Уязвимость glibc </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в glibc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glibc-cve-2026-0915-7.3/</description>
               <solution>Установить обновление для пакета(ов) glibc
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glibc-cve-2026-0915-7.3/" type="self" id="ROS-20260505-73-0081" title="ROS-20260505-73-0081" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0915" type="cve" id="CVE-2026-0915" title="CVE-2026-0915" />
			<reference href="https://bdu.fstec.ru/vul/2026-02104" type="self" id="BDU:2026-02104" title="BDU:2026-02104" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="compat-libpthread-nonshared" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>compat-libpthread-nonshared-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-all-langpacks" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-all-langpacks-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-benchtests" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-benchtests-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-common" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-common-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-devel" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-devel-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-headers" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-headers-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-aa" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-aa-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-af" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-af-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-agr" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-agr-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ak" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ak-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-am" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-am-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-an" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-an-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-anp" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-anp-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ar" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ar-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-as" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-as-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ast" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ast-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ayc" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ayc-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-az" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-az-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-be" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-be-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-bem" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-bem-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ber" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ber-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-bg" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-bg-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-bhb" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-bhb-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-bho" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-bho-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-bi" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-bi-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-bn" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-bn-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-bo" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-bo-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-br" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-br-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-brx" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-brx-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-bs" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-bs-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-byn" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-byn-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ca" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ca-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ce" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ce-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-chr" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-chr-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-cmn" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-cmn-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-crh" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-crh-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-cs" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-cs-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-csb" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-csb-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-cv" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-cv-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-cy" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-cy-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-da" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-da-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-de" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-de-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-doi" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-doi-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-dsb" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-dsb-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-dv" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-dv-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-dz" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-dz-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-el" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-el-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-en" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-en-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-eo" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-eo-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-es" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-es-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-et" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-et-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-eu" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-eu-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-fa" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-fa-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ff" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ff-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-fi" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-fi-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-fil" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-fil-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-fo" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-fo-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-fr" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-fr-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-fur" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-fur-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-fy" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-fy-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ga" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ga-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-gd" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-gd-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-gez" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-gez-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-gl" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-gl-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-gu" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-gu-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-gv" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-gv-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ha" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ha-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-hak" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-hak-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-he" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-he-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-hi" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-hi-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-hif" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-hif-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-hne" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-hne-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-hr" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-hr-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-hsb" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-hsb-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ht" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ht-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-hu" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-hu-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-hy" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-hy-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ia" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ia-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-id" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-id-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ig" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ig-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ik" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ik-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-is" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-is-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-it" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-it-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-iu" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-iu-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ja" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ja-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ka" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ka-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-kab" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-kab-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-kk" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-kk-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-kl" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-kl-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-km" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-km-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-kn" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-kn-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ko" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ko-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-kok" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-kok-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ks" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ks-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ku" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ku-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-kw" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-kw-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ky" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ky-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-lb" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-lb-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-lg" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-lg-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-li" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-li-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-lij" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-lij-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ln" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ln-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-lo" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-lo-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-lt" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-lt-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-lv" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-lv-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-lzh" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-lzh-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-mag" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-mag-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-mai" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-mai-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-mfe" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-mfe-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-mg" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-mg-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-mhr" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-mhr-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-mi" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-mi-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-miq" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-miq-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-mjw" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-mjw-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-mk" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-mk-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ml" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ml-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-mn" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-mn-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-mni" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-mni-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-mr" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-mr-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ms" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ms-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-mt" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-mt-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-my" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-my-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-nan" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-nan-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-nb" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-nb-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-nds" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-nds-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ne" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ne-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-nhn" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-nhn-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-niu" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-niu-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-nl" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-nl-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-nn" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-nn-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-nr" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-nr-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-nso" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-nso-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-oc" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-oc-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-om" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-om-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-or" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-or-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-os" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-os-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-pa" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-pa-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-pap" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-pap-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-pl" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-pl-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ps" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ps-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-pt" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-pt-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-quz" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-quz-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-raj" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-raj-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ro" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ro-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ru" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ru-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-rw" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-rw-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-sa" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-sa-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-sah" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-sah-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-sat" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-sat-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-sc" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-sc-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-sd" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-sd-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-se" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-se-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-sgs" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-sgs-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-shn" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-shn-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-shs" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-shs-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-si" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-si-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-sid" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-sid-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-sk" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-sk-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-sl" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-sl-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-sm" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-sm-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-so" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-so-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-sq" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-sq-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-sr" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-sr-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ss" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ss-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-st" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-st-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-sv" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-sv-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-sw" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-sw-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-szl" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-szl-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ta" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ta-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-tcy" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-tcy-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-te" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-te-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-tg" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-tg-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-th" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-th-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-the" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-the-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ti" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ti-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-tig" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-tig-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-tk" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-tk-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-tl" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-tl-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-tn" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-tn-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-to" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-to-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-tpi" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-tpi-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-tr" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-tr-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ts" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ts-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-tt" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-tt-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ug" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ug-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-uk" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-uk-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-unm" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-unm-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ur" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ur-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-uz" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-uz-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-ve" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-ve-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-vi" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-vi-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-wa" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-wa-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-wae" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-wae-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-wal" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-wal-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-wo" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-wo-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-xh" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-xh-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-yi" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-yi-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-yo" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-yo-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-yue" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-yue-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-yuw" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-yuw-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-zh" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-zh-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-langpack-zu" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-langpack-zu-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-locale-source" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-locale-source-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-minimal-langpack" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-minimal-langpack-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-nss-devel" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-nss-devel-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-static" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-static-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="glibc-utils" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>glibc-utils-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="libnsl" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>libnsl-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="nscd" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>nscd-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="nss_db" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>nss_db-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
				<package name="nss_hesiod" epoch="0" version="2.28" release="14.el7" arch="x86_64" src="glibc-2.28-14.el7.src.rpm">
					<filename>nss_hesiod-0:2.28-14.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0001</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость python-jwcrypto </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-jwcrypto</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-jwcrypto-cve-2023-6681-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-jwcrypto
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-jwcrypto-cve-2023-6681-7.3/" type="self" id="ROS-20260506-73-0001" title="ROS-20260506-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6681" type="cve" id="CVE-2023-6681" title="CVE-2023-6681" />
			<reference href="https://bdu.fstec.ru/vul/2025-16171" type="self" id="BDU:2025-16171" title="BDU:2025-16171" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-jwcrypto" epoch="0" version="1.5.6" release="1.el7" arch="noarch" src="python-jwcrypto-1.5.6-1.el7.src.rpm">
					<filename>python3-jwcrypto-0:1.5.6-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0002</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость python2-jwcrypto </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python2-jwcrypto</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python2-jwcrypto-cve-2023-6681-7.3/</description>
               <solution>Установить обновление для пакета(ов) python2-jwcrypto
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python2-jwcrypto-cve-2023-6681-7.3/" type="self" id="ROS-20260506-73-0002" title="ROS-20260506-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6681" type="cve" id="CVE-2023-6681" title="CVE-2023-6681" />
			<reference href="https://bdu.fstec.ru/vul/2025-16171" type="self" id="BDU:2025-16171" title="BDU:2025-16171" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python2-jwcrypto" epoch="0" version="0.9.1" release="2.el7" arch="noarch" src="python2-jwcrypto-0.9.1-2.el7.src.rpm">
					<filename>python2-jwcrypto-0:0.9.1-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0003</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость golang-github-jose </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang-github-jose</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-github-jose-cve-2026-34986-7.3/</description>
               <solution>Установить обновление для пакета(ов) golang-github-jose
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-github-jose-cve-2026-34986-7.3/" type="self" id="ROS-20260506-73-0003" title="ROS-20260506-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34986" type="cve" id="CVE-2026-34986" title="CVE-2026-34986" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang-github-jose" epoch="0" version="3.0.5" release="1.el7" arch="x86_64" src="golang-github-jose-3.0.5-1.el7.src.rpm">
					<filename>golang-github-jose-0:3.0.5-1.el7.x86_64.rpm</filename>
				</package>
				<package name="compat-golang-github-jose-3-devel" epoch="0" version="3.0.5" release="1.el7" arch="noarch" src="golang-github-jose-3.0.5-1.el7.src.rpm">
					<filename>compat-golang-github-jose-3-devel-0:3.0.5-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-github-jose-devel" epoch="0" version="3.0.5" release="1.el7" arch="noarch" src="golang-github-jose-3.0.5-1.el7.src.rpm">
					<filename>golang-github-jose-devel-0:3.0.5-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0004</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость roundcubemail </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в roundcubemail</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-roundcubemail-cve-2026-35545-7.3/</description>
               <solution>Установить обновление для пакета(ов) roundcubemail
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-roundcubemail-cve-2026-35545-7.3/" type="self" id="ROS-20260506-73-0004" title="ROS-20260506-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-35545" type="cve" id="CVE-2026-35545" title="CVE-2026-35545" />
			<reference href="https://bdu.fstec.ru/vul/2026-06325" type="self" id="BDU:2026-06325" title="BDU:2026-06325" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="roundcubemail" epoch="0" version="1.5.15" release="1.el7" arch="noarch" src="roundcubemail-1.5.15-1.el7.src.rpm">
					<filename>roundcubemail-0:1.5.15-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0005</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость binutils </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в binutils</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-binutils-cve-2025-69652-7.3/</description>
               <solution>Установить обновление для пакета(ов) binutils
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-binutils-cve-2025-69652-7.3/" type="self" id="ROS-20260506-73-0005" title="ROS-20260506-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69652" type="cve" id="CVE-2025-69652" title="CVE-2025-69652" />
			<reference href="https://bdu.fstec.ru/vul/2026-04682" type="self" id="BDU:2026-04682" title="BDU:2026-04682" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="binutils" epoch="0" version="2.40" release="17.el7" arch="x86_64" src="binutils-2.40-17.el7.src.rpm">
					<filename>binutils-0:2.40-17.el7.x86_64.rpm</filename>
				</package>
				<package name="binutils-devel" epoch="0" version="2.40" release="17.el7" arch="x86_64" src="binutils-2.40-17.el7.src.rpm">
					<filename>binutils-devel-0:2.40-17.el7.x86_64.rpm</filename>
				</package>
				<package name="binutils-gold" epoch="0" version="2.40" release="17.el7" arch="x86_64" src="binutils-2.40-17.el7.src.rpm">
					<filename>binutils-gold-0:2.40-17.el7.x86_64.rpm</filename>
				</package>
				<package name="binutils-gprofng" epoch="0" version="2.40" release="17.el7" arch="x86_64" src="binutils-2.40-17.el7.src.rpm">
					<filename>binutils-gprofng-0:2.40-17.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0006</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость binutils </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в binutils</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-binutils-cve-2025-69649-7.3/</description>
               <solution>Установить обновление для пакета(ов) binutils
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-binutils-cve-2025-69649-7.3/" type="self" id="ROS-20260506-73-0006" title="ROS-20260506-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69649" type="cve" id="CVE-2025-69649" title="CVE-2025-69649" />
			<reference href="https://bdu.fstec.ru/vul/2026-04341" type="self" id="BDU:2026-04341" title="BDU:2026-04341" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="binutils" epoch="0" version="2.40" release="17.el7" arch="x86_64" src="binutils-2.40-17.el7.src.rpm">
					<filename>binutils-0:2.40-17.el7.x86_64.rpm</filename>
				</package>
				<package name="binutils-devel" epoch="0" version="2.40" release="17.el7" arch="x86_64" src="binutils-2.40-17.el7.src.rpm">
					<filename>binutils-devel-0:2.40-17.el7.x86_64.rpm</filename>
				</package>
				<package name="binutils-gold" epoch="0" version="2.40" release="17.el7" arch="x86_64" src="binutils-2.40-17.el7.src.rpm">
					<filename>binutils-gold-0:2.40-17.el7.x86_64.rpm</filename>
				</package>
				<package name="binutils-gprofng" epoch="0" version="2.40" release="17.el7" arch="x86_64" src="binutils-2.40-17.el7.src.rpm">
					<filename>binutils-gprofng-0:2.40-17.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0007</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость binutils </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в binutils</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-binutils-cve-2025-69647-7.3/</description>
               <solution>Установить обновление для пакета(ов) binutils
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-binutils-cve-2025-69647-7.3/" type="self" id="ROS-20260506-73-0007" title="ROS-20260506-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69647" type="cve" id="CVE-2025-69647" title="CVE-2025-69647" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="binutils" epoch="0" version="2.40" release="17.el7" arch="x86_64" src="binutils-2.40-17.el7.src.rpm">
					<filename>binutils-0:2.40-17.el7.x86_64.rpm</filename>
				</package>
				<package name="binutils-devel" epoch="0" version="2.40" release="17.el7" arch="x86_64" src="binutils-2.40-17.el7.src.rpm">
					<filename>binutils-devel-0:2.40-17.el7.x86_64.rpm</filename>
				</package>
				<package name="binutils-gold" epoch="0" version="2.40" release="17.el7" arch="x86_64" src="binutils-2.40-17.el7.src.rpm">
					<filename>binutils-gold-0:2.40-17.el7.x86_64.rpm</filename>
				</package>
				<package name="binutils-gprofng" epoch="0" version="2.40" release="17.el7" arch="x86_64" src="binutils-2.40-17.el7.src.rpm">
					<filename>binutils-gprofng-0:2.40-17.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0008</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость binutils </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в binutils</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-binutils-cve-2025-69648-7.3/</description>
               <solution>Установить обновление для пакета(ов) binutils
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-binutils-cve-2025-69648-7.3/" type="self" id="ROS-20260506-73-0008" title="ROS-20260506-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69648" type="cve" id="CVE-2025-69648" title="CVE-2025-69648" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="binutils" epoch="0" version="2.40" release="17.el7" arch="x86_64" src="binutils-2.40-17.el7.src.rpm">
					<filename>binutils-0:2.40-17.el7.x86_64.rpm</filename>
				</package>
				<package name="binutils-devel" epoch="0" version="2.40" release="17.el7" arch="x86_64" src="binutils-2.40-17.el7.src.rpm">
					<filename>binutils-devel-0:2.40-17.el7.x86_64.rpm</filename>
				</package>
				<package name="binutils-gold" epoch="0" version="2.40" release="17.el7" arch="x86_64" src="binutils-2.40-17.el7.src.rpm">
					<filename>binutils-gold-0:2.40-17.el7.x86_64.rpm</filename>
				</package>
				<package name="binutils-gprofng" epoch="0" version="2.40" release="17.el7" arch="x86_64" src="binutils-2.40-17.el7.src.rpm">
					<filename>binutils-gprofng-0:2.40-17.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0009</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость binutils </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в binutils</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-binutils-cve-2025-69644-7.3/</description>
               <solution>Установить обновление для пакета(ов) binutils
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-binutils-cve-2025-69644-7.3/" type="self" id="ROS-20260506-73-0009" title="ROS-20260506-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69644" type="cve" id="CVE-2025-69644" title="CVE-2025-69644" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="binutils" epoch="0" version="2.40" release="17.el7" arch="x86_64" src="binutils-2.40-17.el7.src.rpm">
					<filename>binutils-0:2.40-17.el7.x86_64.rpm</filename>
				</package>
				<package name="binutils-devel" epoch="0" version="2.40" release="17.el7" arch="x86_64" src="binutils-2.40-17.el7.src.rpm">
					<filename>binutils-devel-0:2.40-17.el7.x86_64.rpm</filename>
				</package>
				<package name="binutils-gold" epoch="0" version="2.40" release="17.el7" arch="x86_64" src="binutils-2.40-17.el7.src.rpm">
					<filename>binutils-gold-0:2.40-17.el7.x86_64.rpm</filename>
				</package>
				<package name="binutils-gprofng" epoch="0" version="2.40" release="17.el7" arch="x86_64" src="binutils-2.40-17.el7.src.rpm">
					<filename>binutils-gprofng-0:2.40-17.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0010</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость helm </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в helm</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-helm-cve-2026-35206-7.3/</description>
               <solution>Установить обновление для пакета(ов) helm
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-helm-cve-2026-35206-7.3/" type="self" id="ROS-20260506-73-0010" title="ROS-20260506-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-35206" type="cve" id="CVE-2026-35206" title="CVE-2026-35206" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="helm" epoch="0" version="3.12.3" release="5.el7" arch="x86_64" src="helm-3.12.3-5.el7.src.rpm">
					<filename>helm-0:3.12.3-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0011</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость tomcat10 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat10</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat10-cve-2026-24734-7.3/</description>
               <solution>Установить обновление для пакета(ов) tomcat10
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat10-cve-2026-24734-7.3/" type="self" id="ROS-20260506-73-0011" title="ROS-20260506-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24734" type="cve" id="CVE-2026-24734" title="CVE-2026-24734" />
			<reference href="https://bdu.fstec.ru/vul/2026-05104" type="self" id="BDU:2026-05104" title="BDU:2026-05104" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat10" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-admin-webapps" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-admin-webapps-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-docs-webapp" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-docs-webapp-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-el-5.0-api" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-el-5.0-api-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-embed" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-embed-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-jsp-3.1-api" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-jsp-3.1-api-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-lib" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-lib-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-servlet-6.0-api" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-servlet-6.0-api-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-webapps" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-webapps-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0012</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость tomcat </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2026-24734-7.3/</description>
               <solution>Установить обновление для пакета(ов) tomcat
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2026-24734-7.3/" type="self" id="ROS-20260506-73-0012" title="ROS-20260506-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24734" type="cve" id="CVE-2026-24734" title="CVE-2026-24734" />
			<reference href="https://bdu.fstec.ru/vul/2026-05104" type="self" id="BDU:2026-05104" title="BDU:2026-05104" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-admin-webapps" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-admin-webapps-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-docs-webapp" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-docs-webapp-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-el-3.0-api" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-el-3.0-api-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-jsp-2.3-api" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-jsp-2.3-api-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-lib" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-lib-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-servlet-4.0-api" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-servlet-4.0-api-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-webapps" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-webapps-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0013</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость tomcat11 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat11-cve-2026-24734-7.3/</description>
               <solution>Установить обновление для пакета(ов) tomcat11
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat11-cve-2026-24734-7.3/" type="self" id="ROS-20260506-73-0013" title="ROS-20260506-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24734" type="cve" id="CVE-2026-24734" title="CVE-2026-24734" />
			<reference href="https://bdu.fstec.ru/vul/2026-05104" type="self" id="BDU:2026-05104" title="BDU:2026-05104" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat11" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-admin-webapps" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-admin-webapps-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-docs-webapp" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-docs-webapp-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-el-6.0-api" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-el-6.0-api-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-embed" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-embed-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-jsp-4.0-api" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-jsp-4.0-api-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-lib" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-lib-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-servlet-6.1-api" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-servlet-6.1-api-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-webapps" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-webapps-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0014</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость tomcat-native </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat-native</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-native-cve-2026-24734-7.3/</description>
               <solution>Установить обновление для пакета(ов) tomcat-native
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-native-cve-2026-24734-7.3/" type="self" id="ROS-20260506-73-0014" title="ROS-20260506-73-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24734" type="cve" id="CVE-2026-24734" title="CVE-2026-24734" />
			<reference href="https://bdu.fstec.ru/vul/2026-05104" type="self" id="BDU:2026-05104" title="BDU:2026-05104" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat-native" epoch="1" version="1.3.7" release="1.el7" arch="x86_64" src="tomcat-native-1.3.7-1.el7.src.rpm">
					<filename>tomcat-native-1:1.3.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="tomcat-native-devel" epoch="1" version="1.3.7" release="1.el7" arch="x86_64" src="tomcat-native-1.3.7-1.el7.src.rpm">
					<filename>tomcat-native-devel-1:1.3.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0015</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость tomcat </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в tomcat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2026-24733-7.3/</description>
               <solution>Установить обновление для пакета(ов) tomcat
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2026-24733-7.3/" type="self" id="ROS-20260506-73-0015" title="ROS-20260506-73-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24733" type="cve" id="CVE-2026-24733" title="CVE-2026-24733" />
			<reference href="https://bdu.fstec.ru/vul/2026-05102" type="self" id="BDU:2026-05102" title="BDU:2026-05102" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-admin-webapps" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-admin-webapps-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-docs-webapp" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-docs-webapp-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-el-3.0-api" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-el-3.0-api-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-jsp-2.3-api" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-jsp-2.3-api-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-lib" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-lib-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-servlet-4.0-api" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-servlet-4.0-api-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-webapps" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-webapps-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0016</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость tomcat10 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в tomcat10</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat10-cve-2026-24733-7.3/</description>
               <solution>Установить обновление для пакета(ов) tomcat10
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat10-cve-2026-24733-7.3/" type="self" id="ROS-20260506-73-0016" title="ROS-20260506-73-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24733" type="cve" id="CVE-2026-24733" title="CVE-2026-24733" />
			<reference href="https://bdu.fstec.ru/vul/2026-05102" type="self" id="BDU:2026-05102" title="BDU:2026-05102" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat10" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-admin-webapps" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-admin-webapps-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-docs-webapp" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-docs-webapp-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-el-5.0-api" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-el-5.0-api-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-embed" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-embed-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-jsp-3.1-api" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-jsp-3.1-api-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-lib" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-lib-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-servlet-6.0-api" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-servlet-6.0-api-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-webapps" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-webapps-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0017</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость tomcat11 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в tomcat11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat11-cve-2026-24733-7.3/</description>
               <solution>Установить обновление для пакета(ов) tomcat11
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat11-cve-2026-24733-7.3/" type="self" id="ROS-20260506-73-0017" title="ROS-20260506-73-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24733" type="cve" id="CVE-2026-24733" title="CVE-2026-24733" />
			<reference href="https://bdu.fstec.ru/vul/2026-05102" type="self" id="BDU:2026-05102" title="BDU:2026-05102" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat11" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-admin-webapps" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-admin-webapps-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-docs-webapp" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-docs-webapp-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-el-6.0-api" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-el-6.0-api-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-embed" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-embed-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-jsp-4.0-api" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-jsp-4.0-api-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-lib" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-lib-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-servlet-6.1-api" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-servlet-6.1-api-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-webapps" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-webapps-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0018</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость tomcat </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в tomcat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2025-66614-7.3/</description>
               <solution>Установить обновление для пакета(ов) tomcat
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2025-66614-7.3/" type="self" id="ROS-20260506-73-0018" title="ROS-20260506-73-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66614" type="cve" id="CVE-2025-66614" title="CVE-2025-66614" />
			<reference href="https://bdu.fstec.ru/vul/2026-05103" type="self" id="BDU:2026-05103" title="BDU:2026-05103" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-admin-webapps" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-admin-webapps-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-docs-webapp" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-docs-webapp-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-el-3.0-api" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-el-3.0-api-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-jsp-2.3-api" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-jsp-2.3-api-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-lib" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-lib-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-servlet-4.0-api" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-servlet-4.0-api-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-webapps" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-webapps-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0019</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость tomcat10 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в tomcat10</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat10-cve-2025-66614-7.3/</description>
               <solution>Установить обновление для пакета(ов) tomcat10
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat10-cve-2025-66614-7.3/" type="self" id="ROS-20260506-73-0019" title="ROS-20260506-73-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66614" type="cve" id="CVE-2025-66614" title="CVE-2025-66614" />
			<reference href="https://bdu.fstec.ru/vul/2026-05103" type="self" id="BDU:2026-05103" title="BDU:2026-05103" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat10" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-admin-webapps" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-admin-webapps-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-docs-webapp" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-docs-webapp-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-el-5.0-api" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-el-5.0-api-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-embed" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-embed-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-jsp-3.1-api" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-jsp-3.1-api-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-lib" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-lib-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-servlet-6.0-api" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-servlet-6.0-api-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-webapps" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-webapps-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0020</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость tomcat11 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в tomcat11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat11-cve-2025-66614-7.3/</description>
               <solution>Установить обновление для пакета(ов) tomcat11
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat11-cve-2025-66614-7.3/" type="self" id="ROS-20260506-73-0020" title="ROS-20260506-73-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66614" type="cve" id="CVE-2025-66614" title="CVE-2025-66614" />
			<reference href="https://bdu.fstec.ru/vul/2026-05103" type="self" id="BDU:2026-05103" title="BDU:2026-05103" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat11" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-admin-webapps" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-admin-webapps-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-docs-webapp" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-docs-webapp-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-el-6.0-api" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-el-6.0-api-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-embed" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-embed-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-jsp-4.0-api" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-jsp-4.0-api-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-lib" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-lib-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-servlet-6.1-api" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-servlet-6.1-api-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-webapps" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-webapps-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0021</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость tomcat </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в tomcat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2026-25854-7.3/</description>
               <solution>Установить обновление для пакета(ов) tomcat
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2026-25854-7.3/" type="self" id="ROS-20260506-73-0021" title="ROS-20260506-73-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25854" type="cve" id="CVE-2026-25854" title="CVE-2026-25854" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-admin-webapps" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-admin-webapps-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-docs-webapp" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-docs-webapp-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-el-3.0-api" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-el-3.0-api-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-jsp-2.3-api" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-jsp-2.3-api-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-lib" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-lib-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-servlet-4.0-api" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-servlet-4.0-api-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-webapps" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-webapps-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0022</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость tomcat10 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в tomcat10</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat10-cve-2026-25854-7.3/</description>
               <solution>Установить обновление для пакета(ов) tomcat10
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat10-cve-2026-25854-7.3/" type="self" id="ROS-20260506-73-0022" title="ROS-20260506-73-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25854" type="cve" id="CVE-2026-25854" title="CVE-2026-25854" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat10" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-admin-webapps" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-admin-webapps-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-docs-webapp" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-docs-webapp-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-el-5.0-api" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-el-5.0-api-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-embed" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-embed-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-jsp-3.1-api" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-jsp-3.1-api-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-lib" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-lib-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-servlet-6.0-api" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-servlet-6.0-api-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-webapps" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-webapps-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0023</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость tomcat11 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в tomcat11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat11-cve-2026-25854-7.3/</description>
               <solution>Установить обновление для пакета(ов) tomcat11
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat11-cve-2026-25854-7.3/" type="self" id="ROS-20260506-73-0023" title="ROS-20260506-73-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25854" type="cve" id="CVE-2026-25854" title="CVE-2026-25854" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat11" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-admin-webapps" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-admin-webapps-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-docs-webapp" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-docs-webapp-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-el-6.0-api" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-el-6.0-api-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-embed" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-embed-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-jsp-4.0-api" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-jsp-4.0-api-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-lib" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-lib-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-servlet-6.1-api" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-servlet-6.1-api-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-webapps" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-webapps-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0024</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость tomcat </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2026-24880-7.3/</description>
               <solution>Установить обновление для пакета(ов) tomcat
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2026-24880-7.3/" type="self" id="ROS-20260506-73-0024" title="ROS-20260506-73-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24880" type="cve" id="CVE-2026-24880" title="CVE-2026-24880" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-admin-webapps" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-admin-webapps-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-docs-webapp" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-docs-webapp-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-el-3.0-api" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-el-3.0-api-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-jsp-2.3-api" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-jsp-2.3-api-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-lib" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-lib-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-servlet-4.0-api" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-servlet-4.0-api-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-webapps" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-webapps-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0025</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость tomcat10 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat10</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat10-cve-2026-24880-7.3/</description>
               <solution>Установить обновление для пакета(ов) tomcat10
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat10-cve-2026-24880-7.3/" type="self" id="ROS-20260506-73-0025" title="ROS-20260506-73-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24880" type="cve" id="CVE-2026-24880" title="CVE-2026-24880" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat10" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-admin-webapps" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-admin-webapps-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-docs-webapp" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-docs-webapp-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-el-5.0-api" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-el-5.0-api-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-embed" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-embed-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-jsp-3.1-api" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-jsp-3.1-api-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-lib" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-lib-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-servlet-6.0-api" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-servlet-6.0-api-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-webapps" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-webapps-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0026</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость tomcat11 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat11-cve-2026-24880-7.3/</description>
               <solution>Установить обновление для пакета(ов) tomcat11
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat11-cve-2026-24880-7.3/" type="self" id="ROS-20260506-73-0026" title="ROS-20260506-73-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24880" type="cve" id="CVE-2026-24880" title="CVE-2026-24880" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat11" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-admin-webapps" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-admin-webapps-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-docs-webapp" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-docs-webapp-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-el-6.0-api" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-el-6.0-api-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-embed" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-embed-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-jsp-4.0-api" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-jsp-4.0-api-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-lib" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-lib-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-servlet-6.1-api" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-servlet-6.1-api-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-webapps" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-webapps-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0027</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость tomcat </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в tomcat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2026-29145-7.3/</description>
               <solution>Установить обновление для пакета(ов) tomcat
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2026-29145-7.3/" type="self" id="ROS-20260506-73-0027" title="ROS-20260506-73-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29145" type="cve" id="CVE-2026-29145" title="CVE-2026-29145" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-admin-webapps" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-admin-webapps-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-docs-webapp" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-docs-webapp-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-el-3.0-api" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-el-3.0-api-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-jsp-2.3-api" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-jsp-2.3-api-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-lib" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-lib-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-servlet-4.0-api" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-servlet-4.0-api-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-webapps" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-webapps-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0028</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость tomcat10 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в tomcat10</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat10-cve-2026-29145-7.3/</description>
               <solution>Установить обновление для пакета(ов) tomcat10
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat10-cve-2026-29145-7.3/" type="self" id="ROS-20260506-73-0028" title="ROS-20260506-73-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29145" type="cve" id="CVE-2026-29145" title="CVE-2026-29145" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat10" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-admin-webapps" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-admin-webapps-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-docs-webapp" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-docs-webapp-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-el-5.0-api" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-el-5.0-api-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-embed" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-embed-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-jsp-3.1-api" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-jsp-3.1-api-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-lib" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-lib-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-servlet-6.0-api" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-servlet-6.0-api-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-webapps" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-webapps-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0029</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость tomcat11 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в tomcat11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat11-cve-2026-29145-7.3/</description>
               <solution>Установить обновление для пакета(ов) tomcat11
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat11-cve-2026-29145-7.3/" type="self" id="ROS-20260506-73-0029" title="ROS-20260506-73-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29145" type="cve" id="CVE-2026-29145" title="CVE-2026-29145" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat11" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-admin-webapps" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-admin-webapps-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-docs-webapp" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-docs-webapp-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-el-6.0-api" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-el-6.0-api-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-embed" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-embed-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-jsp-4.0-api" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-jsp-4.0-api-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-lib" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-lib-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-servlet-6.1-api" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-servlet-6.1-api-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-webapps" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-webapps-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0030</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость tomcat-native </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в tomcat-native</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-native-cve-2026-29145-7.3/</description>
               <solution>Установить обновление для пакета(ов) tomcat-native
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-native-cve-2026-29145-7.3/" type="self" id="ROS-20260506-73-0030" title="ROS-20260506-73-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29145" type="cve" id="CVE-2026-29145" title="CVE-2026-29145" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat-native" epoch="1" version="1.3.7" release="1.el7" arch="x86_64" src="tomcat-native-1.3.7-1.el7.src.rpm">
					<filename>tomcat-native-1:1.3.7-1.el7.x86_64.rpm</filename>
				</package>
				<package name="tomcat-native-devel" epoch="1" version="1.3.7" release="1.el7" arch="x86_64" src="tomcat-native-1.3.7-1.el7.src.rpm">
					<filename>tomcat-native-devel-1:1.3.7-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0031</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость tomcat </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2026-34487-7.3/</description>
               <solution>Установить обновление для пакета(ов) tomcat
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2026-34487-7.3/" type="self" id="ROS-20260506-73-0031" title="ROS-20260506-73-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34487" type="cve" id="CVE-2026-34487" title="CVE-2026-34487" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-admin-webapps" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-admin-webapps-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-docs-webapp" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-docs-webapp-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-el-3.0-api" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-el-3.0-api-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-jsp-2.3-api" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-jsp-2.3-api-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-lib" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-lib-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-servlet-4.0-api" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-servlet-4.0-api-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-webapps" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-webapps-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0032</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость tomcat10 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat10</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat10-cve-2026-34487-7.3/</description>
               <solution>Установить обновление для пакета(ов) tomcat10
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat10-cve-2026-34487-7.3/" type="self" id="ROS-20260506-73-0032" title="ROS-20260506-73-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34487" type="cve" id="CVE-2026-34487" title="CVE-2026-34487" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat10" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-admin-webapps" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-admin-webapps-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-docs-webapp" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-docs-webapp-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-el-5.0-api" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-el-5.0-api-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-embed" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-embed-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-jsp-3.1-api" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-jsp-3.1-api-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-lib" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-lib-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-servlet-6.0-api" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-servlet-6.0-api-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-webapps" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-webapps-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0033</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость tomcat11 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat11-cve-2026-34487-7.3/</description>
               <solution>Установить обновление для пакета(ов) tomcat11
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat11-cve-2026-34487-7.3/" type="self" id="ROS-20260506-73-0033" title="ROS-20260506-73-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34487" type="cve" id="CVE-2026-34487" title="CVE-2026-34487" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat11" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-admin-webapps" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-admin-webapps-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-docs-webapp" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-docs-webapp-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-el-6.0-api" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-el-6.0-api-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-embed" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-embed-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-jsp-4.0-api" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-jsp-4.0-api-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-lib" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-lib-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-servlet-6.1-api" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-servlet-6.1-api-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-webapps" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-webapps-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0034</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость tomcat </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2026-34483-7.3/</description>
               <solution>Установить обновление для пакета(ов) tomcat
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2026-34483-7.3/" type="self" id="ROS-20260506-73-0034" title="ROS-20260506-73-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34483" type="cve" id="CVE-2026-34483" title="CVE-2026-34483" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-admin-webapps" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-admin-webapps-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-docs-webapp" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-docs-webapp-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-el-3.0-api" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-el-3.0-api-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-jsp-2.3-api" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-jsp-2.3-api-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-lib" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-lib-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-servlet-4.0-api" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-servlet-4.0-api-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-webapps" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-webapps-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0035</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость tomcat10 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat10</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat10-cve-2026-34483-7.3/</description>
               <solution>Установить обновление для пакета(ов) tomcat10
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat10-cve-2026-34483-7.3/" type="self" id="ROS-20260506-73-0035" title="ROS-20260506-73-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34483" type="cve" id="CVE-2026-34483" title="CVE-2026-34483" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat10" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-admin-webapps" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-admin-webapps-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-docs-webapp" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-docs-webapp-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-el-5.0-api" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-el-5.0-api-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-embed" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-embed-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-jsp-3.1-api" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-jsp-3.1-api-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-lib" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-lib-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-servlet-6.0-api" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-servlet-6.0-api-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-webapps" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-webapps-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0036</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость tomcat11 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat11-cve-2026-34483-7.3/</description>
               <solution>Установить обновление для пакета(ов) tomcat11
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat11-cve-2026-34483-7.3/" type="self" id="ROS-20260506-73-0036" title="ROS-20260506-73-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34483" type="cve" id="CVE-2026-34483" title="CVE-2026-34483" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat11" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-admin-webapps" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-admin-webapps-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-docs-webapp" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-docs-webapp-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-el-6.0-api" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-el-6.0-api-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-embed" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-embed-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-jsp-4.0-api" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-jsp-4.0-api-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-lib" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-lib-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-servlet-6.1-api" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-servlet-6.1-api-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-webapps" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-webapps-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0037</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость tomcat </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в tomcat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2026-34500-7.3/</description>
               <solution>Установить обновление для пакета(ов) tomcat
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2026-34500-7.3/" type="self" id="ROS-20260506-73-0037" title="ROS-20260506-73-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34500" type="cve" id="CVE-2026-34500" title="CVE-2026-34500" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-admin-webapps" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-admin-webapps-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-docs-webapp" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-docs-webapp-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-el-3.0-api" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-el-3.0-api-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-jsp-2.3-api" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-jsp-2.3-api-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-lib" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-lib-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-servlet-4.0-api" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-servlet-4.0-api-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-webapps" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-webapps-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0038</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость tomcat10 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в tomcat10</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat10-cve-2026-34500-7.3/</description>
               <solution>Установить обновление для пакета(ов) tomcat10
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat10-cve-2026-34500-7.3/" type="self" id="ROS-20260506-73-0038" title="ROS-20260506-73-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34500" type="cve" id="CVE-2026-34500" title="CVE-2026-34500" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat10" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-admin-webapps" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-admin-webapps-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-docs-webapp" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-docs-webapp-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-el-5.0-api" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-el-5.0-api-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-embed" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-embed-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-jsp-3.1-api" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-jsp-3.1-api-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-lib" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-lib-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-servlet-6.0-api" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-servlet-6.0-api-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-webapps" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-webapps-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0039</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость tomcat11 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в tomcat11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat11-cve-2026-34500-7.3/</description>
               <solution>Установить обновление для пакета(ов) tomcat11
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat11-cve-2026-34500-7.3/" type="self" id="ROS-20260506-73-0039" title="ROS-20260506-73-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34500" type="cve" id="CVE-2026-34500" title="CVE-2026-34500" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat11" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-admin-webapps" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-admin-webapps-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-docs-webapp" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-docs-webapp-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-el-6.0-api" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-el-6.0-api-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-embed" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-embed-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-jsp-4.0-api" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-jsp-4.0-api-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-lib" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-lib-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-servlet-6.1-api" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-servlet-6.1-api-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-webapps" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-webapps-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0040</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость rubygem-actionview </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в rubygem-actionview</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-actionview-cve-2026-33168-7.3/</description>
               <solution>Установить обновление для пакета(ов) rubygem-actionview
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-actionview-cve-2026-33168-7.3/" type="self" id="ROS-20260506-73-0040" title="ROS-20260506-73-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33168" type="cve" id="CVE-2026-33168" title="CVE-2026-33168" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-actionview" epoch="2" version="6.1.6.1" release="3.el7" arch="noarch" src="rubygem-actionview-6.1.6.1-3.el7.src.rpm">
					<filename>rubygem-actionview-2:6.1.6.1-3.el7.noarch.rpm</filename>
				</package>
				<package name="rubygem-actionview-doc" epoch="2" version="6.1.6.1" release="3.el7" arch="noarch" src="rubygem-actionview-6.1.6.1-3.el7.src.rpm">
					<filename>rubygem-actionview-doc-2:6.1.6.1-3.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0041</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость rubygem-activesupport </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в rubygem-activesupport</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-activesupport-cve-2026-33176-7.3/</description>
               <solution>Установить обновление для пакета(ов) rubygem-activesupport
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-activesupport-cve-2026-33176-7.3/" type="self" id="ROS-20260506-73-0041" title="ROS-20260506-73-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33176" type="cve" id="CVE-2026-33176" title="CVE-2026-33176" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-activesupport" epoch="2" version="6.1.6.1" release="5.el7" arch="noarch" src="rubygem-activesupport-6.1.6.1-5.el7.src.rpm">
					<filename>rubygem-activesupport-2:6.1.6.1-5.el7.noarch.rpm</filename>
				</package>
				<package name="rubygem-activesupport-doc" epoch="2" version="6.1.6.1" release="5.el7" arch="noarch" src="rubygem-activesupport-6.1.6.1-5.el7.src.rpm">
					<filename>rubygem-activesupport-doc-2:6.1.6.1-5.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0042</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость flannel </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в flannel</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-flannel-cve-2026-32241-7.3/</description>
               <solution>Установить обновление для пакета(ов) flannel
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-flannel-cve-2026-32241-7.3/" type="self" id="ROS-20260506-73-0042" title="ROS-20260506-73-0042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32241" type="cve" id="CVE-2026-32241" title="CVE-2026-32241" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="flannel" epoch="0" version="0.28.2" release="1.el7" arch="x86_64" src="flannel-0.28.2-1.el7.src.rpm">
					<filename>flannel-0:0.28.2-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0043</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость erlang </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в erlang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-erlang-cve-2026-23942-7.3/</description>
               <solution>Установить обновление для пакета(ов) erlang
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-erlang-cve-2026-23942-7.3/" type="self" id="ROS-20260506-73-0043" title="ROS-20260506-73-0043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23942" type="cve" id="CVE-2026-23942" title="CVE-2026-23942" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="erlang" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-asn1" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-asn1-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-common_test" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-common_test-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-compiler" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-compiler-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-crypto" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-crypto-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-debugger" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-debugger-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-dialyzer" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-dialyzer-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-diameter" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-diameter-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-doc" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-doc-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-edoc" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-edoc-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-eldap" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-eldap-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-erl_docgen" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-erl_docgen-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-erl_interface" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-erl_interface-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-erts" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-erts-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-et" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-et-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-eunit" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-eunit-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-examples" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-examples-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-ftp" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-ftp-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-gdb-tools" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-gdb-tools-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-inets" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-inets-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-jinterface" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-jinterface-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-kernel" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-kernel-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-megaco" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-megaco-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-mnesia" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-mnesia-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-observer" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-observer-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-odbc" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-odbc-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-os_mon" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-os_mon-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-parsetools" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-parsetools-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-public_key" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-public_key-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-reltool" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-reltool-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-runtime_tools" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-runtime_tools-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-sasl" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-sasl-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-snmp" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-snmp-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-src" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-src-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-ssh" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-ssh-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-ssl" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-ssl-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-stdlib" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-stdlib-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-syntax_tools" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-syntax_tools-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-tftp" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-tftp-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-tools" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-tools-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-wx" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-wx-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-xmerl" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-xmerl-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0044</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость erlang </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в erlang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-erlang-cve-2026-23941-7.3/</description>
               <solution>Установить обновление для пакета(ов) erlang
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-erlang-cve-2026-23941-7.3/" type="self" id="ROS-20260506-73-0044" title="ROS-20260506-73-0044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23941" type="cve" id="CVE-2026-23941" title="CVE-2026-23941" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="erlang" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-asn1" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-asn1-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-common_test" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-common_test-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-compiler" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-compiler-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-crypto" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-crypto-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-debugger" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-debugger-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-dialyzer" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-dialyzer-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-diameter" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-diameter-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-doc" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-doc-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-edoc" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-edoc-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-eldap" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-eldap-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-erl_docgen" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-erl_docgen-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-erl_interface" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-erl_interface-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-erts" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-erts-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-et" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-et-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-eunit" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-eunit-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-examples" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-examples-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-ftp" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-ftp-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-gdb-tools" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-gdb-tools-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-inets" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-inets-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-jinterface" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-jinterface-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-kernel" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-kernel-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-megaco" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-megaco-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-mnesia" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-mnesia-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-observer" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-observer-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-odbc" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-odbc-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-os_mon" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-os_mon-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-parsetools" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-parsetools-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-public_key" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-public_key-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-reltool" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-reltool-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-runtime_tools" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-runtime_tools-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-sasl" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-sasl-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-snmp" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-snmp-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-src" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-src-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-ssh" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-ssh-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-ssl" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-ssl-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-stdlib" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-stdlib-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-syntax_tools" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-syntax_tools-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-tftp" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-tftp-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-tools" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-tools-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-wx" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-wx-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-xmerl" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-xmerl-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0045</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость erlang </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в erlang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-erlang-cve-2026-23943-7.3/</description>
               <solution>Установить обновление для пакета(ов) erlang
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-erlang-cve-2026-23943-7.3/" type="self" id="ROS-20260506-73-0045" title="ROS-20260506-73-0045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23943" type="cve" id="CVE-2026-23943" title="CVE-2026-23943" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="erlang" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-asn1" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-asn1-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-common_test" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-common_test-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-compiler" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-compiler-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-crypto" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-crypto-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-debugger" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-debugger-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-dialyzer" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-dialyzer-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-diameter" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-diameter-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-doc" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-doc-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-edoc" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-edoc-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-eldap" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-eldap-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-erl_docgen" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-erl_docgen-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-erl_interface" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-erl_interface-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-erts" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-erts-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-et" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-et-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-eunit" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-eunit-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-examples" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-examples-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-ftp" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-ftp-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-gdb-tools" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-gdb-tools-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-inets" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-inets-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-jinterface" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-jinterface-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-kernel" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-kernel-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-megaco" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-megaco-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-mnesia" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-mnesia-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-observer" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-observer-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-odbc" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-odbc-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-os_mon" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-os_mon-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-parsetools" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-parsetools-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-public_key" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-public_key-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-reltool" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-reltool-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-runtime_tools" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-runtime_tools-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-sasl" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-sasl-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-snmp" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-snmp-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-src" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-src-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-ssh" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-ssh-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-ssl" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-ssl-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-stdlib" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-stdlib-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-syntax_tools" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-syntax_tools-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-tftp" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-tftp-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-tools" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-tools-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-wx" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-wx-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
				<package name="erlang-xmerl" epoch="0" version="26.2.5.18" release="1.el7" arch="x86_64" src="erlang-26.2.5.18-1.el7.src.rpm">
					<filename>erlang-xmerl-0:26.2.5.18-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0046</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость python-tornado </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-tornado</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-tornado-cve-2026-31958-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-tornado
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-tornado-cve-2026-31958-7.3/" type="self" id="ROS-20260506-73-0046" title="ROS-20260506-73-0046" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31958" type="cve" id="CVE-2026-31958" title="CVE-2026-31958" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python-tornado-doc" epoch="0" version="6.3.3" release="5.el7" arch="x86_64" src="python-tornado-6.3.3-5.el7.src.rpm">
					<filename>python-tornado-doc-0:6.3.3-5.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-tornado" epoch="0" version="6.3.3" release="5.el7" arch="x86_64" src="python-tornado-6.3.3-5.el7.src.rpm">
					<filename>python3-tornado-0:6.3.3-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0047</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость python-jwcrypto </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-jwcrypto</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-jwcrypto-cve-2026-39373-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-jwcrypto
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-jwcrypto-cve-2026-39373-7.3/" type="self" id="ROS-20260506-73-0047" title="ROS-20260506-73-0047" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-39373" type="cve" id="CVE-2026-39373" title="CVE-2026-39373" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-jwcrypto" epoch="0" version="1.5.7" release="1.el7" arch="noarch" src="python-jwcrypto-1.5.7-1.el7.src.rpm">
					<filename>python3-jwcrypto-0:1.5.7-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0048</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость python2-jwcrypto </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python2-jwcrypto</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python2-jwcrypto-cve-2026-39373-7.3/</description>
               <solution>Установить обновление для пакета(ов) python2-jwcrypto
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python2-jwcrypto-cve-2026-39373-7.3/" type="self" id="ROS-20260506-73-0048" title="ROS-20260506-73-0048" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-39373" type="cve" id="CVE-2026-39373" title="CVE-2026-39373" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python2-jwcrypto" epoch="0" version="0.9.1" release="2.el7" arch="noarch" src="python2-jwcrypto-0.9.1-2.el7.src.rpm">
					<filename>python2-jwcrypto-0:0.9.1-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260506-73-0049</id>
		<issued date="2026-05-06" />
		<updated date="2026-05-06" />
		<title>Уязвимость python-cairosvg </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-cairosvg</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-cairosvg-cve-2026-31899-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-cairosvg
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-cairosvg-cve-2026-31899-7.3/" type="self" id="ROS-20260506-73-0049" title="ROS-20260506-73-0049" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31899" type="cve" id="CVE-2026-31899" title="CVE-2026-31899" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-cairosvg" epoch="0" version="2.7.0" release="2.el7" arch="noarch" src="python-cairosvg-2.7.0-2.el7.src.rpm">
					<filename>python3-cairosvg-0:2.7.0-2.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260507-73-0001</id>
		<issued date="2026-05-07" />
		<updated date="2026-05-07" />
		<title>Уязвимость roundcubemail </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в roundcubemail</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-roundcubemail-cve-2026-35544-7.3/</description>
               <solution>Установить обновление для пакета(ов) roundcubemail
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-roundcubemail-cve-2026-35544-7.3/" type="self" id="ROS-20260507-73-0001" title="ROS-20260507-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-35544" type="cve" id="CVE-2026-35544" title="CVE-2026-35544" />
			<reference href="https://bdu.fstec.ru/vul/2026-06326" type="self" id="BDU:2026-06326" title="BDU:2026-06326" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="roundcubemail" epoch="0" version="1.5.15" release="1.el7" arch="noarch" src="roundcubemail-1.5.15-1.el7.src.rpm">
					<filename>roundcubemail-0:1.5.15-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260507-73-0002</id>
		<issued date="2026-05-07" />
		<updated date="2026-05-07" />
		<title>Уязвимость roundcubemail </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в roundcubemail</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-roundcubemail-cve-2026-35543-7.3/</description>
               <solution>Установить обновление для пакета(ов) roundcubemail
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-roundcubemail-cve-2026-35543-7.3/" type="self" id="ROS-20260507-73-0002" title="ROS-20260507-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-35543" type="cve" id="CVE-2026-35543" title="CVE-2026-35543" />
			<reference href="https://bdu.fstec.ru/vul/2026-06324" type="self" id="BDU:2026-06324" title="BDU:2026-06324" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="roundcubemail" epoch="0" version="1.5.15" release="1.el7" arch="noarch" src="roundcubemail-1.5.15-1.el7.src.rpm">
					<filename>roundcubemail-0:1.5.15-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260507-73-0003</id>
		<issued date="2026-05-07" />
		<updated date="2026-05-07" />
		<title>Уязвимость roundcubemail </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в roundcubemail</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-roundcubemail-cve-2026-35542-7.3/</description>
               <solution>Установить обновление для пакета(ов) roundcubemail
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-roundcubemail-cve-2026-35542-7.3/" type="self" id="ROS-20260507-73-0003" title="ROS-20260507-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-35542" type="cve" id="CVE-2026-35542" title="CVE-2026-35542" />
			<reference href="https://bdu.fstec.ru/vul/2026-06304" type="self" id="BDU:2026-06304" title="BDU:2026-06304" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="roundcubemail" epoch="0" version="1.5.15" release="1.el7" arch="noarch" src="roundcubemail-1.5.15-1.el7.src.rpm">
					<filename>roundcubemail-0:1.5.15-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260507-73-0004</id>
		<issued date="2026-05-07" />
		<updated date="2026-05-07" />
		<title>Уязвимость roundcubemail </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в roundcubemail</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-roundcubemail-cve-2026-35541-7.3/</description>
               <solution>Установить обновление для пакета(ов) roundcubemail
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-roundcubemail-cve-2026-35541-7.3/" type="self" id="ROS-20260507-73-0004" title="ROS-20260507-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-35541" type="cve" id="CVE-2026-35541" title="CVE-2026-35541" />
			<reference href="https://bdu.fstec.ru/vul/2026-06303" type="self" id="BDU:2026-06303" title="BDU:2026-06303" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="roundcubemail" epoch="0" version="1.5.15" release="1.el7" arch="noarch" src="roundcubemail-1.5.15-1.el7.src.rpm">
					<filename>roundcubemail-0:1.5.15-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260507-73-0005</id>
		<issued date="2026-05-07" />
		<updated date="2026-05-07" />
		<title>Уязвимость roundcubemail </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в roundcubemail</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-roundcubemail-cve-2026-35540-7.3/</description>
               <solution>Установить обновление для пакета(ов) roundcubemail
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-roundcubemail-cve-2026-35540-7.3/" type="self" id="ROS-20260507-73-0005" title="ROS-20260507-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-35540" type="cve" id="CVE-2026-35540" title="CVE-2026-35540" />
			<reference href="https://bdu.fstec.ru/vul/2026-06180" type="self" id="BDU:2026-06180" title="BDU:2026-06180" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="roundcubemail" epoch="0" version="1.5.15" release="1.el7" arch="noarch" src="roundcubemail-1.5.15-1.el7.src.rpm">
					<filename>roundcubemail-0:1.5.15-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260507-73-0006</id>
		<issued date="2026-05-07" />
		<updated date="2026-05-07" />
		<title>Уязвимость roundcubemail </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в roundcubemail</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-roundcubemail-cve-2026-35539-7.3/</description>
               <solution>Установить обновление для пакета(ов) roundcubemail
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-roundcubemail-cve-2026-35539-7.3/" type="self" id="ROS-20260507-73-0006" title="ROS-20260507-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-35539" type="cve" id="CVE-2026-35539" title="CVE-2026-35539" />
			<reference href="https://bdu.fstec.ru/vul/2026-06179" type="self" id="BDU:2026-06179" title="BDU:2026-06179" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="roundcubemail" epoch="0" version="1.5.15" release="1.el7" arch="noarch" src="roundcubemail-1.5.15-1.el7.src.rpm">
					<filename>roundcubemail-0:1.5.15-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260507-73-0007</id>
		<issued date="2026-05-07" />
		<updated date="2026-05-07" />
		<title>Уязвимость roundcubemail </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в roundcubemail</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-roundcubemail-cve-2026-35538-7.3/</description>
               <solution>Установить обновление для пакета(ов) roundcubemail
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-roundcubemail-cve-2026-35538-7.3/" type="self" id="ROS-20260507-73-0007" title="ROS-20260507-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-35538" type="cve" id="CVE-2026-35538" title="CVE-2026-35538" />
			<reference href="https://bdu.fstec.ru/vul/2026-06182" type="self" id="BDU:2026-06182" title="BDU:2026-06182" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="roundcubemail" epoch="0" version="1.5.15" release="1.el7" arch="noarch" src="roundcubemail-1.5.15-1.el7.src.rpm">
					<filename>roundcubemail-0:1.5.15-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260507-73-0008</id>
		<issued date="2026-05-07" />
		<updated date="2026-05-07" />
		<title>Уязвимость roundcubemail </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в roundcubemail</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-roundcubemail-cve-2026-35537-7.3/</description>
               <solution>Установить обновление для пакета(ов) roundcubemail
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-roundcubemail-cve-2026-35537-7.3/" type="self" id="ROS-20260507-73-0008" title="ROS-20260507-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-35537" type="cve" id="CVE-2026-35537" title="CVE-2026-35537" />
			<reference href="https://bdu.fstec.ru/vul/2026-06181" type="self" id="BDU:2026-06181" title="BDU:2026-06181" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="roundcubemail" epoch="0" version="1.5.15" release="1.el7" arch="noarch" src="roundcubemail-1.5.15-1.el7.src.rpm">
					<filename>roundcubemail-0:1.5.15-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260507-73-0009</id>
		<issued date="2026-05-07" />
		<updated date="2026-05-07" />
		<title>Уязвимость tomcat </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2026-29146-7.3/</description>
               <solution>Установить обновление для пакета(ов) tomcat
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat-cve-2026-29146-7.3/" type="self" id="ROS-20260507-73-0009" title="ROS-20260507-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29146" type="cve" id="CVE-2026-29146" title="CVE-2026-29146" />
			<reference href="https://bdu.fstec.ru/vul/2026-05543" type="self" id="BDU:2026-05543" title="BDU:2026-05543" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-admin-webapps" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-admin-webapps-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-docs-webapp" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-docs-webapp-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-el-3.0-api" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-el-3.0-api-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-jsp-2.3-api" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-jsp-2.3-api-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-lib" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-lib-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-servlet-4.0-api" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-servlet-4.0-api-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat-webapps" epoch="1" version="9.0.117" release="1.el7" arch="noarch" src="tomcat-9.0.117-1.el7.src.rpm">
					<filename>tomcat-webapps-1:9.0.117-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260507-73-0010</id>
		<issued date="2026-05-07" />
		<updated date="2026-05-07" />
		<title>Уязвимость tomcat10 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat10</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat10-cve-2026-29146-7.3/</description>
               <solution>Установить обновление для пакета(ов) tomcat10
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat10-cve-2026-29146-7.3/" type="self" id="ROS-20260507-73-0010" title="ROS-20260507-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29146" type="cve" id="CVE-2026-29146" title="CVE-2026-29146" />
			<reference href="https://bdu.fstec.ru/vul/2026-05543" type="self" id="BDU:2026-05543" title="BDU:2026-05543" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat10" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-admin-webapps" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-admin-webapps-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-docs-webapp" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-docs-webapp-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-el-5.0-api" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-el-5.0-api-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-embed" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-embed-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-jsp-3.1-api" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-jsp-3.1-api-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-lib" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-lib-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-servlet-6.0-api" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-servlet-6.0-api-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat10-webapps" epoch="1" version="10.1.54" release="1.el7" arch="noarch" src="tomcat10-10.1.54-1.el7.src.rpm">
					<filename>tomcat10-webapps-1:10.1.54-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260507-73-0011</id>
		<issued date="2026-05-07" />
		<updated date="2026-05-07" />
		<title>Уязвимость tomcat11 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в tomcat11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat11-cve-2026-29146-7.3/</description>
               <solution>Установить обновление для пакета(ов) tomcat11
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-tomcat11-cve-2026-29146-7.3/" type="self" id="ROS-20260507-73-0011" title="ROS-20260507-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29146" type="cve" id="CVE-2026-29146" title="CVE-2026-29146" />
			<reference href="https://bdu.fstec.ru/vul/2026-05543" type="self" id="BDU:2026-05543" title="BDU:2026-05543" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="tomcat11" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-admin-webapps" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-admin-webapps-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-docs-webapp" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-docs-webapp-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-el-6.0-api" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-el-6.0-api-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-embed" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-embed-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-jsp-4.0-api" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-jsp-4.0-api-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-lib" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-lib-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-servlet-6.1-api" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-servlet-6.1-api-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
				<package name="tomcat11-webapps" epoch="1" version="11.0.21" release="1.el7" arch="noarch" src="tomcat11-11.0.21-1.el7.src.rpm">
					<filename>tomcat11-webapps-1:11.0.21-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260507-73-0012</id>
		<issued date="2026-05-07" />
		<updated date="2026-05-07" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2026-32280-7.3/</description>
               <solution>Установить обновление для пакета(ов) golang
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-golang-cve-2026-32280-7.3/" type="self" id="ROS-20260507-73-0012" title="ROS-20260507-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32280" type="cve" id="CVE-2026-32280" title="CVE-2026-32280" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="golang" epoch="0" version="1.26.2" release="1.el7" arch="x86_64" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-0:1.26.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.26.2" release="1.el7" arch="x86_64" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-bin-0:1.26.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.26.2" release="1.el7" arch="x86_64" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-shared-0:1.26.2-1.el7.x86_64.rpm</filename>
				</package>
				<package name="golang-docs" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-docs-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-misc" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-misc-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-src" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-src-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
				<package name="golang-tests" epoch="0" version="1.26.2" release="1.el7" arch="noarch" src="golang-1.26.2-1.el7.src.rpm">
					<filename>golang-tests-0:1.26.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260507-73-0013</id>
		<issued date="2026-05-07" />
		<updated date="2026-05-07" />
		<title>Уязвимость libarchive </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в libarchive</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libarchive-cve-2026-5121-7.3/</description>
               <solution>Установить обновление для пакета(ов) libarchive
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libarchive-cve-2026-5121-7.3/" type="self" id="ROS-20260507-73-0013" title="ROS-20260507-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5121" type="cve" id="CVE-2026-5121" title="CVE-2026-5121" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="bsdcat" epoch="0" version="3.8.1" release="3.el7" arch="x86_64" src="libarchive-3.8.1-3.el7.src.rpm">
					<filename>bsdcat-0:3.8.1-3.el7.x86_64.rpm</filename>
				</package>
				<package name="bsdcpio" epoch="0" version="3.8.1" release="3.el7" arch="x86_64" src="libarchive-3.8.1-3.el7.src.rpm">
					<filename>bsdcpio-0:3.8.1-3.el7.x86_64.rpm</filename>
				</package>
				<package name="bsdtar" epoch="0" version="3.8.1" release="3.el7" arch="x86_64" src="libarchive-3.8.1-3.el7.src.rpm">
					<filename>bsdtar-0:3.8.1-3.el7.x86_64.rpm</filename>
				</package>
				<package name="bsdunzip" epoch="0" version="3.8.1" release="3.el7" arch="x86_64" src="libarchive-3.8.1-3.el7.src.rpm">
					<filename>bsdunzip-0:3.8.1-3.el7.x86_64.rpm</filename>
				</package>
				<package name="libarchive" epoch="0" version="3.8.1" release="3.el7" arch="x86_64" src="libarchive-3.8.1-3.el7.src.rpm">
					<filename>libarchive-0:3.8.1-3.el7.x86_64.rpm</filename>
				</package>
				<package name="libarchive-devel" epoch="0" version="3.8.1" release="3.el7" arch="x86_64" src="libarchive-3.8.1-3.el7.src.rpm">
					<filename>libarchive-devel-0:3.8.1-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260507-73-0014</id>
		<issued date="2026-05-07" />
		<updated date="2026-05-07" />
		<title>Уязвимость libarchive </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libarchive</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libarchive-cve-2026-4111-7.3/</description>
               <solution>Установить обновление для пакета(ов) libarchive
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-libarchive-cve-2026-4111-7.3/" type="self" id="ROS-20260507-73-0014" title="ROS-20260507-73-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4111" type="cve" id="CVE-2026-4111" title="CVE-2026-4111" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="bsdcat" epoch="0" version="3.8.1" release="3.el7" arch="x86_64" src="libarchive-3.8.1-3.el7.src.rpm">
					<filename>bsdcat-0:3.8.1-3.el7.x86_64.rpm</filename>
				</package>
				<package name="bsdcpio" epoch="0" version="3.8.1" release="3.el7" arch="x86_64" src="libarchive-3.8.1-3.el7.src.rpm">
					<filename>bsdcpio-0:3.8.1-3.el7.x86_64.rpm</filename>
				</package>
				<package name="bsdtar" epoch="0" version="3.8.1" release="3.el7" arch="x86_64" src="libarchive-3.8.1-3.el7.src.rpm">
					<filename>bsdtar-0:3.8.1-3.el7.x86_64.rpm</filename>
				</package>
				<package name="bsdunzip" epoch="0" version="3.8.1" release="3.el7" arch="x86_64" src="libarchive-3.8.1-3.el7.src.rpm">
					<filename>bsdunzip-0:3.8.1-3.el7.x86_64.rpm</filename>
				</package>
				<package name="libarchive" epoch="0" version="3.8.1" release="3.el7" arch="x86_64" src="libarchive-3.8.1-3.el7.src.rpm">
					<filename>libarchive-0:3.8.1-3.el7.x86_64.rpm</filename>
				</package>
				<package name="libarchive-devel" epoch="0" version="3.8.1" release="3.el7" arch="x86_64" src="libarchive-3.8.1-3.el7.src.rpm">
					<filename>libarchive-devel-0:3.8.1-3.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260508-73-0001</id>
		<issued date="2026-05-08" />
		<updated date="2026-05-08" />
		<title>Уязвимость rubygem-activestorage </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в rubygem-activestorage</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-activestorage-cve-2026-33658-7.3/</description>
               <solution>Установить обновление для пакета(ов) rubygem-activestorage
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-activestorage-cve-2026-33658-7.3/" type="self" id="ROS-20260508-73-0001" title="ROS-20260508-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33658" type="cve" id="CVE-2026-33658" title="CVE-2026-33658" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-activestorage" epoch="2" version="6.1.6.1" release="4.el7" arch="noarch" src="rubygem-activestorage-6.1.6.1-4.el7.src.rpm">
					<filename>rubygem-activestorage-2:6.1.6.1-4.el7.noarch.rpm</filename>
				</package>
				<package name="rubygem-activestorage-doc" epoch="2" version="6.1.6.1" release="4.el7" arch="noarch" src="rubygem-activestorage-6.1.6.1-4.el7.src.rpm">
					<filename>rubygem-activestorage-doc-2:6.1.6.1-4.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260508-73-0002</id>
		<issued date="2026-05-08" />
		<updated date="2026-05-08" />
		<title>Уязвимость rubygem-activesupport </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в rubygem-activesupport</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-activesupport-cve-2026-33169-7.3/</description>
               <solution>Установить обновление для пакета(ов) rubygem-activesupport
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-activesupport-cve-2026-33169-7.3/" type="self" id="ROS-20260508-73-0002" title="ROS-20260508-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33169" type="cve" id="CVE-2026-33169" title="CVE-2026-33169" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-activesupport" epoch="2" version="6.1.6.1" release="5.el7" arch="noarch" src="rubygem-activesupport-6.1.6.1-5.el7.src.rpm">
					<filename>rubygem-activesupport-2:6.1.6.1-5.el7.noarch.rpm</filename>
				</package>
				<package name="rubygem-activesupport-doc" epoch="2" version="6.1.6.1" release="5.el7" arch="noarch" src="rubygem-activesupport-6.1.6.1-5.el7.src.rpm">
					<filename>rubygem-activesupport-doc-2:6.1.6.1-5.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260508-73-0003</id>
		<issued date="2026-05-08" />
		<updated date="2026-05-08" />
		<title>Уязвимость rubygem-activestorage </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в rubygem-activestorage</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-activestorage-cve-2026-33202-7.3/</description>
               <solution>Установить обновление для пакета(ов) rubygem-activestorage
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-activestorage-cve-2026-33202-7.3/" type="self" id="ROS-20260508-73-0003" title="ROS-20260508-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33202" type="cve" id="CVE-2026-33202" title="CVE-2026-33202" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-activestorage" epoch="2" version="6.1.6.1" release="4.el7" arch="noarch" src="rubygem-activestorage-6.1.6.1-4.el7.src.rpm">
					<filename>rubygem-activestorage-2:6.1.6.1-4.el7.noarch.rpm</filename>
				</package>
				<package name="rubygem-activestorage-doc" epoch="2" version="6.1.6.1" release="4.el7" arch="noarch" src="rubygem-activestorage-6.1.6.1-4.el7.src.rpm">
					<filename>rubygem-activestorage-doc-2:6.1.6.1-4.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260508-73-0004</id>
		<issued date="2026-05-08" />
		<updated date="2026-05-08" />
		<title>Уязвимость rubygem-activesupport </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в rubygem-activesupport</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-activesupport-cve-2026-33170-7.3/</description>
               <solution>Установить обновление для пакета(ов) rubygem-activesupport
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-activesupport-cve-2026-33170-7.3/" type="self" id="ROS-20260508-73-0004" title="ROS-20260508-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33170" type="cve" id="CVE-2026-33170" title="CVE-2026-33170" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-activesupport" epoch="2" version="6.1.6.1" release="5.el7" arch="noarch" src="rubygem-activesupport-6.1.6.1-5.el7.src.rpm">
					<filename>rubygem-activesupport-2:6.1.6.1-5.el7.noarch.rpm</filename>
				</package>
				<package name="rubygem-activesupport-doc" epoch="2" version="6.1.6.1" release="5.el7" arch="noarch" src="rubygem-activesupport-6.1.6.1-5.el7.src.rpm">
					<filename>rubygem-activesupport-doc-2:6.1.6.1-5.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260508-73-0005</id>
		<issued date="2026-05-08" />
		<updated date="2026-05-08" />
		<title>Уязвимость rubygem-activestorage </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в rubygem-activestorage</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-activestorage-cve-2026-33195-7.3/</description>
               <solution>Установить обновление для пакета(ов) rubygem-activestorage
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-activestorage-cve-2026-33195-7.3/" type="self" id="ROS-20260508-73-0005" title="ROS-20260508-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33195" type="cve" id="CVE-2026-33195" title="CVE-2026-33195" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-activestorage" epoch="2" version="6.1.6.1" release="4.el7" arch="noarch" src="rubygem-activestorage-6.1.6.1-4.el7.src.rpm">
					<filename>rubygem-activestorage-2:6.1.6.1-4.el7.noarch.rpm</filename>
				</package>
				<package name="rubygem-activestorage-doc" epoch="2" version="6.1.6.1" release="4.el7" arch="noarch" src="rubygem-activestorage-6.1.6.1-4.el7.src.rpm">
					<filename>rubygem-activestorage-doc-2:6.1.6.1-4.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260508-73-0006</id>
		<issued date="2026-05-08" />
		<updated date="2026-05-08" />
		<title>Уязвимость rubygem-activestorage </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в rubygem-activestorage</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-activestorage-cve-2026-33174-7.3/</description>
               <solution>Установить обновление для пакета(ов) rubygem-activestorage
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-activestorage-cve-2026-33174-7.3/" type="self" id="ROS-20260508-73-0006" title="ROS-20260508-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33174" type="cve" id="CVE-2026-33174" title="CVE-2026-33174" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-activestorage" epoch="2" version="6.1.6.1" release="4.el7" arch="noarch" src="rubygem-activestorage-6.1.6.1-4.el7.src.rpm">
					<filename>rubygem-activestorage-2:6.1.6.1-4.el7.noarch.rpm</filename>
				</package>
				<package name="rubygem-activestorage-doc" epoch="2" version="6.1.6.1" release="4.el7" arch="noarch" src="rubygem-activestorage-6.1.6.1-4.el7.src.rpm">
					<filename>rubygem-activestorage-doc-2:6.1.6.1-4.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260508-73-0007</id>
		<issued date="2026-05-08" />
		<updated date="2026-05-08" />
		<title>Уязвимость roundcubemail </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в roundcubemail</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-roundcubemail-cve-2026-25916-7.3/</description>
               <solution>Установить обновление для пакета(ов) roundcubemail
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-roundcubemail-cve-2026-25916-7.3/" type="self" id="ROS-20260508-73-0007" title="ROS-20260508-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25916" type="cve" id="CVE-2026-25916" title="CVE-2026-25916" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="roundcubemail" epoch="0" version="1.5.15" release="1.el7" arch="noarch" src="roundcubemail-1.5.15-1.el7.src.rpm">
					<filename>roundcubemail-0:1.5.15-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260508-73-0008</id>
		<issued date="2026-05-08" />
		<updated date="2026-05-08" />
		<title>Уязвимость roundcubemail </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в roundcubemail</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-roundcubemail-cve-2026-26079-7.3/</description>
               <solution>Установить обновление для пакета(ов) roundcubemail
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-roundcubemail-cve-2026-26079-7.3/" type="self" id="ROS-20260508-73-0008" title="ROS-20260508-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26079" type="cve" id="CVE-2026-26079" title="CVE-2026-26079" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="roundcubemail" epoch="0" version="1.5.15" release="1.el7" arch="noarch" src="roundcubemail-1.5.15-1.el7.src.rpm">
					<filename>roundcubemail-0:1.5.15-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260508-73-0009</id>
		<issued date="2026-05-08" />
		<updated date="2026-05-08" />
		<title>Уязвимость dotnet10.0 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dotnet10.0</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet10-0-cve-2026-21218-7.3/</description>
               <solution>Установить обновление для пакета(ов) dotnet10.0
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet10-0-cve-2026-21218-7.3/" type="self" id="ROS-20260508-73-0009" title="ROS-20260508-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21218" type="cve" id="CVE-2026-21218" title="CVE-2026-21218" />
			<reference href="https://bdu.fstec.ru/vul/2026-01775" type="self" id="BDU:2026-01775" title="BDU:2026-01775" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="aspnetcore-runtime-10.0" epoch="0" version="10.0.4" release="1.el7" arch="x86_64" src="dotnet10.0-10.0.104-1.el7.src.rpm">
					<filename>aspnetcore-runtime-10.0-0:10.0.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="aspnetcore-runtime-dbg-10.0" epoch="0" version="10.0.4" release="1.el7" arch="x86_64" src="dotnet10.0-10.0.104-1.el7.src.rpm">
					<filename>aspnetcore-runtime-dbg-10.0-0:10.0.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="aspnetcore-targeting-pack-10.0" epoch="0" version="10.0.4" release="1.el7" arch="x86_64" src="dotnet10.0-10.0.104-1.el7.src.rpm">
					<filename>aspnetcore-targeting-pack-10.0-0:10.0.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-apphost-pack-10.0" epoch="0" version="10.0.4" release="1.el7" arch="x86_64" src="dotnet10.0-10.0.104-1.el7.src.rpm">
					<filename>dotnet-apphost-pack-10.0-0:10.0.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-host" epoch="0" version="10.0.4" release="1.el7" arch="x86_64" src="dotnet10.0-10.0.104-1.el7.src.rpm">
					<filename>dotnet-host-0:10.0.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-hostfxr-10.0" epoch="0" version="10.0.4" release="1.el7" arch="x86_64" src="dotnet10.0-10.0.104-1.el7.src.rpm">
					<filename>dotnet-hostfxr-10.0-0:10.0.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-runtime-10.0" epoch="0" version="10.0.4" release="1.el7" arch="x86_64" src="dotnet10.0-10.0.104-1.el7.src.rpm">
					<filename>dotnet-runtime-10.0-0:10.0.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-runtime-dbg-10.0" epoch="0" version="10.0.4" release="1.el7" arch="x86_64" src="dotnet10.0-10.0.104-1.el7.src.rpm">
					<filename>dotnet-runtime-dbg-10.0-0:10.0.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-sdk-10.0" epoch="0" version="10.0.104" release="1.el7" arch="x86_64" src="dotnet10.0-10.0.104-1.el7.src.rpm">
					<filename>dotnet-sdk-10.0-0:10.0.104-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-sdk-10.0-source-built-artifacts" epoch="0" version="10.0.104" release="1.el7" arch="x86_64" src="dotnet10.0-10.0.104-1.el7.src.rpm">
					<filename>dotnet-sdk-10.0-source-built-artifacts-0:10.0.104-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-sdk-aot-10.0" epoch="0" version="10.0.104" release="1.el7" arch="x86_64" src="dotnet10.0-10.0.104-1.el7.src.rpm">
					<filename>dotnet-sdk-aot-10.0-0:10.0.104-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-sdk-dbg-10.0" epoch="0" version="10.0.104" release="1.el7" arch="x86_64" src="dotnet10.0-10.0.104-1.el7.src.rpm">
					<filename>dotnet-sdk-dbg-10.0-0:10.0.104-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-targeting-pack-10.0" epoch="0" version="10.0.4" release="1.el7" arch="x86_64" src="dotnet10.0-10.0.104-1.el7.src.rpm">
					<filename>dotnet-targeting-pack-10.0-0:10.0.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-templates-10.0" epoch="0" version="10.0.104" release="1.el7" arch="x86_64" src="dotnet10.0-10.0.104-1.el7.src.rpm">
					<filename>dotnet-templates-10.0-0:10.0.104-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260508-73-0010</id>
		<issued date="2026-05-08" />
		<updated date="2026-05-08" />
		<title>Уязвимость dotnet9.0 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dotnet9.0</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet9-0-cve-2026-21218-7.3/</description>
               <solution>Установить обновление для пакета(ов) dotnet9.0
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet9-0-cve-2026-21218-7.3/" type="self" id="ROS-20260508-73-0010" title="ROS-20260508-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21218" type="cve" id="CVE-2026-21218" title="CVE-2026-21218" />
			<reference href="https://bdu.fstec.ru/vul/2026-01775" type="self" id="BDU:2026-01775" title="BDU:2026-01775" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="aspnetcore-runtime-9.0" epoch="0" version="9.0.14" release="1.el7" arch="x86_64" src="dotnet9.0-9.0.115-1.el7.src.rpm">
					<filename>aspnetcore-runtime-9.0-0:9.0.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="aspnetcore-runtime-dbg-9.0" epoch="0" version="9.0.14" release="1.el7" arch="x86_64" src="dotnet9.0-9.0.115-1.el7.src.rpm">
					<filename>aspnetcore-runtime-dbg-9.0-0:9.0.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="aspnetcore-targeting-pack-9.0" epoch="0" version="9.0.14" release="1.el7" arch="x86_64" src="dotnet9.0-9.0.115-1.el7.src.rpm">
					<filename>aspnetcore-targeting-pack-9.0-0:9.0.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-apphost-pack-9.0" epoch="0" version="9.0.14" release="1.el7" arch="x86_64" src="dotnet9.0-9.0.115-1.el7.src.rpm">
					<filename>dotnet-apphost-pack-9.0-0:9.0.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-hostfxr-9.0" epoch="0" version="9.0.14" release="1.el7" arch="x86_64" src="dotnet9.0-9.0.115-1.el7.src.rpm">
					<filename>dotnet-hostfxr-9.0-0:9.0.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-runtime-9.0" epoch="0" version="9.0.14" release="1.el7" arch="x86_64" src="dotnet9.0-9.0.115-1.el7.src.rpm">
					<filename>dotnet-runtime-9.0-0:9.0.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-runtime-dbg-9.0" epoch="0" version="9.0.14" release="1.el7" arch="x86_64" src="dotnet9.0-9.0.115-1.el7.src.rpm">
					<filename>dotnet-runtime-dbg-9.0-0:9.0.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-sdk-9.0" epoch="0" version="9.0.115" release="1.el7" arch="x86_64" src="dotnet9.0-9.0.115-1.el7.src.rpm">
					<filename>dotnet-sdk-9.0-0:9.0.115-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-sdk-9.0-source-built-artifacts" epoch="0" version="9.0.115" release="1.el7" arch="x86_64" src="dotnet9.0-9.0.115-1.el7.src.rpm">
					<filename>dotnet-sdk-9.0-source-built-artifacts-0:9.0.115-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-sdk-aot-9.0" epoch="0" version="9.0.115" release="1.el7" arch="x86_64" src="dotnet9.0-9.0.115-1.el7.src.rpm">
					<filename>dotnet-sdk-aot-9.0-0:9.0.115-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-sdk-dbg-9.0" epoch="0" version="9.0.115" release="1.el7" arch="x86_64" src="dotnet9.0-9.0.115-1.el7.src.rpm">
					<filename>dotnet-sdk-dbg-9.0-0:9.0.115-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-targeting-pack-9.0" epoch="0" version="9.0.14" release="1.el7" arch="x86_64" src="dotnet9.0-9.0.115-1.el7.src.rpm">
					<filename>dotnet-targeting-pack-9.0-0:9.0.14-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-templates-9.0" epoch="0" version="9.0.115" release="1.el7" arch="x86_64" src="dotnet9.0-9.0.115-1.el7.src.rpm">
					<filename>dotnet-templates-9.0-0:9.0.115-1.el7.x86_64.rpm</filename>
				</package>
				<package name="netstandard-targeting-pack-2.1" epoch="0" version="9.0.115" release="1.el7" arch="x86_64" src="dotnet9.0-9.0.115-1.el7.src.rpm">
					<filename>netstandard-targeting-pack-2.1-0:9.0.115-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260508-73-0011</id>
		<issued date="2026-05-08" />
		<updated date="2026-05-08" />
		<title>Уязвимость dotnet8.0 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dotnet8.0</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet8-0-cve-2026-21218-7.3/</description>
               <solution>Установить обновление для пакета(ов) dotnet8.0
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-dotnet8-0-cve-2026-21218-7.3/" type="self" id="ROS-20260508-73-0011" title="ROS-20260508-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21218" type="cve" id="CVE-2026-21218" title="CVE-2026-21218" />
			<reference href="https://bdu.fstec.ru/vul/2026-01775" type="self" id="BDU:2026-01775" title="BDU:2026-01775" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="aspnetcore-runtime-8.0" epoch="0" version="8.0.25" release="1.el7" arch="x86_64" src="dotnet8.0-8.0.125-1.el7.src.rpm">
					<filename>aspnetcore-runtime-8.0-0:8.0.25-1.el7.x86_64.rpm</filename>
				</package>
				<package name="aspnetcore-runtime-dbg-8.0" epoch="0" version="8.0.25" release="1.el7" arch="x86_64" src="dotnet8.0-8.0.125-1.el7.src.rpm">
					<filename>aspnetcore-runtime-dbg-8.0-0:8.0.25-1.el7.x86_64.rpm</filename>
				</package>
				<package name="aspnetcore-targeting-pack-8.0" epoch="0" version="8.0.25" release="1.el7" arch="x86_64" src="dotnet8.0-8.0.125-1.el7.src.rpm">
					<filename>aspnetcore-targeting-pack-8.0-0:8.0.25-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-apphost-pack-8.0" epoch="0" version="8.0.25" release="1.el7" arch="x86_64" src="dotnet8.0-8.0.125-1.el7.src.rpm">
					<filename>dotnet-apphost-pack-8.0-0:8.0.25-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-hostfxr-8.0" epoch="0" version="8.0.25" release="1.el7" arch="x86_64" src="dotnet8.0-8.0.125-1.el7.src.rpm">
					<filename>dotnet-hostfxr-8.0-0:8.0.25-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-runtime-8.0" epoch="0" version="8.0.25" release="1.el7" arch="x86_64" src="dotnet8.0-8.0.125-1.el7.src.rpm">
					<filename>dotnet-runtime-8.0-0:8.0.25-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-runtime-dbg-8.0" epoch="0" version="8.0.25" release="1.el7" arch="x86_64" src="dotnet8.0-8.0.125-1.el7.src.rpm">
					<filename>dotnet-runtime-dbg-8.0-0:8.0.25-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-sdk-8.0" epoch="0" version="8.0.125" release="1.el7" arch="x86_64" src="dotnet8.0-8.0.125-1.el7.src.rpm">
					<filename>dotnet-sdk-8.0-0:8.0.125-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-sdk-8.0-source-built-artifacts" epoch="0" version="8.0.125" release="1.el7" arch="x86_64" src="dotnet8.0-8.0.125-1.el7.src.rpm">
					<filename>dotnet-sdk-8.0-source-built-artifacts-0:8.0.125-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-sdk-dbg-8.0" epoch="0" version="8.0.125" release="1.el7" arch="x86_64" src="dotnet8.0-8.0.125-1.el7.src.rpm">
					<filename>dotnet-sdk-dbg-8.0-0:8.0.125-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-targeting-pack-8.0" epoch="0" version="8.0.25" release="1.el7" arch="x86_64" src="dotnet8.0-8.0.125-1.el7.src.rpm">
					<filename>dotnet-targeting-pack-8.0-0:8.0.25-1.el7.x86_64.rpm</filename>
				</package>
				<package name="dotnet-templates-8.0" epoch="0" version="8.0.125" release="1.el7" arch="x86_64" src="dotnet8.0-8.0.125-1.el7.src.rpm">
					<filename>dotnet-templates-8.0-0:8.0.125-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260508-73-0012</id>
		<issued date="2026-05-08" />
		<updated date="2026-05-08" />
		<title>Уязвимость nss </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в nss</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nss-cve-2026-2781-7.3/</description>
               <solution>Установить обновление для пакета(ов) nss
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nss-cve-2026-2781-7.3/" type="self" id="ROS-20260508-73-0012" title="ROS-20260508-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2781" type="cve" id="CVE-2026-2781" title="CVE-2026-2781" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nss" epoch="0" version="3.79.4" release="5.el7" arch="x86_64" src="nss-3.79.4-5.el7.src.rpm">
					<filename>nss-0:3.79.4-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nss-devel" epoch="0" version="3.79.4" release="5.el7" arch="x86_64" src="nss-3.79.4-5.el7.src.rpm">
					<filename>nss-devel-0:3.79.4-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nss-pkcs11-devel" epoch="0" version="3.79.4" release="5.el7" arch="x86_64" src="nss-3.79.4-5.el7.src.rpm">
					<filename>nss-pkcs11-devel-0:3.79.4-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nss-softokn" epoch="0" version="3.79.4" release="5.el7" arch="x86_64" src="nss-3.79.4-5.el7.src.rpm">
					<filename>nss-softokn-0:3.79.4-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nss-softokn-devel" epoch="0" version="3.79.4" release="5.el7" arch="x86_64" src="nss-3.79.4-5.el7.src.rpm">
					<filename>nss-softokn-devel-0:3.79.4-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nss-softokn-freebl" epoch="0" version="3.79.4" release="5.el7" arch="x86_64" src="nss-3.79.4-5.el7.src.rpm">
					<filename>nss-softokn-freebl-0:3.79.4-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nss-softokn-freebl-devel" epoch="0" version="3.79.4" release="5.el7" arch="x86_64" src="nss-3.79.4-5.el7.src.rpm">
					<filename>nss-softokn-freebl-devel-0:3.79.4-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nss-sysinit" epoch="0" version="3.79.4" release="5.el7" arch="x86_64" src="nss-3.79.4-5.el7.src.rpm">
					<filename>nss-sysinit-0:3.79.4-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nss-tools" epoch="0" version="3.79.4" release="5.el7" arch="x86_64" src="nss-3.79.4-5.el7.src.rpm">
					<filename>nss-tools-0:3.79.4-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nss-util" epoch="0" version="3.79.4" release="5.el7" arch="x86_64" src="nss-3.79.4-5.el7.src.rpm">
					<filename>nss-util-0:3.79.4-5.el7.x86_64.rpm</filename>
				</package>
				<package name="nss-util-devel" epoch="0" version="3.79.4" release="5.el7" arch="x86_64" src="nss-3.79.4-5.el7.src.rpm">
					<filename>nss-util-devel-0:3.79.4-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260508-73-0013</id>
		<issued date="2026-05-08" />
		<updated date="2026-05-08" />
		<title>Уязвимость nodejs-minimatch </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nodejs-minimatch</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-minimatch-cve-2026-27903-7.3/</description>
               <solution>Установить обновление для пакета(ов) nodejs-minimatch
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-minimatch-cve-2026-27903-7.3/" type="self" id="ROS-20260508-73-0013" title="ROS-20260508-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27903" type="cve" id="CVE-2026-27903" title="CVE-2026-27903" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs-minimatch" epoch="0" version="3.1.4" release="1.el7" arch="noarch" src="nodejs-minimatch-3.1.4-1.el7.src.rpm">
					<filename>nodejs-minimatch-0:3.1.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260508-73-0014</id>
		<issued date="2026-05-08" />
		<updated date="2026-05-08" />
		<title>Уязвимость nodejs-minimatch </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nodejs-minimatch</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-minimatch-cve-2026-27904-7.3/</description>
               <solution>Установить обновление для пакета(ов) nodejs-minimatch
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nodejs-minimatch-cve-2026-27904-7.3/" type="self" id="ROS-20260508-73-0014" title="ROS-20260508-73-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27904" type="cve" id="CVE-2026-27904" title="CVE-2026-27904" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nodejs-minimatch" epoch="0" version="3.1.4" release="1.el7" arch="noarch" src="nodejs-minimatch-3.1.4-1.el7.src.rpm">
					<filename>nodejs-minimatch-0:3.1.4-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260508-73-0015</id>
		<issued date="2026-05-08" />
		<updated date="2026-05-08" />
		<title>Уязвимость nginx </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nginx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nginx-cve-2026-32647-7.3/</description>
               <solution>Установить обновление для пакета(ов) nginx
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nginx-cve-2026-32647-7.3/" type="self" id="ROS-20260508-73-0015" title="ROS-20260508-73-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32647" type="cve" id="CVE-2026-32647" title="CVE-2026-32647" />
			<reference href="https://bdu.fstec.ru/vul/2026-04819" type="self" id="BDU:2026-04819" title="BDU:2026-04819" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nginx" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-core" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-core-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-devel" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-devel-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-geoip" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-http-geoip-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-image-filter" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-http-image-filter-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-perl" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-http-perl-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-push-stream" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-http-push-stream-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-xslt-filter" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-http-xslt-filter-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-mail" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-mail-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-stream" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-stream-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-all-modules" epoch="1" version="1.28.3" release="1.el7" arch="noarch" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-all-modules-1:1.28.3-1.el7.noarch.rpm</filename>
				</package>
				<package name="nginx-filesystem" epoch="1" version="1.28.3" release="1.el7" arch="noarch" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-filesystem-1:1.28.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260508-73-0016</id>
		<issued date="2026-05-08" />
		<updated date="2026-05-08" />
		<title>Уязвимость nginx </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nginx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nginx-cve-2026-27651-7.3/</description>
               <solution>Установить обновление для пакета(ов) nginx
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nginx-cve-2026-27651-7.3/" type="self" id="ROS-20260508-73-0016" title="ROS-20260508-73-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27651" type="cve" id="CVE-2026-27651" title="CVE-2026-27651" />
			<reference href="https://bdu.fstec.ru/vul/2026-04820" type="self" id="BDU:2026-04820" title="BDU:2026-04820" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nginx" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-core" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-core-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-devel" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-devel-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-geoip" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-http-geoip-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-image-filter" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-http-image-filter-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-perl" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-http-perl-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-push-stream" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-http-push-stream-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-xslt-filter" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-http-xslt-filter-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-mail" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-mail-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-stream" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-stream-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-all-modules" epoch="1" version="1.28.3" release="1.el7" arch="noarch" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-all-modules-1:1.28.3-1.el7.noarch.rpm</filename>
				</package>
				<package name="nginx-filesystem" epoch="1" version="1.28.3" release="1.el7" arch="noarch" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-filesystem-1:1.28.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260508-73-0017</id>
		<issued date="2026-05-08" />
		<updated date="2026-05-08" />
		<title>Уязвимость nginx </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nginx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nginx-cve-2026-27784-7.3/</description>
               <solution>Установить обновление для пакета(ов) nginx
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nginx-cve-2026-27784-7.3/" type="self" id="ROS-20260508-73-0017" title="ROS-20260508-73-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27784" type="cve" id="CVE-2026-27784" title="CVE-2026-27784" />
			<reference href="https://bdu.fstec.ru/vul/2026-04818" type="self" id="BDU:2026-04818" title="BDU:2026-04818" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nginx" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-core" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-core-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-devel" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-devel-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-geoip" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-http-geoip-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-image-filter" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-http-image-filter-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-perl" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-http-perl-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-push-stream" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-http-push-stream-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-xslt-filter" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-http-xslt-filter-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-mail" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-mail-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-stream" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-stream-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-all-modules" epoch="1" version="1.28.3" release="1.el7" arch="noarch" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-all-modules-1:1.28.3-1.el7.noarch.rpm</filename>
				</package>
				<package name="nginx-filesystem" epoch="1" version="1.28.3" release="1.el7" arch="noarch" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-filesystem-1:1.28.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260508-73-0018</id>
		<issued date="2026-05-08" />
		<updated date="2026-05-08" />
		<title>Уязвимость nginx </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в nginx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nginx-cve-2026-28753-7.3/</description>
               <solution>Установить обновление для пакета(ов) nginx
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nginx-cve-2026-28753-7.3/" type="self" id="ROS-20260508-73-0018" title="ROS-20260508-73-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28753" type="cve" id="CVE-2026-28753" title="CVE-2026-28753" />
			<reference href="https://bdu.fstec.ru/vul/2026-04822" type="self" id="BDU:2026-04822" title="BDU:2026-04822" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nginx" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-core" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-core-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-devel" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-devel-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-geoip" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-http-geoip-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-image-filter" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-http-image-filter-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-perl" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-http-perl-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-push-stream" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-http-push-stream-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-xslt-filter" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-http-xslt-filter-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-mail" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-mail-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-stream" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-stream-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-all-modules" epoch="1" version="1.28.3" release="1.el7" arch="noarch" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-all-modules-1:1.28.3-1.el7.noarch.rpm</filename>
				</package>
				<package name="nginx-filesystem" epoch="1" version="1.28.3" release="1.el7" arch="noarch" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-filesystem-1:1.28.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260512-73-0001</id>
		<issued date="2026-05-12" />
		<updated date="2026-05-12" />
		<title>Уязвимость python-PyPDF2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-PyPDF2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pypdf2-cve-2026-31826-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-PyPDF2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pypdf2-cve-2026-31826-7.3/" type="self" id="ROS-20260512-73-0001" title="ROS-20260512-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31826" type="cve" id="CVE-2026-31826" title="CVE-2026-31826" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-PyPDF2" epoch="0" version="6.9.2" release="1.el7" arch="noarch" src="python-PyPDF2-6.9.2-1.el7.src.rpm">
					<filename>python3-PyPDF2-0:6.9.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260512-73-0002</id>
		<issued date="2026-05-12" />
		<updated date="2026-05-12" />
		<title>Уязвимость python-PyPDF2 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-PyPDF2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pypdf2-cve-2026-33699-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-PyPDF2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pypdf2-cve-2026-33699-7.3/" type="self" id="ROS-20260512-73-0002" title="ROS-20260512-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33699" type="cve" id="CVE-2026-33699" title="CVE-2026-33699" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-PyPDF2" epoch="0" version="6.9.2" release="1.el7" arch="noarch" src="python-PyPDF2-6.9.2-1.el7.src.rpm">
					<filename>python3-PyPDF2-0:6.9.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260512-73-0003</id>
		<issued date="2026-05-12" />
		<updated date="2026-05-12" />
		<title>Уязвимость python-PyPDF2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-PyPDF2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pypdf2-cve-2026-28804-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-PyPDF2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pypdf2-cve-2026-28804-7.3/" type="self" id="ROS-20260512-73-0003" title="ROS-20260512-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28804" type="cve" id="CVE-2026-28804" title="CVE-2026-28804" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-PyPDF2" epoch="0" version="6.9.2" release="1.el7" arch="noarch" src="python-PyPDF2-6.9.2-1.el7.src.rpm">
					<filename>python3-PyPDF2-0:6.9.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260512-73-0004</id>
		<issued date="2026-05-12" />
		<updated date="2026-05-12" />
		<title>Уязвимость python-PyPDF2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-PyPDF2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pypdf2-cve-2026-33123-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-PyPDF2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-pypdf2-cve-2026-33123-7.3/" type="self" id="ROS-20260512-73-0004" title="ROS-20260512-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33123" type="cve" id="CVE-2026-33123" title="CVE-2026-33123" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-PyPDF2" epoch="0" version="6.9.2" release="1.el7" arch="noarch" src="python-PyPDF2-6.9.2-1.el7.src.rpm">
					<filename>python3-PyPDF2-0:6.9.2-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260512-73-0005</id>
		<issued date="2026-05-12" />
		<updated date="2026-05-12" />
		<title>Уязвимость nginx </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в nginx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nginx-cve-2026-27654-7.3/</description>
               <solution>Установить обновление для пакета(ов) nginx
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-nginx-cve-2026-27654-7.3/" type="self" id="ROS-20260512-73-0005" title="ROS-20260512-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27654" type="cve" id="CVE-2026-27654" title="CVE-2026-27654" />
			<reference href="https://bdu.fstec.ru/vul/2026-04817" type="self" id="BDU:2026-04817" title="BDU:2026-04817" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="nginx" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-core" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-core-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-devel" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-devel-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-geoip" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-http-geoip-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-image-filter" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-http-image-filter-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-perl" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-http-perl-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-push-stream" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-http-push-stream-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-xslt-filter" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-http-xslt-filter-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-mail" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-mail-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-stream" epoch="1" version="1.28.3" release="1.el7" arch="x86_64" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-mod-stream-1:1.28.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="nginx-all-modules" epoch="1" version="1.28.3" release="1.el7" arch="noarch" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-all-modules-1:1.28.3-1.el7.noarch.rpm</filename>
				</package>
				<package name="nginx-filesystem" epoch="1" version="1.28.3" release="1.el7" arch="noarch" src="nginx-1.28.3-1.el7.src.rpm">
					<filename>nginx-filesystem-1:1.28.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260512-73-0006</id>
		<issued date="2026-05-12" />
		<updated date="2026-05-12" />
		<title>Уязвимость incus </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в incus</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-incus-cve-2026-23954-7.3/</description>
               <solution>Установить обновление для пакета(ов) incus
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-incus-cve-2026-23954-7.3/" type="self" id="ROS-20260512-73-0006" title="ROS-20260512-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23954" type="cve" id="CVE-2026-23954" title="CVE-2026-23954" />
			<reference href="https://bdu.fstec.ru/vul/2026-00871" type="self" id="BDU:2026-00871" title="BDU:2026-00871" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="incus" epoch="0" version="6.21.0" release="1.el7" arch="x86_64" src="incus-6.21.0-1.el7.src.rpm">
					<filename>incus-0:6.21.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="incus-agent" epoch="0" version="6.21.0" release="1.el7" arch="x86_64" src="incus-6.21.0-1.el7.src.rpm">
					<filename>incus-agent-0:6.21.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="incus-client" epoch="0" version="6.21.0" release="1.el7" arch="x86_64" src="incus-6.21.0-1.el7.src.rpm">
					<filename>incus-client-0:6.21.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="incus-tools" epoch="0" version="6.21.0" release="1.el7" arch="x86_64" src="incus-6.21.0-1.el7.src.rpm">
					<filename>incus-tools-0:6.21.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="incus-selinux" epoch="0" version="6.21.0" release="1.el7" arch="noarch" src="incus-6.21.0-1.el7.src.rpm">
					<filename>incus-selinux-0:6.21.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260512-73-0007</id>
		<issued date="2026-05-12" />
		<updated date="2026-05-12" />
		<title>Уязвимость incus </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в incus</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-incus-cve-2026-23953-7.3/</description>
               <solution>Установить обновление для пакета(ов) incus
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-incus-cve-2026-23953-7.3/" type="self" id="ROS-20260512-73-0007" title="ROS-20260512-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23953" type="cve" id="CVE-2026-23953" title="CVE-2026-23953" />
			<reference href="https://bdu.fstec.ru/vul/2026-00872" type="self" id="BDU:2026-00872" title="BDU:2026-00872" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="incus" epoch="0" version="6.21.0" release="1.el7" arch="x86_64" src="incus-6.21.0-1.el7.src.rpm">
					<filename>incus-0:6.21.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="incus-agent" epoch="0" version="6.21.0" release="1.el7" arch="x86_64" src="incus-6.21.0-1.el7.src.rpm">
					<filename>incus-agent-0:6.21.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="incus-client" epoch="0" version="6.21.0" release="1.el7" arch="x86_64" src="incus-6.21.0-1.el7.src.rpm">
					<filename>incus-client-0:6.21.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="incus-tools" epoch="0" version="6.21.0" release="1.el7" arch="x86_64" src="incus-6.21.0-1.el7.src.rpm">
					<filename>incus-tools-0:6.21.0-1.el7.x86_64.rpm</filename>
				</package>
				<package name="incus-selinux" epoch="0" version="6.21.0" release="1.el7" arch="noarch" src="incus-6.21.0-1.el7.src.rpm">
					<filename>incus-selinux-0:6.21.0-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260512-73-0008</id>
		<issued date="2026-05-12" />
		<updated date="2026-05-12" />
		<title>Уязвимость glib2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в glib2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glib2-cve-2025-14512-7.3/</description>
               <solution>Установить обновление для пакета(ов) glib2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-glib2-cve-2025-14512-7.3/" type="self" id="ROS-20260512-73-0008" title="ROS-20260512-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14512" type="cve" id="CVE-2025-14512" title="CVE-2025-14512" />
			<reference href="https://bdu.fstec.ru/vul/2026-02750" type="self" id="BDU:2026-02750" title="BDU:2026-02750" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="glib2" epoch="0" version="2.65.3" release="9.el7" arch="x86_64" src="glib2-2.65.3-9.el7.src.rpm">
					<filename>glib2-0:2.65.3-9.el7.x86_64.rpm</filename>
				</package>
				<package name="glib2-devel" epoch="0" version="2.65.3" release="9.el7" arch="x86_64" src="glib2-2.65.3-9.el7.src.rpm">
					<filename>glib2-devel-0:2.65.3-9.el7.x86_64.rpm</filename>
				</package>
				<package name="glib2-fam" epoch="0" version="2.65.3" release="9.el7" arch="x86_64" src="glib2-2.65.3-9.el7.src.rpm">
					<filename>glib2-fam-0:2.65.3-9.el7.x86_64.rpm</filename>
				</package>
				<package name="glib2-static" epoch="0" version="2.65.3" release="9.el7" arch="x86_64" src="glib2-2.65.3-9.el7.src.rpm">
					<filename>glib2-static-0:2.65.3-9.el7.x86_64.rpm</filename>
				</package>
				<package name="glib2-tests" epoch="0" version="2.65.3" release="9.el7" arch="x86_64" src="glib2-2.65.3-9.el7.src.rpm">
					<filename>glib2-tests-0:2.65.3-9.el7.x86_64.rpm</filename>
				</package>
				<package name="glib2-doc" epoch="0" version="2.65.3" release="9.el7" arch="noarch" src="glib2-2.65.3-9.el7.src.rpm">
					<filename>glib2-doc-0:2.65.3-9.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260512-73-0009</id>
		<issued date="2026-05-12" />
		<updated date="2026-05-12" />
		<title>Уязвимость beats </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в beats</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-beats-cve-2026-0529-7.3/</description>
               <solution>Установить обновление для пакета(ов) beats
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-beats-cve-2026-0529-7.3/" type="self" id="ROS-20260512-73-0009" title="ROS-20260512-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0529" type="cve" id="CVE-2026-0529" title="CVE-2026-0529" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="auditbeat" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>auditbeat-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="auditbeat-docs" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>auditbeat-docs-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="beats" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>beats-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="filebeat" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>filebeat-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="filebeat-docs" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>filebeat-docs-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="heartbeat" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>heartbeat-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="heartbeat-docs" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>heartbeat-docs-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="metricbeat" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>metricbeat-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="metricbeat-docs" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>metricbeat-docs-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="packetbeat" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>packetbeat-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="packetbeat-docs" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>packetbeat-docs-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260512-73-0010</id>
		<issued date="2026-05-12" />
		<updated date="2026-05-12" />
		<title>Уязвимость beats </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в beats</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-beats-cve-2025-68382-7.3/</description>
               <solution>Установить обновление для пакета(ов) beats
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-beats-cve-2025-68382-7.3/" type="self" id="ROS-20260512-73-0010" title="ROS-20260512-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68382" type="cve" id="CVE-2025-68382" title="CVE-2025-68382" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="auditbeat" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>auditbeat-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="auditbeat-docs" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>auditbeat-docs-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="beats" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>beats-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="filebeat" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>filebeat-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="filebeat-docs" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>filebeat-docs-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="heartbeat" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>heartbeat-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="heartbeat-docs" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>heartbeat-docs-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="metricbeat" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>metricbeat-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="metricbeat-docs" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>metricbeat-docs-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="packetbeat" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>packetbeat-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="packetbeat-docs" epoch="0" version="9.2.4" release="1.el7" arch="x86_64" src="beats-9.2.4-1.el7.src.rpm">
					<filename>packetbeat-docs-0:9.2.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260512-73-0011</id>
		<issued date="2026-05-12" />
		<updated date="2026-05-12" />
		<title>Уязвимость hdf5 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в hdf5</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-hdf5-cve-2026-34734-7.3/</description>
               <solution>Установить обновление для пакета(ов) hdf5
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-hdf5-cve-2026-34734-7.3/" type="self" id="ROS-20260512-73-0011" title="ROS-20260512-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34734" type="cve" id="CVE-2026-34734" title="CVE-2026-34734" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="hdf5" epoch="0" version="1.14.4" release="1.el7" arch="x86_64" src="hdf5-1.14.4-1.el7.src.rpm">
					<filename>hdf5-0:1.14.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="hdf5-devel" epoch="0" version="1.14.4" release="1.el7" arch="x86_64" src="hdf5-1.14.4-1.el7.src.rpm">
					<filename>hdf5-devel-0:1.14.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="hdf5-mpich" epoch="0" version="1.14.4" release="1.el7" arch="x86_64" src="hdf5-1.14.4-1.el7.src.rpm">
					<filename>hdf5-mpich-0:1.14.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="hdf5-mpich-devel" epoch="0" version="1.14.4" release="1.el7" arch="x86_64" src="hdf5-1.14.4-1.el7.src.rpm">
					<filename>hdf5-mpich-devel-0:1.14.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="hdf5-mpich-static" epoch="0" version="1.14.4" release="1.el7" arch="x86_64" src="hdf5-1.14.4-1.el7.src.rpm">
					<filename>hdf5-mpich-static-0:1.14.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="hdf5-openmpi" epoch="0" version="1.14.4" release="1.el7" arch="x86_64" src="hdf5-1.14.4-1.el7.src.rpm">
					<filename>hdf5-openmpi-0:1.14.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="hdf5-openmpi-devel" epoch="0" version="1.14.4" release="1.el7" arch="x86_64" src="hdf5-1.14.4-1.el7.src.rpm">
					<filename>hdf5-openmpi-devel-0:1.14.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="hdf5-openmpi-static" epoch="0" version="1.14.4" release="1.el7" arch="x86_64" src="hdf5-1.14.4-1.el7.src.rpm">
					<filename>hdf5-openmpi-static-0:1.14.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="hdf5-static" epoch="0" version="1.14.4" release="1.el7" arch="x86_64" src="hdf5-1.14.4-1.el7.src.rpm">
					<filename>hdf5-static-0:1.14.4-1.el7.x86_64.rpm</filename>
				</package>
				<package name="java-hdf5" epoch="0" version="1.14.4" release="1.el7" arch="x86_64" src="hdf5-1.14.4-1.el7.src.rpm">
					<filename>java-hdf5-0:1.14.4-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260512-73-0012</id>
		<issued date="2026-05-12" />
		<updated date="2026-05-12" />
		<title>Уязвимость python-tornado </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-tornado</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-tornado-cve-2026-35536-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-tornado
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-tornado-cve-2026-35536-7.3/" type="self" id="ROS-20260512-73-0012" title="ROS-20260512-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-35536" type="cve" id="CVE-2026-35536" title="CVE-2026-35536" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python-tornado-doc" epoch="0" version="6.3.3" release="5.el7" arch="x86_64" src="python-tornado-6.3.3-5.el7.src.rpm">
					<filename>python-tornado-doc-0:6.3.3-5.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-tornado" epoch="0" version="6.3.3" release="5.el7" arch="x86_64" src="python-tornado-6.3.3-5.el7.src.rpm">
					<filename>python3-tornado-0:6.3.3-5.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260512-73-0013</id>
		<issued date="2026-05-12" />
		<updated date="2026-05-12" />
		<title>Уязвимость VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2026-21982-7.3/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2026-21982-7.3/" type="self" id="ROS-20260512-73-0013" title="ROS-20260512-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21982" type="cve" id="CVE-2026-21982" title="CVE-2026-21982" />
			<reference href="https://bdu.fstec.ru/vul/2026-00724" type="self" id="BDU:2026-00724" title="BDU:2026-00724" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-devel" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-devel-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-server" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-server-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-vnc" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-vnc-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-webservice" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-webservice-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-VirtualBox" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>python3-VirtualBox-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmodsrc" epoch="0" version="7.1.16" release="1.el7" arch="noarch" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-kmodsrc-0:7.1.16-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260512-73-0014</id>
		<issued date="2026-05-12" />
		<updated date="2026-05-12" />
		<title>Уязвимость virtualbox-guest-additions </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в virtualbox-guest-additions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2026-21982-7.3/</description>
               <solution>Установить обновление для пакета(ов) virtualbox-guest-additions
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2026-21982-7.3/" type="self" id="ROS-20260512-73-0014" title="ROS-20260512-73-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21982" type="cve" id="CVE-2026-21982" title="CVE-2026-21982" />
			<reference href="https://bdu.fstec.ru/vul/2026-00724" type="self" id="BDU:2026-00724" title="BDU:2026-00724" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="virtualbox-guest-additions" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="virtualbox-guest-additions-7.1.16-1.el7.src.rpm">
					<filename>virtualbox-guest-additions-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260512-73-0015</id>
		<issued date="2026-05-12" />
		<updated date="2026-05-12" />
		<title>Уязвимость VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2026-21984-7.3/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2026-21984-7.3/" type="self" id="ROS-20260512-73-0015" title="ROS-20260512-73-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21984" type="cve" id="CVE-2026-21984" title="CVE-2026-21984" />
			<reference href="https://bdu.fstec.ru/vul/2026-00843" type="self" id="BDU:2026-00843" title="BDU:2026-00843" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-devel" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-devel-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-server" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-server-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-vnc" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-vnc-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-webservice" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-webservice-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-VirtualBox" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>python3-VirtualBox-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmodsrc" epoch="0" version="7.1.16" release="1.el7" arch="noarch" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-kmodsrc-0:7.1.16-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260512-73-0016</id>
		<issued date="2026-05-12" />
		<updated date="2026-05-12" />
		<title>Уязвимость virtualbox-guest-additions </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в virtualbox-guest-additions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2026-21984-7.3/</description>
               <solution>Установить обновление для пакета(ов) virtualbox-guest-additions
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2026-21984-7.3/" type="self" id="ROS-20260512-73-0016" title="ROS-20260512-73-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21984" type="cve" id="CVE-2026-21984" title="CVE-2026-21984" />
			<reference href="https://bdu.fstec.ru/vul/2026-00843" type="self" id="BDU:2026-00843" title="BDU:2026-00843" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="virtualbox-guest-additions" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="virtualbox-guest-additions-7.1.16-1.el7.src.rpm">
					<filename>virtualbox-guest-additions-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260512-73-0017</id>
		<issued date="2026-05-12" />
		<updated date="2026-05-12" />
		<title>Уязвимость VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2026-21957-7.3/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2026-21957-7.3/" type="self" id="ROS-20260512-73-0017" title="ROS-20260512-73-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21957" type="cve" id="CVE-2026-21957" title="CVE-2026-21957" />
			<reference href="https://bdu.fstec.ru/vul/2026-00723" type="self" id="BDU:2026-00723" title="BDU:2026-00723" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-devel" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-devel-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-server" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-server-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-vnc" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-vnc-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-webservice" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-webservice-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-VirtualBox" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>python3-VirtualBox-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmodsrc" epoch="0" version="7.1.16" release="1.el7" arch="noarch" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-kmodsrc-0:7.1.16-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260512-73-0018</id>
		<issued date="2026-05-12" />
		<updated date="2026-05-12" />
		<title>Уязвимость virtualbox-guest-additions </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в virtualbox-guest-additions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2026-21957-7.3/</description>
               <solution>Установить обновление для пакета(ов) virtualbox-guest-additions
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2026-21957-7.3/" type="self" id="ROS-20260512-73-0018" title="ROS-20260512-73-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21957" type="cve" id="CVE-2026-21957" title="CVE-2026-21957" />
			<reference href="https://bdu.fstec.ru/vul/2026-00723" type="self" id="BDU:2026-00723" title="BDU:2026-00723" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="virtualbox-guest-additions" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="virtualbox-guest-additions-7.1.16-1.el7.src.rpm">
					<filename>virtualbox-guest-additions-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260512-73-0019</id>
		<issued date="2026-05-12" />
		<updated date="2026-05-12" />
		<title>Уязвимость VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2026-21983-7.3/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2026-21983-7.3/" type="self" id="ROS-20260512-73-0019" title="ROS-20260512-73-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21983" type="cve" id="CVE-2026-21983" title="CVE-2026-21983" />
			<reference href="https://bdu.fstec.ru/vul/2026-00842" type="self" id="BDU:2026-00842" title="BDU:2026-00842" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-devel" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-devel-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-server" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-server-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-vnc" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-vnc-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-webservice" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-webservice-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-VirtualBox" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>python3-VirtualBox-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmodsrc" epoch="0" version="7.1.16" release="1.el7" arch="noarch" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-kmodsrc-0:7.1.16-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260512-73-0020</id>
		<issued date="2026-05-12" />
		<updated date="2026-05-12" />
		<title>Уязвимость virtualbox-guest-additions </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в virtualbox-guest-additions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2026-21983-7.3/</description>
               <solution>Установить обновление для пакета(ов) virtualbox-guest-additions
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2026-21983-7.3/" type="self" id="ROS-20260512-73-0020" title="ROS-20260512-73-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21983" type="cve" id="CVE-2026-21983" title="CVE-2026-21983" />
			<reference href="https://bdu.fstec.ru/vul/2026-00842" type="self" id="BDU:2026-00842" title="BDU:2026-00842" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="virtualbox-guest-additions" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="virtualbox-guest-additions-7.1.16-1.el7.src.rpm">
					<filename>virtualbox-guest-additions-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260512-73-0021</id>
		<issued date="2026-05-12" />
		<updated date="2026-05-12" />
		<title>Уязвимость VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2026-21989-7.3/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2026-21989-7.3/" type="self" id="ROS-20260512-73-0021" title="ROS-20260512-73-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21989" type="cve" id="CVE-2026-21989" title="CVE-2026-21989" />
			<reference href="https://bdu.fstec.ru/vul/2026-00720" type="self" id="BDU:2026-00720" title="BDU:2026-00720" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-devel" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-devel-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-server" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-server-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-vnc" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-vnc-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-webservice" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-webservice-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-VirtualBox" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>python3-VirtualBox-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmodsrc" epoch="0" version="7.1.16" release="1.el7" arch="noarch" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-kmodsrc-0:7.1.16-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260512-73-0022</id>
		<issued date="2026-05-12" />
		<updated date="2026-05-12" />
		<title>Уязвимость virtualbox-guest-additions </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в virtualbox-guest-additions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2026-21989-7.3/</description>
               <solution>Установить обновление для пакета(ов) virtualbox-guest-additions
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2026-21989-7.3/" type="self" id="ROS-20260512-73-0022" title="ROS-20260512-73-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21989" type="cve" id="CVE-2026-21989" title="CVE-2026-21989" />
			<reference href="https://bdu.fstec.ru/vul/2026-00720" type="self" id="BDU:2026-00720" title="BDU:2026-00720" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="virtualbox-guest-additions" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="virtualbox-guest-additions-7.1.16-1.el7.src.rpm">
					<filename>virtualbox-guest-additions-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260512-73-0023</id>
		<issued date="2026-05-12" />
		<updated date="2026-05-12" />
		<title>Уязвимость VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2026-21990-7.3/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2026-21990-7.3/" type="self" id="ROS-20260512-73-0023" title="ROS-20260512-73-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21990" type="cve" id="CVE-2026-21990" title="CVE-2026-21990" />
			<reference href="https://bdu.fstec.ru/vul/2026-00839" type="self" id="BDU:2026-00839" title="BDU:2026-00839" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-devel" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-devel-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-server" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-server-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-vnc" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-vnc-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-webservice" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-webservice-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-VirtualBox" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>python3-VirtualBox-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmodsrc" epoch="0" version="7.1.16" release="1.el7" arch="noarch" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-kmodsrc-0:7.1.16-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260512-73-0024</id>
		<issued date="2026-05-12" />
		<updated date="2026-05-12" />
		<title>Уязвимость virtualbox-guest-additions </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в virtualbox-guest-additions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2026-21990-7.3/</description>
               <solution>Установить обновление для пакета(ов) virtualbox-guest-additions
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2026-21990-7.3/" type="self" id="ROS-20260512-73-0024" title="ROS-20260512-73-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21990" type="cve" id="CVE-2026-21990" title="CVE-2026-21990" />
			<reference href="https://bdu.fstec.ru/vul/2026-00839" type="self" id="BDU:2026-00839" title="BDU:2026-00839" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="virtualbox-guest-additions" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="virtualbox-guest-additions-7.1.16-1.el7.src.rpm">
					<filename>virtualbox-guest-additions-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260512-73-0025</id>
		<issued date="2026-05-12" />
		<updated date="2026-05-12" />
		<title>Уязвимость VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2026-21988-7.3/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2026-21988-7.3/" type="self" id="ROS-20260512-73-0025" title="ROS-20260512-73-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21988" type="cve" id="CVE-2026-21988" title="CVE-2026-21988" />
			<reference href="https://bdu.fstec.ru/vul/2026-00785" type="self" id="BDU:2026-00785" title="BDU:2026-00785" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-devel" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-devel-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-server" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-server-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-vnc" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-vnc-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-webservice" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-webservice-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-VirtualBox" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>python3-VirtualBox-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmodsrc" epoch="0" version="7.1.16" release="1.el7" arch="noarch" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-kmodsrc-0:7.1.16-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260512-73-0026</id>
		<issued date="2026-05-12" />
		<updated date="2026-05-12" />
		<title>Уязвимость virtualbox-guest-additions </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в virtualbox-guest-additions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2026-21988-7.3/</description>
               <solution>Установить обновление для пакета(ов) virtualbox-guest-additions
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2026-21988-7.3/" type="self" id="ROS-20260512-73-0026" title="ROS-20260512-73-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21988" type="cve" id="CVE-2026-21988" title="CVE-2026-21988" />
			<reference href="https://bdu.fstec.ru/vul/2026-00785" type="self" id="BDU:2026-00785" title="BDU:2026-00785" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="virtualbox-guest-additions" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="virtualbox-guest-additions-7.1.16-1.el7.src.rpm">
					<filename>virtualbox-guest-additions-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260512-73-0027</id>
		<issued date="2026-05-12" />
		<updated date="2026-05-12" />
		<title>Уязвимость VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2026-21987-7.3/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2026-21987-7.3/" type="self" id="ROS-20260512-73-0027" title="ROS-20260512-73-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21987" type="cve" id="CVE-2026-21987" title="CVE-2026-21987" />
			<reference href="https://bdu.fstec.ru/vul/2026-00845" type="self" id="BDU:2026-00845" title="BDU:2026-00845" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-devel" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-devel-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-server" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-server-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-vnc" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-vnc-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-webservice" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-webservice-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-VirtualBox" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>python3-VirtualBox-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmodsrc" epoch="0" version="7.1.16" release="1.el7" arch="noarch" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-kmodsrc-0:7.1.16-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260512-73-0028</id>
		<issued date="2026-05-12" />
		<updated date="2026-05-12" />
		<title>Уязвимость virtualbox-guest-additions </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в virtualbox-guest-additions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2026-21987-7.3/</description>
               <solution>Установить обновление для пакета(ов) virtualbox-guest-additions
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2026-21987-7.3/" type="self" id="ROS-20260512-73-0028" title="ROS-20260512-73-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21987" type="cve" id="CVE-2026-21987" title="CVE-2026-21987" />
			<reference href="https://bdu.fstec.ru/vul/2026-00845" type="self" id="BDU:2026-00845" title="BDU:2026-00845" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="virtualbox-guest-additions" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="virtualbox-guest-additions-7.1.16-1.el7.src.rpm">
					<filename>virtualbox-guest-additions-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260512-73-0029</id>
		<issued date="2026-05-12" />
		<updated date="2026-05-12" />
		<title>Уязвимость VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2026-21956-7.3/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2026-21956-7.3/" type="self" id="ROS-20260512-73-0029" title="ROS-20260512-73-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21956" type="cve" id="CVE-2026-21956" title="CVE-2026-21956" />
			<reference href="https://bdu.fstec.ru/vul/2026-00840" type="self" id="BDU:2026-00840" title="BDU:2026-00840" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-devel" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-devel-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-server" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-server-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-vnc" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-vnc-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-webservice" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-webservice-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-VirtualBox" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>python3-VirtualBox-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmodsrc" epoch="0" version="7.1.16" release="1.el7" arch="noarch" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-kmodsrc-0:7.1.16-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260512-73-0030</id>
		<issued date="2026-05-12" />
		<updated date="2026-05-12" />
		<title>Уязвимость virtualbox-guest-additions </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в virtualbox-guest-additions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2026-21956-7.3/</description>
               <solution>Установить обновление для пакета(ов) virtualbox-guest-additions
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2026-21956-7.3/" type="self" id="ROS-20260512-73-0030" title="ROS-20260512-73-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21956" type="cve" id="CVE-2026-21956" title="CVE-2026-21956" />
			<reference href="https://bdu.fstec.ru/vul/2026-00840" type="self" id="BDU:2026-00840" title="BDU:2026-00840" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="virtualbox-guest-additions" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="virtualbox-guest-additions-7.1.16-1.el7.src.rpm">
					<filename>virtualbox-guest-additions-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260512-73-0031</id>
		<issued date="2026-05-12" />
		<updated date="2026-05-12" />
		<title>Уязвимость virtualbox-guest-additions </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в virtualbox-guest-additions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2026-21955-7.3/</description>
               <solution>Установить обновление для пакета(ов) virtualbox-guest-additions
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-guest-additions-cve-2026-21955-7.3/" type="self" id="ROS-20260512-73-0031" title="ROS-20260512-73-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21955" type="cve" id="CVE-2026-21955" title="CVE-2026-21955" />
			<reference href="https://bdu.fstec.ru/vul/2026-00844" type="self" id="BDU:2026-00844" title="BDU:2026-00844" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="virtualbox-guest-additions" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="virtualbox-guest-additions-7.1.16-1.el7.src.rpm">
					<filename>virtualbox-guest-additions-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260512-73-0032</id>
		<issued date="2026-05-12" />
		<updated date="2026-05-12" />
		<title>Уязвимость VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2026-21955-7.3/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-virtualbox-cve-2026-21955-7.3/" type="self" id="ROS-20260512-73-0032" title="ROS-20260512-73-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21955" type="cve" id="CVE-2026-21955" title="CVE-2026-21955" />
			<reference href="https://bdu.fstec.ru/vul/2026-00844" type="self" id="BDU:2026-00844" title="BDU:2026-00844" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="VirtualBox" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-devel" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-devel-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-server" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-server-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-vnc" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-vnc-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-webservice" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-webservice-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="python3-VirtualBox" epoch="0" version="7.1.16" release="1.el7" arch="x86_64" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>python3-VirtualBox-0:7.1.16-1.el7.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmodsrc" epoch="0" version="7.1.16" release="1.el7" arch="noarch" src="VirtualBox-7.1.16-1.el7.src.rpm">
					<filename>VirtualBox-kmodsrc-0:7.1.16-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260512-73-0033</id>
		<issued date="2026-05-12" />
		<updated date="2026-05-12" />
		<title>Уязвимость ruby </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в ruby</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ruby-cve-2025-61594-7.3/</description>
               <solution>Установить обновление для пакета(ов) ruby
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-ruby-cve-2025-61594-7.3/" type="self" id="ROS-20260512-73-0033" title="ROS-20260512-73-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61594" type="cve" id="CVE-2025-61594" title="CVE-2025-61594" />
			<reference href="https://bdu.fstec.ru/vul/2026-06689" type="self" id="BDU:2026-06689" title="BDU:2026-06689" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="ruby" epoch="0" version="2.7.6" release="139.el7" arch="x86_64" src="ruby-2.7.6-139.el7.src.rpm">
					<filename>ruby-0:2.7.6-139.el7.x86_64.rpm</filename>
				</package>
				<package name="ruby-devel" epoch="0" version="2.7.6" release="139.el7" arch="x86_64" src="ruby-2.7.6-139.el7.src.rpm">
					<filename>ruby-devel-0:2.7.6-139.el7.x86_64.rpm</filename>
				</package>
				<package name="ruby-libs" epoch="0" version="2.7.6" release="139.el7" arch="x86_64" src="ruby-2.7.6-139.el7.src.rpm">
					<filename>ruby-libs-0:2.7.6-139.el7.x86_64.rpm</filename>
				</package>
				<package name="rubygem-bigdecimal" epoch="0" version="2.0.0" release="139.el7" arch="x86_64" src="ruby-2.7.6-139.el7.src.rpm">
					<filename>rubygem-bigdecimal-0:2.0.0-139.el7.x86_64.rpm</filename>
				</package>
				<package name="rubygem-io-console" epoch="0" version="0.5.6" release="139.el7" arch="x86_64" src="ruby-2.7.6-139.el7.src.rpm">
					<filename>rubygem-io-console-0:0.5.6-139.el7.x86_64.rpm</filename>
				</package>
				<package name="rubygem-json" epoch="0" version="2.3.0" release="139.el7" arch="x86_64" src="ruby-2.7.6-139.el7.src.rpm">
					<filename>rubygem-json-0:2.3.0-139.el7.x86_64.rpm</filename>
				</package>
				<package name="rubygem-openssl" epoch="0" version="3.3.0" release="139.el7" arch="x86_64" src="ruby-2.7.6-139.el7.src.rpm">
					<filename>rubygem-openssl-0:3.3.0-139.el7.x86_64.rpm</filename>
				</package>
				<package name="rubygem-psych" epoch="0" version="3.1.0" release="139.el7" arch="x86_64" src="ruby-2.7.6-139.el7.src.rpm">
					<filename>rubygem-psych-0:3.1.0-139.el7.x86_64.rpm</filename>
				</package>
				<package name="ruby-default-gems" epoch="0" version="2.7.6" release="139.el7" arch="noarch" src="ruby-2.7.6-139.el7.src.rpm">
					<filename>ruby-default-gems-0:2.7.6-139.el7.noarch.rpm</filename>
				</package>
				<package name="ruby-doc" epoch="0" version="2.7.6" release="139.el7" arch="noarch" src="ruby-2.7.6-139.el7.src.rpm">
					<filename>ruby-doc-0:2.7.6-139.el7.noarch.rpm</filename>
				</package>
				<package name="rubygem-bundler" epoch="0" version="2.2.24" release="139.el7" arch="noarch" src="ruby-2.7.6-139.el7.src.rpm">
					<filename>rubygem-bundler-0:2.2.24-139.el7.noarch.rpm</filename>
				</package>
				<package name="rubygem-irb" epoch="0" version="1.2.6" release="139.el7" arch="noarch" src="ruby-2.7.6-139.el7.src.rpm">
					<filename>rubygem-irb-0:1.2.6-139.el7.noarch.rpm</filename>
				</package>
				<package name="rubygem-minitest" epoch="0" version="5.13.0" release="139.el7" arch="noarch" src="ruby-2.7.6-139.el7.src.rpm">
					<filename>rubygem-minitest-0:5.13.0-139.el7.noarch.rpm</filename>
				</package>
				<package name="rubygem-net-telnet" epoch="0" version="0.2.0" release="139.el7" arch="noarch" src="ruby-2.7.6-139.el7.src.rpm">
					<filename>rubygem-net-telnet-0:0.2.0-139.el7.noarch.rpm</filename>
				</package>
				<package name="rubygem-power_assert" epoch="0" version="1.1.7" release="139.el7" arch="noarch" src="ruby-2.7.6-139.el7.src.rpm">
					<filename>rubygem-power_assert-0:1.1.7-139.el7.noarch.rpm</filename>
				</package>
				<package name="rubygem-rake" epoch="0" version="13.0.1" release="139.el7" arch="noarch" src="ruby-2.7.6-139.el7.src.rpm">
					<filename>rubygem-rake-0:13.0.1-139.el7.noarch.rpm</filename>
				</package>
				<package name="rubygem-rdoc" epoch="0" version="6.2.1.1" release="139.el7" arch="noarch" src="ruby-2.7.6-139.el7.src.rpm">
					<filename>rubygem-rdoc-0:6.2.1.1-139.el7.noarch.rpm</filename>
				</package>
				<package name="rubygem-test-unit" epoch="0" version="3.3.4" release="139.el7" arch="noarch" src="ruby-2.7.6-139.el7.src.rpm">
					<filename>rubygem-test-unit-0:3.3.4-139.el7.noarch.rpm</filename>
				</package>
				<package name="rubygem-xmlrpc" epoch="0" version="0.3.0" release="139.el7" arch="noarch" src="ruby-2.7.6-139.el7.src.rpm">
					<filename>rubygem-xmlrpc-0:0.3.0-139.el7.noarch.rpm</filename>
				</package>
				<package name="rubygems" epoch="0" version="3.1.6" release="139.el7" arch="noarch" src="ruby-2.7.6-139.el7.src.rpm">
					<filename>rubygems-0:3.1.6-139.el7.noarch.rpm</filename>
				</package>
				<package name="rubygems-devel" epoch="0" version="3.1.6" release="139.el7" arch="noarch" src="ruby-2.7.6-139.el7.src.rpm">
					<filename>rubygems-devel-0:3.1.6-139.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260512-73-0034</id>
		<issued date="2026-05-12" />
		<updated date="2026-05-12" />
		<title>Уязвимость c-ares </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в c-ares</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-c-ares-cve-2025-62408-7.3/</description>
               <solution>Установить обновление для пакета(ов) c-ares
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-c-ares-cve-2025-62408-7.3/" type="self" id="ROS-20260512-73-0034" title="ROS-20260512-73-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62408" type="cve" id="CVE-2025-62408" title="CVE-2025-62408" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="c-ares" epoch="0" version="1.34.6" release="1.el7" arch="x86_64" src="c-ares-1.34.6-1.el7.src.rpm">
					<filename>c-ares-0:1.34.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="c-ares-devel" epoch="0" version="1.34.6" release="1.el7" arch="x86_64" src="c-ares-1.34.6-1.el7.src.rpm">
					<filename>c-ares-devel-0:1.34.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="c-ares-tools" epoch="0" version="1.34.6" release="1.el7" arch="x86_64" src="c-ares-1.34.6-1.el7.src.rpm">
					<filename>c-ares-tools-0:1.34.6-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libcares" epoch="0" version="1.34.6" release="1.el7" arch="x86_64" src="c-ares-1.34.6-1.el7.src.rpm">
					<filename>libcares-0:1.34.6-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260513-73-0001</id>
		<issued date="2026-05-13" />
		<updated date="2026-05-13" />
		<title>Уязвимость rubygem-rack </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в rubygem-rack</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-rack-cve-2026-34831-7.3/</description>
               <solution>Установить обновление для пакета(ов) rubygem-rack
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-rack-cve-2026-34831-7.3/" type="self" id="ROS-20260513-73-0001" title="ROS-20260513-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34831" type="cve" id="CVE-2026-34831" title="CVE-2026-34831" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-rack" epoch="1" version="2.2.23" release="1.el7" arch="noarch" src="rubygem-rack-2.2.23-1.el7.src.rpm">
					<filename>rubygem-rack-1:2.2.23-1.el7.noarch.rpm</filename>
				</package>
				<package name="rubygem-rack-doc" epoch="1" version="2.2.23" release="1.el7" arch="noarch" src="rubygem-rack-2.2.23-1.el7.src.rpm">
					<filename>rubygem-rack-doc-1:2.2.23-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260513-73-0002</id>
		<issued date="2026-05-13" />
		<updated date="2026-05-13" />
		<title>Уязвимость rubygem-rack </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в rubygem-rack</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-rack-cve-2026-34830-7.3/</description>
               <solution>Установить обновление для пакета(ов) rubygem-rack
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-rack-cve-2026-34830-7.3/" type="self" id="ROS-20260513-73-0002" title="ROS-20260513-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34830" type="cve" id="CVE-2026-34830" title="CVE-2026-34830" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-rack" epoch="1" version="2.2.23" release="1.el7" arch="noarch" src="rubygem-rack-2.2.23-1.el7.src.rpm">
					<filename>rubygem-rack-1:2.2.23-1.el7.noarch.rpm</filename>
				</package>
				<package name="rubygem-rack-doc" epoch="1" version="2.2.23" release="1.el7" arch="noarch" src="rubygem-rack-2.2.23-1.el7.src.rpm">
					<filename>rubygem-rack-doc-1:2.2.23-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260513-73-0003</id>
		<issued date="2026-05-13" />
		<updated date="2026-05-13" />
		<title>Уязвимость rubygem-rack </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в rubygem-rack</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-rack-cve-2026-34829-7.3/</description>
               <solution>Установить обновление для пакета(ов) rubygem-rack
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-rack-cve-2026-34829-7.3/" type="self" id="ROS-20260513-73-0003" title="ROS-20260513-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34829" type="cve" id="CVE-2026-34829" title="CVE-2026-34829" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-rack" epoch="1" version="2.2.23" release="1.el7" arch="noarch" src="rubygem-rack-2.2.23-1.el7.src.rpm">
					<filename>rubygem-rack-1:2.2.23-1.el7.noarch.rpm</filename>
				</package>
				<package name="rubygem-rack-doc" epoch="1" version="2.2.23" release="1.el7" arch="noarch" src="rubygem-rack-2.2.23-1.el7.src.rpm">
					<filename>rubygem-rack-doc-1:2.2.23-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260513-73-0004</id>
		<issued date="2026-05-13" />
		<updated date="2026-05-13" />
		<title>Уязвимость rubygem-rack </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в rubygem-rack</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-rack-cve-2026-34763-7.3/</description>
               <solution>Установить обновление для пакета(ов) rubygem-rack
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-rack-cve-2026-34763-7.3/" type="self" id="ROS-20260513-73-0004" title="ROS-20260513-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34763" type="cve" id="CVE-2026-34763" title="CVE-2026-34763" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-rack" epoch="1" version="2.2.23" release="1.el7" arch="noarch" src="rubygem-rack-2.2.23-1.el7.src.rpm">
					<filename>rubygem-rack-1:2.2.23-1.el7.noarch.rpm</filename>
				</package>
				<package name="rubygem-rack-doc" epoch="1" version="2.2.23" release="1.el7" arch="noarch" src="rubygem-rack-2.2.23-1.el7.src.rpm">
					<filename>rubygem-rack-doc-1:2.2.23-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260513-73-0005</id>
		<issued date="2026-05-13" />
		<updated date="2026-05-13" />
		<title>Уязвимость rubygem-rack </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в rubygem-rack</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-rack-cve-2026-26961-7.3/</description>
               <solution>Установить обновление для пакета(ов) rubygem-rack
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-rack-cve-2026-26961-7.3/" type="self" id="ROS-20260513-73-0005" title="ROS-20260513-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26961" type="cve" id="CVE-2026-26961" title="CVE-2026-26961" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-rack" epoch="1" version="2.2.23" release="1.el7" arch="noarch" src="rubygem-rack-2.2.23-1.el7.src.rpm">
					<filename>rubygem-rack-1:2.2.23-1.el7.noarch.rpm</filename>
				</package>
				<package name="rubygem-rack-doc" epoch="1" version="2.2.23" release="1.el7" arch="noarch" src="rubygem-rack-2.2.23-1.el7.src.rpm">
					<filename>rubygem-rack-doc-1:2.2.23-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260513-73-0006</id>
		<issued date="2026-05-13" />
		<updated date="2026-05-13" />
		<title>Уязвимость rubygem-rack </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в rubygem-rack</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-rack-cve-2026-34230-7.3/</description>
               <solution>Установить обновление для пакета(ов) rubygem-rack
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-rack-cve-2026-34230-7.3/" type="self" id="ROS-20260513-73-0006" title="ROS-20260513-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34230" type="cve" id="CVE-2026-34230" title="CVE-2026-34230" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-rack" epoch="1" version="2.2.23" release="1.el7" arch="noarch" src="rubygem-rack-2.2.23-1.el7.src.rpm">
					<filename>rubygem-rack-1:2.2.23-1.el7.noarch.rpm</filename>
				</package>
				<package name="rubygem-rack-doc" epoch="1" version="2.2.23" release="1.el7" arch="noarch" src="rubygem-rack-2.2.23-1.el7.src.rpm">
					<filename>rubygem-rack-doc-1:2.2.23-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260513-73-0007</id>
		<issued date="2026-05-13" />
		<updated date="2026-05-13" />
		<title>Уязвимость rubygem-rack </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в rubygem-rack</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-rack-cve-2026-34826-7.3/</description>
               <solution>Установить обновление для пакета(ов) rubygem-rack
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-rack-cve-2026-34826-7.3/" type="self" id="ROS-20260513-73-0007" title="ROS-20260513-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34826" type="cve" id="CVE-2026-34826" title="CVE-2026-34826" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-rack" epoch="1" version="2.2.23" release="1.el7" arch="noarch" src="rubygem-rack-2.2.23-1.el7.src.rpm">
					<filename>rubygem-rack-1:2.2.23-1.el7.noarch.rpm</filename>
				</package>
				<package name="rubygem-rack-doc" epoch="1" version="2.2.23" release="1.el7" arch="noarch" src="rubygem-rack-2.2.23-1.el7.src.rpm">
					<filename>rubygem-rack-doc-1:2.2.23-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260513-73-0008</id>
		<issued date="2026-05-13" />
		<updated date="2026-05-13" />
		<title>Уязвимость rubygem-rack </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в rubygem-rack</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-rack-cve-2026-34785-7.3/</description>
               <solution>Установить обновление для пакета(ов) rubygem-rack
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-rack-cve-2026-34785-7.3/" type="self" id="ROS-20260513-73-0008" title="ROS-20260513-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34785" type="cve" id="CVE-2026-34785" title="CVE-2026-34785" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-rack" epoch="1" version="2.2.23" release="1.el7" arch="noarch" src="rubygem-rack-2.2.23-1.el7.src.rpm">
					<filename>rubygem-rack-1:2.2.23-1.el7.noarch.rpm</filename>
				</package>
				<package name="rubygem-rack-doc" epoch="1" version="2.2.23" release="1.el7" arch="noarch" src="rubygem-rack-2.2.23-1.el7.src.rpm">
					<filename>rubygem-rack-doc-1:2.2.23-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260513-73-0009</id>
		<issued date="2026-05-13" />
		<updated date="2026-05-13" />
		<title>Уязвимость rubygem-rack </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в rubygem-rack</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-rack-cve-2026-34786-7.3/</description>
               <solution>Установить обновление для пакета(ов) rubygem-rack
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-rubygem-rack-cve-2026-34786-7.3/" type="self" id="ROS-20260513-73-0009" title="ROS-20260513-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34786" type="cve" id="CVE-2026-34786" title="CVE-2026-34786" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="rubygem-rack" epoch="1" version="2.2.23" release="1.el7" arch="noarch" src="rubygem-rack-2.2.23-1.el7.src.rpm">
					<filename>rubygem-rack-1:2.2.23-1.el7.noarch.rpm</filename>
				</package>
				<package name="rubygem-rack-doc" epoch="1" version="2.2.23" release="1.el7" arch="noarch" src="rubygem-rack-2.2.23-1.el7.src.rpm">
					<filename>rubygem-rack-doc-1:2.2.23-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260513-73-0010</id>
		<issued date="2026-05-13" />
		<updated date="2026-05-13" />
		<title>Уязвимость python-django </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-django</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-django-cve-2026-25673-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-django
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-django-cve-2026-25673-7.3/" type="self" id="ROS-20260513-73-0010" title="ROS-20260513-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25673" type="cve" id="CVE-2026-25673" title="CVE-2026-25673" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python-django-bash-completion" epoch="0" version="4.2.30" release="1.el7" arch="noarch" src="python-django-4.2.30-1.el7.src.rpm">
					<filename>python-django-bash-completion-0:4.2.30-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-django" epoch="0" version="4.2.30" release="1.el7" arch="noarch" src="python-django-4.2.30-1.el7.src.rpm">
					<filename>python3-django-0:4.2.30-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-django-doc" epoch="0" version="4.2.30" release="1.el7" arch="noarch" src="python-django-4.2.30-1.el7.src.rpm">
					<filename>python3-django-doc-0:4.2.30-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260513-73-0011</id>
		<issued date="2026-05-13" />
		<updated date="2026-05-13" />
		<title>Уязвимость python-django </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в python-django</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-django-cve-2026-25674-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-django
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-django-cve-2026-25674-7.3/" type="self" id="ROS-20260513-73-0011" title="ROS-20260513-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25674" type="cve" id="CVE-2026-25674" title="CVE-2026-25674" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python-django-bash-completion" epoch="0" version="4.2.30" release="1.el7" arch="noarch" src="python-django-4.2.30-1.el7.src.rpm">
					<filename>python-django-bash-completion-0:4.2.30-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-django" epoch="0" version="4.2.30" release="1.el7" arch="noarch" src="python-django-4.2.30-1.el7.src.rpm">
					<filename>python3-django-0:4.2.30-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-django-doc" epoch="0" version="4.2.30" release="1.el7" arch="noarch" src="python-django-4.2.30-1.el7.src.rpm">
					<filename>python3-django-doc-0:4.2.30-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260513-73-0012</id>
		<issued date="2026-05-13" />
		<updated date="2026-05-13" />
		<title>Уязвимость python-django </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-django</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-django-cve-2026-3902-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-django
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-django-cve-2026-3902-7.3/" type="self" id="ROS-20260513-73-0012" title="ROS-20260513-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3902" type="cve" id="CVE-2026-3902" title="CVE-2026-3902" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python-django-bash-completion" epoch="0" version="4.2.30" release="1.el7" arch="noarch" src="python-django-4.2.30-1.el7.src.rpm">
					<filename>python-django-bash-completion-0:4.2.30-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-django" epoch="0" version="4.2.30" release="1.el7" arch="noarch" src="python-django-4.2.30-1.el7.src.rpm">
					<filename>python3-django-0:4.2.30-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-django-doc" epoch="0" version="4.2.30" release="1.el7" arch="noarch" src="python-django-4.2.30-1.el7.src.rpm">
					<filename>python3-django-doc-0:4.2.30-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260513-73-0013</id>
		<issued date="2026-05-13" />
		<updated date="2026-05-13" />
		<title>Уязвимость python-django </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в python-django</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-django-cve-2026-4277-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-django
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-django-cve-2026-4277-7.3/" type="self" id="ROS-20260513-73-0013" title="ROS-20260513-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4277" type="cve" id="CVE-2026-4277" title="CVE-2026-4277" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python-django-bash-completion" epoch="0" version="4.2.30" release="1.el7" arch="noarch" src="python-django-4.2.30-1.el7.src.rpm">
					<filename>python-django-bash-completion-0:4.2.30-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-django" epoch="0" version="4.2.30" release="1.el7" arch="noarch" src="python-django-4.2.30-1.el7.src.rpm">
					<filename>python3-django-0:4.2.30-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-django-doc" epoch="0" version="4.2.30" release="1.el7" arch="noarch" src="python-django-4.2.30-1.el7.src.rpm">
					<filename>python3-django-doc-0:4.2.30-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260513-73-0014</id>
		<issued date="2026-05-13" />
		<updated date="2026-05-13" />
		<title>Уязвимость python-django </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в python-django</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-django-cve-2026-4292-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-django
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-django-cve-2026-4292-7.3/" type="self" id="ROS-20260513-73-0014" title="ROS-20260513-73-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4292" type="cve" id="CVE-2026-4292" title="CVE-2026-4292" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python-django-bash-completion" epoch="0" version="4.2.30" release="1.el7" arch="noarch" src="python-django-4.2.30-1.el7.src.rpm">
					<filename>python-django-bash-completion-0:4.2.30-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-django" epoch="0" version="4.2.30" release="1.el7" arch="noarch" src="python-django-4.2.30-1.el7.src.rpm">
					<filename>python3-django-0:4.2.30-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-django-doc" epoch="0" version="4.2.30" release="1.el7" arch="noarch" src="python-django-4.2.30-1.el7.src.rpm">
					<filename>python3-django-doc-0:4.2.30-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260513-73-0015</id>
		<issued date="2026-05-13" />
		<updated date="2026-05-13" />
		<title>Уязвимость python-django </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-django</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-django-cve-2026-33034-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-django
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-django-cve-2026-33034-7.3/" type="self" id="ROS-20260513-73-0015" title="ROS-20260513-73-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33034" type="cve" id="CVE-2026-33034" title="CVE-2026-33034" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python-django-bash-completion" epoch="0" version="4.2.30" release="1.el7" arch="noarch" src="python-django-4.2.30-1.el7.src.rpm">
					<filename>python-django-bash-completion-0:4.2.30-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-django" epoch="0" version="4.2.30" release="1.el7" arch="noarch" src="python-django-4.2.30-1.el7.src.rpm">
					<filename>python3-django-0:4.2.30-1.el7.noarch.rpm</filename>
				</package>
				<package name="python3-django-doc" epoch="0" version="4.2.30" release="1.el7" arch="noarch" src="python-django-4.2.30-1.el7.src.rpm">
					<filename>python3-django-doc-0:4.2.30-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260513-73-0016</id>
		<issued date="2026-05-13" />
		<updated date="2026-05-13" />
		<title>Уязвимость python-requests </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-requests</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-requests-cve-2026-25645-7.3/</description>
               <solution>Установить обновление для пакета(ов) python-requests
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python-requests-cve-2026-25645-7.3/" type="self" id="ROS-20260513-73-0016" title="ROS-20260513-73-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25645" type="cve" id="CVE-2026-25645" title="CVE-2026-25645" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python3-requests" epoch="0" version="2.26.0" release="9.el7" arch="noarch" src="python-requests-2.26.0-9.el7.src.rpm">
					<filename>python3-requests-0:2.26.0-9.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260513-73-0017</id>
		<issued date="2026-05-13" />
		<updated date="2026-05-13" />
		<title>Уязвимость python2-requests </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python2-requests</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python2-requests-cve-2026-25645-7.3/</description>
               <solution>Установить обновление для пакета(ов) python2-requests
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python2-requests-cve-2026-25645-7.3/" type="self" id="ROS-20260513-73-0017" title="ROS-20260513-73-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25645" type="cve" id="CVE-2026-25645" title="CVE-2026-25645" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="python2-requests" epoch="0" version="2.26.0" release="9.el7" arch="noarch" src="python2-requests-2.26.0-9.el7.src.rpm">
					<filename>python2-requests-0:2.26.0-9.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260513-73-0018</id>
		<issued date="2026-05-13" />
		<updated date="2026-05-13" />
		<title>Уязвимость lxd </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в lxd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-lxd-cve-2026-34178-7.3/</description>
               <solution>Установить обновление для пакета(ов) lxd
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-lxd-cve-2026-34178-7.3/" type="self" id="ROS-20260513-73-0018" title="ROS-20260513-73-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34178" type="cve" id="CVE-2026-34178" title="CVE-2026-34178" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="lxd" epoch="0" version="6.8" release="1.el7" arch="x86_64" src="lxd-6.8-1.el7.src.rpm">
					<filename>lxd-0:6.8-1.el7.x86_64.rpm</filename>
				</package>
				<package name="lxd-fish-completion" epoch="0" version="6.8" release="1.el7" arch="noarch" src="lxd-6.8-1.el7.src.rpm">
					<filename>lxd-fish-completion-0:6.8-1.el7.noarch.rpm</filename>
				</package>
				<package name="lxd-zsh-completion" epoch="0" version="6.8" release="1.el7" arch="noarch" src="lxd-6.8-1.el7.src.rpm">
					<filename>lxd-zsh-completion-0:6.8-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260513-73-0019</id>
		<issued date="2026-05-13" />
		<updated date="2026-05-13" />
		<title>Уязвимость lxd </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в lxd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-lxd-cve-2026-34179-7.3/</description>
               <solution>Установить обновление для пакета(ов) lxd
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-lxd-cve-2026-34179-7.3/" type="self" id="ROS-20260513-73-0019" title="ROS-20260513-73-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34179" type="cve" id="CVE-2026-34179" title="CVE-2026-34179" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="lxd" epoch="0" version="6.8" release="1.el7" arch="x86_64" src="lxd-6.8-1.el7.src.rpm">
					<filename>lxd-0:6.8-1.el7.x86_64.rpm</filename>
				</package>
				<package name="lxd-fish-completion" epoch="0" version="6.8" release="1.el7" arch="noarch" src="lxd-6.8-1.el7.src.rpm">
					<filename>lxd-fish-completion-0:6.8-1.el7.noarch.rpm</filename>
				</package>
				<package name="lxd-zsh-completion" epoch="0" version="6.8" release="1.el7" arch="noarch" src="lxd-6.8-1.el7.src.rpm">
					<filename>lxd-zsh-completion-0:6.8-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260513-73-0020</id>
		<issued date="2026-05-13" />
		<updated date="2026-05-13" />
		<title>Уязвимость lxd </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в lxd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-lxd-cve-2026-34177-7.3/</description>
               <solution>Установить обновление для пакета(ов) lxd
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-lxd-cve-2026-34177-7.3/" type="self" id="ROS-20260513-73-0020" title="ROS-20260513-73-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34177" type="cve" id="CVE-2026-34177" title="CVE-2026-34177" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="lxd" epoch="0" version="6.8" release="1.el7" arch="x86_64" src="lxd-6.8-1.el7.src.rpm">
					<filename>lxd-0:6.8-1.el7.x86_64.rpm</filename>
				</package>
				<package name="lxd-fish-completion" epoch="0" version="6.8" release="1.el7" arch="noarch" src="lxd-6.8-1.el7.src.rpm">
					<filename>lxd-fish-completion-0:6.8-1.el7.noarch.rpm</filename>
				</package>
				<package name="lxd-zsh-completion" epoch="0" version="6.8" release="1.el7" arch="noarch" src="lxd-6.8-1.el7.src.rpm">
					<filename>lxd-zsh-completion-0:6.8-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260514-73-0001</id>
		<issued date="2026-05-14" />
		<updated date="2026-05-14" />
		<title>Уязвимость php </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в php</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-cve-2025-14177-7.3/</description>
               <solution>Установить обновление для пакета(ов) php
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-cve-2025-14177-7.3/" type="self" id="ROS-20260514-73-0001" title="ROS-20260514-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14177" type="cve" id="CVE-2025-14177" title="CVE-2025-14177" />
			<reference href="https://bdu.fstec.ru/vul/2026-02748" type="self" id="BDU:2026-02748" title="BDU:2026-02748" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-bcmath" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-bcmath-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-cli" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-cli-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-common" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-common-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-dba" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-dba-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-dbg" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-dbg-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-devel" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-devel-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-embedded" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-embedded-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-enchant" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-enchant-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-ffi" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-ffi-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-fpm" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-fpm-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-gd" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-gd-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-gmp" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-gmp-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-imap" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-imap-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-intl" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-intl-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-ldap" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-ldap-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-mbstring" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-mbstring-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-mysqlnd" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-mysqlnd-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-odbc" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-odbc-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-opcache" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-opcache-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-pdo" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-pdo-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-pdo-dblib" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-pdo-dblib-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-pdo-firebird" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-pdo-firebird-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-pgsql" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-pgsql-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-process" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-process-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-pspell" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-pspell-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-snmp" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-snmp-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-soap" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-soap-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-sodium" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-sodium-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-tidy" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-tidy-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-xml" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-xml-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260514-73-0002</id>
		<issued date="2026-05-14" />
		<updated date="2026-05-14" />
		<title>Уязвимость php </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в php</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-cve-2025-14178-7.3/</description>
               <solution>Установить обновление для пакета(ов) php
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-cve-2025-14178-7.3/" type="self" id="ROS-20260514-73-0002" title="ROS-20260514-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14178" type="cve" id="CVE-2025-14178" title="CVE-2025-14178" />
			<reference href="https://bdu.fstec.ru/vul/2026-02749" type="self" id="BDU:2026-02749" title="BDU:2026-02749" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-bcmath" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-bcmath-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-cli" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-cli-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-common" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-common-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-dba" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-dba-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-dbg" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-dbg-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-devel" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-devel-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-embedded" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-embedded-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-enchant" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-enchant-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-ffi" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-ffi-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-fpm" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-fpm-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-gd" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-gd-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-gmp" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-gmp-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-imap" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-imap-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-intl" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-intl-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-ldap" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-ldap-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-mbstring" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-mbstring-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-mysqlnd" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-mysqlnd-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-odbc" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-odbc-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-opcache" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-opcache-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-pdo" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-pdo-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-pdo-dblib" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-pdo-dblib-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-pdo-firebird" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-pdo-firebird-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-pgsql" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-pgsql-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-process" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-process-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-pspell" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-pspell-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-snmp" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-snmp-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-soap" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-soap-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-sodium" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-sodium-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-tidy" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-tidy-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-xml" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-xml-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260514-73-0003</id>
		<issued date="2026-05-14" />
		<updated date="2026-05-14" />
		<title>Уязвимость php </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в php</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-cve-2025-14180-7.3/</description>
               <solution>Установить обновление для пакета(ов) php
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-php-cve-2025-14180-7.3/" type="self" id="ROS-20260514-73-0003" title="ROS-20260514-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14180" type="cve" id="CVE-2025-14180" title="CVE-2025-14180" />
			<reference href="https://bdu.fstec.ru/vul/2026-00449" type="self" id="BDU:2026-00449" title="BDU:2026-00449" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="php" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-bcmath" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-bcmath-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-cli" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-cli-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-common" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-common-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-dba" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-dba-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-dbg" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-dbg-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-devel" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-devel-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-embedded" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-embedded-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-enchant" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-enchant-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-ffi" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-ffi-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-fpm" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-fpm-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-gd" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-gd-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-gmp" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-gmp-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-imap" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-imap-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-intl" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-intl-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-ldap" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-ldap-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-mbstring" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-mbstring-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-mysqlnd" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-mysqlnd-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-odbc" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-odbc-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-opcache" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-opcache-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-pdo" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-pdo-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-pdo-dblib" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-pdo-dblib-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-pdo-firebird" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-pdo-firebird-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-pgsql" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-pgsql-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-process" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-process-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-pspell" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-pspell-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-snmp" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-snmp-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-soap" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-soap-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-sodium" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-sodium-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-tidy" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-tidy-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
				<package name="php-xml" epoch="0" version="8.1.34" release="1.el7" arch="x86_64" src="php-8.1.34-1.el7.src.rpm">
					<filename>php-xml-0:8.1.34-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0001</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость firebird </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в firebird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firebird-cve-2026-40342-7.3/</description>
               <solution>Установить обновление для пакета(ов) firebird
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firebird-cve-2026-40342-7.3/" type="self" id="ROS-20260515-73-0001" title="ROS-20260515-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-40342" type="cve" id="CVE-2026-40342" title="CVE-2026-40342" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firebird" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="firebird-devel" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-devel-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="firebird-utils" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-utils-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libfbclient2" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>libfbclient2-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libfbclient2-devel" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>libfbclient2-devel-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libib-util" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>libib-util-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="firebird-doc" epoch="0" version="3.0.14.33856" release="1.el7" arch="noarch" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-doc-0:3.0.14.33856-1.el7.noarch.rpm</filename>
				</package>
				<package name="firebird-examples" epoch="0" version="3.0.14.33856" release="1.el7" arch="noarch" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-examples-0:3.0.14.33856-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0002</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость firebird </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firebird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firebird-cve-2025-65104-7.3/</description>
               <solution>Установить обновление для пакета(ов) firebird
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firebird-cve-2025-65104-7.3/" type="self" id="ROS-20260515-73-0002" title="ROS-20260515-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65104" type="cve" id="CVE-2025-65104" title="CVE-2025-65104" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firebird" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="firebird-devel" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-devel-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="firebird-utils" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-utils-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libfbclient2" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>libfbclient2-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libfbclient2-devel" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>libfbclient2-devel-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libib-util" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>libib-util-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="firebird-doc" epoch="0" version="3.0.14.33856" release="1.el7" arch="noarch" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-doc-0:3.0.14.33856-1.el7.noarch.rpm</filename>
				</package>
				<package name="firebird-examples" epoch="0" version="3.0.14.33856" release="1.el7" arch="noarch" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-examples-0:3.0.14.33856-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0003</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость firebird </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firebird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firebird-cve-2026-28212-7.3/</description>
               <solution>Установить обновление для пакета(ов) firebird
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firebird-cve-2026-28212-7.3/" type="self" id="ROS-20260515-73-0003" title="ROS-20260515-73-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28212" type="cve" id="CVE-2026-28212" title="CVE-2026-28212" />
			<reference href="https://bdu.fstec.ru/vul/2026-05715" type="self" id="BDU:2026-05715" title="BDU:2026-05715" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firebird" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="firebird-devel" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-devel-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="firebird-utils" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-utils-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libfbclient2" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>libfbclient2-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libfbclient2-devel" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>libfbclient2-devel-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libib-util" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>libib-util-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="firebird-doc" epoch="0" version="3.0.14.33856" release="1.el7" arch="noarch" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-doc-0:3.0.14.33856-1.el7.noarch.rpm</filename>
				</package>
				<package name="firebird-examples" epoch="0" version="3.0.14.33856" release="1.el7" arch="noarch" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-examples-0:3.0.14.33856-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0004</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость firebird </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firebird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firebird-cve-2026-27890-7.3/</description>
               <solution>Установить обновление для пакета(ов) firebird
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firebird-cve-2026-27890-7.3/" type="self" id="ROS-20260515-73-0004" title="ROS-20260515-73-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27890" type="cve" id="CVE-2026-27890" title="CVE-2026-27890" />
			<reference href="https://bdu.fstec.ru/vul/2026-05719" type="self" id="BDU:2026-05719" title="BDU:2026-05719" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firebird" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="firebird-devel" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-devel-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="firebird-utils" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-utils-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libfbclient2" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>libfbclient2-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libfbclient2-devel" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>libfbclient2-devel-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libib-util" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>libib-util-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="firebird-doc" epoch="0" version="3.0.14.33856" release="1.el7" arch="noarch" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-doc-0:3.0.14.33856-1.el7.noarch.rpm</filename>
				</package>
				<package name="firebird-examples" epoch="0" version="3.0.14.33856" release="1.el7" arch="noarch" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-examples-0:3.0.14.33856-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0005</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость firebird </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firebird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firebird-cve-2026-28224-7.3/</description>
               <solution>Установить обновление для пакета(ов) firebird
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firebird-cve-2026-28224-7.3/" type="self" id="ROS-20260515-73-0005" title="ROS-20260515-73-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28224" type="cve" id="CVE-2026-28224" title="CVE-2026-28224" />
			<reference href="https://bdu.fstec.ru/vul/2026-05711" type="self" id="BDU:2026-05711" title="BDU:2026-05711" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firebird" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="firebird-devel" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-devel-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="firebird-utils" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-utils-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libfbclient2" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>libfbclient2-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libfbclient2-devel" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>libfbclient2-devel-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libib-util" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>libib-util-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="firebird-doc" epoch="0" version="3.0.14.33856" release="1.el7" arch="noarch" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-doc-0:3.0.14.33856-1.el7.noarch.rpm</filename>
				</package>
				<package name="firebird-examples" epoch="0" version="3.0.14.33856" release="1.el7" arch="noarch" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-examples-0:3.0.14.33856-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0006</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость firebird </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firebird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firebird-cve-2026-28214-7.3/</description>
               <solution>Установить обновление для пакета(ов) firebird
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firebird-cve-2026-28214-7.3/" type="self" id="ROS-20260515-73-0006" title="ROS-20260515-73-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28214" type="cve" id="CVE-2026-28214" title="CVE-2026-28214" />
			<reference href="https://bdu.fstec.ru/vul/2026-05720" type="self" id="BDU:2026-05720" title="BDU:2026-05720" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firebird" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="firebird-devel" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-devel-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="firebird-utils" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-utils-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libfbclient2" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>libfbclient2-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libfbclient2-devel" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>libfbclient2-devel-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libib-util" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>libib-util-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="firebird-doc" epoch="0" version="3.0.14.33856" release="1.el7" arch="noarch" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-doc-0:3.0.14.33856-1.el7.noarch.rpm</filename>
				</package>
				<package name="firebird-examples" epoch="0" version="3.0.14.33856" release="1.el7" arch="noarch" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-examples-0:3.0.14.33856-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0007</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость firebird </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firebird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firebird-cve-2026-34232-7.3/</description>
               <solution>Установить обновление для пакета(ов) firebird
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firebird-cve-2026-34232-7.3/" type="self" id="ROS-20260515-73-0007" title="ROS-20260515-73-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34232" type="cve" id="CVE-2026-34232" title="CVE-2026-34232" />
			<reference href="https://bdu.fstec.ru/vul/2026-05713" type="self" id="BDU:2026-05713" title="BDU:2026-05713" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firebird" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="firebird-devel" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-devel-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="firebird-utils" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-utils-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libfbclient2" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>libfbclient2-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libfbclient2-devel" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>libfbclient2-devel-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libib-util" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>libib-util-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="firebird-doc" epoch="0" version="3.0.14.33856" release="1.el7" arch="noarch" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-doc-0:3.0.14.33856-1.el7.noarch.rpm</filename>
				</package>
				<package name="firebird-examples" epoch="0" version="3.0.14.33856" release="1.el7" arch="noarch" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-examples-0:3.0.14.33856-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0008</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость firebird </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firebird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firebird-cve-2026-33337-7.3/</description>
               <solution>Установить обновление для пакета(ов) firebird
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firebird-cve-2026-33337-7.3/" type="self" id="ROS-20260515-73-0008" title="ROS-20260515-73-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33337" type="cve" id="CVE-2026-33337" title="CVE-2026-33337" />
			<reference href="https://bdu.fstec.ru/vul/2026-05714" type="self" id="BDU:2026-05714" title="BDU:2026-05714" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firebird" epoch="0" version="4.0.7.3271" release="1.el7" arch="x86_64" src="firebird-4.0.7.3271-1.el7.src.rpm">
					<filename>firebird-0:4.0.7.3271-1.el7.x86_64.rpm</filename>
				</package>
				<package name="firebird-devel" epoch="0" version="4.0.7.3271" release="1.el7" arch="x86_64" src="firebird-4.0.7.3271-1.el7.src.rpm">
					<filename>firebird-devel-0:4.0.7.3271-1.el7.x86_64.rpm</filename>
				</package>
				<package name="firebird-utils" epoch="0" version="4.0.7.3271" release="1.el7" arch="x86_64" src="firebird-4.0.7.3271-1.el7.src.rpm">
					<filename>firebird-utils-0:4.0.7.3271-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libfbclient2" epoch="0" version="4.0.7.3271" release="1.el7" arch="x86_64" src="firebird-4.0.7.3271-1.el7.src.rpm">
					<filename>libfbclient2-0:4.0.7.3271-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libfbclient2-devel" epoch="0" version="4.0.7.3271" release="1.el7" arch="x86_64" src="firebird-4.0.7.3271-1.el7.src.rpm">
					<filename>libfbclient2-devel-0:4.0.7.3271-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libib-util" epoch="0" version="4.0.7.3271" release="1.el7" arch="x86_64" src="firebird-4.0.7.3271-1.el7.src.rpm">
					<filename>libib-util-0:4.0.7.3271-1.el7.x86_64.rpm</filename>
				</package>
				<package name="firebird-doc" epoch="0" version="4.0.7.3271" release="1.el7" arch="noarch" src="firebird-4.0.7.3271-1.el7.src.rpm">
					<filename>firebird-doc-0:4.0.7.3271-1.el7.noarch.rpm</filename>
				</package>
				<package name="firebird-examples" epoch="0" version="4.0.7.3271" release="1.el7" arch="noarch" src="firebird-4.0.7.3271-1.el7.src.rpm">
					<filename>firebird-examples-0:4.0.7.3271-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0009</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость firebird </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firebird</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firebird-cve-2026-35215-7.3/</description>
               <solution>Установить обновление для пакета(ов) firebird
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-firebird-cve-2026-35215-7.3/" type="self" id="ROS-20260515-73-0009" title="ROS-20260515-73-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-35215" type="cve" id="CVE-2026-35215" title="CVE-2026-35215" />
			<reference href="https://bdu.fstec.ru/vul/2026-05716" type="self" id="BDU:2026-05716" title="BDU:2026-05716" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="firebird" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="firebird-devel" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-devel-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="firebird-utils" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-utils-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libfbclient2" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>libfbclient2-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libfbclient2-devel" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>libfbclient2-devel-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="libib-util" epoch="0" version="3.0.14.33856" release="1.el7" arch="x86_64" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>libib-util-0:3.0.14.33856-1.el7.x86_64.rpm</filename>
				</package>
				<package name="firebird-doc" epoch="0" version="3.0.14.33856" release="1.el7" arch="noarch" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-doc-0:3.0.14.33856-1.el7.noarch.rpm</filename>
				</package>
				<package name="firebird-examples" epoch="0" version="3.0.14.33856" release="1.el7" arch="noarch" src="firebird-3.0.14.33856-1.el7.src.rpm">
					<filename>firebird-examples-0:3.0.14.33856-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0010</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость runc </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в runc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-runc-cve-2016-3697-7.3/</description>
               <solution>Установить обновление для пакета(ов) runc
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-runc-cve-2016-3697-7.3/" type="self" id="ROS-20260515-73-0010" title="ROS-20260515-73-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3697" type="cve" id="CVE-2016-3697" title="CVE-2016-3697" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="runc" epoch="2" version="1.2.8" release="1.el7" arch="x86_64" src="runc-1.2.8-1.el7.src.rpm">
					<filename>runc-2:1.2.8-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0011</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость grafana </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в grafana</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grafana-cve-2026-21727-7.3/</description>
               <solution>Установить обновление для пакета(ов) grafana
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grafana-cve-2026-21727-7.3/" type="self" id="ROS-20260515-73-0011" title="ROS-20260515-73-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21727" type="cve" id="CVE-2026-21727" title="CVE-2026-21727" />
			<reference href="https://bdu.fstec.ru/vul/2026-02013" type="self" id="BDU:2026-02013" title="BDU:2026-02013" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="grafana" epoch="0" version="12.3.3" release="1.el7" arch="x86_64" src="grafana-12.3.3-1.el7.src.rpm">
					<filename>grafana-0:12.3.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="grafana-selinux" epoch="0" version="12.3.3" release="1.el7" arch="noarch" src="grafana-12.3.3-1.el7.src.rpm">
					<filename>grafana-selinux-0:12.3.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0012</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость grafana </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в grafana</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grafana-cve-2025-12141-7.3/</description>
               <solution>Установить обновление для пакета(ов) grafana
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grafana-cve-2025-12141-7.3/" type="self" id="ROS-20260515-73-0012" title="ROS-20260515-73-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12141" type="cve" id="CVE-2025-12141" title="CVE-2025-12141" />
			<reference href="https://bdu.fstec.ru/vul/2026-05567" type="self" id="BDU:2026-05567" title="BDU:2026-05567" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="grafana" epoch="0" version="12.3.3" release="1.el7" arch="x86_64" src="grafana-12.3.3-1.el7.src.rpm">
					<filename>grafana-0:12.3.3-1.el7.x86_64.rpm</filename>
				</package>
				<package name="grafana-selinux" epoch="0" version="12.3.3" release="1.el7" arch="noarch" src="grafana-12.3.3-1.el7.src.rpm">
					<filename>grafana-selinux-0:12.3.3-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0013</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость grafana </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в grafana</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grafana-cve-2026-21725-7.3/</description>
               <solution>Установить обновление для пакета(ов) grafana
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-grafana-cve-2026-21725-7.3/" type="self" id="ROS-20260515-73-0013" title="ROS-20260515-73-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21725" type="cve" id="CVE-2026-21725" title="CVE-2026-21725" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="grafana" epoch="0" version="12.4.1" release="1.el7" arch="x86_64" src="grafana-12.4.1-1.el7.src.rpm">
					<filename>grafana-0:12.4.1-1.el7.x86_64.rpm</filename>
				</package>
				<package name="grafana-selinux" epoch="0" version="12.4.1" release="1.el7" arch="noarch" src="grafana-12.4.1-1.el7.src.rpm">
					<filename>grafana-selinux-0:12.4.1-1.el7.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0014</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-2441-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-2441-7.3/" type="self" id="ROS-20260515-73-0014" title="ROS-20260515-73-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2441" type="cve" id="CVE-2026-2441" title="CVE-2026-2441" />
			<reference href="https://bdu.fstec.ru/vul/2026-01947" type="self" id="BDU:2026-01947" title="BDU:2026-01947" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0015</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-2648-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-2648-7.3/" type="self" id="ROS-20260515-73-0015" title="ROS-20260515-73-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2648" type="cve" id="CVE-2026-2648" title="CVE-2026-2648" />
			<reference href="https://bdu.fstec.ru/vul/2026-06198" type="self" id="BDU:2026-06198" title="BDU:2026-06198" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0016</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-2649-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-2649-7.3/" type="self" id="ROS-20260515-73-0016" title="ROS-20260515-73-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2649" type="cve" id="CVE-2026-2649" title="CVE-2026-2649" />
			<reference href="https://bdu.fstec.ru/vul/2026-06197" type="self" id="BDU:2026-06197" title="BDU:2026-06197" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0017</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3061-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3061-7.3/" type="self" id="ROS-20260515-73-0017" title="ROS-20260515-73-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3061" type="cve" id="CVE-2026-3061" title="CVE-2026-3061" />
			<reference href="https://bdu.fstec.ru/vul/2026-03195" type="self" id="BDU:2026-03195" title="BDU:2026-03195" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0018</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3062-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3062-7.3/" type="self" id="ROS-20260515-73-0018" title="ROS-20260515-73-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3062" type="cve" id="CVE-2026-3062" title="CVE-2026-3062" />
			<reference href="https://bdu.fstec.ru/vul/2026-03197" type="self" id="BDU:2026-03197" title="BDU:2026-03197" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0019</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3536-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3536-7.3/" type="self" id="ROS-20260515-73-0019" title="ROS-20260515-73-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3536" type="cve" id="CVE-2026-3536" title="CVE-2026-3536" />
			<reference href="https://bdu.fstec.ru/vul/2026-03181" type="self" id="BDU:2026-03181" title="BDU:2026-03181" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0020</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3063-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3063-7.3/" type="self" id="ROS-20260515-73-0020" title="ROS-20260515-73-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3063" type="cve" id="CVE-2026-3063" title="CVE-2026-3063" />
			<reference href="https://bdu.fstec.ru/vul/2026-06183" type="self" id="BDU:2026-06183" title="BDU:2026-06183" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0021</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3537-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3537-7.3/" type="self" id="ROS-20260515-73-0021" title="ROS-20260515-73-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3537" type="cve" id="CVE-2026-3537" title="CVE-2026-3537" />
			<reference href="https://bdu.fstec.ru/vul/2026-03198" type="self" id="BDU:2026-03198" title="BDU:2026-03198" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0022</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3539-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3539-7.3/" type="self" id="ROS-20260515-73-0022" title="ROS-20260515-73-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3539" type="cve" id="CVE-2026-3539" title="CVE-2026-3539" />
			<reference href="https://bdu.fstec.ru/vul/2026-03184" type="self" id="BDU:2026-03184" title="BDU:2026-03184" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0023</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3538-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3538-7.3/" type="self" id="ROS-20260515-73-0023" title="ROS-20260515-73-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3538" type="cve" id="CVE-2026-3538" title="CVE-2026-3538" />
			<reference href="https://bdu.fstec.ru/vul/2026-03182" type="self" id="BDU:2026-03182" title="BDU:2026-03182" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0024</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3541-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3541-7.3/" type="self" id="ROS-20260515-73-0024" title="ROS-20260515-73-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3541" type="cve" id="CVE-2026-3541" title="CVE-2026-3541" />
			<reference href="https://bdu.fstec.ru/vul/2026-03194" type="self" id="BDU:2026-03194" title="BDU:2026-03194" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0025</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3540-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3540-7.3/" type="self" id="ROS-20260515-73-0025" title="ROS-20260515-73-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3540" type="cve" id="CVE-2026-3540" title="CVE-2026-3540" />
			<reference href="https://bdu.fstec.ru/vul/2026-03190" type="self" id="BDU:2026-03190" title="BDU:2026-03190" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0026</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3542-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3542-7.3/" type="self" id="ROS-20260515-73-0026" title="ROS-20260515-73-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3542" type="cve" id="CVE-2026-3542" title="CVE-2026-3542" />
			<reference href="https://bdu.fstec.ru/vul/2026-03196" type="self" id="BDU:2026-03196" title="BDU:2026-03196" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0027</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3544-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3544-7.3/" type="self" id="ROS-20260515-73-0027" title="ROS-20260515-73-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3544" type="cve" id="CVE-2026-3544" title="CVE-2026-3544" />
			<reference href="https://bdu.fstec.ru/vul/2026-03200" type="self" id="BDU:2026-03200" title="BDU:2026-03200" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0028</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3543-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3543-7.3/" type="self" id="ROS-20260515-73-0028" title="ROS-20260515-73-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3543" type="cve" id="CVE-2026-3543" title="CVE-2026-3543" />
			<reference href="https://bdu.fstec.ru/vul/2026-03199" type="self" id="BDU:2026-03199" title="BDU:2026-03199" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0029</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3913-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3913-7.3/" type="self" id="ROS-20260515-73-0029" title="ROS-20260515-73-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3913" type="cve" id="CVE-2026-3913" title="CVE-2026-3913" />
			<reference href="https://bdu.fstec.ru/vul/2026-04684" type="self" id="BDU:2026-04684" title="BDU:2026-04684" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0030</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3915-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3915-7.3/" type="self" id="ROS-20260515-73-0030" title="ROS-20260515-73-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3915" type="cve" id="CVE-2026-3915" title="CVE-2026-3915" />
			<reference href="https://bdu.fstec.ru/vul/2026-04686" type="self" id="BDU:2026-04686" title="BDU:2026-04686" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0031</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3914-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3914-7.3/" type="self" id="ROS-20260515-73-0031" title="ROS-20260515-73-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3914" type="cve" id="CVE-2026-3914" title="CVE-2026-3914" />
			<reference href="https://bdu.fstec.ru/vul/2026-04685" type="self" id="BDU:2026-04685" title="BDU:2026-04685" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0032</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3917-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3917-7.3/" type="self" id="ROS-20260515-73-0032" title="ROS-20260515-73-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3917" type="cve" id="CVE-2026-3917" title="CVE-2026-3917" />
			<reference href="https://bdu.fstec.ru/vul/2026-05237" type="self" id="BDU:2026-05237" title="BDU:2026-05237" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0033</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3916-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3916-7.3/" type="self" id="ROS-20260515-73-0033" title="ROS-20260515-73-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3916" type="cve" id="CVE-2026-3916" title="CVE-2026-3916" />
			<reference href="https://bdu.fstec.ru/vul/2026-05243" type="self" id="BDU:2026-05243" title="BDU:2026-05243" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0034</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3918-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3918-7.3/" type="self" id="ROS-20260515-73-0034" title="ROS-20260515-73-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3918" type="cve" id="CVE-2026-3918" title="CVE-2026-3918" />
			<reference href="https://bdu.fstec.ru/vul/2026-05235" type="self" id="BDU:2026-05235" title="BDU:2026-05235" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0035</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3919-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3919-7.3/" type="self" id="ROS-20260515-73-0035" title="ROS-20260515-73-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3919" type="cve" id="CVE-2026-3919" title="CVE-2026-3919" />
			<reference href="https://bdu.fstec.ru/vul/2026-05227" type="self" id="BDU:2026-05227" title="BDU:2026-05227" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0036</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3921-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3921-7.3/" type="self" id="ROS-20260515-73-0036" title="ROS-20260515-73-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3921" type="cve" id="CVE-2026-3921" title="CVE-2026-3921" />
			<reference href="https://bdu.fstec.ru/vul/2026-05233" type="self" id="BDU:2026-05233" title="BDU:2026-05233" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0037</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3920-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3920-7.3/" type="self" id="ROS-20260515-73-0037" title="ROS-20260515-73-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3920" type="cve" id="CVE-2026-3920" title="CVE-2026-3920" />
			<reference href="https://bdu.fstec.ru/vul/2026-05244" type="self" id="BDU:2026-05244" title="BDU:2026-05244" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0038</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3922-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3922-7.3/" type="self" id="ROS-20260515-73-0038" title="ROS-20260515-73-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3922" type="cve" id="CVE-2026-3922" title="CVE-2026-3922" />
			<reference href="https://bdu.fstec.ru/vul/2026-05230" type="self" id="BDU:2026-05230" title="BDU:2026-05230" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0039</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3924-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3924-7.3/" type="self" id="ROS-20260515-73-0039" title="ROS-20260515-73-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3924" type="cve" id="CVE-2026-3924" title="CVE-2026-3924" />
			<reference href="https://bdu.fstec.ru/vul/2026-05239" type="self" id="BDU:2026-05239" title="BDU:2026-05239" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0040</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3923-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3923-7.3/" type="self" id="ROS-20260515-73-0040" title="ROS-20260515-73-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3923" type="cve" id="CVE-2026-3923" title="CVE-2026-3923" />
			<reference href="https://bdu.fstec.ru/vul/2026-05238" type="self" id="BDU:2026-05238" title="BDU:2026-05238" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0041</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3925-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3925-7.3/" type="self" id="ROS-20260515-73-0041" title="ROS-20260515-73-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3925" type="cve" id="CVE-2026-3925" title="CVE-2026-3925" />
			<reference href="https://bdu.fstec.ru/vul/2026-05241" type="self" id="BDU:2026-05241" title="BDU:2026-05241" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0042</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3927-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3927-7.3/" type="self" id="ROS-20260515-73-0042" title="ROS-20260515-73-0042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3927" type="cve" id="CVE-2026-3927" title="CVE-2026-3927" />
			<reference href="https://bdu.fstec.ru/vul/2026-05744" type="self" id="BDU:2026-05744" title="BDU:2026-05744" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0043</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3926-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3926-7.3/" type="self" id="ROS-20260515-73-0043" title="ROS-20260515-73-0043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3926" type="cve" id="CVE-2026-3926" title="CVE-2026-3926" />
			<reference href="https://bdu.fstec.ru/vul/2026-05754" type="self" id="BDU:2026-05754" title="BDU:2026-05754" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0044</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3929-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3929-7.3/" type="self" id="ROS-20260515-73-0044" title="ROS-20260515-73-0044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3929" type="cve" id="CVE-2026-3929" title="CVE-2026-3929" />
			<reference href="https://bdu.fstec.ru/vul/2026-05746" type="self" id="BDU:2026-05746" title="BDU:2026-05746" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0045</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3928-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3928-7.3/" type="self" id="ROS-20260515-73-0045" title="ROS-20260515-73-0045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3928" type="cve" id="CVE-2026-3928" title="CVE-2026-3928" />
			<reference href="https://bdu.fstec.ru/vul/2026-05745" type="self" id="BDU:2026-05745" title="BDU:2026-05745" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0046</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3930-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3930-7.3/" type="self" id="ROS-20260515-73-0046" title="ROS-20260515-73-0046" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3930" type="cve" id="CVE-2026-3930" title="CVE-2026-3930" />
			<reference href="https://bdu.fstec.ru/vul/2026-05747" type="self" id="BDU:2026-05747" title="BDU:2026-05747" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0047</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3932-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3932-7.3/" type="self" id="ROS-20260515-73-0047" title="ROS-20260515-73-0047" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3932" type="cve" id="CVE-2026-3932" title="CVE-2026-3932" />
			<reference href="https://bdu.fstec.ru/vul/2026-05749" type="self" id="BDU:2026-05749" title="BDU:2026-05749" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0048</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3931-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3931-7.3/" type="self" id="ROS-20260515-73-0048" title="ROS-20260515-73-0048" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3931" type="cve" id="CVE-2026-3931" title="CVE-2026-3931" />
			<reference href="https://bdu.fstec.ru/vul/2026-05748" type="self" id="BDU:2026-05748" title="BDU:2026-05748" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0049</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3934-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3934-7.3/" type="self" id="ROS-20260515-73-0049" title="ROS-20260515-73-0049" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3934" type="cve" id="CVE-2026-3934" title="CVE-2026-3934" />
			<reference href="https://bdu.fstec.ru/vul/2026-04781" type="self" id="BDU:2026-04781" title="BDU:2026-04781" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0050</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3936-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3936-7.3/" type="self" id="ROS-20260515-73-0050" title="ROS-20260515-73-0050" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3936" type="cve" id="CVE-2026-3936" title="CVE-2026-3936" />
			<reference href="https://bdu.fstec.ru/vul/2026-05163" type="self" id="BDU:2026-05163" title="BDU:2026-05163" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0051</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3935-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3935-7.3/" type="self" id="ROS-20260515-73-0051" title="ROS-20260515-73-0051" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3935" type="cve" id="CVE-2026-3935" title="CVE-2026-3935" />
			<reference href="https://bdu.fstec.ru/vul/2026-05750" type="self" id="BDU:2026-05750" title="BDU:2026-05750" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0052</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3937-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3937-7.3/" type="self" id="ROS-20260515-73-0052" title="ROS-20260515-73-0052" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3937" type="cve" id="CVE-2026-3937" title="CVE-2026-3937" />
			<reference href="https://bdu.fstec.ru/vul/2026-05755" type="self" id="BDU:2026-05755" title="BDU:2026-05755" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0053</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3939-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3939-7.3/" type="self" id="ROS-20260515-73-0053" title="ROS-20260515-73-0053" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3939" type="cve" id="CVE-2026-3939" title="CVE-2026-3939" />
			<reference href="https://bdu.fstec.ru/vul/2026-05756" type="self" id="BDU:2026-05756" title="BDU:2026-05756" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0054</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3941-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3941-7.3/" type="self" id="ROS-20260515-73-0054" title="ROS-20260515-73-0054" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3941" type="cve" id="CVE-2026-3941" title="CVE-2026-3941" />
			<reference href="https://bdu.fstec.ru/vul/2026-05753" type="self" id="BDU:2026-05753" title="BDU:2026-05753" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260515-73-0055</id>
		<issued date="2026-05-15" />
		<updated date="2026-05-15" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3940-7.3/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-chromium-cve-2026-3940-7.3/" type="self" id="ROS-20260515-73-0055" title="ROS-20260515-73-0055" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3940" type="cve" id="CVE-2026-3940" title="CVE-2026-3940" />
			<reference href="https://bdu.fstec.ru/vul/2026-05752" type="self" id="BDU:2026-05752" title="BDU:2026-05752" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="chromedriver" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromedriver-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="146.0.7680.177" release="1.el7" arch="x86_64" src="chromium-146.0.7680.177-1.el7.src.rpm">
					<filename>chromium-common-0:146.0.7680.177-1.el7.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260516-73-0001</id>
		<issued date="2026-05-16" />
		<updated date="2026-05-16" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2026-43284-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2026-43284-7.3/" type="self" id="ROS-20260516-73-0001" title="ROS-20260516-73-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43284" type="cve" id="CVE-2026-43284" title="CVE-2026-43284" />
			<reference href="https://bdu.fstec.ru/vul/2026-06439" type="self" id="BDU:2026-06439" title="BDU:2026-06439" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.172" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.172-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.172-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.172" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.172-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.172-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.172" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.172-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.172-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.172" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.172-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.172-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.172" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.172-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.172-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.172" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.172-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.172-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.172" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.172-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.172-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.172" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.172-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.172-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.172" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.172-1.el7.3.src.rpm">
					<filename>perf-0:6.1.172-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.172" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.172-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.172-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.172" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.172-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.172-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260516-73-0002</id>
		<issued date="2026-05-16" />
		<updated date="2026-05-16" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2026-43500-7.3/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-kernel-lt-cve-2026-43500-7.3/" type="self" id="ROS-20260516-73-0002" title="ROS-20260516-73-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43500" type="cve" id="CVE-2026-43500" title="CVE-2026-43500" />
			<reference href="https://bdu.fstec.ru/vul/2026-06470" type="self" id="BDU:2026-06470" title="BDU:2026-06470" />
		</references>
		<pkglist>
			<collection short="updates">
				<name>updates</name>
				<package name="kernel-lt" epoch="0" version="6.1.172" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.172-1.el7.3.src.rpm">
					<filename>kernel-lt-0:6.1.172-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.1.172" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.172-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-0:6.1.172-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.1.172" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.172-1.el7.3.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.1.172-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.1.172" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.172-1.el7.3.src.rpm">
					<filename>kernel-lt-devel-0:6.1.172-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.1.172" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.172-1.el7.3.src.rpm">
					<filename>kernel-lt-headers-0:6.1.172-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools" epoch="0" version="6.1.172" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.172-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-0:6.1.172-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs" epoch="0" version="6.1.172" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.172-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-0:6.1.172-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-tools-libs-devel" epoch="0" version="6.1.172" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.172-1.el7.3.src.rpm">
					<filename>kernel-lt-tools-libs-devel-0:6.1.172-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="perf" epoch="0" version="6.1.172" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.172-1.el7.3.src.rpm">
					<filename>perf-0:6.1.172-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="python3-perf" epoch="0" version="6.1.172" release="1.el7.3" arch="x86_64" src="kernel-lt-6.1.172-1.el7.3.src.rpm">
					<filename>python3-perf-0:6.1.172-1.el7.3.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-doc" epoch="0" version="6.1.172" release="1.el7.3" arch="noarch" src="kernel-lt-6.1.172-1.el7.3.src.rpm">
					<filename>kernel-lt-doc-0:6.1.172-1.el7.3.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
</updates>
